Integrated Routing & MAC Scheduling for Wireless Mesh Networks. Zhibin Wu Dipankar Raychaudhuri WINLAB, ECE Dept. Rutgers University
|
|
- Brandon Powell
- 5 years ago
- Views:
Transcription
1 Integrated Routing & MAC Scheduling for Wireless Mesh Networks Zhibin Wu Dipankar Raychaudhuri WINLAB, ECE Dept. Rutgers University
2 Outline Our Perspective of High-Speed Wireless Mesh Networks Problem & Approaches Analytic Throughput Bounds for Integrated Routing/scheduling Protocol and Algorithms: Practical Designs Simulation Results with IRMA protocols Conclusions & Future Work 2 IRMA fro Wireless Mesh Networks December 2007
3 Emerging Broadband Radios and Throughput-Thirsty Devices Short-range, high-speed radio technologies emerging: Technology Name Link Speed (in Mbps) BW (MHz) Frequency Band n or40 2.4GHz and 5GHz WiMedia to 10.6 GHz mm-wave (WPAN) up to 2000 N/A 60GHz Device need more throughput over the air Mobiles More processing power, storage capacity and less cost Contents comes from network and share on the network Wireless Camcorders Wireless HDTV 3 IRMA fro Wireless Mesh Networks December 2007
4 New Forms of Wireless Networks CDMA2000 BTS RNC PDSN Wireless Mesh Network WiMAX BS ASN-GW Internet Internet Wi-Fi Wireless not only an access technology, but also a networking technology Wireless devices form a true wireless network Multi-hop wireless peer-to-peer transport 4 IRMA fro Wireless Mesh Networks December 2007
5 High-Speed Wireless Mesh Network Requirement: High Throughput Bulk data transfer over wireless mesh architecture. Goal: Protocol and algorithm design to achieve maximal throughput for concurrent end-to-end multihop flows. Problems: What s the achievable end-to-end capacity given a certain small number of nodes in the topology? Is there a feasible design to approximate the capacity? What s the control overhead and how it scales with the traffic demands? Conventional Approach: IEEE ad hoc routing 5 IRMA fro Wireless Mesh Networks December 2007
6 CSMA/CA MAC Problems with multi-hop radio network A simple contention-based protocol fails to handle interference Link level: Hidden terminals and exposed terminals. o Spatial reuse vs. Collision avoidance. o Mesh network simulation shows ~68% of RTS get no response Flow level: Intra and Inter-flow interference Hidden Node Self Interference Inter-flow Interference Exposed Node 6 IRMA fro Wireless Mesh Networks December 2007
7 Wireless MAC Design Techniques RTS/CTS, MACA- P, D-LSMA DCMA IRMA Reserve first, access later is a must to reach interference-free as well as throughput-optimal Flow-based scheduling design are still offline optimizations, lack of protocols End-to-End flow scheduling can be optimized jointly with L3 7 IRMA fro Wireless Mesh Networks December 2007
8 Joint Routing/Scheduling: Example (a) RTS RTS Data CTS RTS RTS RTS RTS ACK Data CTS RTS ACK MAC with designated Min-hop paths t a 4x performance gain can be achieved by carefully selecting (b) Data ACK Data Data Data ACK Data ACK Data Data ACK Data ACK ACK ACK Synchronized TDMA MAC with better paths t routing paths and MAC schedules JOINITLY. 8 IRMA fro Wireless Mesh Networks December 2007
9 Flow Based Management over TDM Slot Assignments Design both L2 & L3 protocols based on flow session, e.g. scheduling result won t change till the end of a traffic session, better end-to-end performance and less overhead Traffic flows over HS-WMN are not conventional Internet traffic Bulk data transfer & Aggregated traffic from multiple clients To serve long-lived CBR and VBR, TDMA is better. Traffic is not bursty, require deterministic bandwidth and delay By satisfying the interference constraint one can guarantee a certain fixed data rate at a given link. Global synchronization difficulty can be overcome in a small network Dedicated bandwidth can be specified for control Frame n Frame n+1 Frame n+2 9 IRMA fro Wireless Mesh Networks December 2007
10 Contributions of Our Research Offline Approach: Analytical framework to obtain optimal resource allocations and throughput bounds for end-to-end traffic over single-channel wireless mesh networks, especially for single path routing case. Online Approach: IRMA System Design Separation of control and data: Global Control Plane Centralized and distributed heuristic algorithms. 10 IRMA fro Wireless Mesh Networks December 2007
11 Obtaining throughput Bounds from LP Optimizations Maximize end-to-end throughput : multi-commodity network flow problem (linear programming) Analytical throughput bounds with protocol interference model for following scenarios: Min-hop routing + link Scheduling othe path for each <s, d> is known as the min-hop path. Joint routing/scheduling (route is uncertain) o Multipath Routing: traffic from s to d is split in multiple routes More optimal than single-path routing Linear programming, but NP-hard to get all constraints o Single path routing. Mixed integer programming problem Using maximal utilization rounding to avoid integer variables 11 IRMA fro Wireless Mesh Networks December 2007
12 Numerical Results Gaps between the throughput bounds obtained by LP optimizations and a system simulation shows huge potential for integrated protocol design [Gupta 00] :Given n nodes randomly located in a unit disk, transport capacity with interference-free protocols is Network capacity decreases with increasing number of flows 12 IRMA fro Wireless Mesh Networks December 2007
13 IRMA System Model Global control plane and data plane All control signaling on a separate plane Parameters of IRMA component in data plane is determined by control algorithms Control Algorithms Global Control Plane (GCP) Control Message IRMA Algorithms IRMA Control Agent Routing CSMA MAC PHY Control Plane Application IRMA Component Controlled Routing TDMA MAC PHY Data Plane Data Packet Protocol stacks in IRMA system 13 IRMA fro Wireless Mesh Networks December 2007
14 IRMA System Control Cycle Control Cycle: Detection and report of new or changed traffic demands. IRMA optimization determine the paths and conflict-free TDMA schedules for each node. IRMA components (Routing and MAC) transform and work with the new working parameters to ensure QoS. Bootstrap Topology Discovery Load default IRMA parameters Traffic Variation Detection IRMA Working Optimization Path/Schedule Adjust 14 IRMA fro Wireless Mesh Networks December 2007
15 Heuristic Algorithms for IRMA Centralized Algorithms Existing a central entity collect global information (topology, BW, interference relationship) and run optimization algorithms CIRMA-MH: solves min-hop routing, then optimizes link scheduling based on routing results and real-time flow demands. CIRMA-BR: attempts to optimize routing and scheduling decisions simultaneously, using available MAC bandwidth information to route around congested areas. Distributed Algorithms (DIRMA-MH and DIRMA-BR) each node needs to figure out the best schedule and route for its traffic in a distributed manner, with local information exchange only (in the control plane). Optimization for the whole flow is conducted hop by hop (source to sink) 15 IRMA fro Wireless Mesh Networks December 2007
16 CIRMA-MH MH (Min-hop) routing + TDMA link scheduling based on the path selection Inputs of the algorithm: Topology (G(V,E)) Traffic Profile (source-destination, bandwidth requirement) and Interference-index k TDMA frame length T (Number of slots in a frame) Output: route selection and MAC TDMA slot assignments CIRMA-MH Algorithm: 1. Find the shortest route with hop metric 2. For each link e in each flow F i, assign earliest available slot x for this link as long as it does not conflict with the links already scheduled in this slot x 3. Repeat step 2 until all bandwidth requirements are fulfilled or no more slots are available. 16 IRMA fro Wireless Mesh Networks December 2007
17 CIRMA-BR Min-hop routes are not optimal, cause local congestions Better paths can be found and yield higher throughput than MH paths Joint TDMA Link Scheduling and Bandwidth Aware Routing (BR) CIRMA-BR Algorithm: 1. Sorting the flow in ascending order by bandwidth requirements 2. For each flow F i, i= 1,2, M a) Generate link Metric based on available free TDMA Slots b) finding shortest path for flow F i with the bandwidth metric. and assign conflict-free TDMA slots for this flow A B D C (a) A B D C (b) Different routes used by (a) CIRMA-MH and (b) CIRMA-BR in a 6x6 grid for two vertical flows 17 IRMA fro Wireless Mesh Networks December 2007
18 DIRMA-MH Send SREQ, Receive SAPP Update TX-OK Free SREQ+SR EJ D SREQ SREJ Update Slot State Transitions C A B F SUPD Reserved Update Prohibited SREQ SAPP SCAN Receive SREQ, Send SAPP Updat e SREQ+SR EJ Update SUPD RX-OK SREQ+SR EJ E SREQ SAPP Distributed TDMA link schedule setup: Lock and reserve (too ideal) Schedule first, correct later SUPD messages Coordinate neighbors/interferers to mark the slot in Free/TxOK/RxOK/Prohibited States. Periodically broadcasted or triggered SREQ/SAPP/SREJ Reserve the slot to schedule a link transmission SCAN (Schedule Cancel) Release slot if no longer needed for this link Correct schedule errors if collision is detected Solve Hidden Node and Exposed Problems 18 IRMA fro Wireless Mesh Networks December 2007
19 DIRMA-BR Dynamic hop-by-hop routing/scheduling 1. Put forwarders in a candidate pool Interference-aware direction C 2. Candidates are sorted based on the combination of two metrics: A B Min-hop direction o M1:Distance to d o M2: Available BW for this hop and next D hop Interfered Area 3. Select the candidate with smallest metric as forwarder and reserve schedules 4. Choose the next candidate if fails 5. Fall back to MH path and reserve if all fails 19 IRMA fro Wireless Mesh Networks December 2007
20 Performance Evaluation Implement the GCP and IRMA algorithms in ns-2.28 A separate control radio and channel in GCP Ns-2 Simulation Parameters Compare the performance IRMA algorithms Baseline approaches o DSDV o AODV IRMA fro Wireless Mesh Networks December 2007
21 Simulation Results 40-node mesh topology Varying number of source-destination pairs Comparing IRMA algorithms with conventional layered approaches Results show that our IRMA schemes can provide up to ~200% gains. DIRMA-MH algorithm achieves results amount to 90% of CIRMA-MH Both BR algorithms behave better than MH algorithms in most of the cases. CIRMA-BR vs. CIRMA-MH 22.4% more, DIRMA-BR vs. DIRMA-MH 2.37% more The DIRMA-BR algorithm is not very good because per-hop selection is based upon volatile local information 21 IRMA fro Wireless Mesh Networks December 2007
22 Evaluation of the Control Overhead Overhead Statistics Baseline: RTS/CTS + routing overhead IRMA: All control signaling in GCP Simulation Topology 4x4 grid 10 traffic sessions with random start/end Traffic duration: exponential distributed. Results normalized by end-to-end throughput IRMA approach reduce signaling overhead because per-flow control is much more efficient than per-packet control 22 IRMA fro Wireless Mesh Networks December 2007
23 Centralized Protocols vs. Distributed Protocols CIRMA Route and scheduling need to be disseminated when each traffic session begins/ends Don't scale with increasing number of flows and size of network DIRMA Most overhead comes from system bootstrap, discovery and interference characterization Negligible overhead for scheduling and path selection 23 IRMA fro Wireless Mesh Networks December 2007
24 Conclusion and Future Work Fundamental need for cross-layer integration and joint optimization for superior network performance in WMN. Joint Routing and Scheduling show up to 300% performance gain in numerical results We proposed IRMA for wireless mesh networks and discussed: Flow-based Interference-free scheduling Realistic system model heuristic, promising online algorithms Simulation results show that IRMA design improve end-to-end throughput significantly with modest signaling overhead. How much gains when channel assignment is also incorporated Guarantee Fairness & QoS. 24 IRMA fro Wireless Mesh Networks December 2007
25 Please visit 25 IRMA fro Wireless Mesh Networks December 2007
26 Related Publications 1. Z. Wu, S. Ganu and D. Raychaudhuri, ''IRMA: Integrated routing and MAC scheduling in multihop wireless mesh networks'', in Proceedings of the Second IEEE Workshop on Wireless Mesh Networks, Reston VA, Sept Z. Wu, S. Ganu, I. Seskar and D. Raychaudhuri, ''Experimental investigation of PHY layer rate control and frequency selection in based ad-hoc networks'', in Proceedings of ACM SIGCOMM Workshops, August, S. Zhao, Z. Wu, A. Acharya and D. Raychaudhuri, ''PARMA: A PHY/MAC aware routing metric for ad-hoc wireless networks with multi-rate radios'', in Proceedings of IEEE WoWMoM'05, June Z. Wu, D. Raychaudhuri, ''D-LSMA: Distributed link scheduling multiple access protocol for QoS in ad-hoc networks'', in Proceedings of IEEE GLOBECOM '04, November 2004, pp IRMA fro Wireless Mesh Networks November 2007
27 Single-Path Routing vs. Multi-path Routing Capacity/Throughput Single Path Routing Less throughput bounds compare to multi-path routing Multi-path Routing Load balancing over more routes, utilizing more capacity Traffic Split No Yes. Arbitrary splitting, difficult for wireless implementation Robust Overhead Algorithm Packet Ordering Dijkstra, Bellman-ford, OSPF (BGP) Resilient to link failures More Route-discovery overhead, More soft states Route-discovery by flooding Out-of-sequence problem Compatibility Good. Bad We prefer single path routing from system design perspective..
28 About interference models A node cannot derive the distance of a hidden node in interference neighborhood because it cannot decode the packet and correlate this signal with the node identifier. Successful transmission 1) d ij R i 2) R k d kj R R i i d j i ij R i Unsuccessful transmission 1) d ij R i 2) R k d kj R i i d ij j k d k j k R k d k j k R k
29 Conflict Graph Coloring Conflict Graph Connectivity Graph G Conflict Graph G Each edge in G is a vertex in G Two adjacent vertexes in G cannot have same color
30 IRMA-MH Example Link bandwidth 1Mbps, 10 slots in each TDMA frame 3 flows: 15 14, 5 10,11 1 Each flow has offer load 0.2Mbps, demanding 2 slots per frame 2 G (V,E) Slot No After Scheduling flow for 1 st slot demand After scheduling flow 5-10 for 1 st slot demand After Scheduling flow 11-1 for 1 st slot demand After Scheduling flow 15-4 for 2nd slot (fail!) , , , , , , , Scheduling results: Each flow only obtains a 1-slot/per frame bandwidth (0.1M throughput) No slot to assign edge 3-4 Impossible to accommodate those flows with 0.2Mbps throughput. Increase to 20slots/frame does not help, because each flow will require 4 slots/frame. 30
31 LP Formulation of Integrated Routing and MAC Scheduling (2) Find the analytical throughput bounds Min-hop routing + link Scheduling othe path for each <s, d> is known as the min-hop path. Joint routing/scheduling o Single path routing, but path is uncertain. omixed integer programming problem Observations and conclusions from previous and our LP analysis It s NP-hard to find all link conflict constraints in LP formulation. Possible optimal routing paths can be found to yield better throughput than min-hop paths Optimal solution needs global knowledge Our contribution: Offline Optimization + Online algorithms
32 Overview of Wireless Networking Technologies 100+ Mbps, low-power, short range, minimal mobility Local Mobility Global Mobility MANET Wi-Fi Femto Cell LTE/UMB UMA WiMAX Bluetooth UMTS/CDMA2000 GSM(2G) Range Low-rate cellular networks vs. High-speed LAN/PAN. Centralized Cellular Networks support global mobility, but with low link speed and complex architecture Wi-Fi based technologies provide high-speed link access, but limited mobility support. Inter-technology convergence: o UMA and Femto Cell 32 IRMA fro Wireless Mesh Networks November 2007
33 High-Speed Wireless Mesh Network (1) Scope of the HS-WMN cannot be large: [Gupta 00] :Given n nodes randomly located in a unit disk, the uniform per node throughput capacity with interference-free protocols is A small or mid-size network with less than 100 nodes. 33 IRMA fro Wireless Mesh Networks November 2007
34 High Speed Wireless Mesh Network (2) Mobility cause significant throughput reduction Even slight random movement cause route failure and packet loss. Uncertainty of routing discovery disrupts traffic and reduce throughput We focus on a multi-hop network with small number of nodes and minimal mobility. Each node is equipped with one or more short range, high-speed radios. 34 IRMA fro Wireless Mesh Networks December 2007
35 Application Scenarios for HS-WMN Wireless links can be used to replace Ethernet cables, phone lines, USB/Firewire Wireless connectivity among consumer electronics devices, PCs. Multimedia-content sharing in home among HDTV, DVD Player, ipod, XBOX Integrated voice, video and data services 35 IRMA fro Wireless Mesh Networks December 2007
36 Problem Definition & Current Approaches Requirement: High Throughput Bulk data transfer over wireless mesh architecture. Goal: Protocol and algorithm design to achieve maximal throughput for concurrent end to end multihop flows. Problems: What s the achievable end-to-end capacity given a certain small number of nodes in the topology? Is there a feasible design to approximate the capacity? What s the control overhead and how it scales with the traffic demands? Conventional Approach: IEEE ad hoc routing CSMA/CA is bad in multi-hop wireless networks. Poor interaction between two independent distributed L3 and L2 protocols 36 IRMA fro Wireless Mesh Networks November 2007
37 Cross-Layer Routing/MAC Optimizing the performance of individual layers is not like to work beyond a certain point [Barrett et al. 02]. A routing protocol needs to interact with the MAC layer in order to improve its performance. Adopting multiple performance metrics from layer-2 into routing protocols is an example. However, interaction between MAC and routing layers is so close that merely exchanging parameters between them is not adequate. Merging certain functions of MAC and routing protocols is a promising approach. It is particularly meaningful for multi-radio or multi-channel routing, because the channel/radio selection in the MAC layer can help the path selection in the routing layer. 37 IRMA fro Wireless Mesh Networks November 2007
38 Interference-free TDMA Scheduling Protocol Model of Interference Transmission range: R 1) d ij R i Interference range: R 2) R k d kj Conditions for a successful transmission: 1) d ij R i 2) any node k, such that d is not transmitting Scheduling requires perfect interference awareness to know exactly whose interference affect which node kj R ' k R i R ii Unsuccessful transmission d ij j d kj k R k Implication of R >R: A node cannot discover a hidden node Solutions come with overhead: Obtain location information from GPS and exchange Use a dedicate control radio to communicate in interference range Deliver scheduling information to k-hop neighborhood (k>1). Collision-free link scheduling not good as a per-packet mechanism. 38 IRMA fro Wireless Mesh Networks November 2007
39 System Approach Traffic Map Joint FDMA/TDMA/Routing Time/Frequency assignment 39 IRMA fro Wireless Mesh Networks November 2007
40 Theoretical background for Joint Scheduling/Routing Maximize end-to-end throughput : multi-commodity network flow problem (linear programming) Interference-free scheduling: coloring problem (graph theory) Finding maximal independent set in the conflict graph Connectivity Graph G Conflict Graph G Each edge in G is a vertex in G Two adjacent vertexes in G cannot have same color 40 IRMA fro Wireless Mesh Networks November 2007
41 A Typical Simulation Topology 41 IRMA fro Wireless Mesh Networks November 2007
42 Challenges for Online Approach Real-time characterization: Information gathering beyond neighborhood. Interference detection o K-hop approximation o A 2 nd radio monitors as far as up to interference range Run-time Optimization LP optimization algorithms are NP-hard Control overhead and robustness Concise, timely and accurate signaling. Solution: A dedicated control plane Same radio with a dedicated BW slice in time/frequency Another radio use a dedicated control channel 42 IRMA fro Wireless Mesh Networks December 2007
43 LP Formulation of Integrated Routing and MAC Scheduling s d s d s 3 7 G (V,E) 14 d 1 M concurrent flows from s to d L: link set selected as paths r: offer-load/demands for each flow Maximize Subject to: qr i f i M 1) Flow conservation i r i = 1 f keeps same along the path for, 2) Link capacity i f i f ( e) = f BW ( e), for each e L i i + 0 q 1 < si di Constraints for link conflict based on conflict graph in interference model 3) Fairness tradeoff > 43 IRMA fro Wireless Mesh Networks December 2007
Cross-layer Transport Protocol Approaches for wireless networks
Cross-layer Transport Protocol Approaches for wireless networks Sumathi Gopal, Sanjoy Paul, D. Raychaudhuri WINLAB, Rutgers University 21 st Annual IEEE Computer and Communication Workshop (CCW) Feb 5
More informationIRMA: Integrated Routing and MAC Scheduling in Multi-hop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multi-hop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and D. Raychaudhuri WINLAB, Department of Electrical Engineering Rutgers University, North Brunswick,
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationWireless Ad-Hoc Networks
Wireless Ad-Hoc Networks Dr. Hwee-Pink Tan http://www.cs.tcd.ie/hweepink.tan Outline Part 1 Motivation Wireless Ad hoc networks Comparison with infrastructured networks Benefits Evolution Topologies Types
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationRoute and Spectrum Selection in Dynamic Spectrum Networks
Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa
More informationReading. Read 3 MPLS links on the class website
Reading Read 3 MPLS links on the class website Read the following Wikipedia entries: Advanced Mobile Phone System, GSM, 1xEVDO, Cell site, Cellular network, 802.11ac Beyond IP Routing Traffic engineering
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationMidterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122
Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationWireless networks. Wireless Network Taxonomy
Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher
More informationPrinciples of Wireless Sensor Networks. Routing, Zigbee, and RPL
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 8 Stockholm, November 11, 2011 Routing, Zigbee, and RPL Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationCo-existence of WiFi and ZigBee
Co-existence of WiFi and ZigBee Kang G. Shin The University of Michigan Joint work with Xinyu Zhang ACM MobiHoc 2011 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 1 Coexistence
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationImplementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network
ENSC 85: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Presentation School of Engineering
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationPARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios
PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios Suli Zhao and Zhibin Wu WINLAB, Rutgers Univ. Piscataway, NJ 8854 {sulizhao, zhibinwu}@winlab.rutgers.edu Arup
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationEECS 122. University of California Berkeley
EECS 122 University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing Application Transport TH Data Data Application
More informationEECS 122. University of California Berkeley. Network Architecture Network hierarchy Layering Performance. Link Layer Ethernet Wi-Fi
EECS 122 University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing Application Data Transport TH Data Application
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationIEEE s ESS Mesh Networking
IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationMAC Protocols for VANETs
MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM
More informationCHAPTER 7 SIMULATION OBSERVATIONS
CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationON THE SCALABILITY OF AD HOC WIRELESS NETWORKS
ON THE SCALABILITY OF AD HOC WIRELESS NETWORKS by SULI ZHAO A Dissertation submitted to the Graduate School New Brunswick Rutgers, The State University of New Jersey in partial fulfillment of the requirements
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationChannel Allocation for IEEE Mesh Networks
Institut für Technische Informatik und Kommunikationsnetze Channel Allocation for IEEE 802.16 Mesh Networks Till Kleisli Master s Thesis MA-2006-24 April 2006 until October 2006 Advisors: Dr. Ulrich Fiedler,
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationA cluster based interference mitigation scheme for performance enhancement in IEEE
756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4
More informationSensor Network Protocols
EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 6 Stockholm, February 6, 2012 Carlo Fischione Royal Institute of Technology - KTH
More informationLink Layer II: MACA and MACAW
Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationTime Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks
Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp
More informationUlrich Fiedler, Eduard Glatz, 9. March Executive Summary
Topology Construction in the TOWN Project Technical Report 7 Ulrich Fiedler, ulrich.fiedler@bfh.ch Eduard Glatz, eglatz@hsr.ch 9. March 7 Executive Summary In this report, we propose and evaluate an algorithm
More informationTDMH-MAC: Real-time and multi-hop in the same wireless MAC
TDMH-MAC: Real-time and multi-hop in the same wireless MAC Federico Terraneo, Paolo Polidori, Alberto Leva, William Fornaciari Politecnico di Milano, Italy RTSS 8 Nashville, December 8 Quick context This
More informationProviding QoS to Real and Non-Real Time Traffic in IEEE networks
Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationLayer 3: Network Layer. 9. Mar INF-3190: Switching and Routing
Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate
More informationENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,
More informationENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationReview of Medium Access Control protocol for MANET
Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network
More informationProject: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Samsung-ETRI Merged MAC Proposal to TG8 CFC] Date Submitted: [5 May 2014] Source: [Seung-Hoon Park, Kyungkyu Kim,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationIEEE Ad Hoc Networks: Performance Measurements
IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,
More informationEthernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet
Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks
More informationA Multi-Commodity Flow Model for Optimal Routing in Wireless MESH Networks
JOURNAL OF NETWORKS, VOL., NO. 3, JUNE 7 A Multi-Commodity Flow Model for Optimal Routing in Wireless MESH Networks Antonio Capone, Fabio Martignon DEI, Politecnico di Milano, Piazza L. da Vinci 3, 33
More informationA Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks
A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,
More information