A. Floros
I read it because it was extremely dirty and I didn't want to see it anymore on my table. It does a good job in describing IEEE802.11e admission control. However, their proposal is naive; the end note explaining that the "algorithm" is under patent revision, funny.
Tuesday, August 28, 2007
Thursday, August 23, 2007
A Survey of Web Services in Telecommunications
Donna Griffin and Dirk Pesch
The authors suggest the implantation of SOA in telecommunication networks to facilitate the development of new services and increase revenue. The concepts of WS, SOA and EDA are explained together with the standardization bodies and standards that support them.
The authors suggest the implantation of SOA in telecommunication networks to facilitate the development of new services and increase revenue. The concepts of WS, SOA and EDA are explained together with the standardization bodies and standards that support them.
Tuesday, August 21, 2007
Reconfigurable architecture and mobility management for next-generation wireless IP networks
Jyh-Cheng Chen Jui-Hung Yeh Shao-Hsiu Hung Fu-Cheng Chen Li-Wei Lin Yi-Wen Lan
4G involves the integration of different RAN. The authors of the article propose a unique core network to which the different RAN connect. There are different existing mobility management protocols. The authors differentiate between micro-mobility and macro-mobility, and propose RAMP, a protocol that allows the coexistence of the different mobility protocols.
4G involves the integration of different RAN. The authors of the article propose a unique core network to which the different RAN connect. There are different existing mobility management protocols. The authors differentiate between micro-mobility and macro-mobility, and propose RAMP, a protocol that allows the coexistence of the different mobility protocols.
Monday, August 20, 2007
Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs
Jin, Y. Kesidis, G.
The authors assume that the users are selfish and don't follow the IEEE802.11 protocol. The users modify the value they use to multiply the contention window after a collision to maximize a utility function. The authors propose a game and find the stability points.
The math is complex.
The authors assume that the users are selfish and don't follow the IEEE802.11 protocol. The users modify the value they use to multiply the contention window after a collision to maximize a utility function. The authors propose a game and find the stability points.
The math is complex.
Subscribe to:
Posts (Atom)