A MAC-PHY cross-layer protocol for wireless ad-hoc networks

Feilu Liu, Thanasis Korakis, Zhifeng Tao, Shivendra Panwar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cooperative communications is a promising technology that tends to change the conventional access and transmission schemes in wireless networks. By enabling additional collaboration from nodes that otherwise will not directly participate in the transmission, it enables spatial diversity and dramatically improves the performance of the network. In this paper we propose a cross-layer cooperative protocol based on a MAC protocol called CoopMAC [1]-[3] for ad-hoc wireless networks in order to leverage cooperation in both MAC and PHY layer1. Exploiting physical layer combining at the receiver, this simple yet efficient scheme illustrates a new paradigm for realistic cross-layer cooperative protocol design for next generation wireless ad-hoc networks. We have evaluated the performance of the proposed protocol by extensive simulations in a large scale wireless ad-hoc network. Simulation results show that the new protocol significantly improves the network performance in terms of throughput and delay.

Original languageEnglish (US)
Title of host publicationWCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings
Pages1792-1797
Number of pages6
StatePublished - 2008
EventIEEE Wireless Communications and Networking Conference, WCNC 2008 - Las Vegas, NV, United States
Duration: Mar 31 2008Apr 3 2008

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

OtherIEEE Wireless Communications and Networking Conference, WCNC 2008
Country/TerritoryUnited States
CityLas Vegas, NV
Period3/31/084/3/08

Keywords

  • Ad-hoc network
  • Cooperative communications
  • IEEE 802.11
  • Medium access control

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'A MAC-PHY cross-layer protocol for wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this