Performance Analysis of Binary Exponential Backoff MAC Protocol for Cognitive Radio in the IEEE 802.16e/m Network

  • Shengzhu Jin
  • Bong Dae ChoiEmail author
  • Doo Seop Eom
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 383)


We propose a distributed MAC protocol for cognitive radio when primary network is IEEE 802.16e/m WiMAX. Our proposed MAC protocol is Truncated Binary Exponential Backoff Algorithm where backoff stage of algorithm is doubled at each collision, and backoff counter is operated by frame basis and is freezed at a frame with no idle slots. We model our proposed MAC protocol as a 3-dimensional discrete-time Markov chain and obtain steady state probability of the Markov chain by using a censored Markov chain method. Based on this steady state probability, we obtain the throughput, packet loss probability and packet delay distribution of secondary users. Our numerical examples show that initial contention window size can be determined according to the number of secondary users in order to obtain higher throughput for secondary users, and the maximum backoff stage has a large impact on the secondary user’s packet loss probability.


Cognitive radio Exponential backoff MAC protocol Censored Markov chain Throughput 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Lee, W.Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks 50(13), 2127–2159 (2006)CrossRefGoogle Scholar
  2. 2.
    IEEE std 802.16e-2006. IEEE standard for local and metropolitan area networks- part 16: Air interface for fixed and mobile broadband wireless access systems. amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands and corrigendum (February 2006)Google Scholar
  3. 3.
    IEEE P802.16m/D3 (December 2009)Google Scholar
  4. 4.
    Fantacci, R., Tarchi, D.: A novel cognitive networking scenario for IEEE 802.16 networks. In: Proc. of IEEE GLOBECOM, Honolulu, Hawaii, USA (December 2009)Google Scholar
  5. 5.
    Chong, J.W., Sung, Y., Sung, D.K.: RawPEACH: Multiband CSMA/CA-Based Cognitive Radio Networks. J. Comm. Net. 11(2) (April 2009)CrossRefGoogle Scholar
  6. 6.
    Hwang, E., Kim, K.J., Lyakhov, A., Choi, B.D., Hwang, E., Kim, K.J., Lyakhov, A., Choo, B.D.: IEEE Trans. on Vehicular Technology 12, 131–138 (2008)Google Scholar
  7. 7.
    Breuer, L., Baum, D.: An Introduction to Queueing Theory and Matrix-Analytic Methods. Springer, Berlin (2005)zbMATHGoogle Scholar
  8. 8.
    Kemeny, J.G., Snell, J.L., Knapp, A.W.: Denumerable Markov Chains. Graduate Texts in Mathematics, 2nd edn., vol. 40. Springer, New York (1976)CrossRefGoogle Scholar
  9. 9.
    Deng, S.: Traffic characteristics of packet voice. In: IEEE Int. Conf. Commun., vol. 3, pp. 1369–1374 (1995)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.ROBOTIS Co., Ltd.SeoulKorea
  2. 2.Research Institute for ICTKorea UniversitySeoulKorea
  3. 3.The School of Electrical EngineeringKorea UniversitySeoulKorea

Personalised recommendations