Accepted from Open Call
نویسنده
چکیده
The nodes of wireless communication networks are usually equipped with buffers for temporary data storage as required by many network and transportation layer protocols. For example, in the store-carry-forward protocol employed in delay-/disruption-tolerant networking (DTN), temporally disconnected, intermediate nodes may store data packets until they regain connection to the destination or the next forwarding node [1]. Similarly, in user-provided networks, data packets may be temporarily stored as a means for service differentiation between home users and guest users [2]. However, so far, the potential benefits of exploiting buffers for the physical layer and link layer design have received little attention in the literature. In this article, we present the benefits of buffers for the design of relaying protocols in cooperative communication systems [3]. The basic idea of cooperative communication is that the transmitting nodes help each other to facilitate one another’s communication by willingly acting as relays and sharing their resources. In particular, when a source (e.g., a mobile phone) transmits a packet to the destination (e.g., a base station), nearby relay nodes (e.g., other mobile phones) can overhear this packet, process it, and retransmit it to the destination, thus helping in the transmission process. Cooperative (or relayed) communication can improve the capacity and/or extend the coverage of wireless communications systems. Due to their benefits, simple relay schemes have been/are being included in recent/future wireless standards such as the Worldwide Interoperability for Microwave Access (WiMAX) and Long Term Evolution (LTE) Advanced standards [4]. In cooperative communications, two main relaying protocols are used: full-duplex (FD) relaying and half-duplex (HD) relaying. In FD relaying, the relays transmit and receive at the same time and in the same frequency band. However, given the current radio implementation limitations, FD relaying is difficult to realize in practice because of strong self-interference. As a result, the vast majority of the existing literature on cooperative communications considers HD relaying due to its implementation simplicity. In HD relaying, transmission is usually organized in two successive time slots. In the first time slot, the relay receives data transmitted by a source, and in the second time slot the relay forwards the received data to a destination. We refer to such schemes as conventional relaying in the following. In conventional relaying protocols, the relays employ a prefixed schedule of transmission and reception independent of the quality of the transmitting and receiving channels. This prefixed scheduling may lead to significant performance degradation in wireless systems, where the qualities of the transmitting and receiving channels significantly vary with time, since it may prevent the relays from exploiting the best transmitting and the best receiving channels. Figure 1a illustrates this limitation of conventional HD relaying. In particular, in Fig. 1a, we assume that the relay receives in odd time slots 2i – 1 and transmits in even time slots 2i. For the channel realizations assumed in Fig. 1a, because of the fixed schedule of transmission and reception for the relay, the system cannot exploit the link with the largest signal-to-noise ratio (SNR). More ABSTRACT
منابع مشابه
RPC: Remote Procedure Call Protocol Specification Version 2
This document describes the Open Network Computing (ONC) Remote Procedure Call (RPC) version 2 protocol as it is currently deployed and accepted. This document obsoletes RFC 1831. Thurlow Standards Track [Page 1] RFC 5531 Remote Procedure Call Protocol Version 2 May 2009
متن کاملThe Viewpoints of Alborz University of Medical Sciences’ Faculty Members on Open Peer Review of Journal Articles
Background and Aim: The open peer review process, which is one of the peer-reviewed methods in journals, has been accepted in scientific forums. The aim of this study was to investigate the points of view of university faculty members about the open peer review process of journal articles. Materials and Methods: The study used a descriptive survey. The sample size was calculated using the Coch...
متن کاملOpen Source Software Adoption: A Status Report
0 7 4 0 7 4 5 9 / 0 1 / $ 1 0 . 0 0 © 2 0 0 1 I E E E OSS packages make actual adoption a real challenge. This article presents a straightforward and practical roadmap to navigate your OSS adoption considerations. We do not have a universally accepted definition of OSS. For instance, Netscape, Sun Microsystems, and Apple recently introduced what they call “community-source” versions of their po...
متن کاملAssessment of the Variations in the Composition of the Leachate Generated in Open Dumps in Three Provinces of the Caspian Sea Region, Iran
Background: The municipal solid wastes (MSWs) are disposed in open dumps, which have no leachate collection and removal system, in the Caspian region of Iran. Leachate readily reaches the nearby water resources such as streams, rivers, lakes, and sea. Therefore, understanding the quality and quantity of open dump leachate is vital to the proper treatment of leachate. Methods: The leachate samp...
متن کاملSpecial Issue from the Adaptive and Dependable Mobile Ubiquitous Systems (ADAMUS) Workshop
The vision of mobile and ubiquitous systems is becoming a reality thanks to the recent advances in wireless communication and device miniaturization. The widespread industrial uptake of these systems is however compromised by the abrupt changes and challenging dependability requirements imposed by the highly error-prone and heterogeneous mobile provisioning environment. To overcome the intrinsi...
متن کاملOpen Call-by-Value (Extended Version)
The elegant theory of the call-by-value lambda-calculus relies on weak evaluation and closed terms, that are natural hypotheses in the study of programming languages. To model proof assistants, however, strong evaluation and open terms are required, and it is well known that the operational semantics of call-by-value becomes problematic in this case. Here we study the intermediate setting—that ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014