From: Starlink
[mailto:starlink-bounces@lists.bufferbloat.net] On Behalf Of Bob McMahon
Sent: Monday, August 2, 2021 6:24
PM
To: Leonard Kleinrock
Cc: starlink@lists.bufferbloat.net;
Make-Wifi-fast; Cake List; codel@lists.bufferbloat.net; cerowrt-devel; bloat
Subject: Re: [Starlink] [Cake]
[Make-wifi-fast] [Cerowrt-devel] Due Aug 2: Internet Quality workshop CFP for
the internet architecture board
I found the following talk relevant to distances between all the
nodes. https://www.youtube.com/watch?v=PNoUcQTCxiM
Distance is an abstract idea but applies to energy into a node as well as
phylogenetic trees. It's the same problem, i.e. fitting a distance matrix using
some sort of tree. I've found the five branch tree works well for four nodes.
[RR] These trees are means for approximating a higher
dimensional real-world problem with a lower dimensional structure. You may be
doing this to save hardware when trying to cable up some complex test scenarios,
however I’m wondering why? Why not just put the STAs in the lab and turn them
on rather than cabling them?
Bob
On Mon, Aug 2, 2021 at 5:37 PM Leonard Kleinrock <lk@cs.ucla.edu> wrote:
These cases are what my student, Fouad Tobagi and I called the Hidden Terminal Problem (with the Busy Tone solution) back in 1975.
Len
> On Aug 2, 2021, at 4:16 PM, David Lang <david@lang.hm> wrote:
>
> If you are going to setup a test environment for wifi, you need to include the ability to make a fe cases that only happen with RF, not with wired networks and are commonly overlooked
>
> 1. station A can hear station B and C but they cannot hear each other
> 2. station A can hear station B but station B cannot hear station A 3. station A can hear that station B is transmitting, but not with a strong enough signal to decode the signal (yes in theory you can work around interference, but in practice interference is still a real thing)
>
> David Lang
>
This
electronic communication and the information and any files transmitted with it,
or attached to it, are confidential and are intended solely for the use of the
individual or entity to whom it is addressed and may contain information that
is confidential, legally privileged, protected by privacy laws, or otherwise
restricted from disclosure to anyone else. If you are not the intended
recipient or the person responsible for delivering the e-mail to the intended
recipient, you are hereby notified that any use, copying, distributing,
dissemination, forwarding, printing, or copying of this e-mail is strictly
prohibited. If you received this e-mail in error, please return the e-mail to
the sender, delete it from your computer, and destroy any printed copy of it.