{"title":"Delay distribution for a new version of a simple mac protocol for cognitive wireless networks","authors":"Adauto Mendes Bernardes Junior, J. Brito","doi":"10.1109/ICOIN.2014.6799485","DOIUrl":null,"url":null,"abstract":"Cognitive radio is a promising technology for the next generation of wireless networks. Medium Access Control (MAC) protocol is an important issue to define the performance of cognitive radio network. In this paper we investigate the delay distribution of a simple and efficient MAC protocol previously proposed in the literature. This analysis is important to calculate a very important quality of service parameter: the probability of delay exceeding a given threshold. We verify the good behavior of the proposed protocol in terms of delay distribution and we validate the methodology used to estimate the delay distribution.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The International Conference on Information Networking 2014 (ICOIN2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2014.6799485","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cognitive radio is a promising technology for the next generation of wireless networks. Medium Access Control (MAC) protocol is an important issue to define the performance of cognitive radio network. In this paper we investigate the delay distribution of a simple and efficient MAC protocol previously proposed in the literature. This analysis is important to calculate a very important quality of service parameter: the probability of delay exceeding a given threshold. We verify the good behavior of the proposed protocol in terms of delay distribution and we validate the methodology used to estimate the delay distribution.