Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Network resources will always be heterogeneous, and thus have different functionalities and programming models. This adversely affects interoperability. Seamless Mobility is one e...
— The capacity of a power controlled wireless network can be changing due to user’s mobility, fading or shadowing effects. As a result, the quality of service (QOS) of users ac...
—The purpose of this paper is to compare two interference avoidance techniques for time division duplex (TDD) wireless networks, viz.: a novel technique termed asymmetry balancin...