Proportional Fair Coding for Wireless Mesh Networks
نویسندگان
چکیده
منابع مشابه
A Fair Scheduling for Wireless Mesh Networks
Wireless Mesh Networks (WMNs) represent a new and promising paradigm that uses multi-hop communications to extend WiFi networks: By deploying only one hot spot (directly connected to the Internet) and several transient access points (TAPs), an Internet Service Provider (ISP) can extend its coverage and serve a large number of clients using a single broadband connection. Unfortunately, if the me...
متن کاملFair packet scheduling in Wireless Mesh Networks
In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distribut...
متن کاملProportional Fair Scheduling with Capacity Estimation for Wireless Multihop Networks
In this paper, we investigate the scheduling problem to achieve the proportional fairness among the flows in wireless multihop networks with time-varying channel capacity. Using the signal to interference noise ratio and the outage probability, we present an estimate of time-varying capacity. Then, we achieve the proportional fairness in terms of maximizing the network utility functionwith cons...
متن کاملNovel Techniques for Fair Rate Control in Wireless Mesh Networks
IEEE 802.11 based wireless mesh networks can exhibit severe fairness problem by distributing throughput among different flows originated from different nodes. Congestion control, Throughput, Fairness are the important factors to be considered in any wireless network. Flows originating from nodes that directly communicate with the gateway get higher throughput. On the other hand, flows originati...
متن کاملRevisiting security of proportional fair scheduler in wireless cellular networks
http://dx.doi.org/10.1016/j.comnet.2014.09.009 1389-1286/ 2014 Elsevier B.V. All rights reserved. ⇑ Corresponding author. Tel.: +82 42 350 3486. E-mail addresses: [email protected] (H. Park), yiyung@kaist. edu (Y. Yi), [email protected] (Y. Kim). 1 Being malicious or selfish just follows a fabricator’s inte cheating. However, it is possible that a selfish user’s behavio indirectly ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/ACM Transactions on Networking
سال: 2015
ISSN: 1063-6692,1558-2566
DOI: 10.1109/tnet.2014.2298974