SlideShare a Scribd company logo
Cooperation without Synchronization: Practical Cooperative Relaying
for Wireless Networks
Abstract:
Cooperative relay aims to realize the capacity of multi-antenna arrays in a
distributed manner. However, the symbol-level synchronization
requirement among distributed relays limits its use in practice. We propose
to circumvent this barrier with a cross-layer protocol called Distributed
Asynchronous Cooperation (DAC). With DAC, multiple relays can
schedule concurrent transmissions with packet-level (hence coarse)
synchronization. The receiver then extracts multiple versions of each
relayed packet via a collision-resolution algorithm, thus realizing the
diversity gain of cooperative communication. We demonstrate the
feasibility of DAC by prototyping and testing it on the GNURadio/USRP
software radio platform. To explore its relevance at the network level, we
introduce a DAC-based medium access control (MAC) protocol, and a
generic approach to integration of the DAC MAC/PHY layer into a typical
routing algorithm. Considering the use of DAC for multiple network flows,
we analyze the fundamental tradeoff between the improvement in
diversity gain and the reduction in multiplexing opportunities. DAC is
shown to improve the throughput and delay performance of lossy
networks with intermediate link quality. Our analytical results have also
been confirmed via network-level simulation with ns-2.
Existing System:
A typical cooperative communication protocol allows a relay to overhear
the source’s transmission, and then forward the data to the desired receiver
in case the direct delivery attempt fails.
Such a two-stage cooperative relay protocol establishes a virtual antenna
array among multiple distributed transmitters, each with a single antenna,
in order to boost the capacity of the link from the source to the destination.
Proposed System:
We also introduce a generic approach that can use the DAC MAC/PHY to
improve existing routing protocols. In applying this approach to multiple
network flows, we identify an important tradeoff between the diversity
gain provided by concurrent relays, and the multiplexing loss due to the
expanded interference region.
Our analysis shows that DAC improves network throughput when the link
loss rate is below a certain threshold, which can be accurately profiled for
simplified topologies. Therefore, DAC is best applicable to lossy wireless
networks (such as unplanned mesh networks), where it can enhance the
network throughput by improving the reliability of bottleneck links with a
low reception rate.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

What's hot

Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
JPINFOTECH JAYAPRAKASH
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
Ahmad Atta
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
Qspiders - Software Testing Training Institute
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
Tushar Mendhe
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
Surabhi Gosavi
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
Kashyap Davariya
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
AAKASH S
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Amin Omi
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
chennaijp
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Vaideesh Ravi Shankar
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
Alexander Decker
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
caijjournal
 

What's hot (20)

Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Packet switching
Packet switchingPacket switching
Packet switching
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
 

Similar to Cooperation without synchronization practical cooperative relaying for wireless networks

Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Shakas Technologies
 
A channel allocation algorithm for reducing the channel sensing reserving asy...
A channel allocation algorithm for reducing the channel sensing reserving asy...A channel allocation algorithm for reducing the channel sensing reserving asy...
A channel allocation algorithm for reducing the channel sensing reserving asy...ieeeprojectschennai
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Mumbai Academisc
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
IJERA Editor
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
IJERA Editor
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
Krithika242242
 
Achieving congestion diversity in multi hop wireless mesh networks
Achieving congestion diversity in multi hop wireless mesh networksAchieving congestion diversity in multi hop wireless mesh networks
Achieving congestion diversity in multi hop wireless mesh networksieeeprojectschennai
 
An energy efficient cross layer network
An energy efficient cross layer networkAn energy efficient cross layer network
An energy efficient cross layer network
jpstudcorner
 
An approach to sensor network throughput enhancement by phy aided mac
An approach to sensor network throughput enhancement by phy aided macAn approach to sensor network throughput enhancement by phy aided mac
An approach to sensor network throughput enhancement by phy aided mac
ieeepondy
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
chennaijp
 
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamic
jpstudcorner
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
bartholomeocoombs
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014
Senthilvel S
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
IJCNCJournal
 

Similar to Cooperation without synchronization practical cooperative relaying for wireless networks (20)

Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
 
A channel allocation algorithm for reducing the channel sensing reserving asy...
A channel allocation algorithm for reducing the channel sensing reserving asy...A channel allocation algorithm for reducing the channel sensing reserving asy...
A channel allocation algorithm for reducing the channel sensing reserving asy...
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
 
ITCM-10 ZR.pptx
ITCM-10 ZR.pptxITCM-10 ZR.pptx
ITCM-10 ZR.pptx
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Gokul
GokulGokul
Gokul
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
Achieving congestion diversity in multi hop wireless mesh networks
Achieving congestion diversity in multi hop wireless mesh networksAchieving congestion diversity in multi hop wireless mesh networks
Achieving congestion diversity in multi hop wireless mesh networks
 
An energy efficient cross layer network
An energy efficient cross layer networkAn energy efficient cross layer network
An energy efficient cross layer network
 
An approach to sensor network throughput enhancement by phy aided mac
An approach to sensor network throughput enhancement by phy aided macAn approach to sensor network throughput enhancement by phy aided mac
An approach to sensor network throughput enhancement by phy aided mac
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamic
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014
 
Link_NwkingforDevOps
Link_NwkingforDevOpsLink_NwkingforDevOps
Link_NwkingforDevOps
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 

More from ieeeprojectschennai

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
ieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
ieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
ieeeprojectschennai
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
ieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
ieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
ieeeprojectschennai
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
ieeeprojectschennai
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
ieeeprojectschennai
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
ieeeprojectschennai
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
ieeeprojectschennai
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
ieeeprojectschennai
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
ieeeprojectschennai
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
ieeeprojectschennai
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
ieeeprojectschennai
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
ieeeprojectschennai
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
ieeeprojectschennai
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
ieeeprojectschennai
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
ieeeprojectschennai
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
ieeeprojectschennai
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
ieeeprojectschennai
 

More from ieeeprojectschennai (20)

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
 

Cooperation without synchronization practical cooperative relaying for wireless networks

  • 1. Cooperation without Synchronization: Practical Cooperative Relaying for Wireless Networks Abstract: Cooperative relay aims to realize the capacity of multi-antenna arrays in a distributed manner. However, the symbol-level synchronization requirement among distributed relays limits its use in practice. We propose to circumvent this barrier with a cross-layer protocol called Distributed Asynchronous Cooperation (DAC). With DAC, multiple relays can schedule concurrent transmissions with packet-level (hence coarse) synchronization. The receiver then extracts multiple versions of each relayed packet via a collision-resolution algorithm, thus realizing the diversity gain of cooperative communication. We demonstrate the feasibility of DAC by prototyping and testing it on the GNURadio/USRP software radio platform. To explore its relevance at the network level, we introduce a DAC-based medium access control (MAC) protocol, and a generic approach to integration of the DAC MAC/PHY layer into a typical routing algorithm. Considering the use of DAC for multiple network flows, we analyze the fundamental tradeoff between the improvement in diversity gain and the reduction in multiplexing opportunities. DAC is shown to improve the throughput and delay performance of lossy
  • 2. networks with intermediate link quality. Our analytical results have also been confirmed via network-level simulation with ns-2. Existing System: A typical cooperative communication protocol allows a relay to overhear the source’s transmission, and then forward the data to the desired receiver in case the direct delivery attempt fails. Such a two-stage cooperative relay protocol establishes a virtual antenna array among multiple distributed transmitters, each with a single antenna, in order to boost the capacity of the link from the source to the destination. Proposed System: We also introduce a generic approach that can use the DAC MAC/PHY to improve existing routing protocols. In applying this approach to multiple network flows, we identify an important tradeoff between the diversity gain provided by concurrent relays, and the multiplexing loss due to the expanded interference region. Our analysis shows that DAC improves network throughput when the link loss rate is below a certain threshold, which can be accurately profiled for simplified topologies. Therefore, DAC is best applicable to lossy wireless networks (such as unplanned mesh networks), where it can enhance the network throughput by improving the reliability of bottleneck links with a low reception rate.
  • 3. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP. • Front End : - .Net • Back End : - SQL Server