Upload
polytechnique-montreal
View
226
Download
0
Embed Size (px)
Citation preview
IEEE
Proo
f
Received November 8, 2015, accepted December 10, 2015. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2015.2509449
Design and Optimal Configuration of Full-DuplexMAC Protocol for Cognitive Radio NetworksConsidering Self-InterferenceLE THANH TAN, (Member, IEEE), AND LONG BAO LE, (Senior Member, IEEE)Institut National de la Recherche Scientifique-Énergie, Matériaux et Télécommunications, Université du Québec, Montreal, QC J3X 1S2, Canada
Corresponding author: L. T. Le ([email protected])
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
ABSTRACT In this paper, we propose an adaptive medium access control (MAC) protocol forfull-duplex (FD) cognitive radio networks in which FD secondary users (SUs) perform channel contentionfollowed by concurrent spectrum sensing and transmission, and transmission only with maximum powerin two different stages (called the FD sensing and transmission stages, respectively) in each contentionand access cycle. The proposed FD cognitive MAC (FDC-MAC) protocol does not require synchronizationamong SUs, and it efficiently utilizes the spectrum and mitigates the self-interference in the FD transceiver.We develop a mathematical model to analyze the throughput performance of the FDC-MAC protocol, whereboth half-duplex (HD) transmission and FD transmission modes are considered in the transmission stage.Then, we study the FDC-MAC configuration optimization through adaptively controlling the spectrumsensing duration and transmit power level in the FD sensing stage. We prove that there exists optimal sensingtime and transmit power to achieve the maximum throughput, and we develop an algorithm to configurethe proposed FDC-MAC protocol. Extensive numerical results are presented to illustrate the optimalFDC-MAC configuration and the impacts of protocol parameters and the self-interference cancellationquality on the throughput performance. Moreover, we demonstrate the significant throughput gains of theFDC-MAC protocol with respect to the existing HD MAC and single-stage FD MAC protocols.
16
17
18
INDEX TERMS Asynchronous MAC, full-duplex MAC, full-duplex spectrum sensing, optimalsensing duration, throughput maximization, self-interference control, full-duplex cognitive radios,throughput analysis.
I. INTRODUCTION19
Engineering MAC protocols for efficient sharing of white20
spaces is an important research topic in cognitive radio21
networks (CRNs). One critical requirement for the cognitive22
MAC design is that transmissions on the licensed frequency23
band from primary users (PUs) should be satisfactorily pro-24
tected from the SUs’ spectrum access. Therefore, a cognitive25
MAC protocol for the secondary network must realize both26
the spectrum sensing and access functions so that timely27
detection of the PUs’ communications and effective spectrum28
sharing among SUs can be achieved. Most existing research29
works on cognitive MAC protocols have focused on the30
design and analysis of HD MAC (e.g., see [1]–[4] and the31
references therein).32
Due to the HD constraint, SUs typically employ a33
two-stage sensing/access procedure where they perform34
spectrum sensing in the first stage before accessing35
available spectrum for data transmission in the second 36
stage [5]–[11]. The HD constraint also requires SUs be syn- 37
chronized during the spectrum sensing stage, which could 38
be difficult to achieve in practice. In fact, spectrum sensing 39
enables SUs to detect white spaces that are not occupied by 40
PUs [2]–[8], [12], [13]; therefore, imperfect spectrum sens- 41
ing can reduce the spectrum utilization due to failure in 42
detecting white spaces and potentially result in collisions 43
with active PUs. Consequently, sophisticated design and 44
parameter configuration of cognitive MAC protocols must be 45
conducted to achieve good performance while appropriately 46
protecting PUs [1], [6]–[11], [14]. As a result, traditional 47
MAC protocols [15]–[19] adapted to the CRN may not 48
provide satisfactory performance. 49
In general, HD MAC protocols may not exploit white 50
spaces very efficiently since significant sensing time may 51
be required, which would otherwise be utilized for data 52
VOLUME 3, 20152169-3536 2015 IEEE. Translations and content mining are permitted for academic research only.
Personal use is also permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
1
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
transmission. Moreover, SUs may not timely detect the PUs’53
activity during their transmissions, which can cause severe54
interference to active PUs. Thanks to recent advances on55
FD technologies, a FD radio can transmit and receive56
data simultaneously on the same frequency band [20]–[25].57
In fact, the FD technology can be integrated into58
next-generation wireless networks, e.g., small cell networks59
and heterogeneous wireless networks [26], [27], to signifi-60
cantly enhance the network performance. One of the most61
critical issues of wireless FD communication is the presence62
of self-interference, which is caused by power leakage from63
the transmitter to the receiver of a FD transceiver. The64
self-interference may indeed lead to serious communication65
performance degradation of FD wireless systems. Despite66
recent advances on self-interference cancellation (SIC) tech-67
niques [21]–[23] (e.g., propagation SIC, analog-circuit SIC,68
and digital baseband SIC), self-interference still exists due69
to various reasons such as the limitation of hardware and70
channel estimation errors.71
A. RELATED WORKS72
There are some recent works that propose to exploit the73
FD communications for MAC-level channel access in multi-74
user wireless networks [25]–[31]. In [25], the authors develop75
a centralized MAC protocol to support asymmetric data76
traffic where network nodes may transmit data packets of77
different lengths, and they propose to mitigate the hidden78
node problem by employing a busy tone. To overcome this79
hidden node problem, Duarte et al. propose to adapt the80
standard 802.11MAC protocol with the RTS/CTS handshake81
in [28]. Moreover, Goyal et al. in [29] extend this study82
to consider interference between two nodes due to their83
concurrent transmissions. Different from conventional84
wireless networks, designing MAC protocols in CRNs is85
more challenging because the spectrum sensing function86
must be efficiently integrated into the MAC protocol.87
In addition, the self-interference must be carefully addressed88
in the simultaneous spectrum sensing and access to mitigate89
its negative impacts on the sensing and throughput90
performance.91
The FD technology has been employed for more efficient92
spectrum access design in cognitive radio networks [32]–[35]93
where SUs can perform sensing and transmission simulta-94
neously. In [32], a FD MAC protocol is developed which95
allows simultaneous spectrum access of the SU and PU net-96
works where both PUs and SUs are assumed to employ the97
p-persistent MAC protocol for channel contention resolu-98
tion and access. This design is, however, not applicable99
to the hierarchical spectrum access in the CRNs where100
PUs should have higher spectrum access priority compared101
to SUs.102
In our previous work [33], we propose the FD MAC103
protocol by using the standard backoff mechanism as in104
the 802.11 MAC protocol where we employ concurrent FD105
sensing and access during the data transmission phase as106
well as frame fragmentation. Moreover, engineering of a107
cognitive FD relaying network is considered in [34] and [35], 108
where various resource allocation algorithms to improve the 109
outage probability are proposed. In addition, the authors 110
in [30] develop the joint routing and distributed resource 111
allocation for FD wireless networks. In [31], Choi et al. 112
study the distributed power allocation for a hybrid FD/HD 113
system where all network nodes operate in the HD mode 114
but the access point (AP) communicates by using the FD 115
mode. In practice, it would be desirable to design an adapt- 116
able MAC protocol, which can be configured to operate in 117
an optimal fashion depending on specific channel and net- 118
work conditions. This design will be pursued in our current 119
work. 120
B. OUR CONTRIBUTIONS 121
In this paper, we make a further bold step in designing, 122
analyzing, and optimizing an adaptive FDC–MAC protocol 123
for CRNs, where the self-interference and imperfect 124
spectrum sensing are explicitly considered. In particular, 125
the contributions of this paper can be summarized 126
as follows. 127
1) We propose a novel FDC–MAC protocol that can effi- 128
ciently exploit the FD transceiver for spectrum sens- 129
ing and access of the white space without requiring 130
synchronization among SUs. In this protocol, after the 131
p-persistent based channel contention phase, the 132
winning SU enters the data phase consisting of two 133
stages, i.e., concurrent sensing and transmission in the 134
first stage (called FD sensing stage) and transmission 135
only in the second stage (called transmission stage). 136
The developed FDC–MAC protocol, therefore, enables 137
the optimized configuration of transmit power level 138
and sensing time during the FD sensing stage to mit- 139
igate the self-interference and appropriately protect the 140
active PU. After the FD sensing stage, the SU can 141
transmit with the maximum power to achieve the 142
highest throughput. 143
2) We develop a mathematical model for throughput per- 144
formance analysis of the proposed FDC-MAC proto- 145
col considering the imperfect sensing, self-interference 146
effects, and the dynamic status changes of the PU. 147
In addition, both one-way and two-way transmission 148
scenarios, which are called HD transmission (HDTx) 149
and FD transmission (FDTx) modes, respectively, are 150
considered in the analysis. Since the PU can change its 151
idle/active status during the FD sensing and transmis- 152
sion stages, different potential status-change scenarios 153
are studied in the analytical model. 154
3) We study the optimal configuration of FDC-MAC 155
protocol parameters including the SU’s sensing dura- 156
tion and transmit power to maximize the achievable 157
throughput under both FDTx and HDTx modes. 158
We prove that there exists an optimal sensing time to 159
achieve the maximum throughput for a given transmit 160
power value during the FD sensing stage under both 161
FDTx and HDTx modes. Therefore, optimal protocol 162
2 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
parameters can be determined through standard163
numerical search methods.164
4) Extensive numerical results are presented to illustrate165
the impacts of different protocol parameters on the166
throughput performance and the optimal configura-167
tions of the proposed FDC-MAC protocol. Moreover,168
we show the significant throughput enhancement169
of the proposed FDC-MAC protocol compared170
to existing cognitive MAC protocols, namely the171
HD MAC protocol and a single-stage FD MAC pro-172
tocol with concurrent sensing and access during the173
whole data phase. Specifically, our FDC-MAC pro-174
tocol achieves higher throughput with the increasing175
maximum power while the throughput of the176
single-stage FD MAC protocol decreases with the177
maximum power in the high power regime due178
to the self-interference. Moreover, the proposed179
FDC-MAC protocol significantly outperforms the HD180
MAC protocol in terms of system throughput.181
The remaining of this paper is organized as follows.182
Section II describes the system and PU models. FDC–MAC183
protocol design, and throughput analysis are performed in184
Section III. Then, Section IV studies the optimal con-185
figuration of the proposed FDC–MAC protocol. Section V186
demonstrates numerical results followed by concluding187
remarks in Section VI.188
II. SYSTEM AND PU ACTIVITY MODELS189
A. SYSTEM MODEL190
We consider a cognitive radio network where n0 pairs of191
SUs opportunistically exploit white spaces on one channel192
for communications. We assume that each SU is equipped193
with a FD transceiver; hence, the SUs can perform sens-194
ing and transmission simultaneously. However, the sensing195
performance of each SU is affected by the self-interference196
from its transmitter since the transmitted power is leaked197
into the received signal. We denote I (P) as the average self-198
interference power, which is modeled as I (P) = ζ (P)ξ [20]199
where P is the SU’s transmit power, ζ and ξ (0 ≤ ξ ≤ 1)200
are predetermined coefficients which represent the quality201
of self-interference cancellation (QSIC). In this work, we202
design a asynchronous cognitive MAC protocol where no203
synchronization is required among SUs and between SUs and204
the PU. We assume that different pairs of SUs can overhear205
transmissions from the others (i.e., a collocated network is206
assumed). In the following, we refer to pair i of SUs as SU i207
for brevity.208
B. PRIMARY USER ACTIVITY209
We assume that the PU’s idle/active status follows two210
independent random processes. We say that the channel is211
available and busy for SUs’ access if the PU is in the idle and212
active (or busy) states, respectively. LetH0 andH1 denote the213
events that the PU is idle and active, respectively. To protect214
the PU, we assume that SUs must stop their transmissions215
and evacuate from the busy channel within the maximum216
delay of Teva, which is referred to as channel evacuation 217
time. 218
Let τac and τid denote the random variables which repre- 219
sent the durations of active and idle channel states, respec- 220
tively. We denote probability density functions (pdf) of τac 221
and τid as fτac (t) and fτid (t), respectively. While most results 222
in this paper can be applied to general pdfs fτac (t) and fτid (t), 223
we mostly consider the exponential pdf in the analysis. 224
In addition, let P (H0) =τid
τid+τacand P (H1) = 1−P (H0) 225
present the probabilities that the channel is available and 226
busy, respectively where τid and τac denote the average values 227
of τac and τid, respectively. We assume that the probabilities 228
that τac and τid are smaller than Teva are sufficiently small 229
(i.e., the PU changes its status slowly) so that we can ignore 230
events with multiple idle/active status changes in one channel 231
evacuation interval Teva. 232
III. FULL-DUPLEX COGNITIVE MAC PROTOCOL 233
In this section, we describe the proposed FDC-MAC protocol 234
and conduct its throughput analysis considering imperfect 235
sensing, self-interference of the FD transceiver, and dynamic 236
status change of the PUs. 237
A. FDC-MAC PROTOCOL DESIGN 238
The proposed FDC-MAC protocol integrates three important 239
elements of a cognitive MAC protocol, namely contention 240
resolution, spectrum sensing, and access functions. 241
Specifically, SUs employ the p-persistent CSMA princi- 242
ple [17] for contention resolution where each SU with data 243
to transmit attempts to capture an available channel with 244
a probability p after the channel is sensed to be idle dur- 245
ing the standard DIFS interval (DCF Interframe Space). 246
If a particular SU decides not to transmit (with probability 247
of 1 − p), it will sense the channel and attempt to trans- 248
mit again in the next slot of length σ with probability p. 249
To complete the reservation, the four-way handshake with 250
Request-to-Send/Clear-to-Send (RTS/CST) exchanges [16] 251
is employed to reserve the available channel for transmission. 252
Specifically, the secondary transmitter sends RTS to the 253
secondary receiver and waits until it successfully receives 254
the CTS from the secondary receiver. All other SUs, which 255
hear the RTS and CTS exchange from the winning SU, defer 256
to access the channel for a duration equal to the data trans- 257
mission time, T . Then, an acknowledgment (ACK) from the 258
SU’s receiver is transmitted to its corresponding transmitter 259
to notify the successful reception of a packet. Furthermore, 260
the standard small interval, namely SIFS (Short Interframe 261
Space), is used before the transmissions of CTS, ACK, and 262
data frame as in the standard 802.11 MAC protocol [16]. 263
In our design, the data phase after the channel con- 264
tention phase comprises two stages where the SU performs 265
concurrent sensing and transmission in the first stage with 266
duration TS and transmission only in the second stage with 267
duration T − TS . Here, the SU exploits the FD capability of 268
its transceiver to realize concurrent sensing and transmission 269
VOLUME 3, 2015 3
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
FIGURE 1. Timing diagram of the proposed full-duplex cognitive MAC protocol.
the first stage (called FD sensing stage) where the sensing270
outcome at the end of this stage (i.e., an idle or busy channel271
status) determines its further actions as follows. Specifically,272
if the sensing outcome indicates an available channel then273
the SU transmits data in the second stage; otherwise, it274
remains silent for the remaining time of the data phase with275
duration T − TS .276
We assume that the duration of the SU’s data phase T is277
smaller than the channel evacuation time Teva so timely278
evacuation from the busy channel can be realized with reli-279
able FD spectrum sensing. Therefore, our design allows280
to protect the PU with evacuation delay at most T if the281
MAC carrier sensing during the contention phase and282
the FD spectrum sensing in the data phase are perfect.283
Furthermore, we assume that the SU transmits at power levels284
Psen ≤ Pmax and Pdat = Pmax during the FD sensing285
and transmission stages, respectively where Pmax denotes286
the maximum power and the transmit power Psen in the287
FD sensing stage will be optimized to effectively mitigate288
the self-interference and achieve good sensing-throughput289
tradeoff. The timing diagram of the proposed FDC–MAC290
protocol is illustrated in Fig. 1.291
We allow two possible operation modes in the transmission 292
stage. The first is the HD transmission mode (HDTx mode) 293
where there is only one direction of data transmission from 294
the SU transmitter to the SU receiver. In this mode, there 295
is no self-interference in the transmission stage. The second 296
is the FD transmission mode (FDTx mode) where two-way 297
communications between the pair of SUs are assumed 298
(i.e., there are two data flows between the two SU nodes in 299
opposite directions). In this mode, the achieved throughput 300
can be potentially enhanced (at most doubling the throughput 301
of the HDTx mode) but self-interference must be taken into 302
account in throughput quantification. 303
Our proposed FDC–MAC protocol design indeed enables 304
flexible and adaptive configuration, which can efficiently 305
exploit the capability of the FD transceiver. Specifically, if the 306
duration of the FD sensing stage is set equal to the duration 307
of the whole data phase (i.e., TS = T ), then the SU per- 308
forms concurrent sensing and transmission for the whole data 309
phase as in our previous design [33]. This configuration may 310
degrade the achievable throughput since the transmit power 311
during the FD sensing stage is typically set smaller Pmax 312
to mitigate the self-interference and achieve the required 313
4 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
sensing performance. We will refer the corresponding MAC314
protocol with TS = T as one-stage FD MAC in the sequel.315
Moreover, if we set the SU transmit power Psen in the316
sensing stage equal to zero, i.e., Psen = 0, then we317
achieve the traditional two-stage cognitive HDMAC protocol318
where sensing and transmission are performed sequentially319
in two different stages [6], [8]. Moreover, the proposed320
FDC–MAC protocol is more flexible than existing321
designs [6], [8], [33] since different existing designs can322
be achieved through suitable configuration of its protocol323
parameters. It will be demonstrated later that the proposed324
FDC–MAC protocol achieves significant better throughput325
than that of the existing cognitive MAC protocols. In the326
following, we present the throughput analysis based on which327
the protocol configuration optimization can be performed.328
B. THROUGHPUT ANALYSIS329
We now conduct the saturation throughput analysis for the330
secondary network where all SUs are assumed to always331
have data to transmit. The resulting throughput can be served332
as an upper bound for the throughput in the non-saturated333
scenario [16]. This analysis is performed by studying one334
specific contention and access cycle (CA cycle) with the335
contention phase and data phase as shown in Fig. 1. Without336
loss of generality, wewill consider the normalized throughput337
achieved per one unit of system bandwidth (in bits/s/Hz).338
Specifically, the normalized throughput of the FDC–MAC339
protocol can be expressed as340
NT =B
Tove + T, (1)341
where Tove represents the time overhead required for one342
successful channel reservation (i.e., successful RTS/CTS343
exchanges), T denotes the packet transmission time, and B344
denotes the amount of data (bits) transmitted in one CA cycle345
per one unit of system bandwidth, which is expressed in346
bits/Hz. To complete the throughput analysis, we derive the347
quantities Tove and B in the remaining of this subsection.348
1) DERIVATION OF Tove349
The average time overhead for one successful channel reser-350
vation can be calculated as351
Tove = T cont + 2SIFS + 2PD+ ACK , (2)352
where ACK is the length of an ACK message, SIFS is the353
length of a short interframe space, and PD is the propagation354
delay where PD is usually small compared to the slot size σ ,355
and T cont denotes the average time overhead due to idle356
periods, collisions, and successful transmissions of RTS/CTS357
messages in one CA cycle. For better presentation of the358
paper, the derivation of T cont is given in Appendix A.359
2) DERIVATION OF B360
To calculate B, we consider all possible cases that capture361
the activities of SUs and status changes of the PU in the362
FDC-MAC data phase of duration T . Because the PU’s activ-363
ity is not synchronizedwith the SU’s transmission, the PU can364
change its idle/active status any time. We assume that there 365
can be at most one transition between the idle and active states 366
of the PU during one data phase interval. This is consistent 367
with the assumption on the slow status changes of the PU as 368
described in Section II-B since T < Teva. Furthermore, we 369
assume that the carrier sensing of the FDC-MAC protocol 370
is perfect; therefore, the PU is idle at the beginning of the 371
FDC-MACdata phase. Note that the PUmay change its status 372
during the SU’s FD sensing or transmission stage, which 373
requires us to consider different possible events in the data 374
phase. 375
We use hij (i, j ∈ {0, 1}) to represent events capturing status 376
changes of the PU in the FD sensing stage and transmission 377
stage where i = 0 and i = 1 represent the idle and active 378
states of the PU, respectively. For example, if the PU is idle 379
during the FD sensing stage and becomes active during the 380
transmission stage, then we represent this event as (h00, h01) 381
where sub-events h00 and h01 represent the status changes in 382
the FD sensing and transmission stages, respectively. More- 383
over, if the PU changes from the idle to the active state during 384
the FD sensing stage and remains active in the remaining of 385
the data phase, then we represent this event as (h01, h11). 386
It can be verified that we must consider the following three 387
cases with the corresponding status changes of the PU during 388
the FDC-MAC data phase to analyze B. 389
• Case 1: The PU is idle for the whole FDC-MAC data 390
phase (i.e., there is no PU’s signal in both FD sensing 391
and transmission stages) and we denote this event as 392
(h00, h00). The average number of bits (in bits/Hz) trans- 393
mitted during the data phase in this case is denoted asB1. 394
• Case 2: The PU is idle during the FD sensing stage but 395
the PU changes from the idle to the active status in the 396
transmission stage. We denote the event corresponding 397
to this case as (h00, h01) where h00 and h01 capture the 398
sub-events in the FD sensing and transmission stages, 399
respectively. The average number of bits (in bits/Hz) 400
transmitted during the data phase in this case is repre- 401
sented by B2. 402
• Case 3: The PU is first idle then becomes active during 403
the FD sensing stage and it remains active during the 404
whole transmission stage. Similarly we denote this event 405
as (h01, h11) and the average number of bits (in bits/Hz) 406
transmitted during the data phase in this case is denoted 407
as B3. 408
Then, we can calculate B as follows: 409
B = B1 + B2 + B3. (3) 410
To complete the analysis, we will need to derive B1, B2, 411
and B3, which are given in Appendix B. 412
IV. FDC–MAC PROTOCOL CONFIGURATION FOR 413
THROUGHPUT MAXIMIZATION 414
In this section, we study the optimal configuration of the 415
proposed FDC–MAC protocol to achieve the maximum 416
throughput while satisfactorily protecting the PU. 417
VOLUME 3, 2015 5
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
A. PROBLEM FORMULATION418
Let NT (TS , p,Psen) denote the normalized secondary419
throughput, which is the function of the sensing time TS ,420
transmission probability p, and the SU’s transmit power Psen421
in the FD sensing stage. In the following, we assume422
a fixed frame length T , which is set smaller the required423
evacuation time Teva to achieve timely evacuation from a424
busy channel for the SUs. We are interested in determining425
suitable configuration for p, TS and Psen to maximize the sec-426
ondary throughput,NT (TS , p,Psen). In general, the optimal427
transmission probability p should balance between reducing428
collisions among SUs and limiting the protocol overhead.429
However, the achieved throughput is less sensitive to the430
transmission probability p as will be demonstrated later via431
the numerical study. Therefore, we will seek to optimize the432
throughput over Psen and TS for a reasonable and fixed value433
of p.434
For brevity, we express the throughput as a function ofPsen435
and TS only, i.e.,NT (TS ,Psen). Suppose that the PU requires436
that the average detection probability is at leastPd . Then, the437
throughput maximization problem can be stated as follows:438
maxTS ,Psen
NT (TS ,Psen)439
s.t. Pd (ε,TS) ≥ Pd ,440
0 ≤ Psen ≤ Pmax, 0 ≤ TS ≤ T , (4)441
where Pmax is the maximum power for SUs, and TS is upper442
bounded by T . In fact, the first constraint on Pd (ε,TS)443
implies that the spectrum sensing should be sufficiently444
reliable to protect the PU which can be achieved with suf-445
ficiently large sensing time TS . Moreover, the SU’s transmit446
powerPsen must be appropriately set to achieve good tradeoff447
between the network throughput and self-interference448
mitigation.449
B. PARAMETER CONFIGURATION FOR FDC–MAC450
PROTOCOL451
To gain insights into the parameter configuration of the452
FDC–MAC protocol, we first study the optimization with453
respect to the sensing time TS for a given Psen. For any454
value of TS , we would need to set the sensing detection455
threshold ε so that the detection probability constraint is met456
with equality, i.e., Pd (ε,TS) = Pd as in [5] and [6]. Since457
the detection probability is smaller in Case 3 (i.e., the PU458
changes from the idle to active status during the FD sensing459
stage of duration TS ) compared to that in Case 1 and Case 2460
(i.e., the PU remains idle during the FD sensing stage) consid-461
ered in the previous section, we only need to consider Case 3462
to maintain the detection probability constraint. The average463
probability of detection for the FD sensing in Case 3 can be464
expressed as465
Pd =∫ TS
0P01d (t)fτid (t |0 ≤ t ≤ TS ) dt, (5)466
where t denotes the duration from the beginning of the FD467
sensing stage to the instant when the PU changes to the active468
Algorithm 1 FDC-MAC Configuration Algorithm1: for each considered value of Psen ∈ [0,Pmax] do2: Find optimal TS for problem (7) using the bisection
method as T S (Psen) = argmax0≤TS≤T
NT (T ,Psen).
3: end for4: The final solution
(T ∗S ,P
∗sen)
is determined as(T ∗S ,P
∗sen)= argmax
Psen,T S (Psen)
NT (TS (Psen) ,Psen).
state, and fτid (t |A ) is the pdf of τid conditioned on event A 469
capturing the condition 0 ≤ t ≤ TS , which is given as 470
fτid (t |A ) =fτid (t)Pr {A}
=
1τid
exp(− tτid)
1− exp(− TSτid). (6) 471
Note that P01d (t) is derived in Appendix C and fτid (t) is given 472
in (18). 473
We consider the following single-variable optimization 474
problem for a given Psen: 475
max0<TS≤T
NT (TS ,Psen) . (7) 476
We characterize the properties of function NT (TS ,Psen) 477
with respect to TS for a given Psen in the following theorem 478
whose proof is provided in Appendix D. For simplicity, the 479
throughput function is written as NT (TS ). 480
Theorem 1: The objective functionNT(TS) of (7) satisfies 481
the following properties 482
1) limTS→0
∂NT∂TS= +∞, 483
2) a) For HDTxmodewith ∀Psen and FDTxmodewith 484
Psen < Psen, we have limTS→T
∂NT∂TS
< 0, 485
b) For FDTx mode with Psen > Psen, we have 486
limTS→T
∂NT∂TS
> 0, 487
3) ∂2NT∂T 2
S< 0, ∀TS , 488
4) The objective functionNT(TS) is bounded from above, 489
where Psen = N0
[(1+ Pdat
N0+ζPξ
dat
)2
− 1
]is the critical 490
value of Psen such that limTS→T
∂NT∂TS= 0. 491
We would like to discuss the properties stated in 492
Theorem 1. For the HDTx mode with ∀Psen and FDTx mode 493
with low Psen, then properties 1, 2a, and 4 imply that there 494
must be at least one TS in [0,T ] that maximizes NT (TS). 495
The third property implies that this maximum is indeed 496
unique. Moreover, for the FDTx with high Psen, then 497
properties 1, 2b, 3 and 4 imply that NT(TS) increases 498
in [0,T ]. Hence, the throughput NT(TS) achieves its maxi- 499
mum with sensing time TS = T . We propose an algorithm 500
to determine optimal (TS ,Psen), which is summarized in 501
Algorithm 1. Here, we can employ the bisection scheme and 502
other numerical methods to determine the optimal value TS 503
for a given Psen. 504
6 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
V. NUMERICAL RESULTS505
For numerical studies, we set the key parameters for the506
FDC–MAC protocol as follows: mini-slot duration is507
σ = 20µs; PD = 1µs; SIFS = 2σ µs; DIFS = 10σ µs;508
ACK = 20σ µs; CTS = 20σ µs; RTS = 20σ µs. Other509
parameters are chosen as follows unless stated otherwise:510
the sampling frequency fs = 6 MHz; bandwidth of PU’s511
signal 6 MHz; Pd = 0.8; T = 15 ms; p = 0.0022; the512
SNR of the PU signal at each SU γP =PpN0= −20 dB;513
varying self-interference parameters ζ and ξ . Without loss514
of generality, the noise power is normalized to one; hence,515
the SU transmit power Psen becomes Psen = SNRs; and we516
set Pmax = 15dB.517
We first study the impacts of self-interference parameters518
on the throughput performance with the following parameter519
setting: (τid, τac) = (1000, 100) ms, Pmax = 25 dB, Teva =520
40 ms, ζ = 0.4, ξ is varied in ξ = {0.12, 0.1, 0.08, 0.05},521
and Pdat = Pmax. Recall that the self-interference depends522
on the transmit power P as I (P) = ζ (P)ξ where P = Psen523
and P = Pdat in the FD sensing and transmission stages,524
respectively. Fig. 2 illustrates the variations of the throughput525
versus the transmission probability p. It can be observed that526
when ξ decreases (i.e., the self-interference is smaller), the527
achieved throughput increases. This is because SUs can trans-528
mit with higher power while still maintaining the sensing con-529
straint during the FD sensing stage, which leads to throughput530
improvement. The optimal Psen corresponding to these val-531
ues of ξ are Psen = SNRs = {25.00, 18.01, 14.23, 11.28} dB532
and the optimal probability of transmission is p∗ = 0.0022533
as indicated by a star symbol. Therefore, to obtain all other534
results in this section, we set p∗ = 0.0022.535
FIGURE 2. Normalized throughput versus transmission probability p forT = 18 ms, τid = 1000 ms, τac = 100 ms, and varying ξ .
Fig. 3 illustrates the throughput performance versus536
number of SUs n0 when we keep the same parameter set-537
tings as those for Fig. 2 and p∗ = 0.0022. Again, when538
ξ decreases (i.e., the self-interference becomes smaller), the539
achieved throughput increases. In this figure, the optimal540
FIGURE 3. Normalized throughput versus the number of SUs n0 forT = 18 ms, p = 0.0022, τid = 1000 ms, τac = 100 ms, and varying ξ .
FIGURE 4. Normalized throughput versus SU transmit power Psen andsensing time TS for p = 0.0022, τid = 500 ms, τac = 50 ms, n0 = 40,ξ = 1, ζ = 0.7 and FDTx with Pdat = 15 dB.
SNRs achieving the maximum throughput corresponding 541
to the considered values of ξ are Psen = SNRs = 542
{25.00, 18.01, 14.23, 11.28} dB, respectively. 543
We now verify the results stated in Theorem 1 for the FDTx 544
mode. Specifically, Fig. 4 shows the throughput performance 545
for the scenario where the QSIC is very lowwith large ξ and ζ 546
where we set the network parameters as follows: p = 0.0022, 547
τid = 500 ms, τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.7, 548
and Pdat = 15 dB. Moreover, we can obtain Psen as in (42) 549
in Appendix D, which is equal to Psen = 6.6294 dB. In this 550
figure, the curve indicated by asterisks, which corresponds to 551
Psen = Psen, shows the monotonic increase of the through- 552
put with sensing time TS and other curves corresponding 553
to Psen > Psen have the same characteristic. In contrast, 554
all remaining curves (corresponding to Psen < Psen) first 555
increase to the maximum values and then decrease as we 556
increase TS . 557
Fig. 5 illustrates the throughput performance for the very 558
high QSIC with small ξ and ζ where we set the network 559
VOLUME 3, 2015 7
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
FIGURE 5. Normalized throughput versus SU transmit power Psen andsensing time TS for p = 0.0022, τid = 500 ms, τac = 50 ms, n0 = 40,ξ = 1, ζ = 0.08 and FDTx with Pdat = 15 dB.
parameters as follows: p = 0.0022, τid = 500 ms,560
τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.08, and561
Pdat = 15 dB. Moreover, we can obtain Psen as in (42) in562
Appendix D, which is equal to Psen = 19.9201 dB. We have563
Psen < Pmax = 15dB < Psen in this scenario; hence, all564
the curves first increases to the maximum throughput and565
then decreases with the increasing TS . Therefore, we have566
correctly validated the properties stated in Theorem 1.567
Nowwe investigate the throughput performance versus SU568
transmit power Psen and sensing time TS for the case of569
high QSIC with ξ = 0.95 and ζ = 0.08. Fig. 6 shows the570
throughput versus the SU transmit power Psen and sensing571
time TS for the FDTx mode with Pdat = 15 dB, p = 0.0022,572
τid = 150 ms, τac = 50 ms, and n0 = 40. It can be observed573
that there exists an optimal configuration of the SU transmit574
power P∗sen = 4.6552 dB and sensing time T ∗S = 2.44 ms to575
FIGURE 6. Normalized throughput versus SU transmit power Psen andsensing time TS for p = 0.0022, τid = 150 ms, τac = 50 ms, n0 = 40,ξ = 0.95, ζ = 0.08 and FDTx with Pdat = 15 dB.
achieve the maximum throughputNT(T ∗S ,P
∗sen)= 2.3924, 576
which is indicated by a star symbol. These results confirm that 577
SUs must set appropriate sensing time and transmit power for 578
the FDC–MAC protocol to achieve the maximize throughput, 579
which cannot be achieved by setting Ts = T as proposed in 580
existing designs such as in [33]. 581
FIGURE 7. Normalized throughput versus SU transmit power Psen andsensing time TS for p = 0.0022, τid = 150 ms, τac = 50 ms, n0 = 40,ξ = 0.95, ζ = 0.8 and FDTx with Pdat = 15 dB.
In Fig. 7, we present the throughput versus the SU transmit 582
power Psen and sensing time TS for the low QSIC sce- 583
nario where p = 0.0022, τid = 150 ms, τac = 50 ms, 584
Pmax = 15 dB, n0 = 40, ξ = 0.95, and ζ = 0.8. The 585
optimal configuration of SU transmit power P∗sen = 15 dB 586
and sensing time T ∗S = 15 ms to achieve the maximum 587
throughput NT(T ∗S ,P
∗sen)= 1.6757 is again indicated 588
by a star symbol. Under this optimal configuration, the FD 589
sensing is performed during the whole data phase (i.e., there 590
is no transmission stage). In fact, to achieve the maximum 591
throughput, the SU must provide the satisfactory sensing 592
performance and attempt to achieve high transmission rate. 593
Therefore, if the QSIC is low, the data rate achieved during 594
the transmission stage can be lower than that in the FD sens- 595
ing stage because of the very strong self-interference in the 596
transmission stage. Therefore, setting longer FD sensing time 597
enables to achieve more satisfactory sensing performance 598
and higher transmission rate, which explains that the optimal 599
configuration should set T ∗S = T for the low QSIC scenario. 600
This protocol configuration corresponds to existing design 601
in [33], which is a special case of the proposed FDC–MAC 602
protocol. 603
We now investigate the throughput performance with 604
respect to the SU transmit power Psen and sensing time TS 605
for the HDTx mode. Fig. 8 illustrates the throughput per- 606
formance for the high QSIC scenario with ξ = 0.95 and 607
ζ = 0.08. It can be observed that there exists an optimal 608
configuration of SU transmit power P∗sen = 5.6897 dB 609
and sensing time T ∗S = 3.5 ms to achieve the maximum 610
throughput NT(T ∗S ,P
∗sen)= 1.4802, which is indicated 611
8 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
FIGURE 8. Normalized throughput versus SU transmit power Psen andsensing time TS for p = 0.0022, τid = 150 ms, τac = 50 ms, n0 = 40,ξ = 0.95, ζ = 0.08 and HDTx.
by a star symbol. The maximum achieved throughput of the612
HDTxmode is lower than that in the FDTxmode presented in613
Fig. 6. This is because with high QSIC, the FDTx mode can614
transmit more data than the HDTx mode in the transmission615
stage.616
In Fig. 9, we show the throughput versus the SU transmit617
power Psen for TS = 2.2 ms, p = 0.0022, τid = 1000 ms,618
τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.08 and various619
values of T (i.e., the data phase duration) for the FDTx mode620
with Pdat = 15 dB. For each value of T , there exists the621
optimal SU transmit power P∗sen which is indicated by an622
asterisk. It can be observed that as T increases from 8 ms623
to 25 ms, the achieved maximum throughput first increases624
then decreases with T . Also in the case with T ∗ = 15 ms,625
the SU achieves the largest throughput which is indicated by626
a star symbol. Furthermore, the achieved throughput signifi-627
cantly decreases when the pair of (T ,Psen) deviates from the628
optimal values,(T ∗,P∗sen
).629
FIGURE 9. Normalized throughput versus SU transmit power Psen forTS = 2.2 ms, p = 0.0022, τid = 1000 ms, τac = 50 ms, n0 = 40, ξ = 0.95,ζ = 0.08, varying T , and FDTx with Pdat = 15 dB.
FIGURE 10. Normalized throughput versus Pmax for τid = 150 ms,τac = 75 ms, n0 = 40, ξ = 0.85, n0 = 40, ζ =
{0.2,0.7
}, and FDTx with
Pdat = Pmax dB.
Finally, we compare the throughput of our proposed 630
FDC-MAC protocol, the single-stage FD MAC protocol 631
where FD sensing (concurrent spectrum sensing and trans- 632
mission) is performed during the whole data phase [33] and 633
the HDMAC protocol which does not allow the transmission 634
during the spectrum sensing interval in Fig. 10. For brevity, 635
the single-stage FD MAC protocol is refereed to as FD 636
MAC in this figure. The parameter settings are as follows: 637
τid = 150 ms, τac = 75 ms, n0 = 40, ξ = 0.85, n0 = 40, 638
ζ = {0.2, 0.7}, and FDTx with Pdat = Pmax dB. For fair 639
comparison, we first obtain the optimal configuration of the 640
single-stage FD MAC protocol, i.e., then we use (T ∗, p∗) 641
for the HD MAC protocol and FDC-MAC protocol. For the 642
single-stage FD MAC protocol, the transmit power is set 643
to Pmax because there is only a single stage where the SU 644
performs sensing and transmission simultaneously during the 645
data phase. In addition, the HDMAC protocol will also trans- 646
mit with the maximum transmit power Pmax to achieve the 647
highest throughput. For both studied cases of ζ = {0.2, 0.7}, 648
our proposed FDC-MAC protocol significantly outperforms 649
the other two protocols. Moreover, the single-stage FD MAC 650
protocol [33] with power allocation outperforms the HD 651
MAC protocol at the corresponding optimal value of Pmax 652
required by the single-stage FD MAC protocol. However, 653
both single-stage FDC-MAC andHDMAC protocols achieve 654
increasing throughput with higher Pmax while the single- 655
stage FD MAC protocol has the throughput first increased 656
then decreased as Pmax increases. This demonstrates the neg- 657
ative self-interference effect on the throughput performance 658
of the single-stage FD MAC protocol, which is efficiently 659
mitigated by our proposed FDC-MAC protocol. 660
VI. CONCLUSION 661
In this paper, we have proposed the FDC–MAC protocol 662
for cognitive radio networks, analyzed its throughput per- 663
formance, and studied its optimal parameter configuration. 664
VOLUME 3, 2015 9
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
The design and analysis have taken into account the665
FD communication capability and the self-interference of666
the FD transceiver. We have shown that there exists an667
optimal FD sensing time to achieve the maximum through-668
put. We have then presented extensive numerical results to669
demonstrate the impacts of self-interference and protocol670
parameters on the throughput performance. In particular, we671
have shown that the FDC–MAC protocol achieves signifi-672
cantly higher throughput than the HD MAC protocol, which673
confirms that the FDC–MAC protocol can efficiently exploit674
the FD communication capability. Moreover, the FDC–MAC675
protocol results in higher throughput with the increasingmax-676
imum power budget while the throughput of the single-stage677
FD MAC can decrease in the high power regime. This result678
validates the importance of adopting the two-stage procedure679
in the data phase and the optimization of sensing time and680
transmit power during the FD sensing stage to mitigate the681
negative self-interference effect.682
APPENDIX A683
DERIVATION OF T cont684
To calculate T cont, we define some further parameters as685
follows. Denote Tcoll as the duration of the collision and Tsucc686
as the required time for successful RTS/CTS transmission.687
These quantities can be calculated as follows [17]:688 {Tsucc = DIFS + RTS + SIFS + CTS + 2PDTcoll = DIFS + RTS + PD,
(8)689
where DIFS is the length of a DCF (distributed coordination690
function) interframe space, RTS and CTS denote the lengths691
of the RTS and CTS messages, respectively.692
As being shown in Fig. 1, there can be several idle periods693
and collisions before one successful channel reservation. Let694
T iidle denote the i-th idle duration between two consecutive695
RTS/CTS exchanges, which can be collisions or successful696
exchanges. Then, T iidle can be calculated based on its prob-697
ability mass function (pmf), which is derived as follows.698
In the following, all relevant quantities are defined in terms of699
the number of time slots. With n0 SUs joining the contention700
resolution, let Psucc, Pcoll and Pidle denote the probabilities701
that a particular generic slot corresponds to a successful702
transmission, a collision, and an idle slot, respectively. These703
probabilities can be calculated as follows:704
Psucc = n0p (1− p)n0−1 (9)705
Pidle = (1− p)n0 (10)706
Pcoll = 1− Psucc − Pidle, (11)707
where p is the transmission probability of an SU in a generic708
slot. In general, the interval Tcont, whose average value is709
T cont given in (2), consists of several intervals correspond-710
ing to idle periods, collisions, and one successful RTS/CTS711
transmission. Hence, this quantity can be expressed as712
Tcont =
Ncoll∑i=1
(Tcoll + T
iidle
)+ TNcoll+1
idle + Tsucc, (12)713
where Ncoll is the number of collisions before the success- 714
ful RTS/CTS exchange and Ncoll is a geometric random 715
variable (RV) with parameter 1 − Pcoll/P idle where 716
P idle = 1− Pidle. Therefore, its pmf can be expressed as 717
f NcollX (x) =
(Pcoll
P idle
)x (1−
Pcoll
P idle
), x = 0, 1, 2, . . . 718
(13) 719
Also, Tidle represents the number of consecutive idle slots, 720
which is also a geometric RV with parameter 1 − Pidle with 721
the following pmf 722
f TidleX (x) = (Pidle)
x (1− Pidle), x = 0, 1, 2, . . . (14) 723
Therefore, T cont (the average value of Tcont) can be written 724
as follows [17]: 725
T cont = N collTcoll + T idle(N coll + 1
)+ Tsucc, (15) 726
where T idle and N coll can be calculated as 727
T idle =(1− p)n0
1− (1− p)n0(16) 728
N coll =1− (1− p)n0
n0p (1− p)n0−1− 1. (17) 729
These expressions are obtained by using the pmfs of the 730
corresponding RVs given in (13) and (14), respectively [17]. 731
APPENDIX B 732
DERIVATIONS OF B1, B2, B3 733
We will employ a pair of parameters (θ, ϕ) to represent the 734
HDTX and FDTX modes where ((θ, ϕ) = (0, 1)) for HDTx 735
mode and ((θ, ϕ) = (1, 2)) for the FDTx mode. Moreover, 736
since the transmit powers in the FD sensing and transmis- 737
sion stages are different, which are equal to Psen and Pdat, 738
respectively, we define different SNRs and SINRs in these 739
two stages as follows: γS1 =PsenN0
and γS2 =PsenN0+Pp
are 740
the SNR and SINR achieved by the SU in the FD sensing 741
stage with and without the presence of the PU, respectively; 742
γD1 =PdatN0+θ I
and γD2 =Pdat
N0+Pp+θ Ifor I = ζPξdat are 743
the SNR and SINR achieved by the SU in the transmission 744
stage with and without the presence of the PU, respectively. It 745
can be seen that we have accounted for the self-interference 746
for the FDTx mode during the transmission stage in γD1 by 747
noting that θ = 1 in this case. The parameter ϕ for the 748
HDTx and FDTx modes will be employed to capture the 749
throughput for one-way and two-way transmissions in these 750
modes, respectively. 751
The derivations of B1, B2, and B3 require us to consider 752
different possible sensing outcomes in the FD sensing stage. 753
In particular, we need to determine the detection 754
probabilityP ijd , which is the probability of correctly detecting 755
the PU given the PU is active, and the false alarm probabil- 756
ity P ijf , which is the probability of the erroneous sensing 757
of an idle channel, for each event hij capturing the state 758
changes of the PU. In the following analysis, we assume 759
the exponential distribution for τac and τid where τac and τid 760
10 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
denote the corresponding average values of these active and761
idle intervals. Specifically, let fτx (t) denote the pdf of τx762
(x represents ac or id in the pdf of τac or τid, respectively)763
then764
fτx (t) =1τx
exp(−tτx). (18)765
Similarly, we employ T ijS and T ijD to denote the number of766
bits transmitted on one unit of system bandwidth during the767
FD sensing and transmission stages under the PU’s state-768
changing event hij, respectively.769
We can now calculate B1 as follows:770
B1 = P (H0)
∫∞
t=Tove+TT 001 fτid (t)dt771
= P (H0)T 001 exp
(−Tove + Tτid
), (19)772
where P (H0) denotes the probability of the idle state of773
the PU, and P00f is the false alarm probability for event774
h00 given in Appendix C. Moreover, T 001 = P00
f T 00S +775
(1 − P00f )(T 00
S + T 00D ), T 00
S = TS log2 (1+ γS1), T00D =776
ϕ (T − TS) log2 (1+ γD1) where T 00S and T 00
D denote the777
number of bits transmitted (over oneHz of system bandwidth)778
in the FD sensing and transmission stages of the data phase,779
respectively. After some manipulations, we achieve780
B1 = Ke exp(T1τ
)[TS log2(1+ γS1)+ ϕ
(1− P00
f
)781
(T − TS) log2(1+ γD1)], (20)782
where Ke = P (H0) exp(−
(Toveτid+
Tτac
))and 1
1τ=783
1τac−
1τid.784
Moreover, we can calculate B2 as785
B2 = P (H0)
∫ Tove+T
t1=Tove+TS
∫∞
t2=Tove+T−t1786
T 012 (t1)fτid (t1)fτac (t2)dt1dt2, (21)787
where T 012 (t1) = P00
f T 00S + (1 − P00
f )(T 00S + T 01
D
(t1)),788
T 01D (t1) = ϕ
(T − TS − t1
)log2 (1+ γD2) + ϕ t1 log2789
(1+ γD1), and t1 = t1 − (Tove + TS). In this expression,790
t1 denotes the interval from the beginning of the CA cycle791
to the instant when the PU changes to the active state from792
an idle state. Again, T 00S and T 01
D denote the amount of data793
transmitted in the FD sensing and transmission stages for this794
case, respectively. After some manipulations, we achieve795
B2=Ke1τ
τid
{(exp
(T1τ
)− exp
(TS1τ
))796
×
[TS log2 (1+γS1)−ϕ1τ
(1−P00
f)log2
(1+γD11+γD2
)]797
+ϕ (T − TS)(1−P00
f
)798
×
[exp
(T1τ
)log2(1+γD1)−exp
(TS1τ
)log2(1+γD2)
]}.799
(22)800
Finally, we can express B3 as follows: 801
B3 = P (H0)
∫ Tove+TS
t1=Tove
∫∞
t2=Tove+T−t1802
×
[P01d(t1)T 01S(t1)+ (1−P01
d(t1))(T 01
S(t1)+ T 11
D )]
803
fτid (t1)fτac (t2)dt1dt2, (23) 804
where t1 = t1 − Tove, T 01S
(t1)= t1 log2 (1+ γS1) + 805(
TS − t1)log2 (1+ γS2), T
11D = ϕ (T − TS) log2 (1+ γD2), 806
and t1 is the same as in (21). Here, T 01S and T 11
D denote the 807
amount of data delivered in the FD sensing and transmis- 808
sion stages for the underlying case, respectively. After some 809
manipulations, we attain 810
B3 = Ke
∫ TS
t=0
[T 01S (t)+ T 11
D − P01d (t)T 11
D
]811
fτid (t) exp(
tτac
)dt = B31 + B32, (24) 812
where 813
B31 = Ke
∫ TS
t=0
[T 01S (t)+ T 11
D
]fτid (t) exp
(tτac
)dt 814
= Ke1τ
τid
{1τ
[(TS1τ−1)exp
(TS1τ
)+1]log2
(1+γS11+γS2
)815
+
[exp
(TS1τ
)− 1
] [T 11D + TS log2 (1+ γS2)
]}, 816
(25) 817
and 818
B32 = −KeT 11D T32, (26) 819
where T32 =∫ TSt=0 P
01d (t) fτid (t) exp
(tτac
)dt . 820
APPENDIX C 821
FALSE ALARM AND DETECTION PROBABILITIES 822
We derive the detection and false alarm probabilities for 823
FD sensing and two PU’s state-changing events h00 and h01 824
in this appendix. Assume that the transmitted signals from 825
the PU and SU are circularly symmetric complex 826
Gaussian (CSCG) signals while the noise at the secondary 827
receiver is independently and identically distributed CSCG 828
CN (0,N0) [5]. Under FD sensing, the false alarm probability 829
for event h00 can be derived using the similar method as in [5], 830
which is given as 831
P00f = Q
[(ε
N0 + I (Psen)− 1
)√fsTS
], (27) 832
whereQ (x) =∫+∞
x exp(−t2/2
)dt; fs,N0, ε, I (Psen) are the 833
sampling frequency, the noise power, the detection threshold 834
and the self-interference, respectively; TS is the FD sensing 835
duration. 836
The detection probability for event h01 is given as 837
P01d = Q
(
εN0+I (Psen)
−TS−tTSγPS − 1
)√fsTS√
TS−tTS
(γPS + 1)2 + tTS
, (28) 838
VOLUME 3, 2015 11
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
where t is the interval from the beginning of the data phase to839
the instant when the PU changes its state, γPS =Pp
N0+I (Psen)840
is the signal-to-interference-plus-noise ratio (SINR) of the841
PU’s signal at the SU.842
APPENDIX D843
PROOF OF THEOREM 1844
The first derivative of NT can be written as follows:845
∂NT∂TS
=1
Tove + T
3∑i=1
∂Bi∂TS
. (29)846
We derive the first derivative of Bi (i = 1, 2, 3) in the847
following. Toward this end, we will employ the approxima-848
tion of exp (x) ≈ 1 + x, x = Txτx, Tx ∈ {T ,TS ,T − TS},849
τx ∈ {τid, τac,1τ } where recall that 11τ=
1τac−
1τid. This850
approximation holds under the assumption that Tx << τx851
since we can omit all higher-power terms xn for n > 1852
from the Maclaurin series expansion of function exp (x).853
Using this approximation, we can express the first derivative854
of B1 as855
∂B1
∂TS=Ke exp
(T1τ
){log2 (1+ γS1)856
−ϕ
[(T − TS )
∂P00f
∂TS+
(1−P00
f
)]log2(1+ γD1)
},857
(30)858
where∂P00
f∂TS
is the first derivative of P00f whose derivation is859
given in Appendix E.860
Moreover, the first derivative of B2 can be written as861
∂B2
∂TS= Ke
1τ
τid862
×
{[exp
(T1τ
)−
(1+
T1τ
)exp
(TS1τ
)]log2 (1+ γS1)863
−ϕ∂P00
f
∂TS
[1τ
(exp
(TS1τ
)−exp
(T1τ
))log2
(1+γD11+γD2
)864
+ (T−TS)(exp
(T1τ
)log2(1+γD1)−exp
(TS1τ
)log2(1+γD2)
)]865
+ϕ(1− P00
f
) [−T − TS1τ
exp(TS1τ
)log2 (1+ γD2)866
−
(exp
(T1τ
)log2(1+γD1)−exp
(TS1τ
)log2(1+γD2)
)867
+ exp(TS1τ
)log2
(1+ γD11+ γD2
)]}. (31)868
Finally, the first derivative of B3 can be written as869
∂B3
∂TS=∂B31
∂TS+∂B32
∂TS, (32)870
where 871
∂B31
∂TS= Ke
1τ
τid
{1τ
[1+
(TS1τ− 1
)exp
(TS1τ
)]872
log2
(1+ γS11+ γS2
)+
(exp
(TS1τ
)− 1
)873
[TS log2(1+ γS2)+ ϕ(T − TS ) log2(1+ γD2)
] }. 874
(33) 875
To obtain the derivative for B32, we note that 1 ≤ 876
exp(
tτac
)≤ exp
(TSτac
)for ∀t ∈ [0,TS ]. Moreover, 877
from the results in (5) and (6) and using the definition 878
of T32 in (26), we have Pd
(1− exp
(−TSτid
))≤ T32 ≤ 879
Pd
(1− exp
(−TSτid
))exp
(TSτac
). Using these results, the first 880
derivative of B32 can be expressed as 881
∂B32
∂TS= −KePdϕ
T − 2TSτid
log2 (1+ γD2) . (34) 882
Therefore, we have obtained the first derivative ofNT and 883
we are ready to prove the first statement of Theorem 1. Sub- 884
stitute TS = 0 to the derived ∂NT∂TS
and use the approximation 885
exp (x) ≈ 1 + x, we yield the following result after some 886
manipulations 887
limTS→0
∂NT∂TS
= −K0K1 limTS→0
∂P00f
∂TS, (35) 888
where K0 =1
Tove+TKe and 889
K1 = ϕ
[T(1+
T1τ
)+T 2
τid
]log2 (1+ γD1) 890
+ϕT1ττid
log2 (1+ γD2) . (36) 891
It can be verified that K0 > 0, K1 > 0 and limTS→0
∂P00f
∂TS= 892
−∞ by using the derivations in Appendix E; hence, we have 893
limTS→0
∂NT∂TS= +∞ > 0. This completes the proof of the first 894
statement of the theorem. 895
We now present the proof for the second statement of 896
the theorem. Substitute TS = T to ∂NT∂TS
and utilize the 897
approximation exp (x) ≈ 1+ x, we yield 898
limTS→T
∂NT∂TS
=1
Tove + T
3∑i=1
∂Bi∂TS
(T ), (37) 899
where we have 900
∂B1
∂TS(T ) = Ke
(1+
T1τ
)901
×
[log2 (1+ γS1)− ϕ
(1− P00
f (T ))log2 (1+ γD1)
]902
(38) 903
∂B2
∂TS(T ) = −Ke
Tτid
log2 (1+ γS1) (39) 904
12 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
∂B31
∂TS(T ) = Ke
Tτid
[log2(1+γS1)(1+γS2)−ϕ log2(1+γD2)]905
(40)906
∂B32
∂TS(T ) = Keϕ
Tτid
Pd log2 (1+ γD2) .907
Omit all high-power terms in the expansion of exp(x)908
(i.e., xn with n > 1) where x = Txτx, Tx ∈ {T ,TS ,T − TS},909
τx ∈ {τid, τac,1τ }, we yield910
limTS→T
∂NT∂TS
≈1
Tove + T∂B1
∂TS(T ). (41)911
We consider the HDTx and FDTx modes in the fol-912
lowing. For the HDTx mode, we have ϕ = 1 and913
θ = 0. Then, it can be verified that limTS→T
∂NT∂TS
< 0914
by using the results in (38) and (41). This is because915
we have log2 (1+ γS1) −(1− P00
f (T ))log2 (1+ γD1) ≈916
log2 (1+ γS1) − log2 (1+ γD1) < 0 (since we have917
P00f (T ) ≈ 0 and γS1 ≤ γD1).918
For the FDTxmode, we have ϕ = 2, θ = 1, and also γS1 =919
PsenN0
and γD1 =Pdat
N0+I (Pdat)=
Pdat
N0+ζPξ
dat. We would like to920
define a critical value of Psen which satisfies limTS→T
∂NT∂TS= 0921
to proceed further. Using the result in (38) and (41) as well as922
the approximationP00f (T ) ≈ 0, and by solving lim
TS→T∂NT∂TS=923
0 we yield924
Psen = N0
(1+ Pdat
N0 + ζPξ
dat
)2
− 1
. (42)925
Using (38), it can be verified that if Psen > Psen then926
limTS→T
∂NT∂TS
> 0; otherwise, we have limTS→T
∂NT∂TS≤ 0. So927
we have completed the proof for the second statement of928
Theorem 1.929
To prove the third statement of the theorem, we derive the930
second derivative of NT as931
∂2NT∂T 2
S
=1
Tove + T
3∑i=1
∂2Bi∂T 2
S
, (43)932
where we have933
∂2B1
∂T 2S
= −Keϕ exp(T1τ
)log2 (1+ γD1)934
×
[(T − TS)
∂2P00f
∂T 2S
− 2∂P00
f
∂TS
], (44)935
where∂2P00
f
∂T 2S
is the second derivative of P00f and according to936
the derivations in Appendix E, we have∂2P00
f
∂T 2S> 0,
∂P00f
∂TS< 0,937
∀TS . Therefore, we yield∂2B1∂T 2
S< 0 ∀TS .938
Consequently, we have the following upper bound for ∂2B1∂T 2
S939
by omitting the term exp( T1τ
)> 1 in (44)940
∂2B1
∂T 2S
≤ Ke [h1(TS )+ h2(TS )] , (45)941
where 942
h1(TS ) = −ϕ (T − TS)∂2P00
f
∂T 2S
log2 (1+ γD1), 943
h2(TS ) = 2ϕ∂P00
f
∂TSlog2 (1+ γD1). 944
Moreover, we have 945
∂2B2
∂T 2S
=Ke1τ
τid
{−2+ TS
1τ
1τexp
(TS1τ
)log2 (1+ γS1) 946
−ϕ∂2P00
f
∂T 2S
[1τ
(exp
(TS1τ
)−exp
(T1τ
))log2
(1+γD11+γD2
)947
+ (T − TS)(exp
(T1τ
)log2(1+ γD1) 948
− exp(TS1τ
)log2(1+ γD2)
)]949
+ 2ϕ∂P00
f
∂TS
[(exp
(T1τ
)− exp
(TS1τ
))log2(1+ γD1) 950
+T − TS1τ
exp(TS1τ
)log2 (1+ γD2)
]951
−ϕ(1− P00
f
) T − TS1τ
exp(TS1τ
)log2 (1+ γD2) 952
+ϕ(1− P00
f
) 11τ
exp(TS1τ
)log2
(1+ γD11+ γD2
)}. 953
(46) 954
Therefore, we can approximate ∂2B2∂T 2
Sas follows: 955
∂2B2
∂T 2S
= Ke [h3(TS )+ h4(TS )+ h5(TS )], (47) 956
where 957
h3(TS ) = −
(2+ TS
1τ
) (1+ TS
1τ
)τid
log2 (1+ γS1) , 958
h4(TS ) = −ϕ(1− P00
f
) T−TSτid
(1+
TS1τ
)log2(1+γD2) 959
−ϕ∂2P00
f
∂T 2S
(T−TS)[Tτid
log2(1+γD1)−TSτid
log2(1+γD2)]
960
+ 2ϕ∂P00
f
∂TS
T − TSτid
[log2
(1+γD11+γD2
)+TS1τ
log2(1+γD2)], 961
h5(TS ) = ϕ(1− P00
f
) 1τid
(1+
TS1τ
)log2
(1+ γD11+ γD2
). 962
In addition, we have 963
∂2B31
∂T 2S
=Ke
τidexp
(TS1τ
){(1+
T1τ
)log2 (1+ γS1) 964
+ log2 (1+ γS2)+ ϕ(T − TS1τ
− 2)log2 (1+ γD2)
}. 965
(48) 966
VOLUME 3, 2015 13
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
We can approximate ∂2B31∂T 2
Sas follows:967
∂2B31
∂T 2S
= Ke [h6(TS )+ h6(TS )] , (49)968
where969
h6(TS ) =1τid
log2 (1+γS1) (1+γS2) ,970
h7(TS ) = −2ϕτid
log2 (1+γD2) . (50)971
Finally, we have972
∂2B32
∂T 2S
= Keh8(TS ), (51)973
where974
h8(TS ) =2ϕPdτid
log2 (1+γD2) . (52)975
The above analysis yields ∂2NT∂T 2
S= Ke
∑8i=1 hi(TS ). There-976
fore, to prove that ∂2NT∂T 2
S< 0, we should prove that h(TS ) < 0977
since Ke > 0 where978
h(TS ) =8∑i=1
hi(TS ). (53)979
It can be verified that h1(TS ) < 0 and h4(TS ) < 0, ∀TS980
because∂2P00
f
∂T 2S
> 0,∂P00
f∂TS
< 0 according to Appendix E981
and γD2 < γD1. Moreover, we have982
h3(TS ) < −2τid
log2 (1+ γS1) , (54)983
and because γS1 > γS2, we have984
h3(TS ) < −1τid
log2 (1+ γS1) (1+ γS2) = −h6(TS ). (55)985
Therefore, we have h3(TS )+h6(TS ) < 0. Furthermore, we can986
also obtain the following result h7(TS )+ h8(TS ) ≤ 0 because987
Pd ≤ 1. To complete the proof, we must prove that h2(TS )+988
h5(TS ) ≤ 0, which is equivalent to989
−2τid∂P00
f
∂TS
log2 (1+ γD1)
log2(1+γD11+γD2
) ≥ (1− P00f
)(1+
TS1τ
), (56)990
where according to Appendix E991
∂P00f
∂TS= −
γ√fsTS
2√2πTS
exp
(−
(α + γ
√fsTS
)22
), (57)992
where α = (γ1 + 1)Q−1(Pd). It can be verified that (56)993
indeed holds because the LHS of (56) is always larger than994
to 2 while the RHS of (56) is always less than 2. Hence, we995
have completed the proof of the third statement of Theorem 1.996
Finally, the fourth statement in the theorem obviously997
holds because Bi (i = 1, 2, 3) are all bounded from above.998
Hence, we have completed the proof of Theorem 1.999
APPENDIX E 1000
APPROXIMATION OF P00f AND ITS 1001
FIRST AND SECOND DERIVATIVES 1002
We can approximate Pd in (5) as follows: 1003
Pd = Q[(
ε
N0 + I− γ − 1
) √fsTS
γ1 + 1
], (58) 1004
where γ and γ1 are evaluated by a numerical method. Hence, 1005
P00f can be calculated as we set Pd = Pd , which is given as 1006
follows: 1007
P00f = Q
(α + γ
√fsTS
), (59) 1008
where α = (γ1 + 1)Q−1(Pd). 1009
We now derive the first derivative of P00f as 1010
∂P00f
∂TS= −
γ√fsTS
2√2πTS
exp
(−
(α + γ
√fsTS
)22
). (60) 1011
It can be seen that∂P00
f∂TS
< 0 since γ > 0. Moreover, the 1012
second derivative of P00f is 1013
∂2P00f
∂T 2S
=γ√fsTS
4√2πT 2
S
(1+
12yγ√fsTS
)exp
(−y2
2
), (61) 1014
where y = α + γ√fsTS . 1015
We can prove that∂2P00
f
∂T 2S> 0 by considering two different 1016
cases as follows. For the first case with α2
γ 2fs≤ TS ≤ T (0 ≤ 1017
P00f ≤ 0.5), this statement holds since y > 0. For the second 1018
case with 0 ≤ TS ≤ α2
γ 2fs(0.5 ≤ P00
f ≤ 1), y ≤ 0, then 1019
we have 0 < y − α = γ√fsTS ≤ −α and 0 ≤ −y ≤ −α. 1020
By applying the Cauchy-Schwarz inequality, we obtain 0 ≤ 1021
−y(y − α) ≤ γ 2
4 < 1 < 2; hence 1 + 12yγ√fsTS > 0. This 1022
result implies that∂2P00
f
∂T 2S> 0. 1023
REFERENCES 1024
[1] C. Cormio and K. R. Chowdhury, ‘‘A survey on MAC protocols for 1025
cognitive radio networks,’’ Ad Hoc Netw., vol. 7, no. 7, pp. 1315–1329, 1026
Sep. 2009. 1027
[2] T. Yucek and H. Arslan, ‘‘A survey of spectrum sensing algorithms for 1028
cognitive radio applications,’’ IEEE Commun. Surveys Tuts., vol. 11, no. 1, 1029
pp. 116–130, 2009. AQ:11030
[3] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, ‘‘Cognitive radio net- 1031
working and communications: An overview,’’ IEEE Trans. Veh. Technol., 1032
vol. 60, no. 7, pp. 3386–3407, Sep. 2011. 1033
[4] Y. Zou, Y.-D. Yao, and B. Zheng, ‘‘Cooperative relay techniques for cogni- 1034
tive radio systems: Spectrum sensing and secondary user transmissions,’’ 1035
IEEE Commun. Mag., vol. 50, no. 4, pp. 98–103, Apr. 2012. 1036
[5] Y.-C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang, ‘‘Sensing- 1037
throughput tradeoff for cognitive radio networks,’’ IEEE Trans. Wireless 1038
Commun., vol. 7, no. 4, pp. 1326–1337, Apr. 2008. 1039
[6] L. T. Tan and L. B. Le, ‘‘Distributed MAC protocol for cognitive radio 1040
networks: Design, analysis, and optimization,’’ IEEE Trans. Veh. Technol., 1041
vol. 60, no. 8, pp. 3990–4003, Oct. 2011. 1042
[7] L. T. Tan and L. B. Le, ‘‘Joint cooperative spectrum sensing and MAC 1043
protocol design for multi-channel cognitive radio networks,’’ EURASIP J. 1044
Wireless Commun. Netw., vol. 2014, p. 101, Dec. 2014. AQ:21045
[8] L. T. Tan and L. B. Le, ‘‘Channel assignment with access contention 1046
resolution for cognitive radio networks,’’ IEEE Trans. Veh. Technol., 1047
vol. 61, no. 6, pp. 2808–2823, Jul. 2012. 1048
14 VOLUME 3, 2015
IEEE
Proo
f
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
[9] Q. Zhao, L. Tong, A. Swami, and Y. Chen, ‘‘Decentralized cognitive1049
MAC for opportunistic spectrum access in ad hoc networks: A POMDP1050
framework,’’ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589–600,1051
Apr. 2007.1052
[10] H. Kim and K. G. Shin, ‘‘Efficient discovery of spectrum opportunities1053
withMAC-layer sensing in cognitive radio networks,’’ IEEE Trans. Mobile1054
Comput., vol. 7, no. 5, pp. 533–545, May 2008.1055
[11] F. Wang, M. Krunz, and S. Cui, ‘‘Price-based spectrum management in1056
cognitive radio networks,’’ IEEE J. Sel. Topics Signal Process., vol. 2, no. 1,1057
pp. 74–87, Feb. 2008.1058
[12] S. Haykin, D. J. Thomson, and J. H. Reed, ‘‘Spectrum sensing for cognitive1059
radio,’’ Proc. IEEE, vol. 97, no. 5, pp. 849–877, May 2009.1060
[13] E. Axell, G. Leus, E. G. Larsson, and H. V. Poor, ‘‘Spectrum sensing1061
for cognitive radio: State-of-the-art and recent advances,’’ IEEE Signal1062
Process. Mag., vol. 29, no. 3, pp. 101–116, May 2012.1063
[14] Y. R. Kondareddy and P. Agrawal, ‘‘Synchronized MAC protocol for1064
multi-hop cognitive radio networks,’’ in Proc. IEEE ICC, May 2008,1065
pp. 3198–3202.1066
[15] C. Thorpe and L. Murphy, ‘‘A survey of adaptive carrier sensing mecha-1067
nisms for IEEE 802.11 wireless networks,’’ IEEE Commun. Surveys Tuts.,1068
vol. 16, no. 3, pp. 1266–1293, 2014.1069
[16] G. Bianchi, ‘‘Performance analysis of the IEEE 802.11 distributed1070
coordination function,’’ IEEE J. Sel. Areas Commun., vol. 18, no. 3,1071
pp. 535–547, Mar. 2000.1072
[17] F. Cali, M. Conti, and E. Gregori, ‘‘Dynamic tuning of the IEEE 802.111073
protocol to achieve a theoretical throughput limit,’’ IEEE/ACM Trans.1074
Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.1075
[18] H. S. Chhaya and S. Gupta, ‘‘Performance modeling of asynchronous data1076
transfer methods of IEEE 802.11 MAC protocol,’’ Wireless Netw., vol. 3,1077
no. 3, pp. 217–234, Aug. 1997.1078
[19] I. F. Akyildiz, J. McNair, L. C. Martorell, R. Puigjaner, and Y. Yesha,1079
‘‘Medium access control protocols for multimedia traffic in wireless net-1080
works,’’ IEEE Netw., vol. 13, no. 4, pp. 39–47, Jul./Aug. 1999.1081
[20] M. Duarte, C. Dick, and A. Sabharwal, ‘‘Experiment-driven characteri-1082
zation of full-duplex wireless systems,’’ IEEE Trans. Wireless Commun.,1083
vol. 11, no. 12, pp. 4296–4307, Dec. 2012.1084
[21] E. Everett, A. Sahai, and A. Sabharwal, ‘‘Passive self-interference suppres-1085
sion for full-duplex infrastructure nodes,’’ IEEE Trans. Wireless Commun.,1086
vol. 13, no. 2, pp. 680–694, Jan. 2014.1087
[22] A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and1088
R. Wichman, ‘‘In-band full-duplex wireless: Challenges and opportu-1089
nities,’’ IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652,1090
Sep. 2014.1091
[23] D. Korpi, L. Anttila, V. Syrjala, and M. Valkama, ‘‘Widely linear digital1092
self-interference cancellation in direct-conversion full-duplex transceiver,’’1093
IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1674–1687, Sep. 2014.1094
[24] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, ‘‘Achieving single1095
channel, full duplex wireless communication,’’ in Proc. ACM 16th Annu.1096
Int. Conf. MobiCom, 2010, pp. 1–12.1097
[25] M. Jain et al., ‘‘Practical, real-time, full duplex wireless,’’ in Proc. ACM1098
17th Annu. Int. Conf. MobiCom, 2011, pp. 301–312.1099
[26] E. Hossain, L. B. Le, andD. Niyato,Radio ResourceManagement inMulti-1100
Tier Cellular Wireless Networks. New York, NY, USA: Wiley, 2013.1101
[27] L. B. Le et al., ‘‘Enabling 5G mobile wireless technologies,’’ EURASIP J.1102
Wireless Commun. Netw., vol. 2015, p. 218, Dec. 2015.1103
[28] M. Duarte et al., ‘‘Design and characterization of a full-duplex multi-1104
antenna system for WiFi networks,’’ IEEE Trans. Veh. Technol., vol. 63,1105
no. 3, pp. 1160–1177, Mar. 2014.1106
[29] S. Goyal, P. Liu, O. Gurbuz, E. Erkip, and S. Panwar, ‘‘A distributed MAC1107
protocol for full duplex radio,’’ in Proc. Asilomar Conf. Signals, Syst.,1108
Comput., Nov. 2013, pp. 788–792.1109
[30] D. Ramirez and B. Aazhang, ‘‘Optimal routing and power allocation for1110
wireless networks with imperfect full-duplex nodes,’’ IEEE Trans.Wireless1111
Commun., vol. 12, no. 9, pp. 4692–4704, Sep. 2013.1112
[31] W. Choi, H. Lim, and A. Sabharwal, ‘‘Power-controlled medium access1113
control protocol for full-duplex WiFi networks,’’ IEEE Trans. Wireless1114
Commun., vol. 14, no. 7, pp. 3601–3613, Jul. 2015.1115
[32] W. Cheng, X. Zhang, and H. Zhang, ‘‘Full-duplex spectrum-sensing 1116
and MAC-protocol for multichannel nontime-slotted cognitive radio net- 1117
works,’’ IEEE J. Sel. Areas Commun., vol. 33, no. 5, pp. 820–831, 1118
May 2015. 1119
[33] L. T. Tan and L. B. Le, ‘‘Distributed MAC protocol design for full-duplex 1120
cognitive radio networks,’’ in Proc. IEEE GLOBECOM, 2015. AQ:31121
[34] H. Kim, S. Lim, H. Wang, and D. Hong, ‘‘Optimal power allocation and 1122
outage analysis for cognitive full duplex relay systems,’’ IEEE Trans. 1123
Wireless Commun., vol. 11, no. 10, pp. 3754–3765, Oct. 2012. 1124
[35] J. Bang, J. Lee, S. Kim, and D. Hong, ‘‘An efficient relay selection strategy 1125
for random cognitive relay networks,’’ IEEE Trans. Wireless Commun., 1126
vol. 14, no. 3, pp. 1555–1566, Mar. 2015. 1127
[36] G. Zheng, I. Krikidis, and B. Ottersten, ‘‘Full-duplex cooperative cogni- 1128
tive radio with transmit imperfections,’’ IEEE Trans. Wireless Commun., 1129
vol. 12, no. 5, pp. 2498–2511, May 2013. 1130
LE THANH TAN (S’11–M’15) received the 1131
B.Eng. and M.Eng. degrees from the Ho Chi Minh 1132
City University of Technology, in 2002 and 2004, 1133
respectively, and the Ph.D. degree from the Institut 1134
National de la Recherche Scientifique–Énergie 1135
Matériaux Télécommunications, Canada, in 2015. 1136
He was a Lecturer with the Ho Chi Minh City 1137
University of Technical Education from 2002 to 1138
2010. He is currently a Post-Doctoral Research 1139
Associate with the École Polytechnique de 1140
Montréal, Canada. His current research activities focus on Internet of Things 1141
(IoT over LTE/LTE-A network, cyber-physical systems, big data, distributed 1142
sensing, and control), time series analysis and dynamic factor models 1143
(stationary and non-stationary), wireless communications and networking, 1144
cloud-RAN, cognitive radios (software defined radio architectures, proto- 1145
col design, spectrum sensing, detection, and estimation), statistical signal 1146
processing, random matrix theory, compressed sensing, and compressed 1147
sampling. He has served on TPCs of different international conferences, 1148
including the IEEE CROWNCOM, VTC, and PIMRC. 1149
AQ:4
LONG BAO LE (S’04–M’07–SM’12) received 1150
the B.Eng. degree in electrical engineering from 1151
the Ho Chi Minh City University of Technology, 1152
Vietnam, in 1999, the M.Eng. degree in telecom- 1153
munications from the Asian Institute of Technol- 1154
ogy, Thailand, in 2002, and the Ph.D. degree in 1155
electrical engineering from the University of Man- 1156
itoba, Canada, in 2007. He was a Post-Doctoral 1157
Researcher with the Massachusetts Institute of 1158
Technology (2008–2010) and the University of 1159
Waterloo (2007–2008). Since 2010, he has been with the Institut National 1160
de la Recherche Scientifique, Université du Québec, Montréal, QC, Canada, 1161
where he is currently an Associate Professor. He has co-authored the 1162
book entitled Radio Resource Management in Multi-Tier Cellular Wireless 1163
Networks (Wiley, 2013). His current research interests include smart grids, 1164
cognitive radio, radio resource management, network control and optimiza- 1165
tion, and emerging enabling technologies for 5G wireless systems. He is 1166
a member of the Editorial Board of the IEEE TRANSACTIONS ON WIRELESS 1167
COMMUNICATIONS, the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, and 1168
the IEEE WIRELESS COMMUNICATIONS LETTERS. He has served as a Technical 1169
ProgramCommittee Chair/Co-Chair for several IEEE conferences, including 1170
the IEEE WCNC, the IEEE VTC, and the IEEE PIMRC. 1171
1172
VOLUME 3, 2015 15