Skip to main content

Applications to Classic Problems

  • Chapter
  • First Online:
Attachment Transmission in Wireless Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 384 Accesses

Abstract

In this chapter, we present several typical applications that leverage attachment transmission to solve the above-mentioned classic problems. With the assistance of attachment transmission, a variety of MAC layer protocols are designed, which can guide mobile stations to make better access decision through the PHY layer information they need. These applications include: Harmless Attachment that uses attachment transmission to benefit multiple access in WLANs in the infrastructure mode(Bejerano et al., 2010 Proceedings of the 8th international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt), pp 60–69, IEEE, 2010). Attachment Learning that helps mobile stations to learn allocation strategy by themselves. After the learning stage, mobile stations can achieve a TDMA-like performance, where stations can know when exactly to transmit on which channel without further collisions. Attachment Sense that identifies hidden and exposed terminals in ad hoc networks. The self-attached control provides accurate channel usage information (CUI) in real time, thus guides mobile stations to make the right channel access decision fast and accurate. In the following sections, we will present how we utilize attachment transmission to solve the above-mentioned problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y. Bejerano, H.-G. Choi, S.-J. Han, and T. Nandagopal, “Performance tuning of infrastructure-mode wireless lans,” in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2010 Proceedings of the 8th International Symposium on, pp. 60–69, IEEE, 2010.

    Google Scholar 

  2. S. Katti, S. Gollakota, and D. Katabi, “Embracing wireless interference: Analog network coding,” in ACM SIGCOMM Computer Communication Review, vol. 37, pp. 397–408, 2007.

    Google Scholar 

  3. Y. C. Du Ho Kang, D. Kim, and S. Choi, “Qos-aware load indicators for intelligent cell selection,” IEEE APWCS, 2010.

    Google Scholar 

  4. I. W. Group et al., IEEE 802.11n-2009: Enhancements for Higher Throughput, 2009.

    Google Scholar 

  5. G. Zhou, C. Huang, T. Yan, T. He, J. Stankovic, and T. Abdelzaher, “Mmsn: Multi-frequency media access control for wireless sensor networks,” in IEEE Infocom, pp. 1–13, 2006.

    Google Scholar 

  6. P. Mähönen and M. Petrova, “Minority game for cognitive radios: Cooperating without cooperation,” Physical Communication, vol. 1, no. 2, pp. 94–102, 2008.

    Article  Google Scholar 

  7. L. Gao and X. Wang, “A game approach for multi-channel allocation in multi-hop wireless networks,” in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pp. 303–312, ACM, 2008.

    Google Scholar 

  8. J. Park and M. Van Der Schaar, “Medium access control protocols with memory,” IEEE/ACM Transactions on Networking (TON), vol. 18, no. 6, pp. 1921–1934, 2010.

    Article  Google Scholar 

  9. L. Cigler and B. Faltings, “Reaching correlated equilibria through multi-agent learning,” in The 10th International Conference on Autonomous Agents and Multiagent Systems, vol. 2, pp. 509–516, 2011.

    Google Scholar 

  10. R. Aumann, “Subjectivity and correlation in randomized strategies,” Levine’s Working Paper Archive, 2010.

    Google Scholar 

  11. R. Jain, D. Chiu, and W. Hawe, “A quantitative measure of fairness and discrimination for resource allocation in shared computer systems,” DEC research report TR-301, 1984.

    Google Scholar 

  12. S. Sen, R. Choudhury, and S. Nelakuditi, “Listen (on the frequency domain) before you talk,” in ACM SIGCOMM Workshop on Hot Topics in Networks, p. 16, 2010.

    Google Scholar 

  13. S. Gollakota and D. Katabi, “Zigzag decoding: combating hidden terminals in wireless networks,” in ACM SIGCOMM Computer Communication Review, vol. 38, pp. 159–170, 2008.

    Google Scholar 

  14. M. Vutukuru, K. Jamieson, and H. Balakrishnan, “Harnessing exposed terminals in wireless networks,” in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp. 59–72, 2008.

    Google Scholar 

  15. M. Jain, J. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha, “Practical, real-time, full duplex wireless,” in ACM MobiCom, pp. 301–312, 2011.

    Google Scholar 

  16. I. W. Group et al., IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2007.

    Google Scholar 

  17. W. Yu, J. Cao, X. Zhou, and X. Wang, “A high-throughput mac protocol for wireless ad hoc networks,” in IEEE international conference on Pervasive Computing and Communications Workshops (PERCOMW), pp. 405–pp, 2006.

    Google Scholar 

  18. M. Dianati, X. Ling, K. Naik, and X. Shen, “Performance analysis of the node cooperative arq scheme for wireless ad-hoc networks,” in IEEE GLOBECOM, vol. 5, pp. 5–pp, 2005.

    Google Scholar 

  19. S. Zhao, L. Fu, X. Wang, and Q. Zhang, “Fundamental relationship between nodedensity and delay in wireless ad hoc networks with unreliable links,” in ACM MobiCom, pp. 337–348, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Wang, L., Wu, K., Hamdi, M. (2014). Applications to Classic Problems. In: Attachment Transmission in Wireless Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04909-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04909-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04908-3

  • Online ISBN: 978-3-319-04909-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics