Skip to main navigation Skip to search Skip to main content

RECMAC: reliable and efficient cooperative cross-layer MAC scheme for vehicular communication based on random network coding technique

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

In an unreliable cluster-based, broadcast-oriented vehicular network setting, we investigate the transmission reliability and throughput performance of random network coding (RNC) as a function of the packet generate rate. Our proposed model consists of a source vehicle broadcasting packets to a set of receivers (i.e. one-to-many) over independent broadcast erasure channels. The source vehicle performs RNC on N packets and broadcasts the encoded message to a set of receivers. In each hop, several vehicles form a cluster and cooperatively transmit the encoded or re-encoded packet. The combination of RNC, cluster based, and cooperative communications enables RECMAC to optimally minimize data redundancy, which means less overhead, and improve reliability as opposed to existing coding-based solutions. Theoretic analyses and simulation results show that RECMAC scheme can achieve optimal performance in terms of transmission reliability and throughput.
Original languageEnglish
Title of host publicationnan
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages342-347
ISBN (Print)9781862181311
DOIs
Publication statusPublished - 24 Oct 2016
Event22nd International Conference on Automation and Computing (ICAC) - Colchester
Duration: 7 Sept 20168 Sept 2016

Conference

Conference22nd International Conference on Automation and Computing (ICAC)
CityColchester
Period7/09/168/09/16
Other22nd International Conference on Automation and Computing (ICAC) (07/09/2016-08/09/2016, Colchester)

Keywords

  • MAC
  • RNC
  • Throughput
  • VANETs
  • Vehicle Cluster

Fingerprint

Dive into the research topics of 'RECMAC: reliable and efficient cooperative cross-layer MAC scheme for vehicular communication based on random network coding technique'. Together they form a unique fingerprint.

Cite this