M. Omar Al-Kadri
X-FDR: a cross-layer routing protocol for multi-hop full-duplex wireless networks.
Al-Kadri, M. Omar; Aijaz, Adnan; Nallanathan, Arumugam
The recent developments in self-interference (SI) cancellation techniques have led to the practical realization of FD radios that can perform simultaneous transmission and reception. FD technology is attractive for various legacy communications standards. In this article, after discussing the opportunities of FD technology at the network layer, we present a cross-layer aided routing protocol, called X-FDR, for multihop FD wireless networks. X-FDR exploits a physical (PHY) layer model capturing the imperfection of SI cancellation. At the medium access control (MAC) layer, X-FDR adopts an optimized MAC protocol that implements a power control mechanism without creating the hidden terminal problem. X-FDR exploits the unique characteristics of FD technology at the network layer to construct energy-efficient and low end-to-end latency routes in the network. Performance evaluation demonstrates the effectiveness of X-FDR in achieving the gains of FD at higher layers of the protocol stack.
AL-KADRI, M.O., AIJAZ, A. and NALLANATHAN, A. 2019. X-FDR: a cross-layer routing protocol for multi-hop full-duplex wireless networks. IEEE wireless communications [online], 26(2), pages 70-77. Available from: https://doi.org/10.1109/MWC.2017.1700243
|Journal Article Type||Article|
|Acceptance Date||Jun 5, 2018|
|Online Publication Date||Dec 4, 2018|
|Publication Date||Apr 30, 2019|
|Deposit Date||Jun 26, 2018|
|Publicly Available Date||Jun 26, 2018|
|Journal||IEEE wireless communications|
|Publisher||IEEE Communications Society|
|Peer Reviewed||Peer Reviewed|
|Keywords||Fullduplex; Crosslayer; Distributed networks; Routing; Energy efficiency; MAC|
AL-KADRI 2019 X-FDR
Publisher Licence URL
You might also like
TrustMod: a trust management module for NS-3 simulator.
Android mobile malware detection using machine learning: a systematic review.
Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm.
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus.