<--- Back to Details
First PageDocument Content
Computing / Network architecture / OSI protocols / Network performance / Computer networking / Routing algorithms / Carrier sense multiple access with collision avoidance / IEEE 802.11 / OSI model / Data link layer / Hidden node problem / Throughput
Date: 2014-11-10 18:30:11
Computing
Network architecture
OSI protocols
Network performance
Computer networking
Routing algorithms
Carrier sense multiple access with collision avoidance
IEEE 802.11
OSI model
Data link layer
Hidden node problem
Throughput

The Case for a Network Protocol Isolation Layer Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA USA

Add to Reading List

Source URL: sing.stanford.edu

Download Document from Source Website

File Size: 633,85 KB

Share Document on Facebook

Similar Documents

Life-Add: Lifetime Adjustable Design for WiFi Networks with Heterogeneous Energy Supplies Shengbo Chen∗§ , Tarun Bansal†§ , Yin Sun∗§ , Prasun Sinha† and Ness B. Shroff‡ ∗‡ Department  of ECE, The Ohio S

Life-Add: Lifetime Adjustable Design for WiFi Networks with Heterogeneous Energy Supplies Shengbo Chen∗§ , Tarun Bansal†§ , Yin Sun∗§ , Prasun Sinha† and Ness B. Shroff‡ ∗‡ Department of ECE, The Ohio S

DocID: 1rpS5 - View Document

Communication Networks of Visible Light Emitting Diodes with Intra-Frame Bidirectional Transmission Qing Wang Domenico Giustiniano

Communication Networks of Visible Light Emitting Diodes with Intra-Frame Bidirectional Transmission Qing Wang Domenico Giustiniano

DocID: 1qBOs - View Document

LA-MAC: Low-Latency Asynchronous MAC for Wireless Sensor Networks Giorgio Corbellini∗† , Emilio Calvanese Strinati∗ , and Andrzej Duda† ∗ CEA-LETI,  MINATEC, Grenoble, France

LA-MAC: Low-Latency Asynchronous MAC for Wireless Sensor Networks Giorgio Corbellini∗† , Emilio Calvanese Strinati∗ , and Andrzej Duda† ∗ CEA-LETI, MINATEC, Grenoble, France

DocID: 1pt18 - View Document

A BAYESIAN GAME APPROACH TO COEXISTENCE WITH MALICIOUS AND SELFISH NODES IN WIRELESS AD-HOC NETWORKS By J. ANDREW ROLES

A BAYESIAN GAME APPROACH TO COEXISTENCE WITH MALICIOUS AND SELFISH NODES IN WIRELESS AD-HOC NETWORKS By J. ANDREW ROLES

DocID: 1oUDI - View Document

Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks UCB//CSDPhilip Levis, Neil Patel, Scott Shenker and David Culler {pal,shenker,culler}@eecs.berkeley.edu, neil

Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks UCB//CSDPhilip Levis, Neil Patel, Scott Shenker and David Culler {pal,shenker,culler}@eecs.berkeley.edu, neil

DocID: 1lWlt - View Document