2009
DOI: 10.4304/jcm.4.9.700-713
|View full text |Cite
|
Sign up to set email alerts
|

Always Best Packet Switching: the Mobile VoIP Case Study

Abstract: <p class="MsoNormal" style="margin: 0cm 0cm 0pt; layout-grid-mode: char;"><span style="mso-bidi-font-weight: bold;"><span style="font-size: x-small;"><span style="font-family: Times New Roman;">Currently, a mobile device equipped with multiple heterogeneous wireless Network Interface Cards (NICs), cannot take fully advantage of its capabilities as the conventional mobility management approach allows it to select and use only one of its NICs at a time. In contrast to this approach, we pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Subinterfaces must be assigned a VLAN tag. It is inserted into the Ethernet header to separate the associated VLAN (Ghini et al, 2009). The tags must match the VLAN number defined on the switch.…”
Section: Access Router Configurationmentioning
confidence: 99%
“…Subinterfaces must be assigned a VLAN tag. It is inserted into the Ethernet header to separate the associated VLAN (Ghini et al, 2009). The tags must match the VLAN number defined on the switch.…”
Section: Access Router Configurationmentioning
confidence: 99%
“…A characteristic of our approach is that it differs from the common Always Best Connected (ABC) model; in this model, the best available network is identified and used until its performance degrades [11]. In contrast, in our approach all the available Network Interface Cards (NICs) are used simultaneously, differentiating the choice of a network from datagram to datagram, and introducing the ability to switch to the most suitable path depending on the characteristics of the datagram [9]. This enables to create policies for load balancing and recovery in order to maximize the available bandwidth and decrease the loss rate.…”
Section: System Architecturementioning
confidence: 99%
“…In addition, our architecture can be exploited for other real-time multimedia applications, e.g. VoIP [9]. In this paper, we show how our architecture can proficiently manage mobile game traffic.…”
Section: Introductionmentioning
confidence: 96%
“…2) The Transmission Error Detector (TED) operates across the MAC, network and transport layers of the Linux kernel [10]. Its principal responsibility is to monitor each single UDP datagram sent over an active WiFi link in order to detect whether that datagram has been successfully received by the access point or discarded by the MAC layer.…”
Section: Implementation Notesmentioning
confidence: 99%