Prudent Opportunistic Cognitive Radio Access Protocols

نویسندگان

  • Israel Cidon
  • Erez Kantor
  • Shay Kutten
چکیده

In a cognitive radio network, a Primary User (PU) may vacate a channel for intermissions of an unknown length. A substantial amount of research has been devoted to minimizing the disturbance a Secondary User (SU) may cause the PU. We take another step and optimize the throughput of an SU, even when assuming that the disturbance to the PU is indeed avoided using those other methods. We suggest new optimization parameters the lengths of SU packets. That is, the SU fills up the intermission with consecutive packets. Each packet is associated with some fixed overhead. Hence, using a larger number of smaller packets increases the overhead ratio for each SU packet. On the other hand, it reduces the loss of throughput the SU suffers with the loss of a packet in a collision at the end of the intermission. As opposed to previous studies, we optimize also the case where the distribution of the channel intermission is unknown. That is, we develop optimal competitive protocols. Those seek to minimize the ratio of the SU’s profit compared to a hypothetical optimal algorithm that knows the intermission length in advance. We show how to compute the optimal present packets’ sizes for the case that the distribution is known (for a general distribution). Finally, we show several interesting properties of the optimal solutions for several popular distributions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Opportunistic Pervasive Networking Paradigm: Multi-hop Cognitive Radio Networks

Cognitive radio networks enable ubiquitous communications both in frequency and time domain, and hence enable opportunistic pervasive communications. Multi-hop cognitive radio networks are appealing to the researchers due to their wide range of application potential in commercial, emergency communication, and military tactical networks. However, the multi-hop nature of the network coupled with ...

متن کامل

Channel Access Mechanisms and Protocols for Opportunistic Cognitive Radio Networks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 CHAPTER

متن کامل

An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks

Cognitive radio (CR) is a promising wireless technology that provides efficient spectral usage. Medium Access Control (MAC) has an important role in several cognitive radio functions such as sensing, spectrum mobility, resource allocation and spectrum sharing. We focus on the opportunistic spectrum access (OSA) functionality of the CR network MAC layer by which the secondary users (SUs) access ...

متن کامل

Cognitive Radio Techniques for M2M Environments

Machine to Machine (M2M) communications have been recently introduced as a viable paradigm for allowing low cost and efficient communications among devices mainly in an autonomous manner. Even if M2M protocols need dedicated resources, a new paradigm, called Cognitive M2M (CM2M) communications, has been recently considered exploiting cognitive/opportunistic radio communications. After having in...

متن کامل

A Power Constrained Multi-Channel MAC Protocol for a Cooperative Spectrum Access

The Cognitive Radio (CR) is a recent technology that aims at increasing the spectrum utilization under the current static spectrum management. With appropriate CR MAC protocols, the unlicensed users, also called secondary users (SUs), are able to access the unused portion of spectrum in an opportunistic way. These protocols should also provide a coordinated access between the SUs and protect th...

متن کامل

Quality-of-service-aware weighted-fair medium access control protocol for coexisting cognitive radio networks

Opportunistic usage selection of a licensed channel by a secondary user (SU) and its contention for data transmission is a challenging problem in coexisting cognitive radio network (CCRN). This is caused by the presence of many SUs from different CRNs in a shared environment, and the problem is further intensified when the user applications, with heterogeneous quality-of-service (QoS) requireme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013