{"id":79,"date":"2018-12-20T11:49:37","date_gmt":"2018-12-20T11:49:37","guid":{"rendered":"https:\/\/hhk3.kau.se\/fid\/?page_id=79"},"modified":"2023-11-13T00:13:26","modified_gmt":"2023-11-12T23:13:26","slug":"introduction","status":"publish","type":"page","link":"https:\/\/hhk3.kau.se\/mas\/modules\/introduction\/","title":{"rendered":"Introduction"},"content":{"rendered":"<p>This lecture provides an introduction to multi-access solutions. What multi-access is, why it is useful and how it can be realized.<\/p>\n<h3>Course lecture: Introduction<\/h3>\n<p><iframe loading=\"lazy\" title=\"Multi access solutions: Introduction\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/aCZhK9n513g?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h3>Related readings<\/h3>\n<p>The first article provides a comprehensive survey of multi-access solutions and how it can be realized at different protocol layers. The second artice provides an introduction to Multipath TCP.<\/p>\n<ul>\n<li>\u201cMultipath Transmission for the Internet: A Survey\u201d, M. Li et al., In IEEE Communications Surveys &amp; Tutorials, Vol. 18(4), 2016, [<a href=\"https:\/\/hal.sorbonne-universite.fr\/hal-01345613\/document\">pdf\u00a0available\u00a0here<\/a>]<\/li>\n<li>\u201cAn Overview of Multipath TCP\u201d, O. Bonaventure et al., In ;login: The USENIX Magazine, Vol. 37(5), 2012, [<a href=\"https:\/\/www.usenix.org\/system\/files\/login\/articles\/login1210_bonaventure.pdf\">pdf\u00a0available\u00a0here<\/a>]<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This lecture provides an introduction to multi-access solutions. What multi-access is, why it is useful and how it can be realized. Course lecture: Introduction Related readings The first article provides a comprehensive survey of multi-access solutions and how it can be realized at different protocol layers. The second artice provides an introduction to Multipath TCP. [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":0,"parent":77,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-79","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/pages\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":7,"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/pages\/79\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/pages\/79\/revisions\/280"}],"up":[{"embeddable":true,"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/pages\/77"}],"wp:attachment":[{"href":"https:\/\/hhk3.kau.se\/mas\/wp-json\/wp\/v2\/media?parent=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}