On systematic cross-layer design for ad hoc networks

Jason H. Li, Wilbur Peng, Renato Levy, Aristides Staikos, Mung Chiang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

There exist a large amount of research efforts that claim cross-layer design in multi-hop wireless networks. However, almost all of such works use the idea of cross-layering in some ad hoc manner, and different cross-layer designs generally do not work together. To this end, we argue that cross-layer design in such networks should follow some systematic approach, in order to provide a common ground for alternative comparison and integration. In this position paper, we identify two key components toward achieving this ultimate goal of systematic cross-layer design. First, a rigorous mathematical framework is needed to provide the unifying approach for cross-layering, and in this work we choose the well-recognized Generalized Network Utility Maximization (GNUM) approach. Second, with the components availed by the mathematical framework, a composable software "workbench" is needed to "glue" the various components into some prototype alternatives for inspection. We will discuss how such composability may be achieved via our unique ontology-based modeling and simulation approach.

Original languageEnglish (US)
Title of host publication2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
DOIs
StatePublished - 2008
Event2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success - Washington, DC, United States
Duration: Nov 17 2008Nov 19 2008

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
Country/TerritoryUnited States
CityWashington, DC
Period11/17/0811/19/08

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'On systematic cross-layer design for ad hoc networks'. Together they form a unique fingerprint.

Cite this