Medium Access Layer Performance Issues in Wireless Sensor Networks
|
|
- Mariah Greene
- 8 years ago
- Views:
Transcription
1 Medium Access Layer Performance Issues in Wireless Sensor Networks Ilker S. Demirkol 13-June-08 CMPE, Boğaziçi University
2 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 2 / 66
3 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 3 / 66
4 WSN: Network of sensor nodes 1. Sense the environment 2. Process the sensed data 3. Communicate the processed data towards sink G. Boone, Sensors Magazine, 2004: Internet To browse stored information WSN To browse the reality 4 / 66
5 WSN: Many Application Areas Environmental applications e.g., habitat monitoring Health applications e.g., telemonitoring of human physiological data Military applications e.g., battlefield surveillance Home applications e.g., home automation... 5 / 66
6 WSN publications in SCI-E (per year) / 66
7 WSN Research No standardization in communication protocols. A challenging subject, since the sensor nodes are limited in: computational capacity: 4 Mhz CPU memory: 60 KB RAM communication bit rate: Kbps power: battery generally infeasible to replace Primary objective is to achieve highest energy efficiency at each operation. 7 / 66
8 Energy Consumption Components Three energy consuming operations: Communication Sensing Computation To conserve energy: Shutdown the sensor (sleep mode) Duty cycle: Sleep-listen schedules e.g., duty cycle of 5 %: Work 5 unit time and sleep 95 unit time Energy Consumption (mj) mj 8 / 66
9 Two Important MAC Layer Energy Wastes Idle listening Collision C XB A A good MAC protocol should reduce both types of energy wastes. The energy consumed per bit/packet is a crucial performance criterion. 9 / 66
10 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization 10 / 66
11 Surveillance Wireless Sensor Networks (SWSN) SAFE Sink node UNSAFE 11 / 66
12 Packet Traffic Models for WSN Poisson, Periodic,... SPTM (SWSN Packet Traffic Model) Intrusion-initiated Bursty traffic Depends on: Sensing interval Intrusion detection model Sensor1 Sensor2 MAC Sensor3 12 / 66
13 Detection Models Binary Detection Model Probability of detection: 1 Elfes Detection Model Probability of detection: 1 0 d c Certain detection range sensor-target distance 0 d c d u sensor-target distance Certain detection range Uncertain detection range/sensing range Probabilistic d c d u d c detection degree = # of detecting sensors = 5 # of detecting sensors = detection degree = 3 13 / 66 # of sensors w detection prob.= coverage degree = 5
14 Consecutive Coverage Degrees Consecutive coverage degrees are not independent, i.e., can be repsented by: Markov process of order n = 2d v t T u s target speed sampling interval 14 / 66
15 SPTM Framework We provided complete analytical model for: generation of first coverage degree relations of consecutive coverage degrees detection degree for a given coverage degree 15 / 66
16 SPTM Framework 16 / 66
17 SPTM Framework 17 / 66
18 Validation of SPTM Simulation parameters: p distance Validation of coverage degree dependency: 18 / 66
19 Validation of SPTM Coverage degree distribution for all points: Coverage degree dependency example: Subsequent detection points of coverage degree 2: Different distributions! Simulations validates the analysis presented 19 / 66
20 Validation of SPTM Detection degree PMF for a given coverage degree. Correct PMF can be derived with analysis. 20 / 66
21 SPTM An application specific packet traffic model is derived by first defining a framework. The components of the framework is formulated analytically which are verified by simulations. The proposed PTM is adaptive: The detection parameter settings can be set according to the sensor type deployed The specifications of the SWSN application implemented can be incorporated such as the target area and density. 21 / 66
22 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 22 / 66
23 Packet Traffic Models for WSN Poisson, Periodic,... SPTM,... What is the importance of a realistic PTM? 23 / 66
24 Impact of Realistic PTM Performance of S-MAC is evaluated for three different PTMs: Periodic Binomial SPTM Simulation Parameters: 24 / 66
25 Load vs. Delay Similar average load results in very different average delays! 25 / 66
26 Effect of Scenario Parameters Investigated parameter: Target speed To use correct system parameters is also very crucial. 26 / 66
27 Limited Buffer Case Buffer size: 10 packets Packet drops start at lower loads with SPTM. 27 / 66
28 Impact of Using a Realistic Packet Traffic Model It is shown that, for surveillance applications, evaluating a MAC protocol with a packet traffic model other than SPTM may give misleading performance results. The results presented belong to performance evaluation for one-hop communication which will be accumulated in evaluations of the end-to-end performances. In fact, that will lead to higher divergence from the realistic results. 28 / 66
29 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 29 / 66
30 Energy and Delay Optimized Contention for Wireless Sensor Networks Contention-based MAC protocols Majority of the WSN MAC protocols are contention-based Optimize the energy consumed the delay incurred by the contentions of the nodes 30 / 66
31 Contention-based MAC protocols Medium access with contention slots: IEEE , IEEE S-MAC, B-MAC, SCP-MAC, Z-MAC Packet tx time Procedure: Randomly select a slot Carrier sense till the slot you select If no tx before your slot, start tx. Contention Window (CW) What to do, in case of collisions? 31 / 66
32 Collisions ****Collision*** Succ. packet tx Backoff: collision timeout Binary Exponential Backoff (BEB) IEEE , IEEE Uniform Backoff (UB) S-MAC, Z-MAC, Sift, SCP-MAC, B-MAC time 32 / 66
33 The Significance of the Contention Window Size S-MAC defines the following settings: 63 contention slots Slot time: 20 bit tx. If only one node is contending : Expected contention delay (carrier sense duration): 600 bits tx The packet to be sent is 400 bits (S-MAC default)! 33 / 66
34 Trade-off Lower CW size: Mean carrier sense duration Probability of collision Higher CW size: Mean carrier sense duration Probability of collision 34 / 66
35 Impact of CW size on WSN performance We formulate the two crucial WSN objectives analytically: Overall energy consumed for contentions Delay incurred by contentions Parameters of the derived analytical formulas: Contention window size Number of contending nodes Collision timeout duration, communication speed, energy consumption values 35 / 66
36 Analysis vs Simulation Simulation results are average of 1000 runs. Parameters: Bandwidth: 20 Kbps Slot time: 1 ms The collision timeout: ms (RTS+CTS+SIFS) 36 / 66
37 Contention Delay # of contending nodes = 5 : collision duration : carrier sense duration : contention delay 37 / 66
38 Contention Delay for Different Number of Contending Nodes The optimum CW size changes with the number of contending nodes. 38 / 66
39 Performance Comparison for Contention Delay SSCW propose an approximation for optimum Setting CW CW size. size to W* t reveals lower delays compared to other alternatives. SMAC defines fixed 63 slots. W t *: Delay optimizing CW size SSCW: IEEE Tran. on Wireless Comm., Nov 06, by Tian et al. 39 / 66
40 Energy Consumption Results # of contending nodes = 5 40 / 66
41 Performance Comparison for Energy Consumed W E *: Energy optimizing CW size 41 / 66
42 Energy-Delay Trade-off W E * vs. W t * Minimization of one metric can increase the value of the other 7.5% higher delay 8% higher energy 42 / 66
43 Optimized CW Size Conclusions Contention delay Derived analytically Delay optimizing CW size (W t *) Energy consumed for contention resolution Derived analytically Energy optimizing CW size (W E *) First work to present the optimization of CW size in WSN. The analytical work presented can be applied to all networks that defines uniform backoff. 43 / 66
44 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 44 / 66
45 ENCO: A Heuristic for CW Size Setting We need a method for incorporating CW size optimizations into a distributed implementation. Estimated Number of Contenders (ENCO) method for event-based applications average coverage degree ~ average of the number of contending nodes use optimized CW for average coverage degree throughout the network. 45 / 66
46 Estimated Number of Contenders (ENCO) Method Two types of event-driven applications: Random Event Locations (REL) application Correlated Event Locations (CEL) application SPTM is used for traffic generation of CEL application. 46 / 66
47 Simulation Parameters for Evaluation of the ENCO Method Parameter Value Range Number of nodes Area 300 x 300 m 2 Sensing Range Target speed Sampling interval 50 m 10 m/s 1 second 1000 simulation runs with new deployments. At each run, 10 event points are logged. for CEL: 10 consecutive target detection points. 47 / 66
48 Simulation Results of the ENCO Method Sample REL Application: Sample CEL Application: W* ENCO W* E 48 / 66
49 ENCO A heuristic that utilize the contention optimization work is presented. It is defined for event-driven applications where the ENCO method is shown to successfully approximate the performance of the optimum contention window size. 49 / 66
50 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 50 / 66
51 Effect of CW Optimization on Video Sensor Networks Sensor nodes are equipped with video cameras: Controllable video frame rate Limited buffers (Motes: 60 KB RAM) Limited communication rate Mica2: 20 Kbps, MicaZ: 250 Kbps Low computational capacity Limited encoding alternatives 51 / 66
52 Simulation Parameters for VSN Performance Evaluation Network stack: S-MAC + GPSR Comm. range: 80 m 52 / 66
53 Simulation Results for ENCO in VSN Throughput: Latency: Increases throughput for all DC values Decreases latency 53 / 66
54 VSN Performance Improvement with ENCO In this work, we investigated a promising and challenging type of WSN, namely VSN. We show that with current hardware capabilities of the sensor nodes, VSNs can easily saturate even for low video rates. However, the ENCO method is shown to improve the VSN performance for both throughput and latency values which are important criteria for time-critical VSN applications such as border surveillance. 54 / 66
55 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 55 / 66
56 A Better Slot Selection Method? Mostly used slot selection: uniformly random IEEE , S-MAC, Z-MAC,... p* slot selection method is proposed to minimize the collision probability: (IEEE JSAC, 04) 56 / 66
57 Is It Really Better? Collision Probabilities (N=5): Average Contention Delays (N=5): 57 / 66
58 Which CW Size to Compare? For W* t : For individual W* s: Uniformly random slot selection results in better performance with W* t! 58 / 66
59 Choice of Slot Selection Method We showed that although p* results in fewer collisions, its producing a better overall performance depends on the contention window size used. The uniformly random slot selection performance is shown to be better than the p* method if it is used with the CW size of W* t that is derived analytically in this thesis. 59 / 66
60 Conclusions (1) The performance studies of MAC protocols are generally performed with either periodic or Poisson data traffic. However, in reality, the data traffic generated in WSNs depends on the application. We developed an analytical packet traffic model for surveillance wireless sensor networks which utilize a parametric and probabilistic sensor detection model. This model can be used to generate the time-based packet traffic load generated by an intrusion to a target area. Moreover, the analytical model derived can be used for performance evaluations of MAC protocols for SWSNs. By doing detailed simulations, we showed that the performance results of a communication protocol depend on the packet traffic model employed. Using a different model than SPTM can overestimate the performance of a MAC protocol. 60 / 66
61 Conclusions (2) Another work presented in this thesis is the energy and delay optimization of contentions for contention-window based MAC protocols. The importance of the contention window size setting on the energy consumption and the delay incurred is depicted both analytically and by simulations. Separate optimum contention window size setting methods are presented for the energy consumption and the incurred contention delay. It is shown that the performance of contention-based MAC protocols can be significantly improved using the optimum contention window sizes. The presented analysis and optimizations are also applicable to other wireless networks that define a fixed contention window size and uniformly random contention. 61 / 66
62 Conclusions (3) For practical implementation of the CW size optimization in event-triggered WSN, a heuristic namely, the ENCO method, is proposed. The simulations on two different type of event-triggered WSN applications show that the ENCO method achieves close performance results to the optimum contention window size results. In the simulations of ENCO for correlated event location scenario, the information of the number of nodes detecting the events is generated with the proposed SWSN packet traffic model. As a future work, the performance of the ENCO method can be increased with spatio-temporal information such as the history of number of contending nodes. 62 / 66
63 Conclusions (4) We also investigated the improvements in the capabilities of VSNs by using the contention optimization methods and the ENCO heuristic proposed. It is shown that increasing the quality of video capture frame rates results in a drop in the video quality received at the sink even for low rates with currently available hardware and encoding technology. The network performance results of VSN with the ENCO method show that this method can extend the capabilities of VSN by both decreasing the end-to-end delay and increasing the average number of frames received at the sink, i.e., the system throughput at the same time. As a future work, the ENCO method can be improved for QoS-aware WSN where different priority classes can use different CW sizes. 63 / 66
64 Conclusions (5) The CW size studies presented in this thesis base on the uniformly random slot selection method which is the most widely used slot selection method. However, an alternative method was proposed which minimizes the collision probability. This method is compared to the uniformly random method for the contention delay metric. It is found that depending on the CW size used, the slot selection method that resuls in better performance values changes. However, it is shown that the uniformly random slot assignment performs better when used with the optimized CW size. We state that the best slot seletion method investigation should be done in cooperation with the optimum contention window size for the method. As a future work, this joint optimization problem can be investigated. 64 / 66
65 Publications Journal Papers: I. Demirkol, F. Alagöz, H. Deliç and C. Ersoy, Wireless sensor networks for intrusion detection: packet traffic modeling, IEEE Communications Letters, vol. 10, no.1, pp , January I. Demirkol, C. Ersoy and F. Alagöz, MAC protocols for wireless sensor networks: a survey, IEEE Communications Magazine, vol. 44, no. 4, pp , April I. Demirkol, F. Alagöz, H. Deliç and C. Ersoy, The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks, Accepted to Elsevier Computer Networks, I. Demirkol and C. Ersoy, Energy and delay optimized contention for wireless sensor networks, under revision, Elsevier Computer Networks, I. Demirkol, E. Onur and C. Ersoy, Wake-up receivers for wireless sensor networks: Benefits and Challenges, under revision, IEEE Wireless Communications, I. Demirkol and C. Ersoy, Does minimizing the collision probability reveal the best performance? In preparation, I. Demirkol, A. Ozgovde, and C. Ersoy, Improving latency and throughput by intelligent contention window size adjustment for video sensor networks, In preparation, International Conference Papers: A. Ozgovde, I. Demirkol and C. Ersoy, Effect of sleep schedule and frame rate on the capabilities of video sensor networks, International Symposium on Wireless Pervasive Computing - ISWPC 08, Greece, May Y. Durmus, A. Ozgovde, I. Demirkol and C. Ersoy, Exploring the effect of the network parameters of video sensor networks, Accepted to International Symposium on Computer Networks, I. Demirkol, Evaluation of cluster-based cross layer protocols for wireless sensor networks, Accepted to IEEE INFOCOM 2006 Student Workshop, I. Demirkol, Evaluation of cluster-based cross layer protocols for wireless sensor networks, Accepted to ICN 06. National Conference Papers: A. Ozgovde, I. Demirkol and C. Ersoy, Uyuma çizelgesi ve çerçeve hızının görüntülü algılayıcı ağların başarımına etkisi, Akademik Bilişim, Çanakkale, I. Demirkol, K. Basol, O. B. Orhan and S. Sevinc, Sorgu-tabanlı telsiz algılayıcı ağları sınama ortamı çalışmaları, 65 / 66 Proceedings of Bilgi Teknolojileri Kongresi, pp , Denizli, Turkey, 9-11 February 2006.
66 Comments/Questions? 66 / 66
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationHalmstad University Post-Print
Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationBodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationAdaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationInternet of Things. Exam June 24
Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light
More informationFibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
More informationMac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationAgriculture: Methods and Experiences
Wireless Sensor Networks for Precision Agriculture: Methods and Experiences Novel Sensor Technologies for Plant Phenotyping September 13 th 14 th, 2012 Wageningen, The Netherlands Antonio Javier Garcia
More informationc 2012 by Kien Nguyen. All rights reserved.
c 22 by Kien Nguyen. All rights reserved. EFFICIENT MAC PROTOCOL DESIGN FOR WIRELESS SENSOR NETWORKS BY KIEN NGUYEN DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationA Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
More informationPERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationPerformance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationAn experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More informationMEDIUM ACCESS CONTROL LAYER PERFORMANCE ISSUES IN WIRELESS SENSOR NETWORKS
MEDIUM ACCESS CONTROL LAYER PERFORMANCE ISSUES IN WIRELESS SENSOR NETWORKS by Ilker Seyfettin Demirkol B.S, Computer Engineering, Boğaziçi University, 1998 M.S, Computer Engineering, Boğaziçi University,
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationA SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS
Chapter 5 A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Piyush Naik and Krishna M. Sivalingam Dept. of CSEE, University of Maryland, Baltimore County, Baltimore, MD 21250 piyush.naik@umbc.edu,krishna@umbc.edu
More informationENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS: A CROSSLAYER, CHANNEL ADAPTIVE APPROACH TOWARDS PERFORMANCE OPTIMIZATION
Ph.D Thesis ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS: A CROSSLAYER, CHANNEL ADAPTIVE APPROACH TOWARDS PERFORMANCE OPTIMIZATION Submitted to Cochin University of Science and Technology for the award
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationHow to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.
How to deal with a thousand nodes: M2M communication over cellular networks A. Maeder NEC Laboratories Europe andreas.maeder@neclab.eu Outline Introduction to M2M communications The M2M use case landscape
More informationMetrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationProtocol Design and Implementation for Wireless Sensor Networks
Protocol Design and Implementation for Wireless Sensor Networks PIERGIUSEPPE DI MARCO Masters Degree Project Stockholm, Sweden April 2008 XR-EE-RT 2008:005 Abstract Designing efficient and reliable communication
More informationA Receiver Oriented MAC Protocol for Wireless Sensor Networks
A Receiver Oriented MAC Protocol for Wireless Sensor Networks Luca Campelli, Antonio Capone, Matteo Cesana Dipartimento di Elettronica e Informazione Politecnico di Milano, Milan, Italy {campelli, capone,
More informationWireless Sensor Network MAC Protocol: SMAC & TMAC
Wireless Sensor Network MAC Protocol: SMAC & TMAC SARIKA KHATARKAR M.Tech Scholar Technocrats Institute of Technology, Rajiv Gandhi Technical University, Anand Nagar, Bhopal, Madhya Pradesh, 462021, India
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationFeasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks
Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester,
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationPerformance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
More informationAn Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research
More informationEnhancement of VoIP over IEEE 802.11 WLANs by Adapting Transmitting Interval
Enhancement of VoIP over IEEE 82.11 WLANs by Adapting Transmitting Interval Zhuo Chen, Lingyun Wang, and Xinbing Wang School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University
More informationMultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1
More informationYalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca) Renuka Rani (rra7@sfu.ca) www.sfu.ca/~rra7
ENSC 427: Communication Networks Spring 2010 Final Project Presentation Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca) Renuka Rani (rra7@sfu.ca) www.sfu.ca/~rra7 1 Introduction Overview and Motivation
More informationHow To Improve Quality Of Service For A Smart Grid Distribution Monitoring System
Quality of Service Networking for Smart Grid Distribution Monitoring Wei Sun, Xiaojing Yuan, Jianping Wang, Dong Han and Chongwei Zhang School of Electrical Engineering and Automation, Hefei University
More informationISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
More informationMedium Access Control Optimization For Structural Health Monitoring Using Wireless Sensor Network
Medium Access Control Optimization For Structural Health Monitoring Using Wireless Sensor Network by Saurabh Singh A thesis submitted to the Victoria University of Wellington in fulfilment of the requirements
More informationPerformance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
More informationModular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks
Sensors 2015, 15, 16162-16195; doi:10.3390/s150716162 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process
More informationHyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
More informationOn Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks
On Backoff Mechanisms for Wireless Mobile Ad Hoc Networks A Thesis Submitted By Saher S. Manaseer For The Degree of Doctor of Philosophy To The Faculty of Information and Mathematical Sciences University
More informationEnhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
More informationMAC Protocols for Wireless Sensor Networks: A Survey
TOPICS IN AD HOC AND SENSOR NETWORKS MAC Protocols for Wireless Sensor Networks: A Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz, Bogazici University ABSTRACT Wireless sensor networks are appealing
More informationDuty-Cycle MAC Protocols and Networking Overhaul
RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks Shu Du Amit Kumar Saha David B. Johnson Department of Computer Science, Rice University, Houston, TX, USA Abstract Duty-cycle
More informationRestricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi levi@sabanciuniv..edu Sabancı University Computer Science and
More informationHow To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
More informationVoice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
More informationPERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
More informationA Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
More informationCSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationSELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
More informationFAMA/TDMA Hybrid MAC for Wireless Sensor Networks
FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: nuwang@ent.mrt.ac.lk
More informationA New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks
Wireless Sensor Network, 2011, 3, 61-72 doi:10.4236/wsn.2011.32007 Published Online February 2011 (http://www.scirp.org/journal/wsn) A New MAC Protocol for Moving Target in Distributed Wireless Sensor
More informationENERGINO: Hardware and Software Solution for Energy Consumption Monitoring
ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring Karina Gomez, Roberto Riggio, Tinku Rasheed, Daniele Miorandi, Fabrizio Granelli CREATE-NET Research, Trento, Italy Email: first.secondname@create-net.org
More informationImplementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks
Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Junaid Ansari, Janne Riihijärvi and Petri Mähönen Department of Wireless Networks
More informationMAC Scheduling for High Throughput Underwater Acoustic Networks
MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationDrahtlose Kommunikation. Sensornetze
Drahtlose Kommunikation Sensornetze Übersicht Beispielanwendungen Sensorhardware und Netzarchitektur Herausforderungen und Methoden MAC-Layer-Fallstudie IEEE 802.15.4 Energieeffiziente MAC-Layer WSN-Programmierung
More informationOptimal Network Discovery Period for Energy- Efficient WLAN Offloading
Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,
More informationTHE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationMaster s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System
Master s Thesis Title Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Supervisor Professor Masayuki Murata Author Chuluunsuren Damdinsuren February 14th, 2012 Department of Information
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationDesign and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
More informationA Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks
A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks Ayşegül Tüysüz Erman, Thijs Mutter, Lodewijk van Hoesel, and Paul Havinga University of Twente
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks Joseph Polastre Computer Science Department University of California, Berkeley Berkeley, CA 9472 polastre@cs.berkeley.edu Jason Hill JLH Labs
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationFlow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel
More informationWireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
More informationEasy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.
1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationMAC Protocols for Wireless Sensor Networks: a Survey
1 MAC Protocols for Wireless Sensor Networks: a Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz Abstract Wireless sensor networks are appealing to researchers due to their wide range of application
More informationPhilippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationWiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks Amre El-Hoiydi and Jean-Dominique Decotignie CSEM, Swiss Center for Electronics and Microtechnology, Inc, Rue Jaquet-Droz
More informationPartition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks
Department of Electrical Engineering, Mathematics and Computer Science Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Master Thesis Thijs Mutter 439 Supervisors
More informationEstablishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
More information