Publication-01-2015

Multi-hop Link Adaptation for Emergency Services Narrowband Mobile Ad-hoc Networks

Authors

Sebastian Helmle, Mathias Dehm, Michael Kuhn, Dominik Lieckfeldt, and Dirk Pesch

Abstract

Existing narrowband mobile ad-hoc networks (MANETs) used in disaster search and rescue (SAR) missions and tactical communications are specifically designed to enable robust unicast or broadcast voice communications. The increasing demand for add-on data services such as messaging, file and map transfer, etc requires those long-range communication systems to provide higher data rates while maintaining robustness against link disturbances. Link adaptation enables wireless transmitters to select optimal combinations of transmission parameters based on radio channel conditions. Especially for networks with strong bandwidth limitations as investigated here, the difficulty of increasing overhead emerges, demanding for efficient parameter adaptation. The subject of this paper is the investigation of link adaptation in multi-hop scenarios focusing on highly robust end-to-end communications. Results from Monte Carlo computer simulations show that the combination of relaying and link adaptation can significantly increase the packet delivery ratio while simultaneously improving end-to-end user net throughput.

Reference

10th International ITG Conference on Systems, Communications and Coding (SCC 2015), Hamburg, Germany, Feb. 2015

Download

Paper for Download:   to appear

Copyright Notice

© 2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.