Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chunyu Hu is active.

Publication


Featured researches published by Chunyu Hu.


international conference on communications | 2003

On mitigating the broadcast storm problem with directional antennas

Chunyu Hu; Yifei Hong; Jennifer C. Hou

Broadcast has been widely used in mobile ad hoc networks (MANETs) as a communication means to disseminate information to all reachable nodes. However, the conventional broadcast scheme that broadcast packets omnidirectionally suffers from several drawbacks: excessive amount of redundant traffic, exaggerated interference/contention between neighboring nodes, and limited coverage (as a result of contention/collision). This is termed as the broadcast storm problem in S.Y.Ni et al. [1999]. In this paper, we address this problem in MANETs with the use of directional antennas. We propose three schemes: on/off directional broadcast, relay-node-based directional broadcast and location-based directional broadcast, in the increasing order of implementation complexity. We implement the proposed schemes in qualnet and compare their performances against the conventional broadcast scheme. The simulation results indicate that the proposed schemes outperform the conventional omnidirectional scheme with respect to coverage, latency, and redundancy over a wide spectrum of network topology and node mobility.


ieee international conference computer and communications | 2007

A Novel Approach to Contention Control in IEEE 802.11e-Operated WLANs

Chunyu Hu; Jennifer C. Hou

In this paper, we devise, in compliance with the IEEE 802.11e protocol, a novel MAC-centric approach, called MAC contention control (MCC), to maximizing the bandwidth utilization and achieving proportional bandwidth allocation. We first show that approaches based on estimating the number of competing nodes and then setting the contention window size may not converge (and in some cases diverge) because of network dynamics. Then, by studying the optimality condition derived in our prior work, we identify two parameters (referred to as control references) that remain approximately constant when the network operates at the optimal operational point, regardless of the number of competing nodes in each AC. We instrument MCC to measure these control references, compare measurement results to their optimal control reference levels, and adjust the packet dequeuing rate from the interface queues in an additive-increase-multiplicative-decrease (AIMD) fashion and with respect to prespecified bandwidth allocation ratio associated with its AC. In some sense, MCC controls the rate of passing packets from the interface queues to to the MAC access function, and thus practically controls the effective number of competing nodes. We have conducted an extensive simulation study, and demonstrated the superiority of MCC to 802.11e in terms of both the achievable network throughput and the capability of achieving proportional bandwidth allocation. This, coupled with the fact that MCC does not require change in firmware and can be practically deployed, makes MCC a viable approach to contention control in IEEE 802.11e-operated WLANs.


ieee international conference computer and communications | 2006

Provisioning Quality Controlled Medium Access in UltraWideBand-Operated WPANs

Chunyu Hu; Hwangnam Kim; Jennifer C. Hou; Dennis Chi; Sai Shankar Nandagopalan

Quality of service (QoS) provisioning is one of the most important criteria in newly emerging UWB-operated WPANs, as they are expected to support a wide variety of applica- tions from time-constrained, multimedia streaming to throughput- hungry, content transfer applications. As such, the Enhanced Distributed Coordinated Access (EDCA) mechanism has been adopted by MultiBand OFDM Alliance in its UWB MAC proposal. In this paper, we conduct a rigorous, comprehensive, theoretical analysis and show that with the currently recommended parame- ter setting, EDCA cannot provide adequate QoS. In particular, without responding to the system dynamics (e.g., taking into account of the number of active class-i stations), EDCA cannot allocate bandwidth in a deterministic proportional manner and the system bandwidth is under-utilized. After identifying the deficiency of EDCA, we propose, in compliance with the EDCA-incorporated UWB MAC protocol proposed in (15) (20), a framework, along with a set of theoretically grounded methods for controlling medium access with determin- istic QoS for UWB networks. We show that in this framework, 1) real-time traffic is guaranteed of deterministic bandwidth via a contention-based reservation access method; 2) best-effort traffic is provided with deterministic proportional QoS; and moreover, 3) the bandwidth utilization is maximized. We have also validated and evaluated the QoS provisioning capability and practicality of the proposed MAC framework both via simulation and empirically by leveraging the MADWifi (Multiband Atheros Driver for WiFi) Linux driver for Wireless LAN devices with the Atheros chipset.


Computer Networks | 2007

QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future

Hwangnam Kim; Jennifer C. Hou; Chunyu Hu; Ye Ge

Proliferation of portable, wireless-enabled laptop computers and PDAs, cost-effective deployment of access points, and availability of the license-exempt bands and appropriate networking standards contribute to the conspicuous success of IEEE 802.11 WLANs. In the article, we provide a comprehensive overview of techniques for capacity improvement and QoS provisioning in the IEEE 802.11 protocol family. These techniques represent the R&D efforts both in the research community and the IEEE 802.11 Working Groups. Specifically, we summarize the operations of IEEE 802.11 legacy as well as its extension, introduce several protocol modeling techniques, and categorize the various approaches to improve protocol capacity, to provide QoS (by either devising new MAC protocol components or fine-tuning protocol parameters in IEEE 802.11), and to judiciously arbitrate radio resources (e.g., transmission rate and power). To demonstrate how to adapt QoS provisioning in newly emerging areas, we use the wireless mesh network as an example, discuss the role IEEE 802.11 plays in such a network, and outline research issues that arise.


measurement and modeling of computer systems | 2005

A reactive channel model for expediting wireless network simulation

Chunyu Hu; Jennifer C. Hou

A major problem with leveraging event-driven, packet-level simulation environments, such as ns2[6], J-Sim[1], OpNet[2]), and QualNet[3]), in conducting wireless network simulation is the vast number of events generated, a majority of which are related to signal transmission in the PHY/MAC layers.In this extended abstract, we investigate the operations of signal transmission in the various stages: signal propagation, signal interference, and interaction with the PHY/MAC layers, and identify where events can be reduced without impairing the accuracy. We propose to leverage the MAC/PHY state information, and devise (from the perspective of network simulation) a reactive channel model (RCM) in which nodes explicitly register their interests in receiving certain events according to the MAC/PHY states they are in and the corresponding operations that should be performed. The simulation study indicates that RCM renders an order of magnitude of speed-up without compromising the accuracy of simulation results. An advantage of RCM with respect to the implementation is that there is no need to re-design the channel model for each specific MAC layer, and the modification made in the MAC/PHY layers is quite modest (e.g., a few API changes). This, coupled with the performance gain, suggests that RCM is an attractive, light-weight mechanism for expediting wireless network simulation.


International Journal of Wireless and Mobile Computing | 2006

A microscopic study of power management in IEEE 802.11 wireless networks

Chunyu Hu; Rong Zheng; Jennifer C. Hou; Lui Sha

In this paper, we demonstrate via a rigorous, analytical model that the periodic structure in IEEE 802.11 Power-Save Mode (PSM) together with its signalling overhead leads to both energy and bandwidth under-utilisation. We then devise Sleep In the Middle and Prolonged Activeness (SIMPA), a new power management protocol based on IEEE 802.11 PSM, to decouple the power management decision points and the Beacon Intervals (BIs), so as to allow fine grained control. In SIMPA, wireless devices can switch to the sleep state inside a BI or extend their active states beyond one BI. A comprehensive simulation study in both single hop wireless LANs without the AP support and multihop wireless networks demonstrates that as compared to IEEE 802.11 PSM, SIMPA can effectively reduce energy consumed under light to medium traffic loads and retain the network capacity for data transport at high traffic loads.


modeling analysis and simulation of wireless and mobile systems | 2006

Short-term nonuniform access in IEEE 802.11-compliant WLANs: a microscopic wiew and its impact

Chunyu Hu; Hwangnam Kim; Jennifer C. Hou

Along with the success of IEEE 802.11-compliant WLANs, the Distributed Coordinated Function (DCF) specified as the contention-based medium access mechanism in IEEE 802.11 has been widely used to support applications in new regimes. A thorough understanding of the characteristics of IEEE 802.11 DCF is therefore a research focus. DCF assumes the binary exponential backoff algorithm (BEBA). Several existing models that characterize BEBA as a p-persistent scheme have ignored several subtle protocol details. This has practically constrained the models from being applied in a broader range of configurations, e.g., small contention window, and from being further extended, e.g. 802.11e EDCA.In this paper, we develop an analytical model that captures the subtlety, and faithfully describes the channel activities as governed by DCF. Based on the devised model, we perform a rigorous analysis on the saturation throughput performance in a single-hop WLAN. We also identify, by clearly defining and thus being able to differentiate the two terms, attempt probability and transmission probability, an erroneous extension made to Bianchis model [3]. All the findings are corroborated by ns-2 simulation.


Archive | 2005

An Analysis of the Binary Exponential Backoff Algorithm in Distributed MAC Protocols

Chunyu Hu; Hwangnam Kim; Jennifer C. Hou


international conference on distributed computing systems | 2004

LISP: a link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM

Chunyu Hu; Jennifer C. Hou


ad hoc networks | 2005

A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM

Chunyu Hu; Jennifer C. Hou

Collaboration


Dive into the Chunyu Hu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ye Ge

Ohio State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge