The following topics are dealt with: localcomputernetworks; peer-to-peer systems; mesh and optical networks; sensor networks; energy awareness; routing; performance analysis; security; link layer; ieee 802.11 system...
The following topics are dealt with: localcomputernetworks; peer-to-peer systems; mesh and optical networks; sensor networks; energy awareness; routing; performance analysis; security; link layer; ieee 802.11 system; design optimization; and resource management.
We divide the predictive FMIPV6 handover procedure into 5 phases. Among these phases, the link layer prediction, the predictive tunneling and sender preparation phases are mainly concerned, the latencies and the reaso...
详细信息
ISBN:
(纸本)9781424424122
We divide the predictive FMIPV6 handover procedure into 5 phases. Among these phases, the link layer prediction, the predictive tunneling and sender preparation phases are mainly concerned, the latencies and the reasons for the latencies in the 3 phases are analyzed in an JEEEE 802.11 test-bed. Based on the analysis, a Cross-Layer fast handover management mechanism is proposed and proved to be efficient through experiments.
In this paper, we applied an error control protocol for wireless local area network in medium access control. Hiperlan\2 random access phase is taken as an example. We applied quality of service support in the random ...
详细信息
ISBN:
(纸本)9781424424122
In this paper, we applied an error control protocol for wireless local area network in medium access control. Hiperlan\2 random access phase is taken as an example. We applied quality of service support in the random access phase. Analytical model is developed for the backoff strategy with error control protocol. The performance metrics are shown.
In an effort to develop a simulation framework for evaluating the performance of wireless access technologies for vehicular networks, the authors have studied the internal structure of the simulator, NS-2, as well as ...
详细信息
ISBN:
(纸本)9781424424122
In an effort to develop a simulation framework for evaluating the performance of wireless access technologies for vehicular networks, the authors have studied the internal structure of the simulator, NS-2, as well as the draft wireless technology ieee 802.11p. This intended framework aims at replicating, as far as possible, the access technology characteristics in the simulator and with the help of realistic scenarios intends to give an objective view of the performance of applications destined for Intelligent Transport Systems. The framework is first designed to meet the requirements set for vehicle to infrastructure communications, with a view of later extending it to vehicle to vehicle communications for vehicular ad hoc networks.
A novel software-based time multiplexing (TM) coordination mechanism for the ieee 802.11 wireless local area network (WLAN) is proposed in this paper. By using the TM mechanism which can be easily implemented on top o...
详细信息
ISBN:
(纸本)9781424424122
A novel software-based time multiplexing (TM) coordination mechanism for the ieee 802.11 wireless local area network (WLAN) is proposed in this paper. By using the TM mechanism which can be easily implemented on top of the distributed coordination function (DCF) at the access point (AP) with the best features of both point coordination function (PCF) and DCF, a higher priority is naturally set to voice services over data services. Finally, our simulation results demonstrate that the TM mechanism outperforms the pure DCF and the mixture of PCF and DCF in terms of end-to-end voice delay, number of supported voice sessions, and aggregate throughput.
The ieee 802.11 utilizes carrier sensing mechanism to support multiple users effectively with small number of collisions. However, if there are hidden nodes, ieee 802.11 nodes suffer from consecutive collisions and ex...
详细信息
ISBN:
(纸本)9781424424122
The ieee 802.11 utilizes carrier sensing mechanism to support multiple users effectively with small number of collisions. However, if there are hidden nodes, ieee 802.11 nodes suffer from consecutive collisions and experience extremely low throughput Due to the nature of non-cooperative property, every 802.11 node tries to maximize its own throughput irrespective of total network performance. In this paper, we show that 802.11 node can achieve higher throughput by intentionally reducing its carrier sensing range in some cases. Based on simulations, we also show that adjusting carrier sense threshold may bring about undesirable Nash equilibrium in terms of total network performance in game-theoretical model.
Support for real-time traffic is crucial to many ITS (Intelligent Transport Systems) safety applications. At the same time it is desirable to provide a number of non-safety services. In this paper, we propose a commun...
详细信息
ISBN:
(纸本)9781424424122
Support for real-time traffic is crucial to many ITS (Intelligent Transport Systems) safety applications. At the same time it is desirable to provide a number of non-safety services. In this paper, we propose a communication system for safety-critical V2I (Vehicle-to-Infrastructure) communication based on an extension to the upcoming ieee 802.11p MAC standard. Real-time analysis provides the tool to adapt the resources set aside for collision-free, safety-critical data traffic to the communication needs of the current number of supported vehicles. The remaining bandwidth is available to other services according to the contention-based random access method defined in the standard. The performance of the proposed concept is evaluated through a simulation analysis based on a merge assistance scenario supported by roadside infrastructure.
暂无评论