2012
DOI: 10.1002/wcm.2185
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive medium access control protocols for secondary users sharing a common channel with time division multiple access primary users

Abstract: The unused time slots in a primary time division multiple access (TDMA) network are regarded as the potential channel access opportunities for secondary users (SUs) in cognitive radio (CR). In this paper, we investigate the medium access control protocols that enable SUs to access a common TDMA channel with primary users (PUs). The primary traffic is assumed to follow a Bernoulli random process. A two‐state Markov chain is used to model the secondary traffic, and two different scenarios are considered. The fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0
1

Year Published

2013
2013
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 21 publications
0
20
0
1
Order By: Relevance
“…Specifically, about the (actually, quite intuitive) behaviour of the optimal access controller (14), we see that when the access is allowed (i.e., when the secondary-access decision A i (t) = 1 is taken/satisfied) the serving RSU (i) enables to upload data only the VC which maximizes the weighted utility acquired by the network, regardless of the controller class of interest (Hard/Soft, Memory/Memoryless). Before to address the general problem (15), let us spend some words to present two important limit cases.…”
Section: Propositionmentioning
confidence: 99%
See 2 more Smart Citations
“…Specifically, about the (actually, quite intuitive) behaviour of the optimal access controller (14), we see that when the access is allowed (i.e., when the secondary-access decision A i (t) = 1 is taken/satisfied) the serving RSU (i) enables to upload data only the VC which maximizes the weighted utility acquired by the network, regardless of the controller class of interest (Hard/Soft, Memory/Memoryless). Before to address the general problem (15), let us spend some words to present two important limit cases.…”
Section: Propositionmentioning
confidence: 99%
“…Proposition 2: Under the above reported assumptions, for the HATWOP, the access time-windows are optimally allotted by the serving RSU (i) according to (14), where the optimal secondary-access rule A * H is:…”
Section: A the Optimal Access Decision Rule In The General Casementioning
confidence: 99%
See 1 more Smart Citation
“…This provides us with an opportunity to develop a cognitive radio system that opportunistically utilizes the licensed spectrum. More specifically, if the licensed spectrum band is detected as idle, i.e., the band is not occupied by a licensed user (referred to as primary user), the cognitive radio system can reuse such idle licensed spectrum for data transmission [5]. In view of the above observations, cognitive radio relies on the spectrum sensing that is responsible for detecting and identifying the idle spectrum (known as spectrum hole).…”
Section: Introductionmentioning
confidence: 99%
“…На сьогоднішній день не існує ефективного ви-рішення конкуренції каналів між декількома пер-винними та вторинними користувачами [10,20,21]. Ґрунтуючись на методі виявлення і концепції кон-куренції каналів, для вирішення поставлених задач буде отримано можливість покращення точності аналізу спектру і пропускної здатності вторинних користувачів.…”
unclassified