2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195732
|View full text |Cite
|
Sign up to set email alerts
|

VoIPiggy: Implementation and evaluation of a mechanism to boost voice capacity in 802.11WLANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2
2

Relationship

4
0

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Indeed, in this section we report how the new mechanisms can be implemented over existing COTS hardware, using the existing open-source firmware OpenFWWF that has been used in the past to implement other extensions for 802.11 [7,8].…”
Section: Implementing Gatsmentioning
confidence: 99%
“…Indeed, in this section we report how the new mechanisms can be implemented over existing COTS hardware, using the existing open-source firmware OpenFWWF that has been used in the past to implement other extensions for 802.11 [7,8].…”
Section: Implementing Gatsmentioning
confidence: 99%
“…This article extends [1] very substantially, by introducing an analytical model for its performance (capacity region and voice delay), and a much more thorough experimental evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, VoIPiggy achieves a substantially more efficient operation using a very simple scheme. 1 It is also worthwhile noting that HCCA has not been widely deployed, while here we present a working implementation of VoIPiggy.…”
Section: Related Workmentioning
confidence: 99%
“…This microcode replaces the proprietary Broadcom image and allows direct control of all medium access, decoding, and encoding operations subject to some (humble) hardware constraints due to the microcontroller's original purpose. Similarly to [5,28] we altered the receive path in the assembly code and compiled the jammer's functionality in our own microcode that would be run directly on the NIC.…”
Section: Jammer Hardware and Implementationmentioning
confidence: 99%