2016
DOI: 10.1007/s12083-016-0465-0
|View full text |Cite
|
Sign up to set email alerts
|

An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(21 citation statements)
references
References 135 publications
0
21
0
Order By: Relevance
“…There are numerous CR-MAC protocols proposed for DCRNs [5,[11][12][13]. According to [5,11], these MAC protocols can be broadly classified as single-radio protocols (i.e., split phase) [8,10,[14][15][16][17] and multiple-radio protocols [18][19][20]. Using multiple radios can improve the efficiency of channel negotiation process, but it also increases the node complexity as well as deployment cost.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are numerous CR-MAC protocols proposed for DCRNs [5,[11][12][13]. According to [5,11], these MAC protocols can be broadly classified as single-radio protocols (i.e., split phase) [8,10,[14][15][16][17] and multiple-radio protocols [18][19][20]. Using multiple radios can improve the efficiency of channel negotiation process, but it also increases the node complexity as well as deployment cost.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, it can increase the number of successful users substantially and enhance the throughput of DCRNs. However, comparing with the traditional fixed backoff algorithm, using the dynamic backoff algorithm may further improve the network performance [5]. Fu et al, Baher and Doré, and Wu and Xu [22][23][24] have proposed dynamic backoff algorithms for traditional wireless network to improve network throughput and to decrease access delay.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand in the underlay strategy, the CU transmits the data even in the presence of PU, however the interference at PU is managed by constraining the transmitted power in such a way that the interference at PU remains under tolerable limits [29]. Due to very synchronisation free nature, no control information missing facility and suitability for global coverage, the dedicated control channel (DCC) mechanism is selected to exchange the control information such as spectrum sharing and contention among the CUs [34]. According to the considered DCC mechanism, every CU has two transceiver units (half-duplex mode), one is tuned to control channel and other is used for data transmission on particular channel.…”
Section: System Modelmentioning
confidence: 99%
“…Several OSAs based on MAC (medium access control) schemes in CR networks are discussed in detail in Sultana et al 11 The differences between the conventional MAC protocols and OSA-based MAC protocols were investigated. Palma 12 proposed a new communication protocol, named as energy efficiency protocol (EFP), is based on a hop-by-hop transport scheme and is especially devised to simultaneously solve the network energy consumption and the performance of the closed-loop system.…”
Section: Introductionmentioning
confidence: 99%