Context awareness through cross-layer network architecture

M.A Razzaque, Simon Dobson, Paddy Nixon

Research output: A Conference proceeding or a Chapter in BookConference contribution

3 Citations (Scopus)

Abstract

Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better solution: allowing interactions between two or more non-adjacent layers in the protocol stack. Cross-layer architectures based on purely local information will not be able to support system-wide cross-layer performance optimization, context-awareness, etc. A new cross-layer architecture which provides a hybrid local and global view, using gossiping to maintain consistency has been proposed in [1]. This paper studies the possibilities of context-awareness in communications through this architecture by two examples. The first example uses user-centric context to control the available link-bandwidth and satisfy user accordingly. The second uses contextual information to control the transmission power of a mobile node.
Original languageEnglish
Title of host publicationProceedings of the 2007 16th International Conference on Computer Communications and Networks
EditorsKatherine Guo
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1076-1081
Number of pages6
ISBN (Print)9781424412501
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event16th International Conference on Computer Communications and Networks (ICCCN 2007) - Honolulu, Honolulu, United States
Duration: 13 Aug 200716 Aug 2007

Publication series

Name2007 16th International Conference on Computer Communications and Networks
PublisherIEEE
ISSN (Print)1095-2055

Conference

Conference16th International Conference on Computer Communications and Networks (ICCCN 2007)
Abbreviated titleICCCN 2007
CountryUnited States
CityHonolulu
Period13/08/0716/08/07

Fingerprint Dive into the research topics of 'Context awareness through cross-layer network architecture'. Together they form a unique fingerprint.

Cite this