• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 142,118
Next 10 →

A NEURAL BASED PROPOSAL FOR SCHEDULING OF IEEE 802.16 NETWORKS

by Dr K S Kahlon
"... The goal of this paper is to survey the core issues in the design of schedulers for IEEE 802.16 networks and study the various techniques available in literature. Neural Networks have been utilized by researchers over the years to solve a large set of optimization problems in the field of active que ..."
Abstract - Add to MetaCart
The goal of this paper is to survey the core issues in the design of schedulers for IEEE 802.16 networks and study the various techniques available in literature. Neural Networks have been utilized by researchers over the years to solve a large set of optimization problems in the field of active

Adaptive Modulation-based TCP-Aware Uplink Scheduling in IEEE 802.16 Networks

by Hemant Kumar Rath, Abhay Kar, Vishal Sharma
"... Abstract — In this paper we propose polling based uplink scheduling schemes for TCP based applications in a multipointto-point fixed broadband IEEE 802.16 network. Our schemes adapt the transmission rates between Subscriber Stations (SSs) and the Base Station (BS) dynamically using adaptive modulati ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract — In this paper we propose polling based uplink scheduling schemes for TCP based applications in a multipointto-point fixed broadband IEEE 802.16 network. Our schemes adapt the transmission rates between Subscriber Stations (SSs) and the Base Station (BS) dynamically using adaptive

802.16 mesh networking

by Petar Djukic, Shahrokh Valaee - in Handbook of Wimax, S. Ahson and M. Ilyas, Eds , 2007
"... We present an overview of the 802.16 mesh protocol with a specific focus on the networking aspects of the protocol. We first review the 802.16 mesh Time Division Multiple Access (TDMA) technology, including state of the art research on scheduling algorithms required by the technology. We then propos ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
We present an overview of the 802.16 mesh protocol with a specific focus on the networking aspects of the protocol. We first review the 802.16 mesh Time Division Multiple Access (TDMA) technology, including state of the art research on scheduling algorithms required by the technology. We

IEEE 802.16/WIMAX- Overview

by unknown authors
"... 1 IEEE 802.16 Wireless MAN –overview..............................................................................................1 ..."
Abstract - Add to MetaCart
1 IEEE 802.16 Wireless MAN –overview..............................................................................................1

TCP-Aware Uplink Scheduling for IEEE 802.16

by Seungwoon Kim, Ikjun Yeom
"... Abstract — In IEEE 802.16 networks, a bandwidth requestgrant mechanism is used to accommodate various QoS requirements of heterogeneous traffic. However, it may not be effective for TCP flows since (a) there is no strict QoS requirement in TCP traffic; and (b) it is difficult to estimate the amount ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
of required bandwidth due to dynamic changes of the sending rate. In this letter, we propose a new uplink scheduling scheme for best-effort TCP traffic in IEEE 802.16 networks. The proposed scheme does not need any bandwidth request process for allocation. Instead, it estimates the amount of bandwidth

Security analysis of IEEE 802.16

by Leonardo Maccari, Matteo Paoli, Romano Fantacci
"... Abstract — This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standard, the dynamic resources allocation and the mesh mode revealed to be vulnerable to attacks that represent serious ..."
Abstract - Add to MetaCart
nodes of the mesh network. These vulnerabilities are still present even after the latest amendment to the standard, IEEE 802.16e that solved some previously addressed security flaws. I.

Wireless mesh networks: a survey

by Ian F. Akyildiz, Xudong Wang, Weilin Wang - COMPUTER NETWORKS , 2005
"... Wireless meshnet8Ex8 (WMNs)consist of meshrout6L and meshclient8 where meshroutfix have minimal mobilit and formtr backbone of WMNs. They provide netide access for bot mesh andconvent1)fi8 clientt TheintL gratLfl of WMNs wit ot8 net8866 such as t1Int6fiPx1 cellular, IEEE 802.11, IEEE 802.15, IEEE 8 ..."
Abstract - Cited by 658 (12 self) - Add to MetaCart
802.16, sensor netsor1L ets can be accomplishedtccomp tc gatomp and bridging functng1 in t1 meshroutfijx Meshclient can be eit8fi st8fij1)6x or mobile, and can form aclient meshnet16S amongtng1fifiELj and wit meshroutLfifi WMNs are antLfifl1)6fl t resolvets limit18fiflfl andt significantfl improvetp

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment

by Laura Marie Feeney, Martin Nilsson - In IEEE Infocom , 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract - Cited by 655 (3 self) - Add to MetaCart
not provide information in a form that is helpful to protocol developers. This paper describes a series of experiments which obtained detailed measurements of the energy consumption of an IEEE 802.11 wireless network interface operating in an ad hoc networking environment. The data is presented as a

Quality of service support in IEEE 802.16 networks

by Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi, Carl Eklund Nokia - IEEE Network , 2006
"... During the last few years, users all over the world have become more and more accustomed to the availability of broadband access. This has boosted the use of a wide variety both of established and recent multimedia applications. However, there are cases where it is too expensive for network provider ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Wireless Access technologies, such as the IEEE 802.16, also known as WiMAX. One of the features of the MAC layer of 802.16 is that it is designed to differentiate service among traffic categories with different multimedia requirements. This article focuses on mechanisms that are available in an 802.16

An Energy-Efficient MAC Protocol for Wireless Sensor Networks

by Wei Ye, John Heidemann, Deborah Estrin , 2002
"... This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect senso ..."
Abstract - Cited by 1488 (37 self) - Add to MetaCart
wireless MACs such as IEEE 802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses three novel techniques to reduce energy consumption and support self-configuration. To reduce energy consumption
Next 10 →
Results 1 - 10 of 142,118
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University