Cognitive medium access control protocols for secondary users sharing a common channel with time division multiple access primary users

被引:23
|
作者
Hu, Sanqing [1 ]
Yao, Yu-Dong [1 ]
Yang, Zhuo [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
来源
关键词
MAC; protocol; TDMA; Cog-CSMA; Cog-PRMA; throughput; RADIO; MAC;
D O I
10.1002/wcm.2185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unused time slots in a primary time division multiple access (TDMA) network are regarded as the potential channel access opportunities for secondary users (SUs) in cognitive radio (CR). In this paper, we investigate the medium access control protocols that enable SUs to access a common TDMA channel with primary users (PUs). The primary traffic is assumed to follow a Bernoulli random process. A two-state Markov chain is used to model the secondary traffic, and two different scenarios are considered. The first scenario assumes that the secondary packet arrivals are independent and follow a Bernoulli random process and a cognitive carrier sensing multiple access (Cog-CSMA) protocol is proposed. A Rayleigh fading channel is considered in evaluating Cog-CSMA, and its throughput expression is derived in this paper. The second scenario assumes that the packet arrivals follow a correlated packet arrival process and a cognitive packet reservation multiple access (Cog-PRMA) protocol is proposed. A Markov chain is used to model the different system states in Cog-PRMA and derive the throughput. Numerical results show that the Cog-CSMA and Cog-PRMA protocols achieve the objective of supporting secondary transmissions in a TDMA network without interfering the PUs' transmissions and improve the network bandwidth utilization. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:284 / 296
页数:13
相关论文
共 50 条
  • [31] Spectrum Sharing Among Multiple Secondary Users in Cognitive Radio Networks
    Mohammadian, Hoda Shah
    Abolhassani, Bahman
    2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2010,
  • [32] Cognitive Relaying with Time Incentive: Multiple Primary Users
    Thumar, Vinay
    Nadkar, Taskeen
    Shenoy, Gautam
    Desai, U. B.
    Merchant, S. N.
    2011 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2011,
  • [33] Research on improved multiple users detection algorithm in pattern division multiple access system
    Tang, Wanwei
    Wang, Lixia
    Wang, Zedai
    Han, Guofeng
    Zhao, Jinlong
    Yue, Xinwei
    DIGITAL SIGNAL PROCESSING, 2023, 133
  • [34] Opportunistic Spectrum Access for Cognitive Radio in the Presence of Reactive Primary Users
    Che, Yue Ling
    Zhang, Rui
    Gong, Yi
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [35] Achievable Secrecy Rates in the Multiple Access Wiretap Channel with Deviating Users
    Banawan, Karim
    Ulukus, Sennur
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2814 - 2818
  • [36] A multiple access channel game with users implementing throughput and latency metrics
    Garnaev, Andrey
    Trappe, Wade
    ICT EXPRESS, 2023, 9 (05): : 869 - 874
  • [37] EDA-Based Scheduling of Users in the MIMO Multiple Access Channel
    Muhammad Naeem
    Daniel C. Lee
    Wireless Personal Communications, 2013, 71 : 467 - 490
  • [38] EDA-Based Scheduling of Users in the MIMO Multiple Access Channel
    Naeem, Muhammad
    Lee, Daniel C.
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (01) : 467 - 490
  • [39] Access Policy Design for Cognitive Secondary Users Under a Primary Type-I HARQ Process
    Joda, Roghayeh
    Zorzi, Michele
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (11) : 4037 - 4049
  • [40] Dynamic channel access of secondary users in a heterogeneous network using game theory
    Jella, Anusha
    Sabat, Samrat L.
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 425 - 428