2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications 2009
DOI: 10.1109/pimrc.2009.5449990
|View full text |Cite
|
Sign up to set email alerts
|

A new opportunistic MAC layer protocol for cognitive IEEE 802.11-based wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…The research work that closely matches to our study is [16], which adopts two transceivers per secondary user model from [12] and improves the propositions of [17] through dividing each time slot in four phases: sensing phase, reporting phase, negotiation phase, and data transmission phase. In [16], a new cross-layer MAC protocol for channel allocation is proposed with the option of reserving resources.…”
Section: Related Workmentioning
confidence: 71%
“…The research work that closely matches to our study is [16], which adopts two transceivers per secondary user model from [12] and improves the propositions of [17] through dividing each time slot in four phases: sensing phase, reporting phase, negotiation phase, and data transmission phase. In [16], a new cross-layer MAC protocol for channel allocation is proposed with the option of reserving resources.…”
Section: Related Workmentioning
confidence: 71%
“…To aid increased secondary user throughput, the secondary users can be equipped with two radios, one for contention and another for simultaneous data transmission. Availability of more than one transceivers has shown to increase secondary throughput [33]. Usage of multiple radios in secondary devices to increase utilization is also prevalent [13], [34].…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…Therefore, heterogeneous traffic and impact of sub-channel reservation were considered in [8] and [9]. In [10], an 802.11-based opportunistic spectrum access is proposed for single-channel wireless networks where PUs operate on a slot-by-slot basis.…”
Section: Introductionmentioning
confidence: 99%