2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7997363
|View full text |Cite
|
Sign up to set email alerts
|

Efficient interference-aware power control in wireless ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Due to the scarcity of wireless resources, how to effectively utilize wireless resources is the most popular research issue. Currently, many state-of-the-art extensions to traditional DCF have been proposed to mitigate cochannel interference in dense WLANs, such as cochannel concurrency transmission [6,[9][10][11][12] and transmission power control (TPC) [13][14][15][16]. In [9], Vutukuru et al propose CMAP algorithm to build a conflict map for each node by using empirical observations of packet loss and the map differentiating manner between interfering and noninterfering links.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the scarcity of wireless resources, how to effectively utilize wireless resources is the most popular research issue. Currently, many state-of-the-art extensions to traditional DCF have been proposed to mitigate cochannel interference in dense WLANs, such as cochannel concurrency transmission [6,[9][10][11][12] and transmission power control (TPC) [13][14][15][16]. In [9], Vutukuru et al propose CMAP algorithm to build a conflict map for each node by using empirical observations of packet loss and the map differentiating manner between interfering and noninterfering links.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, it brings high extra overhead when the network topology changes frequently. In [11], they further propose an Interference-Aware Power Control (IAPC) protocol to avoid interference by transmitting CTS and 2…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(i) Avoid Interference and Exploit Concurrency. Many current strategies leverage the technology of cross correlation to recover the control information under interferences so as to coordinate between nodes [12][13][14][15][16][17]. In these protocols, authors carefully design some known symbol sequences to convey the control information and conduct the cross correlation between the received signal and the known sequences to determine which sequence is received, so as to obtain the control information under interferences, as shown in Figure 7.…”
Section: Survey On Crossmentioning
confidence: 99%
“…In CSMA-based wireless networks, the interference range is set equal to the carrier sensing range [4,6,9,20]. Several works [2,4,[21][22][23] set the interference range by restricting the signal-to-interference-and-noise ratio (SINR) to a threshold. In their works, only one interference transmitter is considered when calculating the SINR.…”
Section: Introductionmentioning
confidence: 99%