Proceedings of the 2006 IEEE International Conference on Network Protocols 2006
DOI: 10.1109/icnp.2006.320183
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Exploitation of MAC Layer Diversity in Wireless Networks

Abstract: Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information Send comment regarding this burden estimate or any other aspect of this 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED 4. TITLE AND SUBTITLE Cross-Layer Exploitation of MAC Layer Diversity in Wir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…A measurement-driven deployment methodology has been developed for two-tier mesh access networks by leveraging the measurement data. To exploit MAC layer diversity in wireless networks, the authors in [77] conduct experiments to demonstrate that multipath fading effects are seen at the MAC layer. These effects appear at timescales on the same order of the IEEE 802.11 protocol and, therefore, interact negatively with the RTS-CTS-DATA-ACK handshake.…”
Section: F Real System Evaluation For Cross-layer Designmentioning
confidence: 99%
“…A measurement-driven deployment methodology has been developed for two-tier mesh access networks by leveraging the measurement data. To exploit MAC layer diversity in wireless networks, the authors in [77] conduct experiments to demonstrate that multipath fading effects are seen at the MAC layer. These effects appear at timescales on the same order of the IEEE 802.11 protocol and, therefore, interact negatively with the RTS-CTS-DATA-ACK handshake.…”
Section: F Real System Evaluation For Cross-layer Designmentioning
confidence: 99%
“…Opportunistic channel selection in a localized sense has been considered in MAC protocols such as DB-MCMAC [22], etc.…”
Section: Related Workmentioning
confidence: 99%
“…Depending on the environment, this fading can interact with the timescales of IEEE 802.11. This coupling between fading effects and IEEE 802.11 handshaking can result in two problems [1]:…”
Section: Introductionmentioning
confidence: 99%