Cart (Loading....) | Create Account
Close category search window
 

Wireless network coding with improved opportunistic listening

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Argyriou, A. ; Philips Res., Eindhoven

Network coding has been shown to be a very promising technique for increasing the throughput in wireless ad hoc networks. In this paper, we set to define simple extensions for distributed medium access control (MAC) protocols that optimize the transmission of network-coded packets independently of the actual network coding algorithm. The main characteristic of the proposed protocol is that it improves the efficiency of coding decisions and allows verifying the decodability of packets before they are transmitted. The aforementioned goals are achieved first by adopting minor extensions to the channel access scheme, and second by introducing a new algorithm that manages intelligently the data packets that are stored at the MAC queue of each network node. The later algorithm improves the knowledge of a node regarding the available correct coding opportunities by the use of opportunistic acknowledgments, and by maintaining virtual buffers for the overheard data packets. For the proposed protocol, we also develop an analytical performance model that is used for evaluating its performance in conjunction with simulations. Extensive simulations are presented for several ad hoc network topologies that test all the features of the proposed protocol. Significant throughput improvement can be observed when our protocol is compared with network coding schemes that do not exploit the full potential of opportunistic listening.

Published in:

Wireless Communications, IEEE Transactions on  (Volume:8 ,  Issue: 4 )

Date of Publication:

April 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.