SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 31
MAC PROTOCOLS FOR COOPERATIVE DIVERSITY IN WLAN
Unnikrishnan M1
, Rinu Titus2
, Premkumar C V3
1
M Tech, Student, SOE, CUSAT, Kerala, India
2
M Tech, Student, SOE, CUSAT, Kerala, India
3
Assistant Professor, SOE, CUSAT, Kerala, India
Abstract
In recent year, there has been high research attention in the field of user cooperation in wireless communication networks. Here a
survey of cooperative diversity enabled medium access control protocols for WLANs are presented. Cooperative diversity is a
promising technique which can combat fading and improve reliability in wireless environment. It developed as an alternative to
MIMO systems where nearby terminals share their antennas and resources and hence create a Virtual MIMO (VMIMO) system.
These terminals cooperate with the transmitter and receiver to transmit multiple copies of the same data to the receiver through
independent fading channels. These multiple copies of the data can be combined at the receiver using appropriate techniques to
recover the original packet correctly. This improves the reliability of the wireless channel by exploiting the spatial diversity. MAC
protocols play an important role in realizing this concept by effectively coordinating transmissions between source, relay and
destination nodes. For this reason, the research community has proposed a large number of cooperative MAC protocols to realize
this concept. Most of these protocols are contention based and hence are based on IEEE 802.11 DCF mode. These protocols can
be classified in to different categories based on condition for cooperation, optimal helper selection procedure, etc. The protocols
discussed here belongs to a category in which the decision for cooperation based on a cooperation condition, preparation of
potential helper lists and optimal helper selection are done by the source itself. An overview of these protocols including
handshaking schemes, medium access schemes, and features are discussed.
Keywords: Cooperative Diversity, Medium Access Control, Virtual MIMO, Wireless LAN
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Cooperative diversity can be used to nullify the effects of
signal fading due to multipath propagation in wireless
networks. Cooperative diversity is a kind of space diversity
which creates a “virtual array” from adjacent terminals by
sharing their antennas and resources through transmission in
distributed manner and signal processing [1], [2]. It is also
termed as user cooperation diversity [3].
1.1 Cooperation in WLAN
Fig -1 shows an example wireless network. Let terminals
T1, T2 be the transmitters and T3, T4 be the intended
receivers. Consider the case T3 ≠ T4. It corresponds to an ad
hoc mode of operation in WLAN. Case T3=T4 correspond
to an infrastructure mode of operation in WLAN and
terminal T3 acts as an access point here [4]. Any terminal
can receive and process the transmitted signal due to the
broadcast nature of transmissions in a WLAN. Protocols
used in WLAN often avoid such extra observations of
transmitted signals. Making use of these signals, T1 and T2
can jointly communicate their information. They can share
their resources like power, bandwidth, etc for transmission.
Scenario T3 = T4 can be considered as a wireless multiple
access channel with relaying and scenario T3≠T4 can be
treated as a wireless interference channel with relaying. To
transmit the information of T1, T2 acts as a “relay” and
share the resources with T1. Same method can be used for
transmitting the information of T2.
T1
T2
T3
T4
Fig -1: Cooperative diversity scenario [1]
1.2 Cooperative Diversity Protocols
Different cooperative diversity protocols with less
complexity can be used in WLAN of Fig -1. Fixed, selection
and incremental relaying [1], [2] protocols are some of
them. Relay terminals uses different processing techniques
and destination terminals uses different combining
techniques based on these protocols. In fixed relaying, the
relays are allowed to either amplify the received signals
based on their power constraint, or to decode, encode, and
retransmit the messages. Selection relaying is based on fixed
relaying and the transmitting terminals can use cooperative
or non cooperative transmission based on the measured SNR
between the terminals. Incremental relaying makes use of
the limited feedback obtained from the destination to decide
whether relaying is necessary. It improves the spectral
efficiency compared to fixed and selection relaying.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 32
1.2.1 Fixed Relaying
It is of two types: Amplify and Forward [1] and Decode and
Forward [1]. In the first method, source terminal transmits
data to the destination. During this time, relay processes the
received signal from source and then relays the amplified
signal to the destination. This method is same as repetition
coding from two different transmitters except that the relay
boosts its own receiver noise along with the signal. Suitable
combining techniques are used for combining the signals
from two sub blocks and then the information is decoded at
the destination. In Decode and Forward method, the relay
decodes the transmitted signal from source and processes it.
It then transmits the signal though a repetition coding
scheme. The relay can use different decoding techniques and
different combining techniques can be used at the
destination.
1.2.2 Selection Relaying
In this the path between source and relay is checked initially
in terms of SNR. If the path is poor, the source continues the
transmission to the destination either using repetition
scheme or using more powerful coding techniques. If the
path is good, relay adopts fixed relaying to achieve spatial
diversity gain.
1.2.3 Incremental Relaying
Relay just repeats the transmission in both fixed and
selection relaying. So, both the protocols do not make full
use of degrees of freedom at higher rates. Incremental
relaying is used to overcome this drawback. If the direct
transmission is failure, a negative acknowledgement via
feedback is provided by the destination. Then the relay
retransmits the information and achieves spatial diversity.
This kind of procedure improves the spectral efficiency of
incremental relaying protocol compared to the previous
ones. Incremental relaying protocol makes full use of
degrees of freedom since it repeats the transmission only
rarely.
Separate sub channel for each relay is required to repeat
transmission in all the above methods. Also, as the number
of cooperating terminals increases the bandwidth efficiency
decreases in these methods. Coded cooperation [5] can be
used to overcome these limitations and spatial diversity can
be achieved. One of such method is space time coded
cooperative diversity algorithms [6]. All relays can transmit
on the same sub channel in these algorithms. So it improves
bandwidth efficiency. The advantages of these algorithms
also include full benefits of spatial diversity and non
requirement of feedback. The main disadvantage is the
increase in computational complexity.
Fig -2 illustrates the two transmission phases [1], [2] of the
above said algorithms. During the first phase, source
broadcasts the message and both destination and potential
relays overhear the transmission. In the second phase,
potential relays repeat the transmission to the destination. It
is different in these two algorithms. In repetition based
algorithm, each relay repeats the transmission in separate
sub channel. In space time coded algorithm, each relay
repeats the transmission in the same sub channel
simultaneously.
Fig -2: Illustration of the phases of diversity algorithms [6]
Terminals transmit on orthogonal channels for medium
access control. Fig -3 illustrates the channel allocation in the
case of transmission without cooperation. Fig -4 illustrates
the channel and sub channel allocations in the case of
cooperative diversity algorithms based on repetition [1], [2].
These channels must be orthogonal so that at the receiver
these signals can be combined and spatial diversity can be
achieved. Fig -5 illustrates channel and sub channel
allocations in the case of cooperative diversity algorithms
based on space time coding. Here, space time codes are used
by the relays in the second phase so that relays can repeat
the transmission in the same channel simultaneously [6].
Frequency
Time
1 Transmits
2 Transmits
3 Transmits
m Transmits
Fig -3: Medium access control without cooperation [6]
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 33
1 Transmits
2 Transmits
3 Transmits
4 Transmits
2 Repeats 1
1 Repeats 2
1 Repeats 3
1 Repeats 3
3 Repeats 1
3 Repeats 2
2 Repeats 3
2 Repeats m
m Repeats 1
m Repeats 2
m Repeats 3
m-1 Repeats m
Time
Frequency
Phase 1 Phase 2
Fig -4: Medium access control based on repetition [6]
Frequency
Time
1 Transmits
2 Transmits
3 Transmits
m Transmits
D(1) Relay
D(2) Relay
D(3) Relay
D(m) Relay
Phase 1 Phase 2
Fig -5: Medium access control by space time coding [6]
1.3 Medium Access Control in WLANs
WLANs are specified by the IEEE 802.11 standard [7]. The
architecture of the MAC sub layer, as in Fig -6, consists the
distributed coordination function (DCF), the point
coordination function (PCF), the hybrid coordination
function (HCF) and the mesh coordination function (MCF)
[7].
Normally MAC protocols can be divided in to two: channel
allocation based (or contention free) MAC and contention
based random access MAC. Both the MACs can be used in
a cooperative scenario with some modifications. Contention
based MAC is described here since more researches are
conducting on this. Contention based MAC protocols often
use contention based mode called DCF shown in Fig -7.
Distributed Coordination Function is basically a Carrier
Sense Multiple Access scheme with Collision Avoidance
(CSMA/CA) [7], where a station is allowed to transmit if the
medium is sensed to be idle (i.e., no other station is
transmitting). Request To Send (RTS) and Clear To Send
(CTS) [7] control frames are used to inform channel
reservation time and prevent neighbouring nodes from
simultaneously transmitting, as shown in Fig -7. Here, DIFS
(Distributed Inter Frame Space) and SIFS (Short Inter
Frame Space) [7] are used for frame spacing. Frame spacing
allows assigning priorities to a transmission based on their
type (control or data frame). The control frames (RTS/CTS)
include the addresses of both source and destination and a
Network Allocation Vector (NAV) which specifies the time
duration of busy medium condition.
Distributed Coordination Function (DCF)
Point
Coordination
Function
(PCF)
HCF
Controlled
Access
(HCCA)
HCF/MCF
Contention
Access
(EDCA)
MCF
Controlled
Access
(MCCA)
MAC
Extent
Hybrid
Coordination
Function
(HCF)
Mesh Coordination
Function (MCF)
Fig -6: MAC architecture [7]
DIFS
RTS
Data
SIFS
CTS
SIFS SIFS
ACK
DIFS
NAV (RTS)
NAV (CTS)
Contention
Window
Defer Access Backoff After
Defer
Source
Destination
Other
Fig -7: Distributed Coordination Function [7]
While most of this initial work focused on physical layer
schemes [1], [2], [6], [8], [9] researchers have also
investigated supporting cooperative diversity in higher layer
protocols, mostly in the MAC layer. The initial attention
was focused on developing cooperative MAC protocols for
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 34
WLANs based on the IEEE 802.11 standard [7]. Here, the
advances made in developing cooperative MAC protocols
for WLANs are presented. An overview of their
functionality is discussed here. Also results and observed
shortcomings are discussed.
2. COOPERATIVE MAC PROTOCOLS FOR
WLAN
2.1 CoopMAC: A Cooperative MAC for WLANs
CoopMAC [10] illustrates how the IEEE802.11 distributed
coordination function (DCF) [7] can be modified to use
cooperative communication for achieving both higher
throughput and lower interference. In CoopMAC, nodes
have the option of switching between direct and cooperative
transmission. When using cooperative transmission, a
sender communicating with a receiver at a low data rate can
ask a neighboring helper, with a higher data rate with both
itself and the destination, for cooperation by forwarding its
packets. CoopTable, shown in Table -1, maintains the
information of potential helper nodes from which the
optimal helper node is selected. Alternatively, when using
the infrastructure mode, the Access Point (AP) can also
maintain such a CoopTable for each node, while individual
nodes only need to keep track of the AP.
Table -1: Format of the CoopTable [10]
ID (48 bits) Time (8 bits) Rhd (8 bits) Rsd (8 bits) Number of Failures
......... .......... .......... .................. .......................
CoopTable is filled with appropriate data by a node by
overhearing the ongoing transmissions. Consider a network
with a source Ss, helper Sh, destination Sd. It can be assumed
that the source knows the data rate between itself and D, Rsd,
from previous transmissions. Source overhears and analyzes
the transmission (including RTS/CTS packets and data
packets) between H and D to decide whether neighbouring
node H can cooperate with it. The data rate between H and
D, Rhd, is obtained from the Physical Layer Convergence
Procedure (PLCP) header [10]. CoopTable stores all these
information along with time stamps and any consecutive
failed cooperation attempt by Sh.
When Ss want to transmit data to Sd, it compares the amount
of time required to transmit via direct link and helper node.
It simply involves the adding up the payload size, header
size, control packet size and then dividing it with the
transmission rate of the corresponding links. All these
required information are stored in the CoopTable. If the
indirect link through Sh is more efficient than the direct link,
CoopMAC goes for cooperation. The first step for
cooperation is cooperative handshaking which is shown in
Fig -8. For this, an additional frame HTS (Helper Ready to
Send) [10] is introduced. The source puts the address of both
the helper and the destination in the RTS frame along with
the request to cooperate. The helper, if available,
acknowledges this with an HTS. Finally, the destination
responds with a CTS followed by the transfer of data as
shown in Fig -9.
The main feature of CoopMAC is that it is backward
compatible with the existing IEEE 802.11 standard [7]. A
drawback of CoopMAC is that it either uses the direct
source to destination channel or the indirect source to relay
to destination channel. Since only one packet is received at
the destination, it cannot use a packed combining scheme
and take advantage of redundancy in the form of a repeated
packet. Therefore, CoopMAC, in a strict sense, is not a
cooperative protocol as its diversity degree is only one. It is
selective in practice. It is shown that CoopMAC can provide
significant throughput and delay improvements, without
much complexity in system design.
Ss
Sh
Sd
STA1
STA2
RTS
HTS
HTS
CTS
Fig -8: Exchange of control frame in CoopMAC [10]
Ss
Sh
Sd
STA1
STA2
DATA
DATA
ACK
Fig -9: Exchange of data frame in CoopMAC [10]
2.2 C-MAC
C-MAC [11] is comparable to IEEE 802.11 [7] in many
aspects. It is developed based on DCF mode [7] of IEEE
802.11. C-MAC without relay is same as that of IEEE
802.11.C-MAC with relay, as shown in Fig -10, have some
modifications. The main difference is in the handshake
procedure. Control frames include CoopRTS/RTR/CTS
instead of RTS/CTS used in IEEE 802.11. RTS frame is
modified to CoopRTS with some additional features. RTR
(Ready to Relay) frame is used by the relay to announce that
it is ready for cooperation. RTR frame can be decoded by
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 35
the MAC layer since its frame format is similar to that of
CTS. Based on the prior transmission knowledge, source (S)
chooses either relay mode or regular mode for data
transmission. CoopRTS/RTR/CTS handshake procedure is
used to ensure the participation of relay node in the
transmission procedure. In C-MAC with relay, data
transmission starts when the relay node (R) is ready to help.
Source (S) just broadcasts the packet intended for
destination (D). Relay node can overhear this transmission.
Destination (D) keeps the received signal from source (S)
and wait for the signal from relay node (R). Relay transmits
the overheard signal from source to destination after a SIFS
time. Joint decoding of these two signals is performed at the
destination physical layer and a frame is sent to the MAC
layer. If the Frame Check Sequence (FCS) is correct,
destination responds with a positive ACK feedback.
C-MAC protocol is backward compatible with IEEE 802.11.
It is not a perfect one since it requires a method to find
potential relays. It requires physical layer support for
cooperation to jointly decode the received signals at the
destination. But, it provides diversity since both the direct
and indirect link (if available) is used for transmission [12].
NAV RTR DATA
NAV CTS ACK
NAV
NAV
NAV
CoopRTS DATA
NAV (CTS)
NAV (CoopRTS)
DIFS
DIFSBACKOFF
DIFS BACKOFF
DIFS
DIFSSIFSSIFSSIFS SIFS SIFS
DIFS
Sr
Ss
Sd
STA1
STA2
Fig -10: C-MAC with relay [11]
2.3 CD-MAC
Cooperative Diversity MAC (CD-MAC) [13] is a protocol
which is useful ad hoc networks. This protocol uses space-
time-coded cooperative diversity algorithm. Distributed
Space Time Code (DSTC) is used in this protocol and hence
all the relays can transmit on the same channel
simultaneously [14]. This protocol works on a single
channel and uses only one relay for a particular
retransmission. CD-MAC is developed based on DCF mode
of IEEE 802.11 standard and hence it is backward
compatible.
CD-MAC uses a four-way handshaking procedure for
cooperation as shown in Fig -11. If direct link is reliable,
conventional MAC (DCF) is used, otherwise cooperation is
preferred. Source node sends a RTS to the destination. If the
destination replies with CTS, then the succeeding data
transfer is done without cooperation. However, if the source
fails to receive CTS from the destination node and the
timeout period expires, it activates cooperation in the second
phase. The source informs this to the receiving node by
using a relay address in the repeated RTS packet. During
cooperation, the source and relay both use DSTC. In the first
phase, source just sends the packet to the relay. In the
second phase, both relay and source transmits the DSTC
coded copies of the same packet to the destination
simultaneously. In Fig -11, C-RTS represents coded RTS,
which means DSTC is also utilized for control packets.
When the destination wants to reply to a C-RTS, it also
selects a relay and sends C-CTS simultaneously with the
relay. Following this, data transmission and ACK packets
are transmitted. Since, both the links are used for
transmission, this protocol provides diversity.
RTS RTS C-RTS DATA C-DATA
CTS C-CTS ACKC-ACK
C-CTS C-ACK
C-RTS C-DATA
Sender
Destination
Relay1
Relay2
Timeout
SIFS SIFS
SIFS
Fig -11: CD-MAC four way handshaking [13]
3. CONCLUSIONS
Some of the MAC protocols for cooperation in WLANs are
analyzed. It is clear that protocols for WLANs have reached
a certain maturity, owing to significant interest of the
research community, and some protocols are quiet feasible
for deployment on existing hardware, such as CoopMAC.
Almost all of the proposed protocols are contention-based
and use a modified version of 802.11 DCF mode for
cooperative handshaking.
All the above protocols fall below a category of protocols in
which the decision for cooperation based on a cooperation
condition, preparation of potential helper lists and optimal
helper selection are done by the source itself. There are
other categories of protocols in which the above functions
are shared by helper node and source. Some of them are:
rDCF [15], ErDCF [16] in which preparation of potential list
of helper nodes are done by helper contention, Feeney-MAC
[17], Shan-MAC [18] in which optimal helper itself is
selected by helper contention, etc. But the category of
protocols which has got research attention is described here
including CoopMAC, C-MAC, and CD-MAC and other
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 36
ones like Ahmed MAC [19], ADC-MAC [20]. The main
reasons include the facts that these protocols are straight
forward, they can be easily implemented by simply
extending the existing IEEE 802.11 MAC and they are
similar to the physical layer cooperative diversity protocols
[1], [2], [6], [8], [9]. But this cooperation introduces large
overhead for source since it has to maintain information
related to all the potential relays (e.g. CoopTable in [10]).
Also it is difficult to maintain accurate information about the
nodes with mobility or nodes in a rapidly changing
environment. Efficient algorithms for choosing optimal
helper from potential helper nodes are also necessary.
It can be seen that a lot of excellent research on cooperation
in WLAN have conducted already. But, some unaddressed
issues still remain in this area. Many of the protocol
discussed here chooses only one relay node. But protocols
using multiple helper nodes can bring the MIMO benefits
well and can fully exploit spatial diversity. There is no such
protocol in the literature yet which can be pointed out.
Mobility, Security and energy consumption are still relevant
research problems in the cooperative scenario. All these
issues have to be solved properly so that a high performance
MAC with cooperation can be implemented in practice.
REFERENCES
[1]. J. Laneman, D. Tse, and G. Wornell, “Cooperative
Diversity in Wireless Networks: Efficient Protocols and
Outage Behavior”, IEEE Trans. Inf. Theory, vol. 50, pp.
3062–3080, Dec. 2004.
[2]. J. N. Laneman, G. W. Wornell, and D. N. C. Tse, “An
efficient protocol for realizing cooperative diversity in
wireless networks,” in Proc. IEEE Int. Symp. Information
Theory, Washington, DC, June 2001.
[3]. A. Sendonaris, E. Erkip, and B. Aazhang, “Increasing
uplink capacity via user cooperation diversity,” in Proc.
IEEE Int. Symp. Information Theory (ISIT), Cambridge,
MA, Aug. 1998, p. 156.
[4]. V. Hayes, IEEE Standard for Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY)
Specifications, 1997.
[5]. Hunter, T.E., Nosratinia, A.: ‘Diversity through coded
cooperation’, IEEE Trans. Wirel. Commun., 2006, 5, (2),
pp. 283–289.
[6]. J. Laneman and G. Wornell, “Distributed space-time
coded protocols for exploiting cooperative diversity in
wireless networks,” IEEE Transactions on Information
Theory, Vol. 49, No. 10, October 2003.
[7]. L. standards Committee, “Part 11: Wireless LAN
medium access control (MAC) and physical layer (PHY)
specifications”, IEEE-SA Standards Board, 2003.
[8]. A. Sendonaris, E. Erkip, and B. Aazhang, “User
cooperation diversity part I: system description”, IEEE
Trans. Commun., vol. 51, pp. 1927– 1938, Nov. 2003.
[9]. A. Sendonaris, E. Erkip, and B. Aazhang, “User
cooperation diversity part II: implementation aspects and
performance analysis”, IEEE Trans. Commun., vol. 51, pp.
1939–1948, Nov. 2003.
[10]. Liu, P., Tao, Z., Narayanan, S., Korakis, T., Panwar,
S.S.: ‘CoopMAC: a cooperative MAC for wireless LANs’,
IEEE J. Sel. Areas Commun., 2007, 25, (191), pp. 340–354.
[11]. H. Jin, X. Wang, H. Yu, Y. Xu, Y. Guan, and X. Gao,
“C-MAC:A MAC Protocol Supporting Cooperation in
Wireless LANs”,2009 IEEE Wireless Communications and
Networking Conference, pp. 1–6, Apr. 2009.
[12]. P. Ju, W.Song, D. Zhou, ‘Survey on cooperative
medium access control protocols’, IET Commun., 2013,
Vol. 7, Iss. 9, pp. 893–902.
[13]. Sangman, M., Chansu, Y., Seung-Min, P., Heung-
Nam, K., Jiwon, P.: ‘CD-MAC: cooperative diversity MAC
for robust communication in wireless ad hoc networks’,
Proc. IEEE ICC, 2007, pp. 3636–3641.
[14]. G. Scutari and S. Barbarossa, “Distributed Space-Time
Coding for Regenerative Relay Networks”, IEEE Trans. On
Wireless Communications, Vol. 4, No. 5, pp. 2387-2399,
Sep. 2005.
[15]. Zhu, H., Cao, G.: ‘rDCF: A relay-enabled medium
access control protocol for wireless ad hoc networks’, IEEE
Trans. Mob. Comput, 2006, 5, (9), pp. 1201–1214.
[16]. Ahmad, R., Zheng, F., Drieberg, M., Olafsson , S.: ‘An
enhanced relay enabled medium access control protocol for
wireless ad hoc networks’.Proc. IEEE VTC, Spring, 2006.
[17]. Feeney, L.M., Cetin, B., Hollos, D., Kubisch, M.,
Mengesha, S., Karl, H.: ‘Multi-rate relaying for performance
improvement in IEEE 802.11 WLANs’, Proc. Fifth Int.
Conf. on Wired/Wireless Internet Communications
(WWIC), 2007.
[18]. Shan, H., Cheng, H., Zhuang, W.: ‘Cross- layer
cooperative MAC protocol in distributed wireless networks’,
IEEE Wireless Commun., 2011, 10, (8), pp. 2603-2615.
[19]. Ibrahim, A.S., Sadek, A.K., Su, W., Liu, K.J.R.:
‘Cooperative communications with relay-selection: When to
cooperate and whom to cooperate with?’ IEEE Trans.
Wirel.Commun., 2008, 7, (7), pp. 2814–2827.
[20]. Zhou, T., Sharif, H., Hempel, M., Mahasukhon, P.,
Wang, W., Ma, T.: ‘A novel adaptive distributed
cooperative relaying MAC protocol for vehicular networks’,
IEEE J. Sel. Areas Commun., 2011, 29, (1), pp. 72–82 .
BIOGRAPHIES
Unnikrishnan M received the B Tech
Degree in Electronics and Communication
Engineering from College of Engineering
Trikaripur, CUSAT, Kerala, India, in 2012.
He is now pursuing M Tech degree in
Electronics and Communication with
specialization in Wireless Technology at CUSAT, Kochi,
India. E-Mail: unnikrishnanm60@gmail.com
Rinu Titus received her B.Tech degree
from Sahrdaya College of Engineering and
Technology, University of Calicut in 2012.
She is currently pursuing her M.Tech
degree in Wireless Technology from
School of Engineering, CUSAT.
E-Mail: rinutitus@gmail.com
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 37
Premkumar C V received his M.Tech
from CUSAT in 2005 June. He is currently
serving as a faculty member at CUSAT
since 2001. His interested research field is
Wireless Communication.
E-Mail: premkumar@cusat.ac.in

Mais conteúdo relacionado

Mais procurados

Signal classification of second order cyclostationarity signals using bt scld...
Signal classification of second order cyclostationarity signals using bt scld...Signal classification of second order cyclostationarity signals using bt scld...
Signal classification of second order cyclostationarity signals using bt scld...eSAT Publishing House
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETPrasanta kumr Manohari
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variIAEME Publication
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
 
21 9 sep17 19jul 8001 8288-4-ed(edit)
21 9 sep17 19jul 8001 8288-4-ed(edit)21 9 sep17 19jul 8001 8288-4-ed(edit)
21 9 sep17 19jul 8001 8288-4-ed(edit)IAESIJEECS
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 

Mais procurados (19)

Signal classification of second order cyclostationarity signals using bt scld...
Signal classification of second order cyclostationarity signals using bt scld...Signal classification of second order cyclostationarity signals using bt scld...
Signal classification of second order cyclostationarity signals using bt scld...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
En33838844
En33838844En33838844
En33838844
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
COMPARISON OF OLSR AND ENERGY CONSERVED OLSR
COMPARISON OF OLSR AND ENERGY CONSERVED OLSRCOMPARISON OF OLSR AND ENERGY CONSERVED OLSR
COMPARISON OF OLSR AND ENERGY CONSERVED OLSR
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with vari
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 
21 9 sep17 19jul 8001 8288-4-ed(edit)
21 9 sep17 19jul 8001 8288-4-ed(edit)21 9 sep17 19jul 8001 8288-4-ed(edit)
21 9 sep17 19jul 8001 8288-4-ed(edit)
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 

Destaque

Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
Forecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landForecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landeSAT Publishing House
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
 
High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicseSAT Publishing House
 
Master slave vector controlled double induction
Master slave vector controlled double inductionMaster slave vector controlled double induction
Master slave vector controlled double inductioneSAT Publishing House
 
Measurement of iodine availability and stability of
Measurement of iodine availability and stability ofMeasurement of iodine availability and stability of
Measurement of iodine availability and stability ofeSAT Publishing House
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
Investigations on material casualty of plates under
Investigations on material casualty of plates underInvestigations on material casualty of plates under
Investigations on material casualty of plates undereSAT Publishing House
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctioneSAT Publishing House
 
Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleeSAT Publishing House
 
Application of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mixApplication of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mixeSAT Publishing House
 
A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...eSAT Publishing House
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...eSAT Publishing House
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...eSAT Publishing House
 
Finite element optimization of stator by casted and welded structures
Finite element optimization of stator by casted and welded structuresFinite element optimization of stator by casted and welded structures
Finite element optimization of stator by casted and welded structureseSAT Publishing House
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteeSAT Publishing House
 
Case study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infillCase study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infilleSAT Publishing House
 
Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featureseSAT Publishing House
 
The physio chemical and mineralogical properties of mbaduku clay and its suit...
The physio chemical and mineralogical properties of mbaduku clay and its suit...The physio chemical and mineralogical properties of mbaduku clay and its suit...
The physio chemical and mineralogical properties of mbaduku clay and its suit...eSAT Publishing House
 

Destaque (20)

Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
Forecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landForecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial land
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematics
 
Master slave vector controlled double induction
Master slave vector controlled double inductionMaster slave vector controlled double induction
Master slave vector controlled double induction
 
Measurement of iodine availability and stability of
Measurement of iodine availability and stability ofMeasurement of iodine availability and stability of
Measurement of iodine availability and stability of
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
Investigations on material casualty of plates under
Investigations on material casualty of plates underInvestigations on material casualty of plates under
Investigations on material casualty of plates under
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suction
 
Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm module
 
Application of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mixApplication of ibearugbulem’s model for optimizing granite concrete mix
Application of ibearugbulem’s model for optimizing granite concrete mix
 
A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...
 
Finite element optimization of stator by casted and welded structures
Finite element optimization of stator by casted and welded structuresFinite element optimization of stator by casted and welded structures
Finite element optimization of stator by casted and welded structures
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial waste
 
Case study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infillCase study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infill
 
Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded features
 
The physio chemical and mineralogical properties of mbaduku clay and its suit...
The physio chemical and mineralogical properties of mbaduku clay and its suit...The physio chemical and mineralogical properties of mbaduku clay and its suit...
The physio chemical and mineralogical properties of mbaduku clay and its suit...
 

Semelhante a Mac protocols for cooperative diversity in wlan

An Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationAn Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationIRJET Journal
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...IRJET Journal
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
Improved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative DiversityImproved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative DiversityIJCSIT Journal
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...eSAT Journals
 
A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV          A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV IRJET Journal
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProjectOblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProjectMicheal Fisher
 
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET Journal
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 

Semelhante a Mac protocols for cooperative diversity in wlan (20)

An Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless CommunicationAn Investigation of DAF Protocol in Wireless Communication
An Investigation of DAF Protocol in Wireless Communication
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
40120140501003
4012014050100340120140501003
40120140501003
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Improved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative DiversityImproved Ad-Hoc Networks Using Cooperative Diversity
Improved Ad-Hoc Networks Using Cooperative Diversity
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Cooperative communication
Cooperative communicationCooperative communication
Cooperative communication
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...
 
A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV          A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProjectOblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
 
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 

Mais de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

Mais de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Último

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Último (20)

(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Mac protocols for cooperative diversity in wlan

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 31 MAC PROTOCOLS FOR COOPERATIVE DIVERSITY IN WLAN Unnikrishnan M1 , Rinu Titus2 , Premkumar C V3 1 M Tech, Student, SOE, CUSAT, Kerala, India 2 M Tech, Student, SOE, CUSAT, Kerala, India 3 Assistant Professor, SOE, CUSAT, Kerala, India Abstract In recent year, there has been high research attention in the field of user cooperation in wireless communication networks. Here a survey of cooperative diversity enabled medium access control protocols for WLANs are presented. Cooperative diversity is a promising technique which can combat fading and improve reliability in wireless environment. It developed as an alternative to MIMO systems where nearby terminals share their antennas and resources and hence create a Virtual MIMO (VMIMO) system. These terminals cooperate with the transmitter and receiver to transmit multiple copies of the same data to the receiver through independent fading channels. These multiple copies of the data can be combined at the receiver using appropriate techniques to recover the original packet correctly. This improves the reliability of the wireless channel by exploiting the spatial diversity. MAC protocols play an important role in realizing this concept by effectively coordinating transmissions between source, relay and destination nodes. For this reason, the research community has proposed a large number of cooperative MAC protocols to realize this concept. Most of these protocols are contention based and hence are based on IEEE 802.11 DCF mode. These protocols can be classified in to different categories based on condition for cooperation, optimal helper selection procedure, etc. The protocols discussed here belongs to a category in which the decision for cooperation based on a cooperation condition, preparation of potential helper lists and optimal helper selection are done by the source itself. An overview of these protocols including handshaking schemes, medium access schemes, and features are discussed. Keywords: Cooperative Diversity, Medium Access Control, Virtual MIMO, Wireless LAN --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cooperative diversity can be used to nullify the effects of signal fading due to multipath propagation in wireless networks. Cooperative diversity is a kind of space diversity which creates a “virtual array” from adjacent terminals by sharing their antennas and resources through transmission in distributed manner and signal processing [1], [2]. It is also termed as user cooperation diversity [3]. 1.1 Cooperation in WLAN Fig -1 shows an example wireless network. Let terminals T1, T2 be the transmitters and T3, T4 be the intended receivers. Consider the case T3 ≠ T4. It corresponds to an ad hoc mode of operation in WLAN. Case T3=T4 correspond to an infrastructure mode of operation in WLAN and terminal T3 acts as an access point here [4]. Any terminal can receive and process the transmitted signal due to the broadcast nature of transmissions in a WLAN. Protocols used in WLAN often avoid such extra observations of transmitted signals. Making use of these signals, T1 and T2 can jointly communicate their information. They can share their resources like power, bandwidth, etc for transmission. Scenario T3 = T4 can be considered as a wireless multiple access channel with relaying and scenario T3≠T4 can be treated as a wireless interference channel with relaying. To transmit the information of T1, T2 acts as a “relay” and share the resources with T1. Same method can be used for transmitting the information of T2. T1 T2 T3 T4 Fig -1: Cooperative diversity scenario [1] 1.2 Cooperative Diversity Protocols Different cooperative diversity protocols with less complexity can be used in WLAN of Fig -1. Fixed, selection and incremental relaying [1], [2] protocols are some of them. Relay terminals uses different processing techniques and destination terminals uses different combining techniques based on these protocols. In fixed relaying, the relays are allowed to either amplify the received signals based on their power constraint, or to decode, encode, and retransmit the messages. Selection relaying is based on fixed relaying and the transmitting terminals can use cooperative or non cooperative transmission based on the measured SNR between the terminals. Incremental relaying makes use of the limited feedback obtained from the destination to decide whether relaying is necessary. It improves the spectral efficiency compared to fixed and selection relaying.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 32 1.2.1 Fixed Relaying It is of two types: Amplify and Forward [1] and Decode and Forward [1]. In the first method, source terminal transmits data to the destination. During this time, relay processes the received signal from source and then relays the amplified signal to the destination. This method is same as repetition coding from two different transmitters except that the relay boosts its own receiver noise along with the signal. Suitable combining techniques are used for combining the signals from two sub blocks and then the information is decoded at the destination. In Decode and Forward method, the relay decodes the transmitted signal from source and processes it. It then transmits the signal though a repetition coding scheme. The relay can use different decoding techniques and different combining techniques can be used at the destination. 1.2.2 Selection Relaying In this the path between source and relay is checked initially in terms of SNR. If the path is poor, the source continues the transmission to the destination either using repetition scheme or using more powerful coding techniques. If the path is good, relay adopts fixed relaying to achieve spatial diversity gain. 1.2.3 Incremental Relaying Relay just repeats the transmission in both fixed and selection relaying. So, both the protocols do not make full use of degrees of freedom at higher rates. Incremental relaying is used to overcome this drawback. If the direct transmission is failure, a negative acknowledgement via feedback is provided by the destination. Then the relay retransmits the information and achieves spatial diversity. This kind of procedure improves the spectral efficiency of incremental relaying protocol compared to the previous ones. Incremental relaying protocol makes full use of degrees of freedom since it repeats the transmission only rarely. Separate sub channel for each relay is required to repeat transmission in all the above methods. Also, as the number of cooperating terminals increases the bandwidth efficiency decreases in these methods. Coded cooperation [5] can be used to overcome these limitations and spatial diversity can be achieved. One of such method is space time coded cooperative diversity algorithms [6]. All relays can transmit on the same sub channel in these algorithms. So it improves bandwidth efficiency. The advantages of these algorithms also include full benefits of spatial diversity and non requirement of feedback. The main disadvantage is the increase in computational complexity. Fig -2 illustrates the two transmission phases [1], [2] of the above said algorithms. During the first phase, source broadcasts the message and both destination and potential relays overhear the transmission. In the second phase, potential relays repeat the transmission to the destination. It is different in these two algorithms. In repetition based algorithm, each relay repeats the transmission in separate sub channel. In space time coded algorithm, each relay repeats the transmission in the same sub channel simultaneously. Fig -2: Illustration of the phases of diversity algorithms [6] Terminals transmit on orthogonal channels for medium access control. Fig -3 illustrates the channel allocation in the case of transmission without cooperation. Fig -4 illustrates the channel and sub channel allocations in the case of cooperative diversity algorithms based on repetition [1], [2]. These channels must be orthogonal so that at the receiver these signals can be combined and spatial diversity can be achieved. Fig -5 illustrates channel and sub channel allocations in the case of cooperative diversity algorithms based on space time coding. Here, space time codes are used by the relays in the second phase so that relays can repeat the transmission in the same channel simultaneously [6]. Frequency Time 1 Transmits 2 Transmits 3 Transmits m Transmits Fig -3: Medium access control without cooperation [6]
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 33 1 Transmits 2 Transmits 3 Transmits 4 Transmits 2 Repeats 1 1 Repeats 2 1 Repeats 3 1 Repeats 3 3 Repeats 1 3 Repeats 2 2 Repeats 3 2 Repeats m m Repeats 1 m Repeats 2 m Repeats 3 m-1 Repeats m Time Frequency Phase 1 Phase 2 Fig -4: Medium access control based on repetition [6] Frequency Time 1 Transmits 2 Transmits 3 Transmits m Transmits D(1) Relay D(2) Relay D(3) Relay D(m) Relay Phase 1 Phase 2 Fig -5: Medium access control by space time coding [6] 1.3 Medium Access Control in WLANs WLANs are specified by the IEEE 802.11 standard [7]. The architecture of the MAC sub layer, as in Fig -6, consists the distributed coordination function (DCF), the point coordination function (PCF), the hybrid coordination function (HCF) and the mesh coordination function (MCF) [7]. Normally MAC protocols can be divided in to two: channel allocation based (or contention free) MAC and contention based random access MAC. Both the MACs can be used in a cooperative scenario with some modifications. Contention based MAC is described here since more researches are conducting on this. Contention based MAC protocols often use contention based mode called DCF shown in Fig -7. Distributed Coordination Function is basically a Carrier Sense Multiple Access scheme with Collision Avoidance (CSMA/CA) [7], where a station is allowed to transmit if the medium is sensed to be idle (i.e., no other station is transmitting). Request To Send (RTS) and Clear To Send (CTS) [7] control frames are used to inform channel reservation time and prevent neighbouring nodes from simultaneously transmitting, as shown in Fig -7. Here, DIFS (Distributed Inter Frame Space) and SIFS (Short Inter Frame Space) [7] are used for frame spacing. Frame spacing allows assigning priorities to a transmission based on their type (control or data frame). The control frames (RTS/CTS) include the addresses of both source and destination and a Network Allocation Vector (NAV) which specifies the time duration of busy medium condition. Distributed Coordination Function (DCF) Point Coordination Function (PCF) HCF Controlled Access (HCCA) HCF/MCF Contention Access (EDCA) MCF Controlled Access (MCCA) MAC Extent Hybrid Coordination Function (HCF) Mesh Coordination Function (MCF) Fig -6: MAC architecture [7] DIFS RTS Data SIFS CTS SIFS SIFS ACK DIFS NAV (RTS) NAV (CTS) Contention Window Defer Access Backoff After Defer Source Destination Other Fig -7: Distributed Coordination Function [7] While most of this initial work focused on physical layer schemes [1], [2], [6], [8], [9] researchers have also investigated supporting cooperative diversity in higher layer protocols, mostly in the MAC layer. The initial attention was focused on developing cooperative MAC protocols for
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 34 WLANs based on the IEEE 802.11 standard [7]. Here, the advances made in developing cooperative MAC protocols for WLANs are presented. An overview of their functionality is discussed here. Also results and observed shortcomings are discussed. 2. COOPERATIVE MAC PROTOCOLS FOR WLAN 2.1 CoopMAC: A Cooperative MAC for WLANs CoopMAC [10] illustrates how the IEEE802.11 distributed coordination function (DCF) [7] can be modified to use cooperative communication for achieving both higher throughput and lower interference. In CoopMAC, nodes have the option of switching between direct and cooperative transmission. When using cooperative transmission, a sender communicating with a receiver at a low data rate can ask a neighboring helper, with a higher data rate with both itself and the destination, for cooperation by forwarding its packets. CoopTable, shown in Table -1, maintains the information of potential helper nodes from which the optimal helper node is selected. Alternatively, when using the infrastructure mode, the Access Point (AP) can also maintain such a CoopTable for each node, while individual nodes only need to keep track of the AP. Table -1: Format of the CoopTable [10] ID (48 bits) Time (8 bits) Rhd (8 bits) Rsd (8 bits) Number of Failures ......... .......... .......... .................. ....................... CoopTable is filled with appropriate data by a node by overhearing the ongoing transmissions. Consider a network with a source Ss, helper Sh, destination Sd. It can be assumed that the source knows the data rate between itself and D, Rsd, from previous transmissions. Source overhears and analyzes the transmission (including RTS/CTS packets and data packets) between H and D to decide whether neighbouring node H can cooperate with it. The data rate between H and D, Rhd, is obtained from the Physical Layer Convergence Procedure (PLCP) header [10]. CoopTable stores all these information along with time stamps and any consecutive failed cooperation attempt by Sh. When Ss want to transmit data to Sd, it compares the amount of time required to transmit via direct link and helper node. It simply involves the adding up the payload size, header size, control packet size and then dividing it with the transmission rate of the corresponding links. All these required information are stored in the CoopTable. If the indirect link through Sh is more efficient than the direct link, CoopMAC goes for cooperation. The first step for cooperation is cooperative handshaking which is shown in Fig -8. For this, an additional frame HTS (Helper Ready to Send) [10] is introduced. The source puts the address of both the helper and the destination in the RTS frame along with the request to cooperate. The helper, if available, acknowledges this with an HTS. Finally, the destination responds with a CTS followed by the transfer of data as shown in Fig -9. The main feature of CoopMAC is that it is backward compatible with the existing IEEE 802.11 standard [7]. A drawback of CoopMAC is that it either uses the direct source to destination channel or the indirect source to relay to destination channel. Since only one packet is received at the destination, it cannot use a packed combining scheme and take advantage of redundancy in the form of a repeated packet. Therefore, CoopMAC, in a strict sense, is not a cooperative protocol as its diversity degree is only one. It is selective in practice. It is shown that CoopMAC can provide significant throughput and delay improvements, without much complexity in system design. Ss Sh Sd STA1 STA2 RTS HTS HTS CTS Fig -8: Exchange of control frame in CoopMAC [10] Ss Sh Sd STA1 STA2 DATA DATA ACK Fig -9: Exchange of data frame in CoopMAC [10] 2.2 C-MAC C-MAC [11] is comparable to IEEE 802.11 [7] in many aspects. It is developed based on DCF mode [7] of IEEE 802.11. C-MAC without relay is same as that of IEEE 802.11.C-MAC with relay, as shown in Fig -10, have some modifications. The main difference is in the handshake procedure. Control frames include CoopRTS/RTR/CTS instead of RTS/CTS used in IEEE 802.11. RTS frame is modified to CoopRTS with some additional features. RTR (Ready to Relay) frame is used by the relay to announce that it is ready for cooperation. RTR frame can be decoded by
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 35 the MAC layer since its frame format is similar to that of CTS. Based on the prior transmission knowledge, source (S) chooses either relay mode or regular mode for data transmission. CoopRTS/RTR/CTS handshake procedure is used to ensure the participation of relay node in the transmission procedure. In C-MAC with relay, data transmission starts when the relay node (R) is ready to help. Source (S) just broadcasts the packet intended for destination (D). Relay node can overhear this transmission. Destination (D) keeps the received signal from source (S) and wait for the signal from relay node (R). Relay transmits the overheard signal from source to destination after a SIFS time. Joint decoding of these two signals is performed at the destination physical layer and a frame is sent to the MAC layer. If the Frame Check Sequence (FCS) is correct, destination responds with a positive ACK feedback. C-MAC protocol is backward compatible with IEEE 802.11. It is not a perfect one since it requires a method to find potential relays. It requires physical layer support for cooperation to jointly decode the received signals at the destination. But, it provides diversity since both the direct and indirect link (if available) is used for transmission [12]. NAV RTR DATA NAV CTS ACK NAV NAV NAV CoopRTS DATA NAV (CTS) NAV (CoopRTS) DIFS DIFSBACKOFF DIFS BACKOFF DIFS DIFSSIFSSIFSSIFS SIFS SIFS DIFS Sr Ss Sd STA1 STA2 Fig -10: C-MAC with relay [11] 2.3 CD-MAC Cooperative Diversity MAC (CD-MAC) [13] is a protocol which is useful ad hoc networks. This protocol uses space- time-coded cooperative diversity algorithm. Distributed Space Time Code (DSTC) is used in this protocol and hence all the relays can transmit on the same channel simultaneously [14]. This protocol works on a single channel and uses only one relay for a particular retransmission. CD-MAC is developed based on DCF mode of IEEE 802.11 standard and hence it is backward compatible. CD-MAC uses a four-way handshaking procedure for cooperation as shown in Fig -11. If direct link is reliable, conventional MAC (DCF) is used, otherwise cooperation is preferred. Source node sends a RTS to the destination. If the destination replies with CTS, then the succeeding data transfer is done without cooperation. However, if the source fails to receive CTS from the destination node and the timeout period expires, it activates cooperation in the second phase. The source informs this to the receiving node by using a relay address in the repeated RTS packet. During cooperation, the source and relay both use DSTC. In the first phase, source just sends the packet to the relay. In the second phase, both relay and source transmits the DSTC coded copies of the same packet to the destination simultaneously. In Fig -11, C-RTS represents coded RTS, which means DSTC is also utilized for control packets. When the destination wants to reply to a C-RTS, it also selects a relay and sends C-CTS simultaneously with the relay. Following this, data transmission and ACK packets are transmitted. Since, both the links are used for transmission, this protocol provides diversity. RTS RTS C-RTS DATA C-DATA CTS C-CTS ACKC-ACK C-CTS C-ACK C-RTS C-DATA Sender Destination Relay1 Relay2 Timeout SIFS SIFS SIFS Fig -11: CD-MAC four way handshaking [13] 3. CONCLUSIONS Some of the MAC protocols for cooperation in WLANs are analyzed. It is clear that protocols for WLANs have reached a certain maturity, owing to significant interest of the research community, and some protocols are quiet feasible for deployment on existing hardware, such as CoopMAC. Almost all of the proposed protocols are contention-based and use a modified version of 802.11 DCF mode for cooperative handshaking. All the above protocols fall below a category of protocols in which the decision for cooperation based on a cooperation condition, preparation of potential helper lists and optimal helper selection are done by the source itself. There are other categories of protocols in which the above functions are shared by helper node and source. Some of them are: rDCF [15], ErDCF [16] in which preparation of potential list of helper nodes are done by helper contention, Feeney-MAC [17], Shan-MAC [18] in which optimal helper itself is selected by helper contention, etc. But the category of protocols which has got research attention is described here including CoopMAC, C-MAC, and CD-MAC and other
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 36 ones like Ahmed MAC [19], ADC-MAC [20]. The main reasons include the facts that these protocols are straight forward, they can be easily implemented by simply extending the existing IEEE 802.11 MAC and they are similar to the physical layer cooperative diversity protocols [1], [2], [6], [8], [9]. But this cooperation introduces large overhead for source since it has to maintain information related to all the potential relays (e.g. CoopTable in [10]). Also it is difficult to maintain accurate information about the nodes with mobility or nodes in a rapidly changing environment. Efficient algorithms for choosing optimal helper from potential helper nodes are also necessary. It can be seen that a lot of excellent research on cooperation in WLAN have conducted already. But, some unaddressed issues still remain in this area. Many of the protocol discussed here chooses only one relay node. But protocols using multiple helper nodes can bring the MIMO benefits well and can fully exploit spatial diversity. There is no such protocol in the literature yet which can be pointed out. Mobility, Security and energy consumption are still relevant research problems in the cooperative scenario. All these issues have to be solved properly so that a high performance MAC with cooperation can be implemented in practice. REFERENCES [1]. J. Laneman, D. Tse, and G. Wornell, “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior”, IEEE Trans. Inf. Theory, vol. 50, pp. 3062–3080, Dec. 2004. [2]. J. N. Laneman, G. W. Wornell, and D. N. C. Tse, “An efficient protocol for realizing cooperative diversity in wireless networks,” in Proc. IEEE Int. Symp. Information Theory, Washington, DC, June 2001. [3]. A. Sendonaris, E. Erkip, and B. Aazhang, “Increasing uplink capacity via user cooperation diversity,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Cambridge, MA, Aug. 1998, p. 156. [4]. V. Hayes, IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1997. [5]. Hunter, T.E., Nosratinia, A.: ‘Diversity through coded cooperation’, IEEE Trans. Wirel. Commun., 2006, 5, (2), pp. 283–289. [6]. J. Laneman and G. Wornell, “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Transactions on Information Theory, Vol. 49, No. 10, October 2003. [7]. L. standards Committee, “Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications”, IEEE-SA Standards Board, 2003. [8]. A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity part I: system description”, IEEE Trans. Commun., vol. 51, pp. 1927– 1938, Nov. 2003. [9]. A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity part II: implementation aspects and performance analysis”, IEEE Trans. Commun., vol. 51, pp. 1939–1948, Nov. 2003. [10]. Liu, P., Tao, Z., Narayanan, S., Korakis, T., Panwar, S.S.: ‘CoopMAC: a cooperative MAC for wireless LANs’, IEEE J. Sel. Areas Commun., 2007, 25, (191), pp. 340–354. [11]. H. Jin, X. Wang, H. Yu, Y. Xu, Y. Guan, and X. Gao, “C-MAC:A MAC Protocol Supporting Cooperation in Wireless LANs”,2009 IEEE Wireless Communications and Networking Conference, pp. 1–6, Apr. 2009. [12]. P. Ju, W.Song, D. Zhou, ‘Survey on cooperative medium access control protocols’, IET Commun., 2013, Vol. 7, Iss. 9, pp. 893–902. [13]. Sangman, M., Chansu, Y., Seung-Min, P., Heung- Nam, K., Jiwon, P.: ‘CD-MAC: cooperative diversity MAC for robust communication in wireless ad hoc networks’, Proc. IEEE ICC, 2007, pp. 3636–3641. [14]. G. Scutari and S. Barbarossa, “Distributed Space-Time Coding for Regenerative Relay Networks”, IEEE Trans. On Wireless Communications, Vol. 4, No. 5, pp. 2387-2399, Sep. 2005. [15]. Zhu, H., Cao, G.: ‘rDCF: A relay-enabled medium access control protocol for wireless ad hoc networks’, IEEE Trans. Mob. Comput, 2006, 5, (9), pp. 1201–1214. [16]. Ahmad, R., Zheng, F., Drieberg, M., Olafsson , S.: ‘An enhanced relay enabled medium access control protocol for wireless ad hoc networks’.Proc. IEEE VTC, Spring, 2006. [17]. Feeney, L.M., Cetin, B., Hollos, D., Kubisch, M., Mengesha, S., Karl, H.: ‘Multi-rate relaying for performance improvement in IEEE 802.11 WLANs’, Proc. Fifth Int. Conf. on Wired/Wireless Internet Communications (WWIC), 2007. [18]. Shan, H., Cheng, H., Zhuang, W.: ‘Cross- layer cooperative MAC protocol in distributed wireless networks’, IEEE Wireless Commun., 2011, 10, (8), pp. 2603-2615. [19]. Ibrahim, A.S., Sadek, A.K., Su, W., Liu, K.J.R.: ‘Cooperative communications with relay-selection: When to cooperate and whom to cooperate with?’ IEEE Trans. Wirel.Commun., 2008, 7, (7), pp. 2814–2827. [20]. Zhou, T., Sharif, H., Hempel, M., Mahasukhon, P., Wang, W., Ma, T.: ‘A novel adaptive distributed cooperative relaying MAC protocol for vehicular networks’, IEEE J. Sel. Areas Commun., 2011, 29, (1), pp. 72–82 . BIOGRAPHIES Unnikrishnan M received the B Tech Degree in Electronics and Communication Engineering from College of Engineering Trikaripur, CUSAT, Kerala, India, in 2012. He is now pursuing M Tech degree in Electronics and Communication with specialization in Wireless Technology at CUSAT, Kochi, India. E-Mail: unnikrishnanm60@gmail.com Rinu Titus received her B.Tech degree from Sahrdaya College of Engineering and Technology, University of Calicut in 2012. She is currently pursuing her M.Tech degree in Wireless Technology from School of Engineering, CUSAT. E-Mail: rinutitus@gmail.com
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org 37 Premkumar C V received his M.Tech from CUSAT in 2005 June. He is currently serving as a faculty member at CUSAT since 2001. His interested research field is Wireless Communication. E-Mail: premkumar@cusat.ac.in