Monday, March 31, 2008

Mobile Privacy in Wireless Networks–Revisited

Caimu Tang, Member, IEEE, and Dapeng Oliver Wu, Senior Member, IEEE

The authors detail the privacy requirements for mobile dives and propose a mechanism to attain such privacy. It is based on Elliptic Curve Cryptography and thus does not place overwhelming burden on the mobile device.

Tuesday, March 25, 2008

Analysis of the Stability and Performance of Exponential Backoff

Byung-Jae Kwak,Nah-Oak Song,Leonard E. Miller

An extensive analysis of Exponential Backoff and its asymptotic properties is provided. Unfortunately, the truncated exponential backoff which is the one that actually appears in real implementations is not considered.

Thursday, March 20, 2008

A Capacity Analysis for the IEEE 802.11 MAC Protocol

Y.C. TAY and K.C. CHUA

Very interesting paper. The author provide a number of claims related to DCF that enhance the understanding of the protocol. They already highlight that the optimal transmission probability is a function of the packet length and the number of active terminals.

Tuesday, March 18, 2008

IEEE 802.11 Wireless Local Area Networks

Brian P. Crow, Indra Widjaja, Jeon Geun Kim, Prescott T. Sakai

Even thoug I could not finish the paper (the scanning is horrible) I had to write a comment. These guys already obtained results than me... and it was back in the 20th century :-P

VARIABLE BIT RATE VOIP IN IEEE 802.11E WIRELESS LANS

FRANK HAIZHON LI, UNIVERSITY OF SOUTH CAROLINA UPSTATE
YANG XIAO AND JINGYUAN ZHANG, UNIVERSITY OF ALABAMA

The article presents CAC for VBR VoIP calls. The variable bit-rate is a consequence of the on-off nature of the calls. The authors present a time-based admission control mechanism that uses token-bucket and relies on the observation information to decide whether to accept a new call or not. Additionally they propose that the AP accesses the channel with priority to solve the uplink-downlink unfairness.

EVALUATION OF SIGNALING LOADS IN 3GPP NETWORKS

DARIO S. TONESI AND LUCA SALGARELLI, UNIVERSITY OF BRESCIA
YAN SUN AND THOMAS F. LA PORTA, PENNSYLVANIA STATE UNIVERSITY

The article compares the signaling load of 3GPP release 99 to release 5. The long SIP text messages and the higher number of messages are responsible of increased signaling traffic.

Monday, March 17, 2008

sempre 16

Quan una estació ha d'elegir un backoff després de transmetre un paquet amb èxit, calcula un valor aleatori entre 0 i CWmin. Per què no elegir sempre 16? D'aquesta manera després d'un transitori amb col.lisions, el sistema es comportaria com un TDMA.

Friday, March 14, 2008

z-mac: a hybrid mac for wireless sensor networks

Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min

I got the idea of what a hybrid protocol is. A combination of csma and tdma. It seemed to me that the proposal is excruciatingly complex and tedious. However, i must check the following references:

[13] K. Jamieson, H. Balakrishnan and Y. Tay. Sift:A MAC protocol for event driven wireless sensor networks

[19] Y. Tay, K. Jamieson, and H. Balakrishnan. Collision-Minimizing CSMA and its applications to wireless sensor networks

Thursday, March 13, 2008

Optimal Constant-Window Backoff Scheme for IEEE 802.11 DCF in finite Load Single-Hop Wireless Networks

Hicham Anouar and Christian Bonnet

The authors propose using an optimal fixed window which is computed as a function of the number stations. There is a weird assumption related to a "normalized packet length". I found a few details that could be useful in refining my own paper.

I was surprised to see that they have a journal version of the same paper.

Friday, March 7, 2008

SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System

David A. Bryan and Bruce B. Lowekamp, Cullen Jennings

I read this as an introduction to P2PSIP, before attempting to understand the RFCs.