Research topic: Multimedia Communication over Wireless Mesh Networks

Size: px
Start display at page:

Download "Research topic: Multimedia Communication over Wireless Mesh Networks"

Transcription

1 Research topic: Multimedia Communication over Wireless Mesh Networks Marcel Castro

2 Education background Bachelor in Electrical Eng. - Federal University of Goias, Goiânia, Brazil 2000 Master or Science in Electrical Eng. State University of Campinas (UNICAMP), Campinas, Brazil PhD in Computer Science Karlstad University (KAU), Karlstad, Sweden - present

3 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work

4 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work

5 Wireless Mesh Networks Node Types Wireless routers Gateways Link Types Intra-mesh wireless links Stationary client access Printers, servers Mobile client access Mobile clients Stationary clients Internet access links

6 Residential/Home Networks Usage Scenarios Office Campus/Community/Public Access Router/GW

7 Mesh Networks: Challenges Transmission Range Directional Antenna or MIMO Multiple Frequencies Multi-radio interfaces Multihop Routing Route Selection with multiple radios Multiple paths Routing to/from gateway Security, Privacy Malicious Users Admission Control Self Management Minimal human intervention avoid network operator Smart Spectrum Utilization Capacity Mobility Use of non-interference channels Header Compression Aggregation of traffic Priorization Multihop Handover Mobile Gateways Service Scalability Quality of Service Real-time applications Gateway 1 Internet Internet Gateway 2

8 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work

9 Voice over IP VoIP over Hybrid MANETs Very hot topic in 3G Uses packetized voice over RTP/UDP/IP High overhead for small voice packets when used over standard Signalling via SIP involves 2 centralized entities: Registrar and Proxy User A e.g. GPRS/UMTS/WLAN User B Mobile Communication Devices Telecom Network Public Internet Wireless Access Networks Mobile PDAs Wireless Sensors Laptops Internet Connectivity Internet Connectivity Mobile Ad Hoc Network

10 Motivation and Characteristics Key Issue: How to provide VoIP services? Potential performance degradation Self Interference due to forwarding Routing required Call Setup Delay: below 5 sec for user satisfaction and interworking with ISDN: Possible Solutions Analyzed* Standard Approach Proxy located at Gateway Distributed SIP SIP signaling delay, network dependent SIP processing delay, proxy dependent Amount of signaling traffic SIP and Service Discovery Peer-to-Peer SIP Media * * M.C. Castro, A.J. Kassler, SIP based Service Provisioning for hybrid MANETs. IWT2007, Brazil, Feb AR1 AR2 INVITE,.. Internet AR3 SIP Request/Response RTP Media Samples Link Connectivity Proxy/ Registrar

11 Standard Approach - Simulation A brief insight through ns-2 simulation: Hybrid MANETs, MNs in grid, Different voice background traffic: ITU G729: 8Kbps, 20ms Bidirectional Exponential traffic talk/silence: 350ms/650ms Distance btw source/destination: 2-7 hops Out-In: 25%-75% SIP INVITE TA SIP Request payload: 500 bytes SIP Response payload: 300bytes Performance in terms of: SIP Call setup delay: Time btw SIP INVITE and 200 OK SIP Call Blocking Probability SIP msg loss IEEE g Data Rate = 24Mbps Link speed of 5Mbps / 2ms AODV-UU Hello Interval: 1s Routing towards Gateway using tunneling Carrier Sence = 500m Received Threshold = 250m Node space in grid = 200m TwoRayGround: Frequency: 2.4GHz Transmission Power = 100mW Tx/Rx Antenna height = 1,5m Tx/Rx Antenna gain = 1dB Sesitivity = -85dBm

12 Standard Approach - Simulation *ITU-T E.721, Network grade of service parameters and target values for circuit-switched services in the evolving isdn, May hops 1 gatew ay 0,9 5 hops 1 gatew ay 2 hops 1 gatew ay 0,8 Call blocking probability (<5sec) 0,7 0,6 0,5 0,4 0,3 0,2 Call Setup Delay (s) Blocking Probability SIP msg. drops Number of SIP INVITE messages Re-invitations due to SIP timeout - 2 hops Re-invitations due to SIP msg dropped - 2 hops 0,1 0 Alternative Approaches Desired Re-invitations due to SIP timeout - 5 hops Re-invitations due to SIP msg dropped - 5 hops Number of background flows Number of background flows

13 Proxy located at Gateway Gateway acts as SIP proxy/registrar on behalf of MANET nodes MANET nodes need to have information about the proxy Static configuration, or Autoconfiguration: Extension of GW discovery mechanism to inform MN about Gateway SIP Capability. Media AR1 AR2 INVITE,.. Proxy/ Registrar Internet Proxy/ Registrar SIP Request/Response RTP Media Samples Link Connectivity AR3 * M.C. Castro, A.J. Kassler A.J., Challenges of SIP in Internet Connected MANETs, Proc. of Int. Symposium of Wireless Pervasive Computing, Puerto Rico, February 2007.

14 Proxy located at Gateway Call Setup Delay where Proxy at AN/GW Call Setup Delay versus number of hops PLR versus number of hops

15 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work

16 Routing Metrics in WMNs Related Work: QoS related approach: Calculate spare bandwidth Perform admission control on new flow [Chen & Heinzelman, JSAC05] Best-effort approach: Various routing metrics

17 Routing Metrics in WMNs Routing Metric should count: Path Length Link Capacity Packet Loss Ratio Interference: Inter-flow interference: Intra-flow interference:

18 Routing Metrics in WMNs ETX Expected Transmission Count [De Couto et al., MobiCom03] WCETT Weight Cumulative ETT [Draves et al., MobiCom04] MIC Metric of Interference and Channel Switching [Yang et al., WiMesh05]

19 Why new metrics? Metric needs to incorporate existing traffic and selftraffic: Self-traffic

20 How to do it? Use MAC timers [Saha, PhD thesis, Rice Univ., 07] Carrier sense and hidden terminal information [Yin et al., JWCMC06]

21 Where to use it? Packet Aggregation M A C IP U D P R T P AUDIO M A C IP U D P R T P AUDIO M A C DATA D T IP U P R P AUDIO DIFS Backoff SIFS ACK DIFS Backoff SIFS ACK DIFS Backoff SIFS ACK t M A C IP AH IP U D P R T P AUDIO IP U DATA D P R T P AUDIO IP U D P R T P AUDIO DIFS Backoff SIFS ACK t Traffic aware routing saved transmission time

22 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work

23 P2P in WMNs Advantages of P2P over centralized infrastructure: Significant autonomy from central servers Exploits resources at the edges of the Internet storage and content CPU cycles Resources at edge have intermittent connectivity, being added & removed Classification: Unstructured P2P file sharing: Napster, Gnutella, KaZaA, search theory, flashfloods Structured DHT systems: Chord, CAN, Pastry, Tapestry, Bamboo, etc

24 Broad definition P2P file sharing Napster, Gnutella, KaZaA, etc P2P communication Instant messaging P2P computation DHTs & their apps Chord, CAN, Pastry, Tapestry P2P apps built over emerging overlays PlanetLab

25 Peer-to-Peer SIP INVITE REGISTER => Contact: columbia.edu Client-server maintenance, configuration, controlled infrastructure Alice s host INVITE alice P2P overlay REGISTER Alice No central server, but potentially higher search latency Cross-layer Cross-layer design: design: -Interaction -Interaction between between P2P P2P Protocols Protocols (DHT (DHT maintenance) maintenance) and and SIP SIP -All -All SIP SIP users users participate participate in in the the P2P P2P overlay overlay

26 Peer-to-Peer SIP cont. P2P SIP Functions Lookup: Find a node that is responsible for given ID through INVITE Node answers 200OK if responsible, otherwise 302 moved temporarily Join the P2P overlay Send REGISTER to Bootstrap node with nodeid, build up finger table Leave the P2P Leaving node stores ressources at predecessor Distributed hash table (DHT) Manage SIP user location Node-ID 683 = hash(bob@kau.se) Overlay maintanance P2P protocol, e.g: OpenDHT, or SIP REGISTER may transport DHT Internet connected MANET Hierarchy of P2P SIP network GW must act as P2P SIP proxy/registrar Bob s Node Node-ID 683 Node C Node-ID INVITE INVITE Alice s Node Node-ID 503 Node A Node-ID Bob s Node Node B Node-ID 24 Alice trying to contact Bob

27 P2P SIP with DHT in hybrid MANET Problems Which protocol is used to maintain P2P SIP Overlay? Reuse SIP REGISTER for maintaining overlay structure Use OpenDHT for register and SIP for INVITE TA Performance of DHT in MANET under mobility and high churn rate? Interworking with external networks: Need P2PSIP node to act as gateway to external networks How P2PSIP finds those gateways? How to contact external nodes? Cross register OR Locate user during call setup DNS GW or Bootstrap nodes represent the domain P2P SIP Hierarchy GW reachable from global and local P2P SIP Network

28 Current Status VoIP over Hybrid MANETs Four proposals described Scalability versus number of hops, gateways, and different number of traffics. Simulation in NS-2: SIP + AODV-UU

29 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work

30 Future Plans VoIP over Hybrid MANETs Evaluate SIP over P2P in simulation and testbed (using Linksys WRT54GL) Packet Aggregation Design of optimal Aggregation Technique using Traffic-aware Routing Metric Evaluation of packet aggregation over testbed P2P Systems in WMNs Cross-layer adaptation (physical location, link condition, ) Support of Quality of Service (Admission control, class of service, )

31 Thank you! Marcel C. Castro

32 Backup Slides

33 Node Joining Extended SIP Msg Joining Node Node-ID REGISTER 302 Node B Bootstrap Node Node-ID REGISTER 3. REGISTER 302 Node C Node B Node-ID 245 Key = Hash( ) = Node-ID OK Node C Node-ID 520 Iterative search increases reliability 4. Joining node after join Node-ID 503 REGISTER sip: SIP/2.0 To: <sip:503@ ;user=node> From: <sip:503@ ;user=node> Contact: <sip:503@ ;user=node> Expires: 600 DHT-NodeID: <sip:503@ ;user=node>;algorithm= sha1;overlay=chat; expires=600 Require: dht Supported: dht

34 User Registration Extended SIP Msg Alice s Node Node-ID 503 Node A Node-ID 023 Key = Hash(alice@example.com)= Alice -> REGISTER 302 Node B 2. REGISTER 200 OK Node B Node-ID 245 Alice-> Alice s Node Node C Node-ID 520 User s node must register in DHT SIP REGISTER used for nodes and users Alice s Node Node-ID 503 REGISTER sip: SIP/2.0 To: <sip:alice@example.com; resourceid=234> From: <sip:alice@example.com; resourceid=234> Contact: <sip:alice@ > Expires: 600 DHT-NodeID: <sip:503@ ;user=node>;algorithm=sha1;o verlay=chat; expires=1200 Require: dht Supported: dht

35 Contacting a User Extended SIP Msg Bob s Node Node-ID INVITE Node A Node-ID 023 Bob-> Bob s Node 302 Bob s Node Alice -> 234 Bob -> 723 Node C Node-ID 520 DHT used for initial location 2. INVITE Alice s Node Node-ID 503 Node B Node-ID 245 Alice-> Alice s Node REGISTER sip: SIP/2.0 To: <sip:bob@example.com;resourceid=723> From: <sip:alice@example.com; resourceid=234> DHT-NodeID: <sip:503@ ;user=node>;algorithm=sha1;o verlay=chat; expires=800 Require: dht Supported: dht

36 Session Establishment Bob s Node Node-ID 683 Node A Node-ID 023 Bob-> Bob s Node Alice -> 234 Bob -> 723 Node C Node-ID 520 Node B Node-ID 245 Alice-> Alice s Node Standard SIP used for connection No reliance on DHT Alice s Node Node-ID 503

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University RELOAD P2P Overlay Access Protocol Younghan Kim Soongsil University Contents Introduction What is P2P? Why P2P-SIP? P2PSIP overlay network Architecture Operations RELOAD protocol Introduction Protocol

More information

Optimizing SIP Service Provisioning in Internet Connected MANETs

Optimizing SIP Service Provisioning in Internet Connected MANETs Optimizing SIP Service Provisioning in Internet Connected MANETs Marcel C. Castro and Andreas J. Kassler Computer Science Department Karlstad University Universitetgatan 2, Karlstad, Sweden Email: (Marcel.Cavalcanti

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Preface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone

Preface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone VoIP quality and performance issues Delay Jitter Packet loss Echo and talk overlap Approaches to maintaining VoIP quality Network-level QoS VoIP codecs VoIP applications and services Fax Emergency numbers

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S

Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S Internet Multimedia Architecture Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-Serv, IntServ) Conclusions

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Overlay Networks in ScaleNet

Overlay Networks in ScaleNet Overlay Networks in ScaleNet Dipl-Inform. Ingmar Baumgart Prof. Dr. Martina Zitterbart VDE ITG 5.2.1 Fachgruppentreffen, Ericsson, Aachen, 5.5.06, The ScaleNet Project : Scalable, efficient and flexible

More information

Architecture and Evaluation of an Unplanned b Mesh Network

Architecture and Evaluation of an Unplanned b Mesh Network Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Media Communications Internet Telephony and Teleconference

Media Communications Internet Telephony and Teleconference Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard

More information

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network ENSC 85: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Presentation School of Engineering

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Latest Peer-to-Peer Technologies II Artjom Lind 1

Latest Peer-to-Peer Technologies II Artjom Lind 1 Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured

More information

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Outline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices

Outline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices Outline QoS routing in ad-hoc networks QoS in ad-hoc networks Classifiction of QoS approaches Instantiation in IEEE 802.11 The MAC protocol (recap) DCF, PCF and QoS support IEEE 802.11e: EDCF, HCF Streaming

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Overview. Slide. Special Module on Media Processing and Communication

Overview. Slide. Special Module on Media Processing and Communication Overview Review of last class Protocol stack for multimedia services Real-time transport protocol (RTP) RTP control protocol (RTCP) Real-time streaming protocol (RTSP) SIP Special Module on Media Processing

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,

More information

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:

More information

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Having looked at the

More information

A Novel Software-Based H.323 Gateway with

A Novel Software-Based H.323 Gateway with A Novel Software-Based H.323 Gateway with Proxy-TC for VoIP Systems Presenter : Wei-Sheng Yin Advisor : Dr. Po-Ning Chen Institute of Communications Engineering National Chiao Tung University Agenda Introduction

More information

Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP

Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP T-110.7100 Applications and Services in Internet 1.10.2008 Jouni Mäenpää NomadicLab, Ericsson Contents Extending SIP SIP extension negotiation

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Advanced Network Design

Advanced Network Design Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Opportunistic Application Flows in Sensor-based Pervasive Environments

Opportunistic Application Flows in Sensor-based Pervasive Environments Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based

More information

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005 GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005 Rutgers, The State University of New Jersey D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 GENI Wireless Network

More information

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks 2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols

More information

Multimedia Networking

Multimedia Networking Multimedia Networking Victor Gau Information Processing Lab. 2008/03/07 Outline Introduction Network Basics Quality of Service Applications VoIP IPTV Telematics Multimedia Multimedia (Lat. Multum + Medium)

More information

Ad-hoc and Infrastructured Networks Interconnection

Ad-hoc and Infrastructured Networks Interconnection tel. 22 209 4000 fax 22 209 4050 e-mail www@inescporto.pt internet Ad-hoc and Infrastructured Networks Interconnection Tânia Pinto Calçada and Manuel Ricardo RTCM Aveiro 18th February 2005 INESC Porto

More information

Real-Time Control Protocol (RTCP)

Real-Time Control Protocol (RTCP) Real-Time Control Protocol (RTCP) works in conjunction with RTP each participant in RTP session periodically sends RTCP control packets to all other participants each RTCP packet contains sender and/or

More information

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some

More information

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Computer Networks Group Universität Paderborn Outline Design principles (skipped) Basic

More information

PeerfactSim.KOM: A Simulation Framework for Peer-to-Peer Systems

PeerfactSim.KOM: A Simulation Framework for Peer-to-Peer Systems PeerfactSim.KOM: A Simulation Framework for Peer-to-Peer Systems The 2011 International Conference on High Performance Computing & Simulation July 4 8, 2011, Istanbul, Turkey Dominik Stingl Christian Gross

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

H.323. Definition. Overview. Topics

H.323. Definition. Overview. Topics H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Tech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone

Tech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone Tech-invite http://www.tech-invite.com RFC 3261's SIP Examples V2.2 November 22, 2005 Registrar Bob's SIP INVITE 100 Trying Proxy INVITE 100 Trying Proxy 200 OK INVITE REGISTER This is a representation,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Motivation for peer-to-peer

Motivation for peer-to-peer Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS

More information

Efficient Routing for Wireless Mesh Networks Using a Backup Path

Efficient Routing for Wireless Mesh Networks Using a Backup Path University of New Haven Digital Commons @ New Haven Electrical & Computer Engineering and Computer Science Faculty Publications Electrical & Computer Engineering and Computer Science 12-2013 Efficient

More information

New Signaling approach Improving the VoIP Quality of Service in Ad hoc Network

New Signaling approach Improving the VoIP Quality of Service in Ad hoc Network New Signaling approach Improving the VoIP Quality of Service in Ad hoc Network Salma Rattal EEA&TI Laboratory Faculty of sciences and techniques Hassan 2nd University Mohammedia-Casablanca Morocco Abdelmajid

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

ENG Advanced Mobile Networks: QoS, QoE & Technical Aspects

ENG Advanced Mobile Networks: QoS, QoE & Technical Aspects ENG-514 - Advanced Mobile Networks: QoS, QoE & Technical Aspects Description The increasing uptake of Internet of Things (IoT), Big data and cloud-based services introduces a new set of requirements for

More information

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range Outlines 4G Wireless Systems Vijay K. Garg, Ph.D., P.E. Department of Electrical & Computer Engineering, College of Engineering, University of Illinois at Chicago e-mail: garg.v@comcast.net Types of wireless

More information

Adaptive Aggregation of Voice over IP in Wireless Mesh Networks

Adaptive Aggregation of Voice over IP in Wireless Mesh Networks Computer Science Peter Dely Adaptive Aggregation of Voice over IP in Wireless Mesh Networks Master s Project D2007:08 Adaptive Aggregation of Voice over IP in Wireless Mesh Networks Peter Dely 2007 The

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Wide Open Spaces or Mostly Wireless, Most of the Time

Wide Open Spaces or Mostly Wireless, Most of the Time Wide Open Spaces or Mostly Wireless, Most of the Time Jerry D. Gibson University of California, Santa Barbara Supported by NSF under Grant Nos. CCF-0429884 and CNS-0435527, the California Micro Program,

More information

Overview of Mobile Networking Initiatives at WINLAB

Overview of Mobile Networking Initiatives at WINLAB Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea Address Auto uto- configuration for Wireless Mesh Networks Keecheon Kim Konkuk University Seoul, Korea kckim@konkuk.ac.kr Contents Wireless Mesh Networks Auto- configuration Topics In Autoconf WG Proposed

More information

Fiber-Wireless (FiWi) Access Networks

Fiber-Wireless (FiWi) Access Networks Fiber-Wireless (FiWi) Access Networks Eiman Alotaibi Department of Computer Science University of California, Davis Reference: N. Ghazisaidi, M. Martin, and C. Assi, Fiber-Wireless (FiWi) Access Networks:

More information