2017
DOI: 10.1109/twc.2017.2692221
|View full text |Cite
|
Sign up to set email alerts
|

Carrier Sensing-Based Medium Access Control Protocol for WLANs Exploiting Successive Interference Cancellation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…SIC has great potential to increase channel capacity and improve channel utilization. Therefore, existing studies [5], [6], [7] considered integrating SIC technology into 802.11 CSMA/CA protocols (which are called CSMA/CA-SIC protocols hereafter). The CSMA/CA-SIC protocols first let nodes perform multiple rounds of contention to generate multiple sequential winners and then let the winners transmit their frames concurrently.…”
Section: B Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…SIC has great potential to increase channel capacity and improve channel utilization. Therefore, existing studies [5], [6], [7] considered integrating SIC technology into 802.11 CSMA/CA protocols (which are called CSMA/CA-SIC protocols hereafter). The CSMA/CA-SIC protocols first let nodes perform multiple rounds of contention to generate multiple sequential winners and then let the winners transmit their frames concurrently.…”
Section: B Motivationmentioning
confidence: 99%
“…Existing SIC-aware protocols are mainly considered in past studies as the basis for new SIC-aware MAC protocols or for modifying existing protocols to exploit SIC [5], [6], [7], [8]. However, none of these studies can solve the two drawbacks we mentioned in Section I.B.…”
Section: A Sic-aware Designsmentioning
confidence: 99%
See 1 more Smart Citation
“…To solve the problem of spectrum access in dynamic networks, many methods can implement dynamic spectrum access, including competition algorithms (such as ALOHA [46] and CSMA [47] ), reservation algorithms (such as FPRP [48] and NbIA [49] ), and the queuing algorithms (such as DLPS [50] ). With the development of evolutionary algorithms, including GA [51,52] , PSO [53] , and biological foraging algorithms [54] , researchers are increasingly trying to integrate their use in dynamic spectrum access.…”
Section: Dynamic Spectrum Access Technologymentioning
confidence: 99%
“…In these detectors, a decision is made about an interfering symbol in one stage, and then this symbol is subtracted from the other interfering symbols in the next stages. This process is repeated until all interfering symbols are detected [20,21]. This procedure removes interferences if the decisions of the detected symbols in previous stages are correct; otherwise, it will duplicate the contribution of the interference.…”
Section: Introductionmentioning
confidence: 99%