Publication

On Selfish Behavior in CSMA/CA Networks

Publications associées (46)

Optimizing TCP Receive Performance

Willy Zwaenepoel, Aravind Menon

The performance of the networking stack in an operating system depends on the overhead incurred by two of its components: the per-byte overhead incurred in data-touching operations, and the per-packet overhead of protocol processing and other operating sys ...
2008

Non-cooperative behavior in wireless networks

Mark Felegyhazi

Existing cellular networks are centrally managed and require a tremendous initial investment. With the advancement of new wireless technologies, the operators of traditional networks have to face new competition. New technologies make it possible to provid ...
EPFL2007

Border Games in Cellular Networks

Jean-Pierre Hubaux, Mark Felegyhazi, Mario Cagalj, Diego Dufour

In each country today, cellular networks operate on carefully separated frequency bands. This separation is imposed by the regulators of the given country to avoid interference between these networks. But, the separation is only valid within the borders of ...
2007

Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks

Jean-Pierre Hubaux, Mark Felegyhazi, Levente Buttyan

In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multi-hop communication. In recent years, incentive mechanism ...
2006

Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks

Georgios Theodorakopoulos

Decentralized and unstructured networks are becoming more prevalent today (e.g. ad hoc networks). Like every network, they depend on the cooperation of their users to survive. However, each user does not necessarily know who the others are, or what their i ...
2006

Thwarting selfish and malicious behavior in wireless networks

Mario Cagalj

Security is at the core of any communication system and, in particular, of wireless (radio) networks. In this thesis, we focus on three important security aspects in the framework of wireless networks: selfish (noncooperative) behavior at the Medium Access ...
EPFL2006

MAC layer functions for SLEF

Alaeddine El Fawal, Lorenzo Keller

We develop three functions around the MAC layer: (1) Pseudo broadcast is a technique used to improve throughput of broadcast transmissions in case of congested networks. The mechanism consists in sending a packet in unicast to a station using RTS/CTS. Othe ...
2006

Enhancing IEEE 802.11 MAC in congested environments

Imad Aad

IEEE 802.11 is currently the most deployed wireless local area networkingstandard. It uses carrier sense multiple access with collision avoidance (CSMA/CA) to resolve contention between nodes. Contention windows (CW) change dynamically to adapt to the cont ...
2005

Enhancing IEEE 802.11 MAC in congested environments

IEEE 802.11 is currently the most deployed wireless local area networkingstandard. It uses carrier sense multiple access with collision avoidance (CSMA/CA) to resolve contention between nodes. Contention windows (CW) change dynamically to adapt to the cont ...
2005

On Cheating in CSMA/CA Ad Hoc Networks

Jean-Pierre Hubaux, Imad Aad, Mario Cagalj

CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules. This is important, since the nodes themselves control their random deferment ...
2004

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.