1 / 6

MAC group

MAC group. Attendees: Charles Bostian, Amer Hassan, Xin Liu, Jon Peha, Ying Wang, Zhou Wang, Heather Zheng. Coexistence of different MACs. Approaches: A unified MAC is probably not desirable. Through cooperation.

kurt
Télécharger la présentation

MAC group

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MAC group Attendees: Charles Bostian, Amer Hassan, Xin Liu, Jon Peha, Ying Wang, Zhou Wang, Heather Zheng

  2. Coexistence of different MACs • Approaches: • A unified MAC is probably not desirable. • Through cooperation. • Create a Meta-MAC, a unifying sublayer on top of MAC layers, which enables different MACs to communicate and users to choose the right MAC. • Create a possible industry forum/consortium/certification type of approach for the Meta-MAC. • Enforcement is a challenging issue here. • Another type of collaboration is through cooperative relay in the PHY/MAC layer. • There exists a tradeoff between the level of cooperation and enforcement.

  3. Policing and preventing misbehaving devices • Is it a MAC layer issue or a security issue? Where should it be? • Game theory a possible approach • Explore the interaction between policy and MAC. Define the environment and the corresponding policy. • Possibility of hardware implementation on enforcement.

  4. Control channel • In-band signaling is possible in certain scenarios. There are cases where there is no need for control channel. • Create a dedicated control channel through dedicated spectrum, ISM, or PHY layer techniques.

  5. Action items • Take the collaborative scheme to next level. • Feasibility study, requirement definition, and benchmark cases for comparison. • Better understanding on how applications behavior.

  6. Dependencies • Always a dependency on technology (e.g.,60GHz), policy maker, trade associations, and security models.

More Related