Abstract
In this chapter, we present several typical applications that leverage attachment transmission to solve the above-mentioned classic problems. With the assistance of attachment transmission, a variety of MAC layer protocols are designed, which can guide mobile stations to make better access decision through the PHY layer information they need. These applications include: Harmless Attachment that uses attachment transmission to benefit multiple access in WLANs in the infrastructure mode(Bejerano et al., 2010 Proceedings of the 8th international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt), pp 60–69, IEEE, 2010). Attachment Learning that helps mobile stations to learn allocation strategy by themselves. After the learning stage, mobile stations can achieve a TDMA-like performance, where stations can know when exactly to transmit on which channel without further collisions. Attachment Sense that identifies hidden and exposed terminals in ad hoc networks. The self-attached control provides accurate channel usage information (CUI) in real time, thus guides mobile stations to make the right channel access decision fast and accurate. In the following sections, we will present how we utilize attachment transmission to solve the above-mentioned problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Y. Bejerano, H.-G. Choi, S.-J. Han, and T. Nandagopal, “Performance tuning of infrastructure-mode wireless lans,” in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2010 Proceedings of the 8th International Symposium on, pp. 60–69, IEEE, 2010.
S. Katti, S. Gollakota, and D. Katabi, “Embracing wireless interference: Analog network coding,” in ACM SIGCOMM Computer Communication Review, vol. 37, pp. 397–408, 2007.
Y. C. Du Ho Kang, D. Kim, and S. Choi, “Qos-aware load indicators for intelligent cell selection,” IEEE APWCS, 2010.
I. W. Group et al., IEEE 802.11n-2009: Enhancements for Higher Throughput, 2009.
G. Zhou, C. Huang, T. Yan, T. He, J. Stankovic, and T. Abdelzaher, “Mmsn: Multi-frequency media access control for wireless sensor networks,” in IEEE Infocom, pp. 1–13, 2006.
P. Mähönen and M. Petrova, “Minority game for cognitive radios: Cooperating without cooperation,” Physical Communication, vol. 1, no. 2, pp. 94–102, 2008.
L. Gao and X. Wang, “A game approach for multi-channel allocation in multi-hop wireless networks,” in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pp. 303–312, ACM, 2008.
J. Park and M. Van Der Schaar, “Medium access control protocols with memory,” IEEE/ACM Transactions on Networking (TON), vol. 18, no. 6, pp. 1921–1934, 2010.
L. Cigler and B. Faltings, “Reaching correlated equilibria through multi-agent learning,” in The 10th International Conference on Autonomous Agents and Multiagent Systems, vol. 2, pp. 509–516, 2011.
R. Aumann, “Subjectivity and correlation in randomized strategies,” Levine’s Working Paper Archive, 2010.
R. Jain, D. Chiu, and W. Hawe, “A quantitative measure of fairness and discrimination for resource allocation in shared computer systems,” DEC research report TR-301, 1984.
S. Sen, R. Choudhury, and S. Nelakuditi, “Listen (on the frequency domain) before you talk,” in ACM SIGCOMM Workshop on Hot Topics in Networks, p. 16, 2010.
S. Gollakota and D. Katabi, “Zigzag decoding: combating hidden terminals in wireless networks,” in ACM SIGCOMM Computer Communication Review, vol. 38, pp. 159–170, 2008.
M. Vutukuru, K. Jamieson, and H. Balakrishnan, “Harnessing exposed terminals in wireless networks,” in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp. 59–72, 2008.
M. Jain, J. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha, “Practical, real-time, full duplex wireless,” in ACM MobiCom, pp. 301–312, 2011.
I. W. Group et al., IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2007.
W. Yu, J. Cao, X. Zhou, and X. Wang, “A high-throughput mac protocol for wireless ad hoc networks,” in IEEE international conference on Pervasive Computing and Communications Workshops (PERCOMW), pp. 405–pp, 2006.
M. Dianati, X. Ling, K. Naik, and X. Shen, “Performance analysis of the node cooperative arq scheme for wireless ad-hoc networks,” in IEEE GLOBECOM, vol. 5, pp. 5–pp, 2005.
S. Zhao, L. Fu, X. Wang, and Q. Zhang, “Fundamental relationship between nodedensity and delay in wireless ad hoc networks with unreliable links,” in ACM MobiCom, pp. 337–348, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Wang, L., Wu, K., Hamdi, M. (2014). Applications to Classic Problems. In: Attachment Transmission in Wireless Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04909-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-04909-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04908-3
Online ISBN: 978-3-319-04909-0
eBook Packages: Computer ScienceComputer Science (R0)