
Previous Article
Performance analysis and optimization of a pseudofault Geo/Geo/1 repairable queueing system with Npolicy, setup time and multiple working vacations
 JIMO Home
 This Issue

Next Article
Effect of mobility of smart meters on performance of advanced metering infrastructure
Performance analysis of binary exponential backoff MAC protocol for cognitive radio in the IEEE 802.16e/m network
1.  ROBOTIS Co., Ltd., Seoul, Korea 
2.  Research Institute for Information and Communication Technology, Korea University, Seoul, Korea 
3.  The School of Electrical Engineering, Korea University, Seoul, Korea 
We propose a distributed MAC protocol for cognitive radio when primary network is IEEE 802.16e/m WiMAX. Our proposed MAC protocol is the Truncated Binary Exponential Backoff Algorithm where the backoff window size of algorithm is doubled at each collision, and the backoff counter is operated by frame basis in IEEE 802.16e/m and is freezed at a frame with no idle slots. We model our proposed MAC protocol as a 3dimensional discretetime Markov chain and obtain steady state probability of the Markov chain by using a censored Markov chain method. Based on this steady state probability, we obtain the throughput, packet loss probability and packet delay distribution of secondary users. Our numerical examples show that the initial contention window size can be determined according to the number of secondary users in order to obtain higher throughput for secondary users, and the maximum backoff window has a large impact on the secondary user's packet loss probability. Secondary users' packet delay distribution is much influenced by the initial contention window size and the number of secondary users.
References:
[1] 
I. F. Akyildiz, W. Y. Lee, M. C. Vuran and S. Mohanty, Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, 50 (2006), 21272159. 
[2]  L. Breuer and D. Baum, An Introduction to Queueing Theory and MatrixAnalytic Methods, Springer, Berlin, 2005. 
[3] 
J. W. Chong, Y. Sung and D. K. Sung, RawPEACH: Multiband CSMA/CAbased cognitive radio networks, J. Comm. Net. 11 APRIL 2009. 
[4] 
S. Deng, Traffic characteristics of packet voice, IEEE Int Conf Commun 1995;3: 1369. 74. 
[5] 
R. Fantacci and D. Tarchi, A novel cognitive networking scenario for IEEE 802. 16 networks, Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009. 
[6] 
E. Hwang, K. J. Kim, A. Lyakhov and B. D. Choi, Delay analysis of bandwidth request in truncated binary exponential backoff mechanism over errorfree/errorprone channels in IEEE802.16e, Proc. of the 16th International Workshop on Quality of Service, (2008), 131138. 
[7] 
E. Hwang, K. J. Kim and B. D. Choi, Delay distribution and loss probability of bandwidth requests under truncated binary exponential backoff mechanism in IEEE 802.16e over GilbertElliot error channel, Journal of Industrial and Management Optimization, 5 (2009), 525540. doi: 10.3934/jimo.2009.5.525. 
[8] 
J. G. Kemeny, J. L. Snell and A. W. Knapp, Denumerable Markov Chains Graduate Texts in Mathematics, SpringerVerlag, New York, second edition, 1976. 
[9] 
K. J. Kim, J. S. Park and B. D. Choi, Admission control scheme of extended rtPS algorithm for VolP sevice in IEEE 802.163e with adaptive modulation and coding, Journal of Industrial and Management Optimization, 5 (2010), 641660. doi: 10.3934/jimo.2010.6.641. 
[10] 
IEEE std 802. 16e2006. IEEE standard for local and metropolitan area networkspart 16: Air interface for fixed and mobile broadband wireless access systems. amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands and corrigendum 1, Feb. 2006. 
[11] 
IEEE P802. 16m/D3, December, 2009. 
show all references
References:
[1] 
I. F. Akyildiz, W. Y. Lee, M. C. Vuran and S. Mohanty, Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, 50 (2006), 21272159. 
[2]  L. Breuer and D. Baum, An Introduction to Queueing Theory and MatrixAnalytic Methods, Springer, Berlin, 2005. 
[3] 
J. W. Chong, Y. Sung and D. K. Sung, RawPEACH: Multiband CSMA/CAbased cognitive radio networks, J. Comm. Net. 11 APRIL 2009. 
[4] 
S. Deng, Traffic characteristics of packet voice, IEEE Int Conf Commun 1995;3: 1369. 74. 
[5] 
R. Fantacci and D. Tarchi, A novel cognitive networking scenario for IEEE 802. 16 networks, Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009. 
[6] 
E. Hwang, K. J. Kim, A. Lyakhov and B. D. Choi, Delay analysis of bandwidth request in truncated binary exponential backoff mechanism over errorfree/errorprone channels in IEEE802.16e, Proc. of the 16th International Workshop on Quality of Service, (2008), 131138. 
[7] 
E. Hwang, K. J. Kim and B. D. Choi, Delay distribution and loss probability of bandwidth requests under truncated binary exponential backoff mechanism in IEEE 802.16e over GilbertElliot error channel, Journal of Industrial and Management Optimization, 5 (2009), 525540. doi: 10.3934/jimo.2009.5.525. 
[8] 
J. G. Kemeny, J. L. Snell and A. W. Knapp, Denumerable Markov Chains Graduate Texts in Mathematics, SpringerVerlag, New York, second edition, 1976. 
[9] 
K. J. Kim, J. S. Park and B. D. Choi, Admission control scheme of extended rtPS algorithm for VolP sevice in IEEE 802.163e with adaptive modulation and coding, Journal of Industrial and Management Optimization, 5 (2010), 641660. doi: 10.3934/jimo.2010.6.641. 
[10] 
IEEE std 802. 16e2006. IEEE standard for local and metropolitan area networkspart 16: Air interface for fixed and mobile broadband wireless access systems. amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands and corrigendum 1, Feb. 2006. 
[11] 
IEEE P802. 16m/D3, December, 2009. 
Parameter  Value 
 140 
 0.9432 
 0.9692 
 1 
Parameter  Value 
 140 
 0.9432 
 0.9692 
 1 
[1] 
Seunghee Lee, Ganguk Hwang. A new analytical model for optimized cognitive radio networks based on stochastic geometry. Journal of Industrial & Management Optimization, 2017, 13 (4) : 18831899. doi: 10.3934/jimo.2017023 
[2] 
Haruki Katayama, Hiroyuki Masuyama, Shoji Kasahara, Yutaka Takahashi. Effect of spectrum sensing overhead on performance for cognitive radio networks with channel bonding. Journal of Industrial & Management Optimization, 2014, 10 (1) : 2140. doi: 10.3934/jimo.2014.10.21 
[3] 
Jae Deok Kim, Ganguk Hwang. Crosslayer modeling and optimization of multichannel cognitive radio networks under imperfect channel sensing. Journal of Industrial & Management Optimization, 2015, 11 (3) : 807828. doi: 10.3934/jimo.2015.11.807 
[4] 
Yuan Zhao, Wuyi Yue. Cognitive radio networks with multiple secondary users under two kinds of priority schemes: Performance comparison and optimization. Journal of Industrial & Management Optimization, 2017, 13 (3) : 14491466. doi: 10.3934/jimo.2017001 
[5] 
Hyeon Je Cho, Ganguk Hwang. Optimal design for dynamic spectrum access in cognitive radio networks under Rayleigh fading. Journal of Industrial & Management Optimization, 2012, 8 (4) : 821840. doi: 10.3934/jimo.2012.8.821 
[6] 
Shunfu Jin, Wuyi Yue, Zsolt Saffer. Analysis and optimization of a gated polling based spectrum allocation mechanism in cognitive radio networks. Journal of Industrial & Management Optimization, 2016, 12 (2) : 687702. doi: 10.3934/jimo.2016.12.687 
[7] 
Yuan Zhao, Wuyi Yue. Performance evaluation and optimization of cognitive radio networks with adjustable access control for multiple secondary users. Journal of Industrial & Management Optimization, 2019, 15 (1) : 114. doi: 10.3934/jimo.2018029 
[8] 
Yuan Zhao, Wuyi Yue. Performance analysis and optimization for cognitive radio networks with a finite primary user buffer and a probability returning scheme. Journal of Industrial & Management Optimization, 2017, 13 (5) : 116. doi: 10.3934/jimo.2018195 
[9] 
Samuel N. Cohen, Lukasz Szpruch. On Markovian solutions to Markov Chain BSDEs. Numerical Algebra, Control & Optimization, 2012, 2 (2) : 257269. doi: 10.3934/naco.2012.2.257 
[10] 
Hyukjin Lee, ChengChew Lim, Jinho Choi. Joint backoff control in time and frequency for multichannel wireless systems and its Markov model for analysis. Discrete & Continuous Dynamical Systems  B, 2011, 16 (4) : 10831099. doi: 10.3934/dcdsb.2011.16.1083 
[11] 
Jingzhi Tie, Qing Zhang. An optimal meanreversion trading rule under a Markov chain model. Mathematical Control & Related Fields, 2016, 6 (3) : 467488. doi: 10.3934/mcrf.2016012 
[12] 
Ralf Banisch, Carsten Hartmann. A sparse Markov chain approximation of LQtype stochastic control problems. Mathematical Control & Related Fields, 2016, 6 (3) : 363389. doi: 10.3934/mcrf.2016007 
[13] 
Kun Fan, Yang Shen, Tak Kuen Siu, Rongming Wang. On a Markov chain approximation method for option pricing with regime switching. Journal of Industrial & Management Optimization, 2016, 12 (2) : 529541. doi: 10.3934/jimo.2016.12.529 
[14] 
Eunju Hwang, Kyung Jae Kim, Bong Dae Choi. Delay distribution and loss probability of bandwidth requests under truncated binary exponential backoff mechanism in IEEE 802.16e over GilbertElliot error channel. Journal of Industrial & Management Optimization, 2009, 5 (3) : 525540. doi: 10.3934/jimo.2009.5.525 
[15] 
Lin Xu, Rongming Wang. Upper bounds for ruin probabilities in an autoregressive risk model with a Markov chain interest rate. Journal of Industrial & Management Optimization, 2006, 2 (2) : 165175. doi: 10.3934/jimo.2006.2.165 
[16] 
Kazuhiko Kuraya, Hiroyuki Masuyama, Shoji Kasahara. Load distribution performance of supernode based peertopeer communication networks: A nonstationary Markov chain approach. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 593610. doi: 10.3934/naco.2011.1.593 
[17] 
OlliPekka Tossavainen, Daniel B. Work. Markov Chain Monte Carlo based inverse modeling of traffic flows using GPS data. Networks & Heterogeneous Media, 2013, 8 (3) : 803824. doi: 10.3934/nhm.2013.8.803 
[18] 
Badal Joshi. A detailed balanced reaction network is sufficient but not necessary for its Markov chain to be detailed balanced. Discrete & Continuous Dynamical Systems  B, 2015, 20 (4) : 10771105. doi: 10.3934/dcdsb.2015.20.1077 
[19] 
Ralf Banisch, Carsten Hartmann. Addendum to "A sparse Markov chain approximation of LQtype stochastic control problems". Mathematical Control & Related Fields, 2017, 7 (4) : 623623. doi: 10.3934/mcrf.2017023 
[20] 
Giacomo Micheli. Cryptanalysis of a noncommutative key exchange protocol. Advances in Mathematics of Communications, 2015, 9 (2) : 247253. doi: 10.3934/amc.2015.9.247 
2018 Impact Factor: 1.025
Tools
Metrics
Other articles
by authors
[Back to Top]