Parameter | Value |
| 140 |
| 0.9432 |
| 0.9692 |
| 1 |
We propose a distributed MAC protocol for cognitive radio when primary network is IEEE 802.16e/m WiMAX. Our proposed MAC protocol is the Truncated Binary Exponential Backoff Algorithm where the backoff window size of algorithm is doubled at each collision, and the backoff counter is operated by frame basis in IEEE 802.16e/m and is freezed at a frame with no idle slots. We model our proposed MAC protocol as a 3-dimensional discrete-time Markov chain and obtain steady state probability of the Markov chain by using a censored Markov chain method. Based on this steady state probability, we obtain the throughput, packet loss probability and packet delay distribution of secondary users. Our numerical examples show that the initial contention window size can be determined according to the number of secondary users in order to obtain higher throughput for secondary users, and the maximum backoff window has a large impact on the secondary user's packet loss probability. Secondary users' packet delay distribution is much influenced by the initial contention window size and the number of secondary users.
Citation: |
Table 1. Parameter values used in numerical examples
Parameter | Value |
| 140 |
| 0.9432 |
| 0.9692 |
| 1 |
[1] | I. F. Akyildiz, W. Y. Lee, M. C. Vuran and S. Mohanty, Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, 50 (2006), 2127-2159. |
[2] | L. Breuer and D. Baum, An Introduction to Queueing Theory and Matrix-Analytic Methods, Springer, Berlin, 2005. |
[3] | J. W. Chong, Y. Sung and D. K. Sung, RawPEACH: Multiband CSMA/CA-based cognitive radio networks, J. Comm. Net. 11 APRIL 2009. |
[4] | S. Deng, Traffic characteristics of packet voice, IEEE Int Conf Commun 1995;3: 1369. 74. |
[5] | R. Fantacci and D. Tarchi, A novel cognitive networking scenario for IEEE 802. 16 networks, Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009. |
[6] | E. Hwang, K. J. Kim, A. Lyakhov and B. D. Choi, Delay analysis of bandwidth request in truncated binary exponential backoff mechanism over error-free/error-prone channels in IEEE802.16e, Proc. of the 16th International Workshop on Quality of Service, (2008), 131-138. |
[7] | E. Hwang, K. J. Kim and B. D. Choi, Delay distribution and loss probability of bandwidth requests under truncated binary exponential backoff mechanism in IEEE 802.16e over Gilbert-Elliot error channel, Journal of Industrial and Management Optimization, 5 (2009), 525-540. doi: 10.3934/jimo.2009.5.525. |
[8] | J. G. Kemeny, J. L. Snell and A. W. Knapp, Denumerable Markov Chains Graduate Texts in Mathematics, Springer-Verlag, New York, second edition, 1976. |
[9] | K. J. Kim, J. S. Park and B. D. Choi, Admission control scheme of extended rtPS algorithm for VolP sevice in IEEE 802.163e with adaptive modulation and coding, Journal of Industrial and Management Optimization, 5 (2010), 641-660. doi: 10.3934/jimo.2010.6.641. |
[10] | IEEE std 802. 16e-2006. IEEE standard for local and metropolitan area networks-part 16: Air interface for fixed and mobile broadband wireless access systems. amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands and corrigendum 1, Feb. 2006. |
[11] | IEEE P802. 16m/D3, December, 2009. |