# American Institute of Mathematical Sciences

• Previous Article
Effect of mobility of smart meters on performance of advanced metering infrastructure
• JIMO Home
• This Issue
• Next Article
Performance analysis and optimization of a pseudo-fault Geo/Geo/1 repairable queueing system with N-policy, setup time and multiple working vacations
July  2017, 13(3): 1483-1494. doi: 10.3934/jimo.2017003

## Performance analysis of binary exponential backoff MAC protocol for cognitive radio in the IEEE 802.16e/m network

 1 ROBOTIS Co., Ltd., Seoul, Korea 2 Research Institute for Information and Communication Technology, Korea University, Seoul, Korea 3 The School of Electrical Engineering, Korea University, Seoul, Korea

* Corresponding author: Bong Dae Choi

The reviewing process of the paper was handled by Wuyi Yue and Yutaka Takahashi as Guest Editors

Received  October 2015 Published  December 2016

Fund Project: The second author is supported by the National Research Foundation of Korea grants funded by Korea government(MEST)(No.2012-008099) and the third author is supported by a Korea University Grant.

We propose a distributed MAC protocol for cognitive radio when primary network is IEEE 802.16e/m WiMAX. Our proposed MAC protocol is the Truncated Binary Exponential Backoff Algorithm where the backoff window size of algorithm is doubled at each collision, and the backoff counter is operated by frame basis in IEEE 802.16e/m and is freezed at a frame with no idle slots. We model our proposed MAC protocol as a 3-dimensional discrete-time Markov chain and obtain steady state probability of the Markov chain by using a censored Markov chain method. Based on this steady state probability, we obtain the throughput, packet loss probability and packet delay distribution of secondary users. Our numerical examples show that the initial contention window size can be determined according to the number of secondary users in order to obtain higher throughput for secondary users, and the maximum backoff window has a large impact on the secondary user's packet loss probability. Secondary users' packet delay distribution is much influenced by the initial contention window size and the number of secondary users.

Citation: Shengzhu Jin, Bong Dae Choi, Doo Seop Eom. Performance analysis of binary exponential backoff MAC protocol for cognitive radio in the IEEE 802.16e/m network. Journal of Industrial & Management Optimization, 2017, 13 (3) : 1483-1494. doi: 10.3934/jimo.2017003
##### References:

show all references

##### References:
An example of frame structure of IEEE 802.16e system
Secondary users' throughput versus $N_s$ ($N_p=160$)
Secondary users' throughput versus $N_s$ ($N_p=120$)
Secondary users' packet loss probability versus $m$
Secondary users' packet loss probability versus $N_p$
Delay distribution versus $W_0$ ($N_s=30$)
Delay distribution versus $W_0$ ($N_s=60$)
Parameter values used in numerical examples
 Parameter Value $N_{slot}$ 140 $\alpha$ 0.9432 $\beta$ 0.9692 $R_t$ 1
 Parameter Value $N_{slot}$ 140 $\alpha$ 0.9432 $\beta$ 0.9692 $R_t$ 1
 [1] Manoel J. Dos Santos, Baowei Feng, Dilberto S. Almeida Júnior, Mauro L. Santos. Global and exponential attractors for a nonlinear porous elastic system with delay term. Discrete & Continuous Dynamical Systems - B, 2021, 26 (5) : 2805-2828. doi: 10.3934/dcdsb.2020206 [2] Juliang Zhang, Jian Chen. Information sharing in a make-to-stock supply chain. Journal of Industrial & Management Optimization, 2014, 10 (4) : 1169-1189. doi: 10.3934/jimo.2014.10.1169 [3] Liqin Qian, Xiwang Cao. Character sums over a non-chain ring and their applications. Advances in Mathematics of Communications, 2021  doi: 10.3934/amc.2020134 [4] Min Li, Jiahua Zhang, Yifan Xu, Wei Wang. Effects of disruption risk on a supply chain with a risk-averse retailer. Journal of Industrial & Management Optimization, 2021  doi: 10.3934/jimo.2021024 [5] Wen-Bin Yang, Yan-Ling Li, Jianhua Wu, Hai-Xia Li. Dynamics of a food chain model with ratio-dependent and modified Leslie-Gower functional responses. Discrete & Continuous Dynamical Systems - B, 2015, 20 (7) : 2269-2290. doi: 10.3934/dcdsb.2015.20.2269 [6] Benrong Zheng, Xianpei Hong. Effects of take-back legislation on pricing and coordination in a closed-loop supply chain. Journal of Industrial & Management Optimization, 2021  doi: 10.3934/jimo.2021035 [7] Reza Lotfi, Yahia Zare Mehrjerdi, Mir Saman Pishvaee, Ahmad Sadeghieh, Gerhard-Wilhelm Weber. A robust optimization model for sustainable and resilient closed-loop supply chain network design considering conditional value at risk. Numerical Algebra, Control & Optimization, 2021, 11 (2) : 221-253. doi: 10.3934/naco.2020023

2019 Impact Factor: 1.366