1-2hit |
Nhan NGUYEN-THANH Anh T. PHAM Van-Tam NGUYEN
Designing a medium access control (MAC) protocol is a key for implementing any practical wireless network. In general, a MAC protocol is responsible for coordinating users in accessing spectrum resources. Given that a user in cognitive radio(CR) networks do not have priority in accessing spectrum resources, MAC protocols have to perform dynamic spectrum access (DSA) functions, including spectrum sensing, spectrum access, spectrum allocation, spectrum sharing and spectrum mobility, beside conventional control procedure. As a result, designing MAC protocols for CR networks requires more complicated consideration than that needed for conventional/primary wireless network. In this paper, we focus on two major perspectives related to the design of a CR-MAC protocol: dynamic spectrum access functions and network infrastructure. Five DSA functions are reviewed from the point of view of MAC protocol design. In addition, some important factors related to the infrastructure of a CR network including network architecture, control channel management, the number of radios in the CR device and the number of transmission data channels are also discussed. The remaining challenges and open research issues are addressed for future research to aim at obtaining practical CR-MAC protocols.
In this paper, we present a distributed and interactive admission and power control protocol for spectrum underlay environments. The protocol enables distributed primary users (PUs) to estimate and adjust the level of tolerable interference as their transmitting powers evolve to a given signal-to-interference-plus-noise ratio (SINR) target. The protocol also guides the powers of distributed secondary users (SUs) to achieve their own targets while restricting the transmitting powers from SUs so as not to interfere with the PUs. This restriction of interference from SUs to PUs is an essential part of cognitive radio networks (CRNs) and is facilitated by sending a warning tone from PUs to SUs in the proposed protocol. The SUs that have frequently received the warning tones turn off their transmitters and so autonomously drop from the system. This paper proves that, under the proposed interactive protocol, every PU finally achieves its target if it is originally feasible without SUs and the transmit powers of remaining SUs converge to a fixed point. The proposed method protects PUs perfectly in the sense that all the PUs reach their targets after power control. Numerical investigation shows how safely PUs are protected and how well SUs are admitted as a function of protocol parameters, the frequency of warning tones, the number of SUs to be admitted and the number of active PUs.