A MAC method with joint detection for ad hoc networks

被引:0
|
作者
Li, Cuiran [1 ]
Xie, Ranli [1 ]
Li, Chengshu [1 ]
机构
[1] Beijing Jiaotong Univ, Modern Commun Res Inst, Beijing 100044, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In ad hoc networks, hidden-and the exposed-terminal problems can severely reduce the system throughput in MAC layer. To address these problem, a channel access method exploiting joint detection of overlapping packets is proposed by Kota in [4]]. In this paper, we propose an improvement on the method, which uses CSMA/CD medium access protocol for the RTS/CTS control packets and transmitter-based code assignment for spreading the data packets. The performance of the proposed channel access method has been investigated by analysis and computer simulations in comparison with Kota's and Nagarajs scheme proposed in [4] and [5]. The results show that our proposed channel access method gives a significant improvement in system throughput.
引用
收藏
页码:2927 / +
页数:2
相关论文
共 50 条
  • [21] Joint physical-MAC layer design of the broadcast protocol in ad hoc networks
    Madueño, M
    Vidal, J
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (01) : 65 - 75
  • [22] A Self-Adaptive Detection System for MAC Misbehavior in Ad Hoc Networks
    Guang, Lei
    Assi, Chadi
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3682 - 3687
  • [23] Performance evaluation of a multiuser detection based MAC design for Ad Hoc networks
    Zhang, Jinfang
    Dziong, Zbigniew
    Gagnon, Francois
    Kadoch, Michel
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 294 - 298
  • [24] Dynamic channel allocation and optimal detection for MAC in CDMA ad hoc networks
    Butala, A
    Tong, L
    THIRTY-SIXTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS - CONFERENCE RECORD, VOLS 1 AND 2, CONFERENCE RECORD, 2002, : 1160 - 1164
  • [25] Rate management in multiuser detection based MAC design for ad hoc networks
    Kouraogo, Pegdwinde Justin
    Dziong, Zbigniew
    Haidar, Mohamad
    Gagnon, Francois
    AD HOC NETWORKS, 2013, 11 (01) : 1 - 18
  • [26] A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Peter X.
    Tang, Helen
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [27] Mobility handling in MAC for wireless ad hoc networks
    Raja, Anjali
    Su, Xiao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (03): : 303 - 311
  • [28] A cooperative MAC protocol for ad hoc wireless networks
    Korakis, Thanasis
    Tao, Zhifeng
    Slutskiy, Yevgeniy
    Panwar, Shivendra
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 532 - +
  • [29] Cooperative Relay MAC Protocol for Ad Hoc Networks
    Wang, Shengwei
    Liu, Jun
    Zhou, Shengli
    Zhou, Lingyun
    Yin, Minghao
    Hao, Hui
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 612 - 616
  • [30] An Efficient and Reliable MAC for Vehicular Ad Hoc Networks
    Due Ngoe Minh Dang
    Ranh Ngoe Dang
    Cuong The Do
    Hong, Choong Seon
    2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,