2015
DOI: 10.1109/tpds.2014.2350495
|View full text |Cite
|
Sign up to set email alerts
|

Throughput-Optimal Cross-Layer Design for Cognitive Radio Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 28 publications
0
18
0
Order By: Relevance
“…Mesodiakaki and others proposed a novel, contention-aware channel selection algorithm, where the secondary network under study firstly detected the licensed channels with no primary user activity-by exploiting cooperative spectrum sensing, secondly estimated the probability of collision in each one, and then, thirdly, selected the less contended channel for access [24]. Cammarano and others presented a distributed, integrated medium access control, scheduling, routing and congestion/rate control protocol stack, for cognitive radio, ad hoc networks that dynamically exploited available spectrum resources left unused by primary licensed users, maximizing the throughput of a set of multi-hop flows between peer nodes [25]. Kawamoto and others focused on data collection for location-based authentication systems, as an application of the industrial Internet of things (IoT) [26].…”
Section: Related Workmentioning
confidence: 99%
“…Mesodiakaki and others proposed a novel, contention-aware channel selection algorithm, where the secondary network under study firstly detected the licensed channels with no primary user activity-by exploiting cooperative spectrum sensing, secondly estimated the probability of collision in each one, and then, thirdly, selected the less contended channel for access [24]. Cammarano and others presented a distributed, integrated medium access control, scheduling, routing and congestion/rate control protocol stack, for cognitive radio, ad hoc networks that dynamically exploited available spectrum resources left unused by primary licensed users, maximizing the throughput of a set of multi-hop flows between peer nodes [25]. Kawamoto and others focused on data collection for location-based authentication systems, as an application of the industrial Internet of things (IoT) [26].…”
Section: Related Workmentioning
confidence: 99%
“…The objective of these schemes is to improve the overall network utility while protecting active PUs' communications from excessive interference introduced by SUs. In [29], Cammarano et al presented a distributed cross-layer framework for joint optimization of MAC, scheduling, routing, and congestion control in CRAHNs, by maximizing the throughput of a set of multi-hop end-to-end packet flows. However, similar to [18,27], it is not clear how good the performance of the end-to-end rate control is compared under a wireless transmission environment with higher RTTs.…”
Section: Related Workmentioning
confidence: 99%
“…The optimization of ( ) ( ) is the routing decision. As assumed in [18], in this paper, the transmission capacity of any link is set to be 1.…”
Section: Data Queue At the Network Layermentioning
confidence: 99%