Caimu Tang, Member, IEEE, and Dapeng Oliver Wu, Senior Member, IEEE
The authors detail the privacy requirements for mobile dives and propose a mechanism to attain such privacy. It is based on Elliptic Curve Cryptography and thus does not place overwhelming burden on the mobile device.
Monday, March 31, 2008
Tuesday, March 25, 2008
Analysis of the Stability and Performance of Exponential Backoff
Byung-Jae Kwak,Nah-Oak Song,Leonard E. Miller
An extensive analysis of Exponential Backoff and its asymptotic properties is provided. Unfortunately, the truncated exponential backoff which is the one that actually appears in real implementations is not considered.
An extensive analysis of Exponential Backoff and its asymptotic properties is provided. Unfortunately, the truncated exponential backoff which is the one that actually appears in real implementations is not considered.
Thursday, March 20, 2008
A Capacity Analysis for the IEEE 802.11 MAC Protocol
Y.C. TAY and K.C. CHUA
Very interesting paper. The author provide a number of claims related to DCF that enhance the understanding of the protocol. They already highlight that the optimal transmission probability is a function of the packet length and the number of active terminals.
Very interesting paper. The author provide a number of claims related to DCF that enhance the understanding of the protocol. They already highlight that the optimal transmission probability is a function of the packet length and the number of active terminals.
Tuesday, March 18, 2008
IEEE 802.11 Wireless Local Area Networks
Brian P. Crow, Indra Widjaja, Jeon Geun Kim, Prescott T. Sakai
Even thoug I could not finish the paper (the scanning is horrible) I had to write a comment. These guys already obtained results than me... and it was back in the 20th century :-P
Even thoug I could not finish the paper (the scanning is horrible) I had to write a comment. These guys already obtained results than me... and it was back in the 20th century :-P
VARIABLE BIT RATE VOIP IN IEEE 802.11E WIRELESS LANS
FRANK HAIZHON LI, UNIVERSITY OF SOUTH CAROLINA UPSTATE
YANG XIAO AND JINGYUAN ZHANG, UNIVERSITY OF ALABAMA
The article presents CAC for VBR VoIP calls. The variable bit-rate is a consequence of the on-off nature of the calls. The authors present a time-based admission control mechanism that uses token-bucket and relies on the observation information to decide whether to accept a new call or not. Additionally they propose that the AP accesses the channel with priority to solve the uplink-downlink unfairness.
YANG XIAO AND JINGYUAN ZHANG, UNIVERSITY OF ALABAMA
The article presents CAC for VBR VoIP calls. The variable bit-rate is a consequence of the on-off nature of the calls. The authors present a time-based admission control mechanism that uses token-bucket and relies on the observation information to decide whether to accept a new call or not. Additionally they propose that the AP accesses the channel with priority to solve the uplink-downlink unfairness.
EVALUATION OF SIGNALING LOADS IN 3GPP NETWORKS
DARIO S. TONESI AND LUCA SALGARELLI, UNIVERSITY OF BRESCIA
YAN SUN AND THOMAS F. LA PORTA, PENNSYLVANIA STATE UNIVERSITY
The article compares the signaling load of 3GPP release 99 to release 5. The long SIP text messages and the higher number of messages are responsible of increased signaling traffic.
YAN SUN AND THOMAS F. LA PORTA, PENNSYLVANIA STATE UNIVERSITY
The article compares the signaling load of 3GPP release 99 to release 5. The long SIP text messages and the higher number of messages are responsible of increased signaling traffic.
Monday, March 17, 2008
sempre 16
Quan una estació ha d'elegir un backoff després de transmetre un paquet amb èxit, calcula un valor aleatori entre 0 i CWmin. Per què no elegir sempre 16? D'aquesta manera després d'un transitori amb col.lisions, el sistema es comportaria com un TDMA.
Friday, March 14, 2008
z-mac: a hybrid mac for wireless sensor networks
Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min
I got the idea of what a hybrid protocol is. A combination of csma and tdma. It seemed to me that the proposal is excruciatingly complex and tedious. However, i must check the following references:
[13] K. Jamieson, H. Balakrishnan and Y. Tay. Sift:A MAC protocol for event driven wireless sensor networks
[19] Y. Tay, K. Jamieson, and H. Balakrishnan. Collision-Minimizing CSMA and its applications to wireless sensor networks
I got the idea of what a hybrid protocol is. A combination of csma and tdma. It seemed to me that the proposal is excruciatingly complex and tedious. However, i must check the following references:
[13] K. Jamieson, H. Balakrishnan and Y. Tay. Sift:A MAC protocol for event driven wireless sensor networks
[19] Y. Tay, K. Jamieson, and H. Balakrishnan. Collision-Minimizing CSMA and its applications to wireless sensor networks
Thursday, March 13, 2008
Optimal Constant-Window Backoff Scheme for IEEE 802.11 DCF in finite Load Single-Hop Wireless Networks
Hicham Anouar and Christian Bonnet
The authors propose using an optimal fixed window which is computed as a function of the number stations. There is a weird assumption related to a "normalized packet length". I found a few details that could be useful in refining my own paper.
I was surprised to see that they have a journal version of the same paper.
The authors propose using an optimal fixed window which is computed as a function of the number stations. There is a weird assumption related to a "normalized packet length". I found a few details that could be useful in refining my own paper.
I was surprised to see that they have a journal version of the same paper.
Friday, March 7, 2008
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
David A. Bryan and Bruce B. Lowekamp, Cullen Jennings
I read this as an introduction to P2PSIP, before attempting to understand the RFCs.
I read this as an introduction to P2PSIP, before attempting to understand the RFCs.
Subscribe to:
Posts (Atom)