The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we examine the use of pricing for distributed, incentive-compatible and socially optimal resource allocation in a QoS-differentiated random-access wireless network. We argue that QoS mechanisms in wireless networks are susceptible to misuse by self-interested users. We first present a simple pricing scheme that leads to social optimality (i.e., achieves QoS-differentiated proportional...
In spite of the tremendous boom in the wireless LAN arena, applications such as streaming video and audio still bring unique and challenging quality of service (QoS) requirements to such networks. To this effect, IEEE 802.11e medium access control (MAC) standard specifies a set of QoS enhancement features which allows traffic classification (high priority or HP and low priority or LP), prioritization...
Many wireless network standards include quality-of-service (QoS) features at the MAC layer. These features provide nodes transmitting high priority delay sensitive traffic such as voice and video preferential access to the channel over nodes carrying low priority delay tolerant traffic such as file transfer and email. However, such schemes are unfair to low priority users, depriving them of equitable...
We provide a new unified framework, called "multiple correlated informants - single recipient" communication, to address the variations of the traditional Distributed Source Coding (DSC) problem. Different combinations of the assumptions about the communication scenarios and the objectives of communication result in different variations of the DSC problem. For each of these variations, the...
In this paper, we argue that network performance can be improved when nodes explicitly exchange protocol information with each other. We present a vision of network society for next generation wireless networks that entails such social networking. We begin by describing our cognitive social network (CosNet) system architecture that enables network nodes to effectively gather, analyze, compact, repositorize,...
The implementation of QoS provisioning at the MAC layer requires users to classify their traffic into QoS categories. In realistic scenarios where users are selfish and interested in maximizing their own utility, users may have an interest in misrepresenting the QoS category of their traffic. We examine a simplified model for IEEE 802.11e networks in which channel access can be obtained via random...
In this paper, we examine the use of pricing for distributed, incentive-compatible and socially optimal resource allocation in a QoS-differentiated random-access wireless network. Specifically, we consider the uplink of a single-hop random access MAC where each user contends for channel access according to some user-chosen probability. Each user declares its utility function to the AP. The AP then...
Sensor network applications such as environmental monitoring demand that the data collection process be carried out for the longest possible time. Our paper addresses this problem by presenting a routing scheme that ensures that the monitoring network remains connected and hence the live sensor nodes deliver data for a longer duration. We analyze the role of relay nodes (neighbours of the base-station)...
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capacity region has long been known to be NP-hard. Mobility introduces an additional dimension of complexity because nodes now also have to decide when they should initiate route discovery. Since route discovery involves communication...
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxy-based scheme in the work of Ling and Znati (2005) and Li et al. (2005), we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably...
The IEEE 802.11e medium access control (MAC) standard provides distributed service differentiation or quality-of service (QoS) by employing a priority system. In 802.11e networks, network traffic is classified into different priorities or access categories (ACs). Nodes maintain separate queues for each AC and packets at the head-of-line (HOL) of each queue contend for channel access using AC-specific...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.