### Abstract

We propose a distributed MAC protocol for cognitive radio when primary network is IEEE 802.16e/m WiMAX. Our proposed MAC protocol is Truncated Binary Exponential Backoff Algorithm where backoff stage of algorithm is doubled at each collision, and backoff counter is operated by frame basis and is freezed at a frame with no idle slots. We model our proposed MAC protocol as a 3-dimensional discrete-time Markov chain and obtain steady state probability of the Markov chain by using a censored Markov chain method. Based on this steady state probability, we obtain the throughput, packet loss probability and packet delay distribution of secondary users. Our numerical examples show that initial contention window size can be determined according to the number of secondary users in order to obtain higher throughput for secondary users, and the maximum backoff stage has a large impact on the secondary user’s packet loss probability.

Original language | English |
---|---|

Title of host publication | Advances in Intelligent Systems and Computing |

Publisher | Springer Verlag |

Pages | 81-89 |

Number of pages | 9 |

Volume | 383 |

ISBN (Print) | 9783319222660 |

DOIs | |

Publication status | Published - 2016 |

Event | 10th International Conference on Queueing Theory and Network Applications, QTNA 2015 - Ha Noi, Ha Long, Viet Nam Duration: 2014 Aug 17 → 2014 Aug 20 |

### Publication series

Name | Advances in Intelligent Systems and Computing |
---|---|

Volume | 383 |

ISSN (Print) | 21945357 |

### Other

Other | 10th International Conference on Queueing Theory and Network Applications, QTNA 2015 |
---|---|

Country | Viet Nam |

City | Ha Noi, Ha Long |

Period | 14/8/17 → 14/8/20 |

### Keywords

- Censored Markov chain
- Cognitive radio
- Exponential backoff MAC protocol
- Throughput

### ASJC Scopus subject areas

- Control and Systems Engineering
- Computer Science(all)

## Fingerprint Dive into the research topics of 'Performance analysis of binary exponential backoff MAC protocol for cognitive radio in the IEEE 802.16e/m network'. Together they form a unique fingerprint.

## Cite this

*Advances in Intelligent Systems and Computing*(Vol. 383, pp. 81-89). (Advances in Intelligent Systems and Computing; Vol. 383). Springer Verlag. https://doi.org/10.1007/978-3-319-22267-7_8