Documente Academic
Documente Profesional
Documente Cultură
1 Dept.
I. I NTRODUCTION
In order to overcome the spectrum scarcity and improve
the spectrum utilization, a new spectrum allocation paradigm,
called cognitive radio, has been proposed[1]. With cognitive
radio, under-utilized portions of licensed spectrums are open
to opportunistic access by unlicensed users. The main goal
of spectrum access protocols for cognitive radio networks is
to provide more spectrum access opportunities to unlicensed
users (called secondary users, SUs) while limiting the interference perceived by licensed users (called primary users, PUs).
Therefore, we need to analyze the performance characteristics
such as the throughput achieved by SUs and the interference
level perceived by PUs.
We categorize the research work on the performance analysis for cognitive radio networks according to the following
characteristics of the cognitive medium access control(MAC)
protocols: either centralized or decentralized. In centralized
cognitive MAC protocols[2], both the spectrum sensing and
spectrum allocation for SUs are performed by a central
controller. In decentralized MAC protocols[3][5], SUs individually perform spectrum sensing and search spectrum
opportunities. This paper falls under the latter research effort
of cognitive radio performances.
The decentralized cognitive MAC protocols can be further
classified according to whether or not (time) slot structure
commonly applied to PUs and SUs is used. Wang et. al.[3]
and Chong et. al.[4] proposed MAC protocols with commonly
applied slot structure for cognitive radio networks. The slot
structures make it easier to prevent interference perceived by
PUs. However, the accurate slot time synchronization among
PUs and SUs is a difficult technique for practical implementation. For the cognitive radio networks without commonly
applied slot structure, Huang et. al.[5] proposed three similar
decentralized MAC protocols with the structure of sensing,
Fig. 1.
Fig. 2.
Fig. 3. One-step transition diagram for the Markov chain describing a SUs
behavior
Wi j
(p )i 0,0
Wi
for all i, j ,
(1)
R
i,0 .
E(XTX )
=
E(XTX )
E(XON ) + E(XOFF )
+
(5)
Meanwhile, by the memoryless property of exponential distribution, the conditional probability pintf , meaning that this is
the probability of the transition from ON period to OFF period
seen by a transmitted packet by the tagged SU, is given by
(6)
(9)
(3)
i=0
pcoll = 1 (1 )N 1 .
N (1 )N 1
i
1 (1 )N
N (1 )N 1
(i 1)Tp {P(Ai ) + P(Bi )} . (11)
+ i 1 (1 )N
E(XI )
= E(XI )
E(XON )
(12)
0,0 =
2 (1 2 p ) (1 p )
W0 (1 (2 p )R+1 ) (1 p ) + (1 2 p ) (1 (p )R+1 )
(2)
2 (1 2 p ) (1 (p )R+1 )
W0 (1 (2 p )R+1 ) (1 p ) + (1 2 p ) (1 (p )R+1 )
, if i = 1
1
1(1 ) e
()(1e(Tv +Ts ) )
i1
P(Ai ) =
Ts
e
1e
(1
)
(
)
1 eTs +
{P(Ak ) + P(Bk )} ,
1
1e (1 )N
(4)
if i 2
(7)
k=1
and
P(Bi )
Tp
(1 P(A1 )) , if i = 1
1e
i
i1
=
T
p
1
P(Ak )
P(Bk ) ,
1e
k=1
XI is given by
FXI |Bi (x) P(XI x|Bi )
= P(X OFF > Tp x|X OFF < Tp )
eTp (ex 1)
=
(0 x Tp ) (13)
1 eTp
due to the memoryless property of exponential distribution.
Thus, E(XI |Bi ) is given by
E(XI |Bi ) =
Tp (1 eTp )
.
(1 eTp )
(14)
i
p (1 ep )
P(Bi ) .
(1 ep )
i
(15)
(8)
if i 2 .
k=1
100Mbps
1
of an ON period
of an OFF period
5msec
15msec
100 sec
500 sec
20 sec
16, 32, 64, 128
4
1 10Kbyte
0.55
0.5
0.45
0.4
0.35
0.3
0.25
W0=16, num
W0=32, num
W0=64, num
W0=128, num
W0=16, sim
W0=32, sim
W0=64, sim
W0=128, sim
0.2
0.15
0.1
0.05
4
5
6
7
Packet Size of SUs (Kbyte)
10
V. C ONCLUSION
0.07
W0=16, num
W0=32, num
W0=64, num
W0=128, num
W0=16, sim
W0=32, sim
W0=64, sim
W0=128, sim
0.06
Interference Ratio
0.05
0.04
0.03
0.02
0.01
4
5
6
7
Packet Size of SUs (Kbyte)
10
0.5
0.45
0.4
0.35
W0=16, num
W0=32, num
W0=64, num
W0=128, num
W0=16, sim
W0=32, sim
W0=64, sim
W0=128, sim
0.3
0.25
0.2
4
5
6
7
Packet Size of SUs (Kbyte)
10
0.07
0.06
0.05
Interference Ratio
ACKNOWLEGEMENT
R EFERENCES
0.04
0.03
W0=16, num
W0=32, num
W0=64, num
W0=128, num
W0=16, sim
W0=32, sim
W0=64, sim
W0=128, sim
0.02
0.01
4
5
6
7
Packet Size of SUs (Kbyte)
10
0.55
[1] J. Mitola, Cognitive radio for flexible mobilie multimedia communications, in Proc. IEEE Intl Wksp. Mobilie Multimedia Commun., pp. 3-10,
1999.
[2] I.F. Akyildiz, W.-Y. Lee, M.C. Vuran, and S. Mohanty, NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A
survey, in Computer networks, vol. 50, no. 13, pp.2127-2159, 2006.
[3] P. Wang, D. Niyato, and H. Jiang, Voice Service Support over Cognitive
Radio Networks, in Proc. ICC, 2009.
[4] J.W. Chong, Y. Sung, and D. K. Sung, RawPEACH: Multiband
CSMA/CA-Based Cognitive Radio Networks, Journal of Communications and Networks, vol.11, no. 2, pp. 174-185, 2009.
[5] S. Huang, X. Liu, and Z. Ding, Opportunistic Spectrum Access in
Cognitive Radio Networks, in Proc. Infocom, 2008.
[6] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized Cognitive
MAC for Opportunistic Spectrum Access in Ad Hoc Networks, IEEE
Journal of Selected Areas in Communications, vol 25, no. 3, pp.856-600,
2007.
[7] W.-Y. Lee, and I.F. Akyildiz, Optimal Spectrum Sensing Framework for
Cognitive Radio Networks, IEEE Transactions on Wireless Communications, vol. 7, no. 10, pp. 3845-3857, 2008.
[8] H. Lee, and D.-H. Cho, VoIP Capacity Analysis in Cognitive Radio
System, IEEE Communications Letters, vol. 13, no. 6, pp. 393-395, 2009.
[9] IEEE 802.11 Speification, Wireless Medium Access Control(MAC) and
Physical Layer(PHY) for Wireless Local Area Network (WLANs), 1999.
[10] G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications,
vol. 18, no. 3, pp. 535-547, Aug. 2000.