Learn More
We present the results of an analysis of the usage of our new campus-wide wireless network. A week-long traffic trace was collected in January 2003, recording address and protocol information for every packet sent and received on the wireless network. A centralised authentication log was used to match packets with wireless access points. The trace was(More)
There is an increasing need to support user mobility in today's computing environments. The incorporation of multicast routing support in a mobile computing environment presents several challenges. Of special interest are mobile multicast schemes suitable for TCP/IP networks in general, and the Internet in particular. This paper outlines a design of network(More)
The buffer pool in a DBMS is used to cache the disk pages of the database. Because typical database workloads are I/O-bound, the effectiveness of the buffer pool management algorithm is a crucial factor in the performance of the DBMS. In IBM’s DB2 buffer pool, the page cleaning algorithm is used to write changed pages to disks before they are selected for(More)
A wireless transmitter can use a channel to transmit bits over distance per second (in general, either more bits over shorter distance or fewer bits over longer distance). We call this the Channel Transport Capacity. This paper analyzes how the one-hop channel transport capacity limits multi-hop network capacity in cellular wireless mesh networks. The main(More)
We envision a future ubiquitous wireless access network called a cellular wireless mesh network. A cellular wireless mesh network is organized in multi-radio, multi-channel, multi-rate and multi-hop radio cells, each served by a single gateway. We propose the Maximum Channel Collision Time algorithm, which derives an expression for a conservative cell(More)
  • 1