Providing Some Minimum Guarantee for Real

Providing Some Minimum Guarantee for Real-time
Secondary Users in Cognitive Radio Sensor
Networks
Michael Okopa
Changa Andrew
Tonny Bulega
International University
of East Africa,
Faculty of Science and Technology,
Kampala, Uganda
[email protected]
Makerere University,
Kampala, Uganda
[email protected]
Makerere University,
Kampala, Uganda
[email protected]
Abstract—Previous studies of real-time traffic in Cognitive
Radio Sensor Networks(CRSNs) were done using reservationbased method and an absolute priority method. In the absolute
priority method, the traffic is classified as primary, real-time
secondary user, and Best Effort (BE) secondary user. These
studies were done under the assumption that primary user’s
traffic arrive at a low rate. However, under high arrival rate of
primary user traffic, real-time secondary user traffic is starved.
In this study, we developed an analytical model of source-tosink delay in a CRSN that differentiates the service of users into
primary and secondary and further partitions secondary user’s
traffic into real-time and BE. During service, primary traffic is
given higher priority over real-time secondary user which in turn
has higher priority over BE secondary traffic. In this model, a
threshold is introduced on the number of primary user packets
served to reduce the starvation of real-time secondary users under
high arrival rate of primary user traffic. The numerical results
obtained from the derived models show that real-time secondary
users experience a reduction in source-to-sink delay as a result of
introducing a threshold on the number of primary user packets
served. On the other hand, the primary user packets experience
a higher source-to-sink delay. However, the reduction in sourceto-sink delay experienced by real-time secondary user is lower
than the increase in source-to-sink delay experienced by primary
user traffic.
Index Terms—absolute priority; best effort;real-time; sourceto-sink delay;
I. INTRODUCTION
Wireless sensor networks (WSNs) are special networks with
large number of nodes consisting of embedded processors,
sensors, and radios. A typical sensor network consists of
a large number of sensor nodes deployed either inside the
phenomenon of interest or close to it. Romer et al. [1] defines a
wireless sensor network as an ad hoc multi-hop network which
consists of large number of tiny homogeneous sensor nodes
that are resource-constrained, mostly immobile and randomly
deployed in the area of interest.
The main purpose of sensor networks is to provide users
access to the information gathered by spatially distributed sensors, rather than enabling end-to-end communication between
pairs of nodes as in other large-scale networks such as the
Internet or wireless mesh networks.
Sensor nodes collaborate on real-time monitoring, sensing,
collecting network distribution of the various environments
within the region or monitoring object information [2]. Due to
limited transmission range of sensor nodes, the sensory data
are delivered to a processing center, called sink node, through
multi-hop communication meaning that each sensor node plays
the role of being a data originator and a data router. This
information is then processed to obtain useful data, which is
then sent to the user [3].
To reduce delay in data delivery that happens through multihop communication, sensor nodes form clusters and a cluster
head is selected for each cluster [4]. Instead of the data being
relayed by every node along a particular path, data is passed
from the source node to the cluster head, thus reducing the
number of nodes through which data is relayed.
WSNs work in the license-free band, hence vulnerable to
suffer from heavy interference caused by other networks sharing the same spectrum [2], [3]. To overcome this challenge,
cognitive radio network has been suggested as a promising
approach to reduce interference [5]. Cognitive Radio (CR)
networks provide efficient utilization of the radio spectrum and
highly reliable communication to users whenever and wherever
needed. In the event that the licensed owner also referred to
as primary user (PU) is not utilizing the channel, the channel
can be used by the unlicensed user also called secondary user
(SU) without jeopardizing the service quality of the primary
user [6].
Combining WSN and cognitive radio can overcome the
challenge of providing users access to information as well
as reducing interference caused by other networks sharing the
same spectrum. There has been some efforts on combining
WSNs and cognitive radio technology [7], [8].
Providing minimum guarantee in CRSNs is of great importance for example in health care, a packet indicating an
abnormal event of a patient should reach the doctor as soon
as possible. In environmental monitoring, a wireless smoke
sensor should provide real-time recognition of the smoke.
Two methods have been proposed for prioritizing the realtime traffic over the best effort (BE) traffic in the Cognitive Radio Sensor Network (CRSN), that is reservation-based
method [9] and an absolute priority method [10], [11]. In the
reservation-based method [10], each type of traffic can only
be served when a channel is available during the pre-allocated
time intervals. On the other hand, in the absolute priority
method [11], the real-time traffic can be served whenever a
channel is available (when the primary user is not using the
channel), and the BE traffic can only be served when there
is no buffered real-time traffic. However, under high arrival
rate of primary user traffic, real-time secondary user traffic is
starved.
In this paper, we derive models for source-to-sink delay in
CRSNs while delaying primary user so as to serve real-time
secondary user.
The contributions of this paper are two fold. Firstly, this
research proposes an analytical model that differentiates the
service of users in a CRSN based on absolute priority. In
addition, this model provides minimum guarantee to realtime secondary users under high arrival rate of primary users.
Secondly, this research evaluated how the proposed model
improves the performance of real-time secondary user without
appreciably degrading the performance of primary user.
The rest of the paper is organized as follows: in the
next section, we present the system models. We evaluate the
proposed models in section III, and finally conclude the paper
in section IV.
II. SYSTEM MODELS
We consider a cognitive radio sensor network. When a
frequency channel is available, all transmissions between the
sensors and the Channel Head (CH) are assumed to be errorfree. Co-channel interference between different clusters can
be avoided in different ways. First, a different set of candidate channels can be assigned to neighboring clusters if the
number of candidate channels is sufficiently large. Secondly,
if neighboring clusters have to share the same set of candidate
channels, their CHs may sense the channels in different orders
so that they will find different available channels with a high
probability. If neighboring clusters have to share the same
frequency channel, simultaneous transmissions can be avoided
by carefully coordinating the timelines of the clusters using
similar models as in [12], [13].
Figure 1 and figure 2 shows the single-cluster queue model
and multi-cluster queue model respectively. For the case of
single-cluster, traffic traverses only one cluster head before
reaching the sink, while for the case of multi-cluster, traffic
traverses two or more cluster heads before reaching the sink.
Fig. 2.
Multi-cluster queue model
In multi cluster transmissions, both real-time and best effort
data collected by the CH from the sensors are forwarded
to the next hop CH and further to the sink. The CRSN
opportunistically accesses vacant channels in a spectrum. Each
cluster requires only one available frequency channel at any
time due to the fact that the CH has only one radio for data
communications. The CRSN is assumed to have a primary
user which has one type of traffic, whereas the secondary user
has both real-time and best effort traffic. In order to keep short
the source-to-sink delay, real-time traffic collected by the CH
will be given higher priority over best effort traffic. We assume
the prioritization of real-time traffic is only done at the first
cluster-head and the rest of the cluster-heads perform only the
forwarding function along a particular path to the sink.
In addition to collecting data from the sensors, the CH is
also responsible for sensing available channels from a number
of candidate channels, allocating radio resources, and sending
control signals to the sensors. The sensor nodes have to switch
between different channels depending on channel availability.
The arrival of all traffic to each node is assumed to follow a
Poisson process with mean arrival rate, λ per node. The service
time at each node is assumed to be exponentially distributed.
Buffer capacity of each node is assumed to be finite. Both
real-time traffic and best effort (BE) data traffic can be served,
but the real-time traffic is given a higher priority. In order to
achieve small transmission delay, the real-time traffic is served
with contention-free transmissions using the IEEE 802.15.4
MAC protocol, which is commonly used for WSNs [9].
In the next section, we derive the expression for source-tosink delay.
A. source-to-sink delay models
Fig. 1.
Single-cluster queue model
Source-to-sink delay consists of the following delays; transmission delay, propagation delay, and queuing delay. Of these
components, queuing delay is the most difficult to model. We
use Jackson’s theorem [2] to model the delay experienced
by the Cluster-Heads (CHs) in a multi clustered network.
Jackson’s theorem states that in a network of queues, each
node is an independent queuing system, with a Poisson input
determined by the principles of partitioning, merging, and
tandem queuing. The theorem is based on three assumptions:
(i) The queuing network consists of m nodes, each of which
provides an independent exponential service.
(ii) Items arriving from outside the system to any one of the
nodes arrive with a Poisson rate.
(iii) Once served at a node, a packet goes to one of the
other nodes with a fixed probability, or it goes out of
the system.
We model each node using the M/M/1/k queue system
separate from the others. Mean delay at each node is then
added to derive the total node delays.
by packets in one cluster is therefore given as:
⎛
⎞
k−(i+1)
2
λE[τPi ]
λE[τR2 ]
⎠+
E[TRQ ] = ⎝
2(1 − λPi /E[τPi ])
2(1 − λR /E[τR ])
B. Source-to-sink delay with threshold
(4)
The performance of BE secondary traffic is the same,
whether the threshold is applied or not. This is because BE
secondary user traffic packets have to wait for the queue of
primary user and real-time secondary user to be empty before
receiving service.
Under high arrival rate of primary users, real-time secondary
users can be starved. Therefore, we employ a threshold on
the number of primary user packets served before serving
real-time secondary user packets. In doing this, real-time
secondary users receive minimum guarantee, that is, they can
still receive service even when there are primary user packets
in the queue. The result of this is that the primary user delay
is increased while the delay for real-time secondary user is
reduced. However, the delay for non real-time secondary users
remain the same whether a threshold is applied or not.
1) Source-to-sink delay for primary user’s packets: The
Source-to-sink delay of a primary user packet consists of the
following delays: Transmission delay, propagation delay, the
waiting time in queue of a primary user packet, and the waiting
time due to service of real-time secondary user packets which
do not have to wait for the service of other primary user
packets. We take a worst case scenario where the primary
user finds a real-time secondary user in service.
Therefore, the queuing delay experienced by primary user
packets in one cluster is given as:
k
λE[τP2i ]
λE[τR2 i ]
E[TPQ ] =
+
2(1 − λPi /E[τPi ]) i=1 2(1 − λRi /E[τRi ])
(1)
where k is the number of real-time secondary packets that
have to be served before servicing primary user packets.
The source-to-sink delay, E[SSD] of primary packets with
threshold is therefore:
E[SSD] =
L
d
+ +
R
s
k
λE[τR2 i ]
1
λE[τP2 ]
+
+
E[τP ] 2(1 − λP /E[τP ]) i=1 2(1 − λRi /E[τRi ])
i=0
(3)
The source-to-sink delay, E[SSD] of real-time secondary
user packets with threshold is therefore:
L
d
E[SSD] =
+ +
R
s
⎞
⎛
k−(i+1)
λE[τP2i ]
1
λE[τR2 ]
⎠+
⎝
+
2(1 − λPi /E[τPi ])
E[τR ] 2(1 − λR /E[τR])
i=0
C. Source-to-sink delay without threshold
The source-to-sink delay for primary user’s packets without
threshold can be deduced from [14] as:
L
d
1
λE[τP2 ]
E[SSD] =
+ +
+
(5)
R
s
E[τP ] 2(1 − λP /E[τP ])
On the other hand, the source-to-sink delay for real-time
secondary user packet can also be deduced from [14] as:
E[SSD] =
L
d
+ +
R
s
1
λE[τR2 ]
+
+
E[τR ] 2(1 − λR /E[τR ])
i=1
(6)
In the next section, we present numerical results showing
the performance of the source-to-sink delay models.
k λE[τP2i ]
2(1 − λPi /E[τPi ])
III. PERFORMANCE EVALUATION
In this section, we use the derived models to evaluate its
performance. In particular, we analyze the variation of sourceto-sink delay with arrival rate of packets, and number of
cluster heads. In each case, we consider primary user, real-time
secondary user traffic, and secondary user best effort traffic.
A. Model Parameters
(2)
2) Source-to-sink delay for real-time secondary user’s packets: In this case, the Source-to-sink delay of real-time secondary user packets consist of the following delays: Transmission delay, propagation delay, the queuing delay due to
some primary user packets and queuing delay due to real-time
secondary user packets. The total queuing delay experienced
Table I shows the basic mathematical symbols used in the
analysis.
TABLE I
BASIC MATHEMATICAL SYMBOLS USED IN THE ANALYSIS
Parameter
ρR
ρBE
λR
λBE
ρ
Meaning
Load due to Real-time secondary user traffic
Load due to best effort secondary user traffic
Arrival rate of real-time secondary user traffic
Arrival rate of best effort secondary user traffic
Load
Value
5
260ms
10 packets/second
7.5Mbits
1.5Mbps
2km
3 ∗ 108ms−1
ρ =0.5 and ρ
R
7
6.5
6
5.5
0
Fig. 3.
load
Source−to−sink delay (ms)
Source−to−sink delay (ms)
7.5
8.5
PU without threshold
PU with threshold=1
PU with threshold=2
0.5
Load due to primary user packets
1
PU without threshold
PU with threshold=1
PU with threshold=2
8
7.5
7
6.5
6
5.5
0
0.5
Load due to primary user packets
7.5
Real−time SU without threshold
Real−time SU with threshold=1
7
Real−time
SU with threshold=2
7
6.5
6
5.5
0.5
1
Load due to primary user packets
6.5
6
5.5
0
0.5
Load due to primary user packets
1
Fig. 4. Source-to-sink delay for real-time secondary user as a function of
primary user load
ρR=0.9 and ρBE=0.9
=0.5
BE
8
7.5
5
0
1) Variation with load : In this case we investigate the
increase in delay of primary users and decrease in delay
of real-time secondary users with increase in load. We used
equations 5, 2 and 6 and 4 to plot graphs of source-to-sink
delay as a function of primary user’s load.
8
ρR=0.9 and ρBE=0.9
=0.5
BE
1
Source-to-sink delay for primary user as a function of primary user
Figure 3 shows a graph of source-to-sink delay for primary
user as a function of primary user load when the load due to
real-time secondary user and BE secondary user is fixed. We
observe that source-to-sink delay increases with increase in
load due to primary user. We also observe that the higher the
threshold, the higher the source-to-sink delay. For example for
low load of real-time and BE secondary users, that is ρ = 0.5,
when the load due to primary user is 0.5 the source-to-sink
delay increases by 0.02ms when the threshold is one, while
when the threshold is two the source-to-sink delay increases
by 0.03ms. On the other hand, when the load of real-time
and BE secondary users is put at ρ = 0.9 and the load due
to primary user is 0.5 the source-to-sink delay increases by
0.77ms when the threshold is one, while when the threshold is
two the source-to-sink delay increases by 0.96ms. The sourceto-sink delay of primary user also increases with increase in
load due to real-time and BE secondary users.
Figure 4 shows a graph of source-to-sink delay for realtime secondary user as a function of primary user load when
the load due to real-time secondary user and BE secondary
user is fixed. We observe that source-to-sink delay increases
with increase in load due to primary user. We also observe
that the higher the threshold, the higher the source-to-sink
delay reduces. For example for low load of real-time and
BE secondary users, that is ρ = 0.5, when the load due to
primary user is 0.5 the source-to-sink delay reduces by 0.02ms
when the threshold is one, while when the threshold is two the
source-to-sink delay reduces by 0.08ms. On the other hand,
when the load due to real-time and BE secondary users is put at
ρ = 0.9 and the load due to primary user is 0.5 the source-tosink delay reduces by 0.15ms when the threshold is one, while
when the threshold is two the source-to-sink delay reduces by
0.66ms. The source-to-sink delay of real-time secondary user
reduces further with increase in load due to real-time and BE
secondary users traffic.
2) Variation with arrival rate : In this section, we investigate the increase in delay of primary users traffic and decrease
in delay of real-time secondary users traffic with increase in
arrival rate of primary users traffic. We use equations 5, 2 and
6 and 4 to plot graphs of source-to-sink delay as a function
of arrival rate of primary user traffic.
λ =λ
R
λ =λ
=4 packets/second
BE
R
16
14
18
PU without threshold
PU when threshold=1
PU when threshold=2
Source−to−sink delay (ms)
Number of cluster heads
Packet inter arrival time
Average service rate
Average packet length
Transmission rate
Distance between two nodes
Propagation speed
Source−to−sink delay (ms)
Parameter
R
Source−to−sink delay (ms)
TABLE II
E VALUATION PARAMETERS
ρ =0.5 and ρ
8
Source−to−sink delay (ms)
Table II shows the hypothetical parameters used in the
analysis which is consistent with parameters used in literature
[14].
12
10
8
6
4
0
5
10
Arrival rate of PU packets (packets/second)
16
=9 packets/second
BE
PU without threshold
PU when threshold=1
PU when threshold=2
14
12
10
8
6
4
0
5
10
Arrival rate of PU packets (packets/second)
Fig. 5. Source-to-sink delay for primary user as a function of arrival rate of
primary user traffic
We observe from figure 5 that source-to-sink delay for
primary user generally increases with increase in arrival rate
of primary user traffic. We also observe that at low arrival
rate (4 packets/second) of real-time and BE secondary users,
the performance of primary user packets are almost the same
when the threshold is applied and when the threshold is not
applied. This implies that introducing a threshold when the
arrival rate of primary users is low has no significant effect
on the performance of the system. However, when the arrival
rate of real-time and BE secondary users are increased to
9 packets/second, the source-to-sink delay of primary user
traffic increases by 1ms when the threshold is one and by
2ms when the threshold is two at primary user arrival rate of
5 packets/second.
λR= λBE=9 packets/second
=4 packets/second
BE
11
Source−to−sink delay (ms)
Source−to−sink delay (ms)
Real−time SU without threshold
Real−time
10 SU when threshold=1
Real−time SU when threshold=2
14
12
10
8
6
9
8
(a) ρ =0.9 and ρ
7
R
4
6
0
5
10
0
5
10
Arrival rate of PU packets (packets/second) Arrival rate of PU packets (packets/second)
Fig. 6. Source-to-sink delay for real-time secondary user as a function of
arrival rate of primary user
We observe from figure 6 that source-to-sink delay for
real-time secondary user generally increases with increase in
arrival rate of primary user traffic. We also observe that at low
arrival rate (4 packets/second) of real-time and BE secondary
users, the reduction in source-to-sink delay is low. However,
when the arrival rate of real-time and BE secondary users are
increased to 9 packets/second, the source-to-sink delay of realtime secondary user increases by 0.2ms when the threshold is
one and by 0.4ms when the threshold is two. The reduction in
source-to-sink delay is more pronounced at high arrival rate
of real-time and BE secondary user traffic.
B. Tradeoff
In this section, we investigate the tradeoff between the
increase in source-to-sink delay experienced by primary user
traffic and the reduction in source-to-sink delay experienced by
real-time secondary users as a result of introducing a threshold.
We use equations 2 and 4 to plot graphs 7 to 10.
(a) ρ =0.5 and ρ
R
(b) ρ =0.5 and ρ
=0.5
BE
R
PU without threshold
PU with threshold=1
Source−to−sink delay (ms)
Source−to−sink delay (ms)
8
7.5
7
6.5
6
5.5
0
0.5
Load due to primary user packets
1
(b) ρ =0.9 and ρ
=0.9
R
BE
8
=0.5
BE
8
Real−time SU without threshold
Real−time SU with threshold=1
7.5
7
6.5
6
5.5
0
0.5
Load due to primary user packets
1
Fig. 7. Source-to-sink delay as a function of primary user load, at low
secondary user load
Figure 7(a) shows a graph of source-to-sink delay for
primary user as a function of primary user load, when the
PU without threshold
PU with threshold=1
7.5
7
6.5
6
5.5
0
0.5
1
Load due to primary user packets
Source−to−sink delay (ms)
R
Source−to−sink delay (ms)
λ =λ
16
load due to real-time and non BE secondary user traffic are
fixed at low load, ρ = 0.5, while figure 7(b) shows a graph of
source-to-sink delay for real-time secondary user as a function
of primary user load, when the load due to real-time and
BE secondary user traffic are fixed at low load, ρ = 0.5.
We observe that source-to-sink delay generally increases with
increase in primary user load. We also observe that the increase
in source-to-sink delay experienced by primary user is 0.1ms
at primary user load of 0.5 while the decrease in source-tosink delay experienced by real-time secondary user is 0.3ms
at the same primary user load.. Therefore, the reduction in
source-to-sink delay experienced by real-time secondary user
is more than the increase in source-to-sink delay experienced
by primary user at low load.
=0.9
BE
8
Real−time SU without threshold
Real−time SU with threshold=1
7.5
7
6.5
6
5.5
0
0.5
1
Load due to primary user packets
Fig. 8. Source-to-sink delay as a function of primary user load, at high
secondary user load
Figure 8(a) shows a graph of source-to-sink delay for
primary user as a function of primary user load, when the
load due to real-time and BE secondary user traffic are fixed
at high load, ρ = 0.9, while figure 8(b) shows a graph of
source-to-sink delay for real-time secondary user as a function
of primary user load, when the load due to real-time and BE
secondary user traffic are fixed at high load, ρ = 0.9. We
observe that the source-to-sink delay generally increases with
increase in primary user load. We also observe that the increase
in source-to-sink delay experienced by primary user is 0.6ms
at a primary user load of 0.5 while the decrease in source-tosink delay experienced by real-time secondary user is 0.2ms
at the same primary user load. Therefore, the reduction in
source-to-sink delay experienced by real-time secondary user
is less than the increase in source-to-sink delay experienced
by primary user traffic at high load.
We observe from figure 9(a) that for low arrival rate of realtime and BE secondary users traffic, the increase in source-tosink delay experienced by primary users is low compared to
the reduction in source-to-sink delay experienced by real-time
secondary users observed in 9(b). For example, at primary
user arrival rate of 5 packets/second, the source-to-sink delay
experienced by primary user is the same with or without
the threshold, while for real-time secondary user, there is a
reduction in source-to-sink delay of 0.1ms at the same arrival
rate.
We observe from figure 10 that for high arrival rate of real-
(a) λR= λBE=4 packets/second
(b) λR= λBE=4 packets/second
PU without threshold
PU when threshold=1
14
Source−to−sink delay (ms)
Source−to−sink delay (ms)
16
12
10
8
6
4
0
5
8
6
5
10
Source-to-sink delay as a function of arrival rate of primary user
λ =λ
R
λ =λ
=9 packets/second
BE
R
PU without threshold
PU when threshold=1
14
Source−to−sink delay (ms)
Source−to−sink delay (ms)
10
Arrival rate of PU (packets/second)
16
12
10
8
6
4
0
5
10
Arrival rate of PU (packets/second)
Fig. 10.
traffic
12
4
0
10
Arrival rate of PU (packets/second)
Fig. 9.
traffic
16
Real−time SU without threshold
Real−time SU when threshold=1
14
=9 packets/second
BE
R EFERENCES
12
10
8
5
ACKNOWLEDGMENT
This work was partially funded by the International University of East Africa, Kampala, Uganda Research Fund.
16
Real−time SU without threshold
Real−time SU when threshold=1
14
6
0
high arrival rate. However, at low arrival rate of packets into
the system, the reduction in source-to-sink delay experienced
by real-time secondary user is higher than the increase in
source-to-sink delay experienced by primary user traffic.
Therefore, we conclude that service differentiation and
inclusion of threshold can improve the performance of realtime secondary user at an appreciably low degradation to the
primary user.
However, the potential bottleneck to the implementation of
service differentiation is the computational overhead necessary
to identify which type of user to give service.
10
Arrival rate of PU (packets/second)
Source-to-sink delay as a function of arrival rate of primary user
time and BE secondary user’s traffic, the increase in sourceto-sink delay experienced by primary users is about 0.8ms
compared to the reduction in source-to-sink delay experienced
by real-time secondary user which is approximately 0.4ms.
Therefore, we conclude that the reduction in source-to-sink
delay experienced by real-time secondary users is achieved
at no cost at low arrival rate of real-time and BE secondary
user traffic. However, the reduction in source-to-sink delay
experienced by real-time traffic at high arrival rate of realtime and BE secondary user traffic is less than the increase in
source-to-sink delay experienced by primary user traffic.
IV. C ONCLUSION
An analytical model of source-to-sink delay is developed for
a CRSN that differentiates the service of users into primary
and secondary and further partitions secondary user into realtime and BE. During service, the first priority is given to
primary user, second priority to real-time secondary user and
third priority is given to BE secondary user.
We observe that real-time secondary users experience a
reduction in source-to-sink delay as a result of introducing
a threshold on the number of primary user packets served. On
the other hand, the primary user packets experience a higher
source-to-sink delay as a result of the introduction of the
threshold. The reduction in source-to-sink delay experienced
by real-time secondary user is lower than the increase in
source-to-sink delay experienced by primary user traffic at
[1] K. Romer and F. Mattern, “The design space of wireless sensor networks,” in Proc.IEEE Wireless Communications, vol. 11, no. 6, Dec.
2004, pp. 54–61.
[2] L. Angrisani, M. Bertocco, D. Fortin, and A. Sona, “Experimental study
of coexistence issues between IEEE 802.11b and IEEE 802.15.4 wireless
networks,” in Proc. IEEE Trans. Instrumentation and Measurement,
vol. 57, no. 8, 2008, pp. 1514–1523.
[3] S. Pollin, I. Tan, B. Hodge, C. Chun, and A. Bahai, “Harmful coexistence between 802.15.4 and 802.11: a measurement-based study,”
3rd International Conference on Cognitive Radio Oriented Wireless
Networks and Communications (CrownCom), pp. 1–6, 2008.
[4] S. Tang, “An Analytical Traffic Flow Model for Cluster-based Wireless
Sensor Networks,” in Proc. IEEE, 2006.
[5] FCC, “Report of the spectrum efficiency working group,” FCC Spectrum
Policy Task Force, Tech. Rep, Nov. 2002.
[6] A. Garhwal and P. P. Bhattacharya, “ Dynamic Spectrum Access in
Cognitive Radio: a brief review,” pp. 149–153, 2011.
[7] O. Akan, O. Karli, and O. Ergul, “Cognitive radio sensor networks,” in
Proc. IEEE Networks, vol. 23, no. 4, Jul. 2009, pp. 34–40.
[8] K. A. Yau, P. Komisarczuk, and P. D. Teal, “Cognitive radio-based
wireless sensor networks: conceptual design and open issues,” in Proc.
IEEE 34th Conference on Local Computer Networks (LCN), Zurich,
Switzerland, 2009, pp. 955–962.
[9] Z. Liang, S. Feng, D. Zhao, and X. Shen, “Delay Performance Analysis
for Supporting Real-Time Traffic in a Cognitive Radio Sensor Network,”
in Proc. IEEE Transactions on Wireless Communications, vol. 10, no. 1,
Jan. 2011, pp. 325–335.
[10] Z. Liang and D. Zhao, “Quality of service performance of a cognitive
radio sensor network,” in Proc. IEEE International Conference on
Communications (ICC), Cape Town, South Africa, May 2010, pp. 1–
5.
[11] S. Feng and D. Zhao, “Design and performance analysis of a cognitive
radio sensor network,” in Proc. IEEE Wireless Communications and
Networking Conference (WCNC), Sydney, Australia, Apr. 2010.
[12] F. Zhang, T. D. Todd, D. Zhao, and V. Kezys, “Power saving access
points for IEEE 802.11 wireless network infrastructure,” in Proc. IEEE
Transactions on Mobile Computing, vol. 5, no. 2, Feb. 2006, pp. 144–
156.
[13] D. Zhao, J. Zou, and T. D. Todd, “Admission control with load balancing
in IEEE 802.11-based ESS mesh networks,” in Proc. Wireless Networks,
vol. 13, 2007, pp. 351–359.
[14] P. Kaur, A. Khosla, and M. Uddin, “Markovian Queuing Model for
Dynamic Spectrum Allocation in Centralized Architecture for Cognitive
Radios,” in Proc. International Journal of Engineering and Technology,
IJET, vol. 3, no. 1, Feb. 2011, pp. 96–101.