2008
DOI: 10.1109/jsac.2008.080111
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks

Abstract: Abstract-We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet scheduling at MAC layer, for the wireless ad hoc networks. Specifically, the MAC protocols enable the secondary users to identify and utilize the leftover frequency spectrum in a way that constrains the level of interference to the primary users. In our proposed protocols, each secondary user is equipped with two transceivers. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
414
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 688 publications
(414 citation statements)
references
References 15 publications
(13 reference statements)
0
414
0
Order By: Relevance
“…Moreover, according to the common characterization of secondary users as best effort opportunistic users, it is assumed in the following that the secondary source transmits its own packets only once. 3 After each secondary source's transmission, the secondary receiver feeds back whether or not it successfully decoded its intended packet. The system operates in slotted time t={1, 2, 3, .…”
Section: A Network Descriptionmentioning
confidence: 99%
“…Moreover, according to the common characterization of secondary users as best effort opportunistic users, it is assumed in the following that the secondary source transmits its own packets only once. 3 After each secondary source's transmission, the secondary receiver feeds back whether or not it successfully decoded its intended packet. The system operates in slotted time t={1, 2, 3, .…”
Section: A Network Descriptionmentioning
confidence: 99%
“…Existing multi-channel CRN MAC protocols can be classified into two categories: single rendezvous or parallel rendezvous. Single rendezvous MAC protocols [2][3][4][5][6] have a control channel as the rendezvous channel, and nodes can exchange all control information and negotiate parameters for data transmission on this channel. This control channel, however, can become a bottleneck under information exchange operations [7] and some such MAC protocols also need an additional transceiver which is always tuned onto the control channel, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…This control channel, however, can become a bottleneck under information exchange operations [7] and some such MAC protocols also need an additional transceiver which is always tuned onto the control channel, e.g. [5]. Parallel rendezvous MAC protocols, on the other hand, do not need a common control channel.…”
Section: Introductionmentioning
confidence: 99%
“…The issues related to spectrum decision, access and management are addressed in [7,8,9]. In [7], the authors propose a distributed Medium Access Control (MAC) protocol able to handle spectrum sensing, decision and access at the same time.…”
Section: Related Workmentioning
confidence: 99%
“…Decision theory is used to design and optimize the protocol parameters, with particular attention to spectrum prediction functionalities. In [8], Jia et al design a MAC protocol which accounts for hardware constraints (single transceiver, sensing overhead), whereas Su and Zhang [9] leverage a cross-layering approach to implement a MAC based on cooperative sensing among secondary users.…”
Section: Related Workmentioning
confidence: 99%