Jaume Nin-Guerrero

Learn More
In this paper we present a new simulation module for ns-3 aimed at the simulation of LTE networks. This module has been designed with a product-oriented perspective in order to allow LTE equipment manufacturers to test RRM/SON algorithms in a simulation environment before they are deployed in the field. First, we describe the design of our simulation(More)
We validate the IEEE 802.11 MAC layer model in ns3 by means of measurements on the EXTREME testbed. We consider different scenarios: communications within a single pair of nodes, multiuser communications using either VoIP or saturated traffic, and communications in the presence of hidden nodes. For each scenario we describe in detail our testbed and(More)
—Call Admission Control (CAC) is recognized as one of the key strategies to achieve satisfactory QoS support for VoIP over IEEE 802.11 WLANs. However, most of the prior CAC solutions for VoIP over WLAN are centralized, and the few distributed CAC schemes proposed so far do not account for issues such as the loss of channel time due to medium contention and(More)
— Nowadays many manufacturers are building mobile devices with multiple interfaces. Thus, users have access to different types of wireless access networks, which often, as for WLAN and cellular systems, coexists independently. The challenge is to make such multiple access networks to cooperate to have ubiquitous access and enhanced user quality of service.(More)
— Nowadays, mobile users wish to use their multi-interface mobile devices to access the Internet through network points of attachment (PoA) based on heterogeneous wireless technologies. They also wish to seamlessly change the PoAs during their ongoing sessions to improve service quality and/or reduce monetary cost. If appropriately handled, multihomed(More)
— In this paper we deal with the problem of user-driven Call Admission Control for Voice over IP communications in a Wireless LAN environment. We argue that state-of-the-art solutions to this problem are suboptimal, since they leverage on analytical models whose assumptions are not necessarily verified in the scenario considered. To overcome this problem,(More)
  • 1