1 - 7 of 7 Chapters
[In the past decade, with the advances of wireless technologies and the increasing demand for wireless communication services, a variety of wireless networks have been deployed, e.g., cellular networks, wireless local area networks (WLANs), wireless ad hoc networks, sensor networks, and wireless...
[Heterogeneous wireless networks including single- and multi-hop wireless networks are considered. As WLANs are one of the most successful single-hop wireless network and has been widely deployed all over the world, we firstly study MAC layer QoS provisioning in WLANs. To meet the growing demand...
[As discussed in Chap. 2, the current WLANs experience bandwidth inefficiency when supporting voice traffic, leading to a very limited capacity to voice users. In this chapter, we aim at addressing this limitation. Our work is based on IEEE 802.11e since it is the most promising technology for...
[In Chap. 3, an infrastructure-based WLAN is considered with a central controller. In this chapter, we consider an ad hoc WLAN where a distributed access control is needed due to the lack of central controller. Most of the existing distributed access control schemes for ad hoc WLANs are...
[In the preceding chapters, a single-hop wireless network (i.e., WLAN) is considered. In this chapter, we consider a multi-hop wireless ad hoc network. As discussed in Chap. 2, unlike single-hop WLANs, the multi-hop wireless network presents more challenges to the QoS provisioning. The hidden...
[In this chapter, we study a wireless mesh backbone, which consists of a number of routers located at fixed sites and covers a large geographical area. Different from the existing MAC schemes, our MAC scheme design benefits greatly from the fixed network topology. With the router location...
[In this book, we have introduced several distributed MAC schemes to provide QoS support for different types of traffic in heterogeneous wireless networks including WLANs, wireless ad hoc networks, and wireless mesh networks. Specifically, these MAC schemes are summarized as follows:]
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.