RECOMAC: A cross-layer cooperative network protocol for wireless ad hoc networks

M. Sarper Gokturk, Ozgur Gurbuz, Elza Erkip

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A novel decentralized cross-layer multi-hop cooperative protocol, namely, Routing Enabled Cooperative Medium Access Control (RECOMAC) is proposed for wireless ad hoc networks. The protocol architecture makes use of cooperative forwarding methods, in which coded packets are forwarded via opportunistically formed cooperative sets within a region, as RECOMAC spans the physical, medium access control (MAC) and routing layers. Randomized coding is exploited at the physical layer to realize cooperative transmissions, and cooperative forwarding is implemented for routing functionality, which is submerged into the MAC layer, while the overhead for MAC and route set up is minimized. RECOMAC is shown to provide dramatic performance improvements of eight times higher throughput and one tenth of end-to-end delay than that of the conventional architecture in practical wireless mesh networks.

Original languageEnglish (US)
Title of host publication2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops
DOIs
StatePublished - 2012
Event2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012 - Istanbul, Turkey
Duration: May 7 2012May 10 2012

Publication series

Name2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops

Other

Other2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012
Country/TerritoryTurkey
CityIstanbul
Period5/7/125/10/12

Keywords

  • Cooperative communications
  • cooperative routing
  • wireless ad hoc networks

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'RECOMAC: A cross-layer cooperative network protocol for wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this