SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

This article is part of the series Wireless Cooperative Networks.

Open Access Research Article

Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

J Alonso-Zárate1*, E Kartsakli2, Ch Verikoukis1 and L Alonso2

Author Affiliations

1 Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Avinguda Del Canal Olímpic S/N, Parc Mediterrani de la Tecnologia, 08860 Castelldefels, Barcelona, Spain

2 Department of Signal Theory and Communications, Escola Politècnica Superior de Castelldefels (EPSC), Universitat Politècnica de Catalunya (UPC), Avinguda Del Canal Olímpic S/N, Parc Mediterrani de la Tecnologia, 08860 Castelldefels, Barcelona, Spain

For all author emails, please log on.

EURASIP Journal on Advances in Signal Processing 2008, 2008:817401  doi:10.1155/2008/817401


The electronic version of this article is the complete one and can be found online at: http://asp.eurasipjournals.com/content/2008/1/817401


Received:15 November 2007
Accepted:2 April 2008
Published:9 April 2008

© 2008 The Author(s).

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The persistent relay carrier sensing multiple access (PRCSMA) protocol is presented in this paper as a novel medium access control (MAC) protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ) scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

Publisher note

To access the full article, please see PDF.