{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T07:43:54Z","timestamp":1696578234685},"reference-count":27,"publisher":"Wiley","issue":"18","license":[{"start":{"date-parts":[[2016,11,22]],"date-time":"2016-11-22T00:00:00Z","timestamp":1479772800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51541410","61571402","61271421"],"award-info":[{"award-number":["51541410","61571402","61271421"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications"],"published-print":{"date-parts":[[2016,12,25]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Two\u2010way exclusive OR (XOR) relay can enable hidden nodes to exchange data with low delays and high data rate, while keeping signal processing simple. In this paper, we analyse practical two\u2010way XOR relaying systems, where finite relay buffer, non\u2010negligible signalling overhead, and lossy wireless channels are all captured. A two\u2010layer model is developed to characterise such practical two\u2010way relay systems, which is then reformulated into a Markov process after we project and combine inter\u2010layer state transitions of the two\u2010layer model. Using Markov techniques, we evaluate the steady state probabilities of the Markov process and, in turn, the key performance measures of two\u2010way XOR relaying, such as throughput, delay, and packet loss. The accuracy of our model is validated by simulations. Our model can also be used as an online tool to configure the buffer resources, adapting to wireless channel conditions and signalling requirements. Copyright \u00a9 2016 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/wcm.2755","type":"journal-article","created":{"date-parts":[[2016,11,22]],"date-time":"2016-11-22T13:22:46Z","timestamp":1479820966000},"page":"3230-3243","source":"Crossref","is-referenced-by-count":2,"title":["Performance analysis of two\u2010way MAC layer network coding under finite relay buffer and non\u2010negligible signalling overhead"],"prefix":"10.1002","volume":"16","author":[{"given":"Shijie","family":"Shi","sequence":"first","affiliation":[{"name":"School of Information Engineering Zhengzhou University  Zhengzhou 450001 China"}]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"CSIRO  Marsfield NSW 2122 Australia"}]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computing and Communications University of Technology Sydney  Australia"}]},{"given":"Shiyin","family":"Li","sequence":"additional","affiliation":[{"name":"China University of Mining and Technology  Xuzhou 221008 China"}]}],"member":"311","published-online":{"date-parts":[[2016,11,22]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923722"},{"key":"e_1_2_8_3_1","unstructured":"80211n\/D104 IDS.Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: Enhancements for higher throughput September 2006."},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.081165"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130820"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2053947"},{"key":"e_1_2_8_7_1","doi-asserted-by":"crossref","unstructured":"LiuCH XueF.Network coding for two\u2010way relaying: rate region sum rate and opportunistic scheduling.IEEE International Conference on Communications 2008. ICC'08 Beijing China.2008 IEEE;1044\u20131049.","DOI":"10.1109\/ICC.2008.204"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.092513.121778"},{"key":"e_1_2_8_9_1","doi-asserted-by":"crossref","unstructured":"RossettoF LucaniD.Systematic design of network coding\u2010aware buffering strategies.Military Communications Conference 2011 \u2010 Milcom 2011 Baltimore USA.2011;316\u2013322.","DOI":"10.1109\/MILCOM.2011.6127683"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2365806"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2176958"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.187"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.017"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.12.010"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.02.090314"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2205921"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.100112.120082"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2305162"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2211631"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2178598"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2238535"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2069150"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0473-6"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061010.091803"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2187319"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139626514"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2347973"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwcm.2755","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwcm.2755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/wcm.2755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T07:10:27Z","timestamp":1696489827000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/wcm.2755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,22]]},"references-count":27,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2016,12,25]]}},"alternative-id":["10.1002\/wcm.2755"],"URL":"https:\/\/doi.org\/10.1002\/wcm.2755","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,22]]}}}