SlideShare a Scribd company logo
IEEEProof
Received November 8, 2015, accepted December 10, 2015. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2015.2509449
Design and Optimal Configuration of Full-Duplex
MAC Protocol for Cognitive Radio Networks
Considering Self-Interference
LE THANH TAN, (Member, IEEE), AND LONG BAO LE, (Senior Member, IEEE)
Institut National de la Recherche Scientifique-Énergie, Matériaux et Télécommunications, Université du Québec, Montreal, QC J3X 1S2, Canada
Corresponding author: L. T. Le (long.le@emt.inrs.ca)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
ABSTRACT In this paper, we propose an adaptive medium access control (MAC) protocol for
full-duplex (FD) cognitive radio networks in which FD secondary users (SUs) perform channel contention
followed by concurrent spectrum sensing and transmission, and transmission only with maximum power
in two different stages (called the FD sensing and transmission stages, respectively) in each contention
and access cycle. The proposed FD cognitive MAC (FDC-MAC) protocol does not require synchronization
among SUs, and it efficiently utilizes the spectrum and mitigates the self-interference in the FD transceiver.
We develop a mathematical model to analyze the throughput performance of the FDC-MAC protocol, where
both half-duplex (HD) transmission and FD transmission modes are considered in the transmission stage.
Then, we study the FDC-MAC configuration optimization through adaptively controlling the spectrum
sensing duration and transmit power level in the FD sensing stage. We prove that there exists optimal sensing
time and transmit power to achieve the maximum throughput, and we develop an algorithm to configure
the proposed FDC-MAC protocol. Extensive numerical results are presented to illustrate the optimal
FDC-MAC configuration and the impacts of protocol parameters and the self-interference cancellation
quality on the throughput performance. Moreover, we demonstrate the significant throughput gains of the
FDC-MAC protocol with respect to the existing HD MAC and single-stage FD MAC protocols.
16
17
18
INDEX TERMS Asynchronous MAC, full-duplex MAC, full-duplex spectrum sensing, optimal
sensing duration, throughput maximization, self-interference control, full-duplex cognitive radios,
throughput analysis.
I. INTRODUCTION19
Engineering MAC protocols for efficient sharing of white20
spaces is an important research topic in cognitive radio21
networks (CRNs). One critical requirement for the cognitive22
MAC design is that transmissions on the licensed frequency23
band from primary users (PUs) should be satisfactorily pro-24
tected from the SUs’ spectrum access. Therefore, a cognitive25
MAC protocol for the secondary network must realize both26
the spectrum sensing and access functions so that timely27
detection of the PUs’ communications and effective spectrum28
sharing among SUs can be achieved. Most existing research29
works on cognitive MAC protocols have focused on the30
design and analysis of HD MAC (e.g., see [1]–[4] and the31
references therein).32
Due to the HD constraint, SUs typically employ a33
two-stage sensing/access procedure where they perform34
spectrum sensing in the first stage before accessing35
available spectrum for data transmission in the second 36
stage [5]–[11]. The HD constraint also requires SUs be syn- 37
chronized during the spectrum sensing stage, which could 38
be difficult to achieve in practice. In fact, spectrum sensing 39
enables SUs to detect white spaces that are not occupied by 40
PUs [2]–[8], [12], [13]; therefore, imperfect spectrum sens- 41
ing can reduce the spectrum utilization due to failure in 42
detecting white spaces and potentially result in collisions 43
with active PUs. Consequently, sophisticated design and 44
parameter configuration of cognitive MAC protocols must be 45
conducted to achieve good performance while appropriately 46
protecting PUs [1], [6]–[11], [14]. As a result, traditional 47
MAC protocols [15]–[19] adapted to the CRN may not 48
provide satisfactory performance. 49
In general, HD MAC protocols may not exploit white 50
spaces very efficiently since significant sensing time may 51
be required, which would otherwise be utilized for data 52
VOLUME 3, 2015
2169-3536 
 2015 IEEE. Translations and content mining are permitted for academic research only.
Personal use is also permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
1
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
transmission. Moreover, SUs may not timely detect the PUs’53
activity during their transmissions, which can cause severe54
interference to active PUs. Thanks to recent advances on55
FD technologies, a FD radio can transmit and receive56
data simultaneously on the same frequency band [20]–[25].57
In fact, the FD technology can be integrated into58
next-generation wireless networks, e.g., small cell networks59
and heterogeneous wireless networks [26], [27], to signifi-60
cantly enhance the network performance. One of the most61
critical issues of wireless FD communication is the presence62
of self-interference, which is caused by power leakage from63
the transmitter to the receiver of a FD transceiver. The64
self-interference may indeed lead to serious communication65
performance degradation of FD wireless systems. Despite66
recent advances on self-interference cancellation (SIC) tech-67
niques [21]–[23] (e.g., propagation SIC, analog-circuit SIC,68
and digital baseband SIC), self-interference still exists due69
to various reasons such as the limitation of hardware and70
channel estimation errors.71
A. RELATED WORKS72
There are some recent works that propose to exploit the73
FD communications for MAC-level channel access in multi-74
user wireless networks [25]–[31]. In [25], the authors develop75
a centralized MAC protocol to support asymmetric data76
traffic where network nodes may transmit data packets of77
different lengths, and they propose to mitigate the hidden78
node problem by employing a busy tone. To overcome this79
hidden node problem, Duarte et al. propose to adapt the80
standard 802.11 MAC protocol with the RTS/CTS handshake81
in [28]. Moreover, Goyal et al. in [29] extend this study82
to consider interference between two nodes due to their83
concurrent transmissions. Different from conventional84
wireless networks, designing MAC protocols in CRNs is85
more challenging because the spectrum sensing function86
must be efficiently integrated into the MAC protocol.87
In addition, the self-interference must be carefully addressed88
in the simultaneous spectrum sensing and access to mitigate89
its negative impacts on the sensing and throughput90
performance.91
The FD technology has been employed for more efficient92
spectrum access design in cognitive radio networks [32]–[35]93
where SUs can perform sensing and transmission simulta-94
neously. In [32], a FD MAC protocol is developed which95
allows simultaneous spectrum access of the SU and PU net-96
works where both PUs and SUs are assumed to employ the97
p-persistent MAC protocol for channel contention resolu-98
tion and access. This design is, however, not applicable99
to the hierarchical spectrum access in the CRNs where100
PUs should have higher spectrum access priority compared101
to SUs.102
In our previous work [33], we propose the FD MAC103
protocol by using the standard backoff mechanism as in104
the 802.11 MAC protocol where we employ concurrent FD105
sensing and access during the data transmission phase as106
well as frame fragmentation. Moreover, engineering of a107
cognitive FD relaying network is considered in [34] and [35], 108
where various resource allocation algorithms to improve the 109
outage probability are proposed. In addition, the authors 110
in [30] develop the joint routing and distributed resource 111
allocation for FD wireless networks. In [31], Choi et al. 112
study the distributed power allocation for a hybrid FD/HD 113
system where all network nodes operate in the HD mode 114
but the access point (AP) communicates by using the FD 115
mode. In practice, it would be desirable to design an adapt- 116
able MAC protocol, which can be configured to operate in 117
an optimal fashion depending on specific channel and net- 118
work conditions. This design will be pursued in our current 119
work. 120
B. OUR CONTRIBUTIONS 121
In this paper, we make a further bold step in designing, 122
analyzing, and optimizing an adaptive FDC–MAC protocol 123
for CRNs, where the self-interference and imperfect 124
spectrum sensing are explicitly considered. In particular, 125
the contributions of this paper can be summarized 126
as follows. 127
1) We propose a novel FDC–MAC protocol that can effi- 128
ciently exploit the FD transceiver for spectrum sens- 129
ing and access of the white space without requiring 130
synchronization among SUs. In this protocol, after the 131
p-persistent based channel contention phase, the 132
winning SU enters the data phase consisting of two 133
stages, i.e., concurrent sensing and transmission in the 134
first stage (called FD sensing stage) and transmission 135
only in the second stage (called transmission stage). 136
The developed FDC–MAC protocol, therefore, enables 137
the optimized configuration of transmit power level 138
and sensing time during the FD sensing stage to mit- 139
igate the self-interference and appropriately protect the 140
active PU. After the FD sensing stage, the SU can 141
transmit with the maximum power to achieve the 142
highest throughput. 143
2) We develop a mathematical model for throughput per- 144
formance analysis of the proposed FDC-MAC proto- 145
col considering the imperfect sensing, self-interference 146
effects, and the dynamic status changes of the PU. 147
In addition, both one-way and two-way transmission 148
scenarios, which are called HD transmission (HDTx) 149
and FD transmission (FDTx) modes, respectively, are 150
considered in the analysis. Since the PU can change its 151
idle/active status during the FD sensing and transmis- 152
sion stages, different potential status-change scenarios 153
are studied in the analytical model. 154
3) We study the optimal configuration of FDC-MAC 155
protocol parameters including the SU’s sensing dura- 156
tion and transmit power to maximize the achievable 157
throughput under both FDTx and HDTx modes. 158
We prove that there exists an optimal sensing time to 159
achieve the maximum throughput for a given transmit 160
power value during the FD sensing stage under both 161
FDTx and HDTx modes. Therefore, optimal protocol 162
2 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
parameters can be determined through standard163
numerical search methods.164
4) Extensive numerical results are presented to illustrate165
the impacts of different protocol parameters on the166
throughput performance and the optimal configura-167
tions of the proposed FDC-MAC protocol. Moreover,168
we show the significant throughput enhancement169
of the proposed FDC-MAC protocol compared170
to existing cognitive MAC protocols, namely the171
HD MAC protocol and a single-stage FD MAC pro-172
tocol with concurrent sensing and access during the173
whole data phase. Specifically, our FDC-MAC pro-174
tocol achieves higher throughput with the increasing175
maximum power while the throughput of the176
single-stage FD MAC protocol decreases with the177
maximum power in the high power regime due178
to the self-interference. Moreover, the proposed179
FDC-MAC protocol significantly outperforms the HD180
MAC protocol in terms of system throughput.181
The remaining of this paper is organized as follows.182
Section II describes the system and PU models. FDC–MAC183
protocol design, and throughput analysis are performed in184
Section III. Then, Section IV studies the optimal con-185
figuration of the proposed FDC–MAC protocol. Section V186
demonstrates numerical results followed by concluding187
remarks in Section VI.188
II. SYSTEM AND PU ACTIVITY MODELS189
A. SYSTEM MODEL190
We consider a cognitive radio network where n0 pairs of191
SUs opportunistically exploit white spaces on one channel192
for communications. We assume that each SU is equipped193
with a FD transceiver; hence, the SUs can perform sens-194
ing and transmission simultaneously. However, the sensing195
performance of each SU is affected by the self-interference196
from its transmitter since the transmitted power is leaked197
into the received signal. We denote I(P) as the average self-198
interference power, which is modeled as I(P) = ζ (P)ξ
[20]199
where P is the SU’s transmit power, ζ and ξ (0 ≤ ξ ≤ 1)200
are predetermined coefficients which represent the quality201
of self-interference cancellation (QSIC). In this work, we202
design a asynchronous cognitive MAC protocol where no203
synchronization is required among SUs and between SUs and204
the PU. We assume that different pairs of SUs can overhear205
transmissions from the others (i.e., a collocated network is206
assumed). In the following, we refer to pair i of SUs as SU i207
for brevity.208
B. PRIMARY USER ACTIVITY209
We assume that the PU’s idle/active status follows two210
independent random processes. We say that the channel is211
available and busy for SUs’ access if the PU is in the idle and212
active (or busy) states, respectively. Let H0 and H1 denote the213
events that the PU is idle and active, respectively. To protect214
the PU, we assume that SUs must stop their transmissions215
and evacuate from the busy channel within the maximum216
delay of Teva, which is referred to as channel evacuation 217
time. 218
Let τac and τid denote the random variables which repre- 219
sent the durations of active and idle channel states, respec- 220
tively. We denote probability density functions (pdf) of τac 221
and τid as fτac (t) and fτid (t), respectively. While most results 222
in this paper can be applied to general pdfs fτac (t) and fτid (t), 223
we mostly consider the exponential pdf in the analysis. 224
In addition, let P (H0) = ¯τid
¯τid+¯τac
and P (H1) = 1 − P (H0) 225
present the probabilities that the channel is available and 226
busy, respectively where ¯τid and ¯τac denote the average values 227
of τac and τid, respectively. We assume that the probabilities 228
that τac and τid are smaller than Teva are sufficiently small 229
(i.e., the PU changes its status slowly) so that we can ignore 230
events with multiple idle/active status changes in one channel 231
evacuation interval Teva. 232
III. FULL-DUPLEX COGNITIVE MAC PROTOCOL 233
In this section, we describe the proposed FDC-MAC protocol 234
and conduct its throughput analysis considering imperfect 235
sensing, self-interference of the FD transceiver, and dynamic 236
status change of the PUs. 237
A. FDC-MAC PROTOCOL DESIGN 238
The proposed FDC-MAC protocol integrates three important 239
elements of a cognitive MAC protocol, namely contention 240
resolution, spectrum sensing, and access functions. 241
Specifically, SUs employ the p-persistent CSMA princi- 242
ple [17] for contention resolution where each SU with data 243
to transmit attempts to capture an available channel with 244
a probability p after the channel is sensed to be idle dur- 245
ing the standard DIFS interval (DCF Interframe Space). 246
If a particular SU decides not to transmit (with probability 247
of 1 − p), it will sense the channel and attempt to trans- 248
mit again in the next slot of length σ with probability p. 249
To complete the reservation, the four-way handshake with 250
Request-to-Send/Clear-to-Send (RTS/CST) exchanges [16] 251
is employed to reserve the available channel for transmission. 252
Specifically, the secondary transmitter sends RTS to the 253
secondary receiver and waits until it successfully receives 254
the CTS from the secondary receiver. All other SUs, which 255
hear the RTS and CTS exchange from the winning SU, defer 256
to access the channel for a duration equal to the data trans- 257
mission time, T. Then, an acknowledgment (ACK) from the 258
SU’s receiver is transmitted to its corresponding transmitter 259
to notify the successful reception of a packet. Furthermore, 260
the standard small interval, namely SIFS (Short Interframe 261
Space), is used before the transmissions of CTS, ACK, and 262
data frame as in the standard 802.11 MAC protocol [16]. 263
In our design, the data phase after the channel con- 264
tention phase comprises two stages where the SU performs 265
concurrent sensing and transmission in the first stage with 266
duration TS and transmission only in the second stage with 267
duration T − TS. Here, the SU exploits the FD capability of 268
its transceiver to realize concurrent sensing and transmission 269
VOLUME 3, 2015 3
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
FIGURE 1. Timing diagram of the proposed full-duplex cognitive MAC protocol.
the first stage (called FD sensing stage) where the sensing270
outcome at the end of this stage (i.e., an idle or busy channel271
status) determines its further actions as follows. Specifically,272
if the sensing outcome indicates an available channel then273
the SU transmits data in the second stage; otherwise, it274
remains silent for the remaining time of the data phase with275
duration T − TS.276
We assume that the duration of the SU’s data phase T is277
smaller than the channel evacuation time Teva so timely278
evacuation from the busy channel can be realized with reli-279
able FD spectrum sensing. Therefore, our design allows280
to protect the PU with evacuation delay at most T if the281
MAC carrier sensing during the contention phase and282
the FD spectrum sensing in the data phase are perfect.283
Furthermore, we assume that the SU transmits at power levels284
Psen ≤ Pmax and Pdat = Pmax during the FD sensing285
and transmission stages, respectively where Pmax denotes286
the maximum power and the transmit power Psen in the287
FD sensing stage will be optimized to effectively mitigate288
the self-interference and achieve good sensing-throughput289
tradeoff. The timing diagram of the proposed FDC–MAC290
protocol is illustrated in Fig. 1.291
We allow two possible operation modes in the transmission 292
stage. The first is the HD transmission mode (HDTx mode) 293
where there is only one direction of data transmission from 294
the SU transmitter to the SU receiver. In this mode, there 295
is no self-interference in the transmission stage. The second 296
is the FD transmission mode (FDTx mode) where two-way 297
communications between the pair of SUs are assumed 298
(i.e., there are two data flows between the two SU nodes in 299
opposite directions). In this mode, the achieved throughput 300
can be potentially enhanced (at most doubling the throughput 301
of the HDTx mode) but self-interference must be taken into 302
account in throughput quantification. 303
Our proposed FDC–MAC protocol design indeed enables 304
flexible and adaptive configuration, which can efficiently 305
exploit the capability of the FD transceiver. Specifically, if the 306
duration of the FD sensing stage is set equal to the duration 307
of the whole data phase (i.e., TS = T), then the SU per- 308
forms concurrent sensing and transmission for the whole data 309
phase as in our previous design [33]. This configuration may 310
degrade the achievable throughput since the transmit power 311
during the FD sensing stage is typically set smaller Pmax 312
to mitigate the self-interference and achieve the required 313
4 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
sensing performance. We will refer the corresponding MAC314
protocol with TS = T as one-stage FD MAC in the sequel.315
Moreover, if we set the SU transmit power Psen in the316
sensing stage equal to zero, i.e., Psen = 0, then we317
achieve the traditional two-stage cognitive HD MAC protocol318
where sensing and transmission are performed sequentially319
in two different stages [6], [8]. Moreover, the proposed320
FDC–MAC protocol is more flexible than existing321
designs [6], [8], [33] since different existing designs can322
be achieved through suitable configuration of its protocol323
parameters. It will be demonstrated later that the proposed324
FDC–MAC protocol achieves significant better throughput325
than that of the existing cognitive MAC protocols. In the326
following, we present the throughput analysis based on which327
the protocol configuration optimization can be performed.328
B. THROUGHPUT ANALYSIS329
We now conduct the saturation throughput analysis for the330
secondary network where all SUs are assumed to always331
have data to transmit. The resulting throughput can be served332
as an upper bound for the throughput in the non-saturated333
scenario [16]. This analysis is performed by studying one334
specific contention and access cycle (CA cycle) with the335
contention phase and data phase as shown in Fig. 1. Without336
loss of generality, we will consider the normalized throughput337
achieved per one unit of system bandwidth (in bits/s/Hz).338
Specifically, the normalized throughput of the FDC–MAC339
protocol can be expressed as340
NT =
B
Tove + T
, (1)341
where Tove represents the time overhead required for one342
successful channel reservation (i.e., successful RTS/CTS343
exchanges), T denotes the packet transmission time, and B344
denotes the amount of data (bits) transmitted in one CA cycle345
per one unit of system bandwidth, which is expressed in346
bits/Hz. To complete the throughput analysis, we derive the347
quantities Tove and B in the remaining of this subsection.348
1) DERIVATION OF Tove349
The average time overhead for one successful channel reser-350
vation can be calculated as351
Tove = Tcont + 2SIFS + 2PD + ACK, (2)352
where ACK is the length of an ACK message, SIFS is the353
length of a short interframe space, and PD is the propagation354
delay where PD is usually small compared to the slot size σ,355
and Tcont denotes the average time overhead due to idle356
periods, collisions, and successful transmissions of RTS/CTS357
messages in one CA cycle. For better presentation of the358
paper, the derivation of Tcont is given in Appendix A.359
2) DERIVATION OF B360
To calculate B, we consider all possible cases that capture361
the activities of SUs and status changes of the PU in the362
FDC-MAC data phase of duration T. Because the PU’s activ-363
ity is not synchronized with the SU’s transmission, the PU can364
change its idle/active status any time. We assume that there 365
can be at most one transition between the idle and active states 366
of the PU during one data phase interval. This is consistent 367
with the assumption on the slow status changes of the PU as 368
described in Section II-B since T < Teva. Furthermore, we 369
assume that the carrier sensing of the FDC-MAC protocol 370
is perfect; therefore, the PU is idle at the beginning of the 371
FDC-MAC data phase. Note that the PU may change its status 372
during the SU’s FD sensing or transmission stage, which 373
requires us to consider different possible events in the data 374
phase. 375
We use hij (i, j ∈ {0, 1}) to represent events capturing status 376
changes of the PU in the FD sensing stage and transmission 377
stage where i = 0 and i = 1 represent the idle and active 378
states of the PU, respectively. For example, if the PU is idle 379
during the FD sensing stage and becomes active during the 380
transmission stage, then we represent this event as (h00, h01) 381
where sub-events h00 and h01 represent the status changes in 382
the FD sensing and transmission stages, respectively. More- 383
over, if the PU changes from the idle to the active state during 384
the FD sensing stage and remains active in the remaining of 385
the data phase, then we represent this event as (h01, h11). 386
It can be verified that we must consider the following three 387
cases with the corresponding status changes of the PU during 388
the FDC-MAC data phase to analyze B. 389
• Case 1: The PU is idle for the whole FDC-MAC data 390
phase (i.e., there is no PU’s signal in both FD sensing 391
and transmission stages) and we denote this event as 392
(h00, h00). The average number of bits (in bits/Hz) trans- 393
mitted during the data phase in this case is denoted as B1. 394
• Case 2: The PU is idle during the FD sensing stage but 395
the PU changes from the idle to the active status in the 396
transmission stage. We denote the event corresponding 397
to this case as (h00, h01) where h00 and h01 capture the 398
sub-events in the FD sensing and transmission stages, 399
respectively. The average number of bits (in bits/Hz) 400
transmitted during the data phase in this case is repre- 401
sented by B2. 402
• Case 3: The PU is first idle then becomes active during 403
the FD sensing stage and it remains active during the 404
whole transmission stage. Similarly we denote this event 405
as (h01, h11) and the average number of bits (in bits/Hz) 406
transmitted during the data phase in this case is denoted 407
as B3. 408
Then, we can calculate B as follows: 409
B = B1 + B2 + B3. (3) 410
To complete the analysis, we will need to derive B1, B2, 411
and B3, which are given in Appendix B. 412
IV. FDC–MAC PROTOCOL CONFIGURATION FOR 413
THROUGHPUT MAXIMIZATION 414
In this section, we study the optimal configuration of the 415
proposed FDC–MAC protocol to achieve the maximum 416
throughput while satisfactorily protecting the PU. 417
VOLUME 3, 2015 5
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
A. PROBLEM FORMULATION418
Let NT (TS, p, Psen) denote the normalized secondary419
throughput, which is the function of the sensing time TS,420
transmission probability p, and the SU’s transmit power Psen421
in the FD sensing stage. In the following, we assume422
a fixed frame length T, which is set smaller the required423
evacuation time Teva to achieve timely evacuation from a424
busy channel for the SUs. We are interested in determining425
suitable configuration for p, TS and Psen to maximize the sec-426
ondary throughput, NT (TS, p, Psen). In general, the optimal427
transmission probability p should balance between reducing428
collisions among SUs and limiting the protocol overhead.429
However, the achieved throughput is less sensitive to the430
transmission probability p as will be demonstrated later via431
the numerical study. Therefore, we will seek to optimize the432
throughput over Psen and TS for a reasonable and fixed value433
of p.434
For brevity, we express the throughput as a function of Psen435
and TS only, i.e., NT (TS, Psen). Suppose that the PU requires436
that the average detection probability is at least Pd . Then, the437
throughput maximization problem can be stated as follows:438
max
TS ,Psen
NT (TS, Psen)439
s.t. ˆPd (ε, TS) ≥ Pd ,440
0 ≤ Psen ≤ Pmax, 0 ≤ TS ≤ T, (4)441
where Pmax is the maximum power for SUs, and TS is upper442
bounded by T. In fact, the first constraint on ˆPd (ε, TS)443
implies that the spectrum sensing should be sufficiently444
reliable to protect the PU which can be achieved with suf-445
ficiently large sensing time TS. Moreover, the SU’s transmit446
power Psen must be appropriately set to achieve good tradeoff447
between the network throughput and self-interference448
mitigation.449
B. PARAMETER CONFIGURATION FOR FDC–MAC450
PROTOCOL451
To gain insights into the parameter configuration of the452
FDC–MAC protocol, we first study the optimization with453
respect to the sensing time TS for a given Psen. For any454
value of TS, we would need to set the sensing detection455
threshold ε so that the detection probability constraint is met456
with equality, i.e., ˆPd (ε, TS) = Pd as in [5] and [6]. Since457
the detection probability is smaller in Case 3 (i.e., the PU458
changes from the idle to active status during the FD sensing459
stage of duration TS) compared to that in Case 1 and Case 2460
(i.e., the PU remains idle during the FD sensing stage) consid-461
ered in the previous section, we only need to consider Case 3462
to maintain the detection probability constraint. The average463
probability of detection for the FD sensing in Case 3 can be464
expressed as465
ˆPd =
TS
0
P01
d (t)fτid (t |0 ≤ t ≤ TS ) dt, (5)466
where t denotes the duration from the beginning of the FD467
sensing stage to the instant when the PU changes to the active468
Algorithm 1 FDC-MAC Configuration Algorithm
1: for each considered value of Psen ∈ [0, Pmax] do
2: Find optimal TS for problem (7) using the bisection
method as TS (Psen) = argmax
0≤TS ≤T
NT (T, Psen).
3: end for
4: The final solution T∗
S , P∗
sen is determined as
T∗
S , P∗
sen = argmax
Psen,TS (Psen)
NT (TS (Psen) , Psen).
state, and fτid (t |A) is the pdf of τid conditioned on event A 469
capturing the condition 0 ≤ t ≤ TS, which is given as 470
fτid (t |A) =
fτid (t)
Pr {A}
=
1
¯τid
exp(− t
¯τid
)
1 − exp(−TS
¯τid
)
. (6) 471
Note that P01
d (t) is derived in Appendix C and fτid (t) is given 472
in (18). 473
We consider the following single-variable optimization 474
problem for a given Psen: 475
max
0<TS ≤T
NT (TS, Psen) . (7) 476
We characterize the properties of function NT (TS, Psen) 477
with respect to TS for a given Psen in the following theorem 478
whose proof is provided in Appendix D. For simplicity, the 479
throughput function is written as NT (TS). 480
Theorem 1: The objective function NT(TS) of (7) satisfies 481
the following properties 482
1) lim
TS →0
∂NT
∂TS
= +∞, 483
2) a) For HDTx mode with ∀Psen and FDTx mode with 484
Psen < Psen, we have lim
TS →T
∂NT
∂TS
< 0, 485
b) For FDTx mode with Psen > Psen, we have 486
lim
TS →T
∂NT
∂TS
> 0, 487
3) ∂2NT
∂T2
S
< 0, ∀TS, 488
4) The objective function NT(TS) is bounded from above, 489
where Psen = N0 1 + Pdat
N0+ζP
ξ
dat
2
− 1 is the critical 490
value of Psen such that lim
TS →T
∂NT
∂TS
= 0. 491
We would like to discuss the properties stated in 492
Theorem 1. For the HDTx mode with ∀Psen and FDTx mode 493
with low Psen, then properties 1, 2a, and 4 imply that there 494
must be at least one TS in [0, T] that maximizes NT (TS). 495
The third property implies that this maximum is indeed 496
unique. Moreover, for the FDTx with high Psen, then 497
properties 1, 2b, 3 and 4 imply that NT(TS) increases 498
in [0, T]. Hence, the throughput NT(TS) achieves its maxi- 499
mum with sensing time TS = T. We propose an algorithm 500
to determine optimal (TS, Psen), which is summarized in 501
Algorithm 1. Here, we can employ the bisection scheme and 502
other numerical methods to determine the optimal value TS 503
for a given Psen. 504
6 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
V. NUMERICAL RESULTS505
For numerical studies, we set the key parameters for the506
FDC–MAC protocol as follows: mini-slot duration is507
σ = 20µs; PD = 1µs; SIFS = 2σ µs; DIFS = 10σ µs;508
ACK = 20σ µs; CTS = 20σ µs; RTS = 20σ µs. Other509
parameters are chosen as follows unless stated otherwise:510
the sampling frequency fs = 6 MHz; bandwidth of PU’s511
signal 6 MHz; Pd = 0.8; T = 15 ms; p = 0.0022; the512
SNR of the PU signal at each SU γP =
Pp
N0
= −20 dB;513
varying self-interference parameters ζ and ξ. Without loss514
of generality, the noise power is normalized to one; hence,515
the SU transmit power Psen becomes Psen = SNRs; and we516
set Pmax = 15dB.517
We first study the impacts of self-interference parameters518
on the throughput performance with the following parameter519
setting: (¯τid, ¯τac) = (1000, 100) ms, Pmax = 25 dB, Teva =520
40 ms, ζ = 0.4, ξ is varied in ξ = {0.12, 0.1, 0.08, 0.05},521
and Pdat = Pmax. Recall that the self-interference depends522
on the transmit power P as I(P) = ζ (P)ξ
where P = Psen523
and P = Pdat in the FD sensing and transmission stages,524
respectively. Fig. 2 illustrates the variations of the throughput525
versus the transmission probability p. It can be observed that526
when ξ decreases (i.e., the self-interference is smaller), the527
achieved throughput increases. This is because SUs can trans-528
mit with higher power while still maintaining the sensing con-529
straint during the FD sensing stage, which leads to throughput530
improvement. The optimal Psen corresponding to these val-531
ues of ξ are Psen = SNRs = {25.00, 18.01, 14.23, 11.28} dB532
and the optimal probability of transmission is p∗ = 0.0022533
as indicated by a star symbol. Therefore, to obtain all other534
results in this section, we set p∗ = 0.0022.535
FIGURE 2. Normalized throughput versus transmission probability p for
T = 18 ms, ¯τid = 1000 ms, ¯τac = 100 ms, and varying ξ.
Fig. 3 illustrates the throughput performance versus536
number of SUs n0 when we keep the same parameter set-537
tings as those for Fig. 2 and p∗ = 0.0022. Again, when538
ξ decreases (i.e., the self-interference becomes smaller), the539
achieved throughput increases. In this figure, the optimal540
FIGURE 3. Normalized throughput versus the number of SUs n0 for
T = 18 ms, p = 0.0022, ¯τid = 1000 ms, ¯τac = 100 ms, and varying ξ.
FIGURE 4. Normalized throughput versus SU transmit power Psen and
sensing time TS for p = 0.0022, ¯τid = 500 ms, ¯τac = 50 ms, n0 = 40,
ξ = 1, ζ = 0.7 and FDTx with Pdat = 15 dB.
SNRs achieving the maximum throughput corresponding 541
to the considered values of ξ are Psen = SNRs = 542
{25.00, 18.01, 14.23, 11.28} dB, respectively. 543
We now verify the results stated in Theorem 1 for the FDTx 544
mode. Specifically, Fig. 4 shows the throughput performance 545
for the scenario where the QSIC is very low with large ξ and ζ 546
where we set the network parameters as follows: p = 0.0022, 547
¯τid = 500 ms, ¯τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.7, 548
and Pdat = 15 dB. Moreover, we can obtain Psen as in (42) 549
in Appendix D, which is equal to Psen = 6.6294 dB. In this 550
figure, the curve indicated by asterisks, which corresponds to 551
Psen = Psen, shows the monotonic increase of the through- 552
put with sensing time TS and other curves corresponding 553
to Psen > Psen have the same characteristic. In contrast, 554
all remaining curves (corresponding to Psen < Psen) first 555
increase to the maximum values and then decrease as we 556
increase TS. 557
Fig. 5 illustrates the throughput performance for the very 558
high QSIC with small ξ and ζ where we set the network 559
VOLUME 3, 2015 7
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
FIGURE 5. Normalized throughput versus SU transmit power Psen and
sensing time TS for p = 0.0022, ¯τid = 500 ms, ¯τac = 50 ms, n0 = 40,
ξ = 1, ζ = 0.08 and FDTx with Pdat = 15 dB.
parameters as follows: p = 0.0022, ¯τid = 500 ms,560
¯τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.08, and561
Pdat = 15 dB. Moreover, we can obtain Psen as in (42) in562
Appendix D, which is equal to Psen = 19.9201 dB. We have563
Psen < Pmax = 15dB < Psen in this scenario; hence, all564
the curves first increases to the maximum throughput and565
then decreases with the increasing TS. Therefore, we have566
correctly validated the properties stated in Theorem 1.567
Now we investigate the throughput performance versus SU568
transmit power Psen and sensing time TS for the case of569
high QSIC with ξ = 0.95 and ζ = 0.08. Fig. 6 shows the570
throughput versus the SU transmit power Psen and sensing571
time TS for the FDTx mode with Pdat = 15 dB, p = 0.0022,572
¯τid = 150 ms, ¯τac = 50 ms, and n0 = 40. It can be observed573
that there exists an optimal configuration of the SU transmit574
power P∗
sen = 4.6552 dB and sensing time T∗
S = 2.44 ms to575
FIGURE 6. Normalized throughput versus SU transmit power Psen and
sensing time TS for p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, n0 = 40,
ξ = 0.95, ζ = 0.08 and FDTx with Pdat = 15 dB.
achieve the maximum throughput NT T∗
S , P∗
sen = 2.3924, 576
which is indicated by a star symbol. These results confirm that 577
SUs must set appropriate sensing time and transmit power for 578
the FDC–MAC protocol to achieve the maximize throughput, 579
which cannot be achieved by setting Ts = T as proposed in 580
existing designs such as in [33]. 581
FIGURE 7. Normalized throughput versus SU transmit power Psen and
sensing time TS for p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, n0 = 40,
ξ = 0.95, ζ = 0.8 and FDTx with Pdat = 15 dB.
In Fig. 7, we present the throughput versus the SU transmit 582
power Psen and sensing time TS for the low QSIC sce- 583
nario where p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, 584
Pmax = 15 dB, n0 = 40, ξ = 0.95, and ζ = 0.8. The 585
optimal configuration of SU transmit power P∗
sen = 15 dB 586
and sensing time T∗
S = 15 ms to achieve the maximum 587
throughput NT T∗
S , P∗
sen = 1.6757 is again indicated 588
by a star symbol. Under this optimal configuration, the FD 589
sensing is performed during the whole data phase (i.e., there 590
is no transmission stage). In fact, to achieve the maximum 591
throughput, the SU must provide the satisfactory sensing 592
performance and attempt to achieve high transmission rate. 593
Therefore, if the QSIC is low, the data rate achieved during 594
the transmission stage can be lower than that in the FD sens- 595
ing stage because of the very strong self-interference in the 596
transmission stage. Therefore, setting longer FD sensing time 597
enables to achieve more satisfactory sensing performance 598
and higher transmission rate, which explains that the optimal 599
configuration should set T∗
S = T for the low QSIC scenario. 600
This protocol configuration corresponds to existing design 601
in [33], which is a special case of the proposed FDC–MAC 602
protocol. 603
We now investigate the throughput performance with 604
respect to the SU transmit power Psen and sensing time TS 605
for the HDTx mode. Fig. 8 illustrates the throughput per- 606
formance for the high QSIC scenario with ξ = 0.95 and 607
ζ = 0.08. It can be observed that there exists an optimal 608
configuration of SU transmit power P∗
sen = 5.6897 dB 609
and sensing time T∗
S = 3.5 ms to achieve the maximum 610
throughput NT T∗
S , P∗
sen = 1.4802, which is indicated 611
8 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
FIGURE 8. Normalized throughput versus SU transmit power Psen and
sensing time TS for p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, n0 = 40,
ξ = 0.95, ζ = 0.08 and HDTx.
by a star symbol. The maximum achieved throughput of the612
HDTx mode is lower than that in the FDTx mode presented in613
Fig. 6. This is because with high QSIC, the FDTx mode can614
transmit more data than the HDTx mode in the transmission615
stage.616
In Fig. 9, we show the throughput versus the SU transmit617
power Psen for TS = 2.2 ms, p = 0.0022, ¯τid = 1000 ms,618
¯τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.08 and various619
values of T (i.e., the data phase duration) for the FDTx mode620
with Pdat = 15 dB. For each value of T, there exists the621
optimal SU transmit power P∗
sen which is indicated by an622
asterisk. It can be observed that as T increases from 8 ms623
to 25 ms, the achieved maximum throughput first increases624
then decreases with T. Also in the case with T∗ = 15 ms,625
the SU achieves the largest throughput which is indicated by626
a star symbol. Furthermore, the achieved throughput signifi-627
cantly decreases when the pair of (T, Psen) deviates from the628
optimal values, T∗, P∗
sen .629
FIGURE 9. Normalized throughput versus SU transmit power Psen for
TS = 2.2 ms, p = 0.0022, ¯τid = 1000 ms, ¯τac = 50 ms, n0 = 40, ξ = 0.95,
ζ = 0.08, varying T , and FDTx with Pdat = 15 dB.
FIGURE 10. Normalized throughput versus Pmax for ¯τid = 150 ms,
¯τac = 75 ms, n0 = 40, ξ = 0.85, n0 = 40, ζ = 0.2, 0.7 , and FDTx with
Pdat = Pmax dB.
Finally, we compare the throughput of our proposed 630
FDC-MAC protocol, the single-stage FD MAC protocol 631
where FD sensing (concurrent spectrum sensing and trans- 632
mission) is performed during the whole data phase [33] and 633
the HD MAC protocol which does not allow the transmission 634
during the spectrum sensing interval in Fig. 10. For brevity, 635
the single-stage FD MAC protocol is refereed to as FD 636
MAC in this figure. The parameter settings are as follows: 637
¯τid = 150 ms, ¯τac = 75 ms, n0 = 40, ξ = 0.85, n0 = 40, 638
ζ = {0.2, 0.7}, and FDTx with Pdat = Pmax dB. For fair 639
comparison, we first obtain the optimal configuration of the 640
single-stage FD MAC protocol, i.e., then we use (T∗, p∗) 641
for the HD MAC protocol and FDC-MAC protocol. For the 642
single-stage FD MAC protocol, the transmit power is set 643
to Pmax because there is only a single stage where the SU 644
performs sensing and transmission simultaneously during the 645
data phase. In addition, the HD MAC protocol will also trans- 646
mit with the maximum transmit power Pmax to achieve the 647
highest throughput. For both studied cases of ζ = {0.2, 0.7}, 648
our proposed FDC-MAC protocol significantly outperforms 649
the other two protocols. Moreover, the single-stage FD MAC 650
protocol [33] with power allocation outperforms the HD 651
MAC protocol at the corresponding optimal value of Pmax 652
required by the single-stage FD MAC protocol. However, 653
both single-stage FDC-MAC and HD MAC protocols achieve 654
increasing throughput with higher Pmax while the single- 655
stage FD MAC protocol has the throughput first increased 656
then decreased as Pmax increases. This demonstrates the neg- 657
ative self-interference effect on the throughput performance 658
of the single-stage FD MAC protocol, which is efficiently 659
mitigated by our proposed FDC-MAC protocol. 660
VI. CONCLUSION 661
In this paper, we have proposed the FDC–MAC protocol 662
for cognitive radio networks, analyzed its throughput per- 663
formance, and studied its optimal parameter configuration. 664
VOLUME 3, 2015 9
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
The design and analysis have taken into account the665
FD communication capability and the self-interference of666
the FD transceiver. We have shown that there exists an667
optimal FD sensing time to achieve the maximum through-668
put. We have then presented extensive numerical results to669
demonstrate the impacts of self-interference and protocol670
parameters on the throughput performance. In particular, we671
have shown that the FDC–MAC protocol achieves signifi-672
cantly higher throughput than the HD MAC protocol, which673
confirms that the FDC–MAC protocol can efficiently exploit674
the FD communication capability. Moreover, the FDC–MAC675
protocol results in higher throughput with the increasing max-676
imum power budget while the throughput of the single-stage677
FD MAC can decrease in the high power regime. This result678
validates the importance of adopting the two-stage procedure679
in the data phase and the optimization of sensing time and680
transmit power during the FD sensing stage to mitigate the681
negative self-interference effect.682
APPENDIX A683
DERIVATION OF T cont684
To calculate Tcont, we define some further parameters as685
follows. Denote Tcoll as the duration of the collision and Tsucc686
as the required time for successful RTS/CTS transmission.687
These quantities can be calculated as follows [17]:688
Tsucc = DIFS + RTS + SIFS + CTS + 2PD
Tcoll = DIFS + RTS + PD,
(8)689
where DIFS is the length of a DCF (distributed coordination690
function) interframe space, RTS and CTS denote the lengths691
of the RTS and CTS messages, respectively.692
As being shown in Fig. 1, there can be several idle periods693
and collisions before one successful channel reservation. Let694
Ti
idle denote the i-th idle duration between two consecutive695
RTS/CTS exchanges, which can be collisions or successful696
exchanges. Then, Ti
idle can be calculated based on its prob-697
ability mass function (pmf), which is derived as follows.698
In the following, all relevant quantities are defined in terms of699
the number of time slots. With n0 SUs joining the contention700
resolution, let Psucc, Pcoll and Pidle denote the probabilities701
that a particular generic slot corresponds to a successful702
transmission, a collision, and an idle slot, respectively. These703
probabilities can be calculated as follows:704
Psucc = n0p (1 − p)n0−1
(9)705
Pidle = (1 − p)n0 (10)706
Pcoll = 1 − Psucc − Pidle, (11)707
where p is the transmission probability of an SU in a generic708
slot. In general, the interval Tcont, whose average value is709
Tcont given in (2), consists of several intervals correspond-710
ing to idle periods, collisions, and one successful RTS/CTS711
transmission. Hence, this quantity can be expressed as712
Tcont =
Ncoll
i=1
Tcoll + Ti
idle + T
Ncoll+1
idle + Tsucc, (12)713
where Ncoll is the number of collisions before the success- 714
ful RTS/CTS exchange and Ncoll is a geometric random 715
variable (RV) with parameter 1 − Pcoll/Pidle where 716
Pidle = 1 − Pidle. Therefore, its pmf can be expressed as 717
f
Ncoll
X (x) =
Pcoll
Pidle
x
1 −
Pcoll
Pidle
, x = 0, 1, 2, . . . 718
(13) 719
Also, Tidle represents the number of consecutive idle slots, 720
which is also a geometric RV with parameter 1 − Pidle with 721
the following pmf 722
f
Tidle
X (x) = (Pidle)x
(1 − Pidle), x = 0, 1, 2, . . . (14) 723
Therefore, Tcont (the average value of Tcont) can be written 724
as follows [17]: 725
Tcont = NcollTcoll + Tidle Ncoll + 1 + Tsucc, (15) 726
where Tidle and Ncoll can be calculated as 727
Tidle =
(1 − p)n0
1 − (1 − p)n0
(16) 728
Ncoll =
1 − (1 − p)n0
n0p (1 − p)n0−1
− 1. (17) 729
These expressions are obtained by using the pmfs of the 730
corresponding RVs given in (13) and (14), respectively [17]. 731
APPENDIX B 732
DERIVATIONS OF B1, B2, B3 733
We will employ a pair of parameters (θ, ϕ) to represent the 734
HDTX and FDTX modes where ((θ, ϕ) = (0, 1)) for HDTx 735
mode and ((θ, ϕ) = (1, 2)) for the FDTx mode. Moreover, 736
since the transmit powers in the FD sensing and transmis- 737
sion stages are different, which are equal to Psen and Pdat, 738
respectively, we define different SNRs and SINRs in these 739
two stages as follows: γS1 = Psen
N0
and γS2 = Psen
N0+Pp
are 740
the SNR and SINR achieved by the SU in the FD sensing 741
stage with and without the presence of the PU, respectively; 742
γD1 = Pdat
N0+θI and γD2 = Pdat
N0+Pp+θI for I = ζP
ξ
dat are 743
the SNR and SINR achieved by the SU in the transmission 744
stage with and without the presence of the PU, respectively. It 745
can be seen that we have accounted for the self-interference 746
for the FDTx mode during the transmission stage in γD1 by 747
noting that θ = 1 in this case. The parameter ϕ for the 748
HDTx and FDTx modes will be employed to capture the 749
throughput for one-way and two-way transmissions in these 750
modes, respectively. 751
The derivations of B1, B2, and B3 require us to consider 752
different possible sensing outcomes in the FD sensing stage. 753
In particular, we need to determine the detection 754
probability P
ij
d , which is the probability of correctly detecting 755
the PU given the PU is active, and the false alarm probabil- 756
ity P
ij
f , which is the probability of the erroneous sensing 757
of an idle channel, for each event hij capturing the state 758
changes of the PU. In the following analysis, we assume 759
the exponential distribution for τac and τid where ¯τac and ¯τid 760
10 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
denote the corresponding average values of these active and761
idle intervals. Specifically, let fτx (t) denote the pdf of τx762
(x represents ac or id in the pdf of τac or τid, respectively)763
then764
fτx (t) =
1
¯τx
exp(−
t
¯τx
). (18)765
Similarly, we employ T
ij
S and T
ij
D to denote the number of766
bits transmitted on one unit of system bandwidth during the767
FD sensing and transmission stages under the PU’s state-768
changing event hij, respectively.769
We can now calculate B1 as follows:770
B1 = P (H0)
∞
t=Tove+T
T00
1 fτid
(t)dt771
= P (H0) T00
1 exp −
Tove + T
¯τid
, (19)772
where P (H0) denotes the probability of the idle state of773
the PU, and P00
f is the false alarm probability for event774
h00 given in Appendix C. Moreover, T00
1 = P00
f T00
S +775
(1 − P00
f )(T00
S + T00
D ), T00
S = TS log2 (1 + γS1), T00
D =776
ϕ (T − TS) log2 (1 + γD1) where T00
S and T00
D denote the777
number of bits transmitted (over one Hz of system bandwidth)778
in the FD sensing and transmission stages of the data phase,779
respectively. After some manipulations, we achieve780
B1 = Ke exp
T
τ
TS log2(1 + γS1)+ ϕ 1 − P00
f781
(T − TS) log2(1 + γD1) , (20)782
where Ke = P (H0) exp − Tove
¯τid
+ T
¯τac
and 1
τ =783
1
¯τac
− 1
¯τid
.784
Moreover, we can calculate B2 as785
B2 = P (H0)
Tove+T
t1=Tove+TS
∞
t2=Tove+T−t1
786
T01
2 (t1)fτid
(t1)fτac (t2)dt1dt2, (21)787
where T01
2 (t1) = P00
f T00
S + (1 − P00
f )(T00
S + T01
D
¯t1 ),788
T01
D (t1) = ϕ T − TS − ¯t1 log2 (1 + γD2) + ϕ¯t1 log2789
(1 + γD1), and ¯t1 = t1 − (Tove + TS). In this expression,790
t1 denotes the interval from the beginning of the CA cycle791
to the instant when the PU changes to the active state from792
an idle state. Again, T00
S and T01
D denote the amount of data793
transmitted in the FD sensing and transmission stages for this794
case, respectively. After some manipulations, we achieve795
B2 = Ke
τ
¯τid
exp
T
τ
− exp
TS
τ
796
× TS log2 (1+γS1)−ϕ τ 1−P00
f log2
1+γD1
1+γD2
797
+ ϕ (T − TS) 1−P00
f798
× exp
T
τ
log2(1+γD1)−exp
TS
τ
log2(1+γD2) .799
(22)800
Finally, we can express B3 as follows: 801
B3 = P (H0)
Tove+TS
t1=Tove
∞
t2=Tove+T−t1
802
× P01
d ¯t1 T01
S ¯t1 + (1−P01
d ¯t1 )(T01
S ¯t1 + T11
D ) 803
fτid
(t1)fτac (t2)dt1dt2, (23) 804
where ¯t1 = t1 − Tove, T01
S
¯t1 = ¯t1 log2 (1 + γS1) + 805
TS − ¯t1 log2 (1 + γS2), T11
D = ϕ (T − TS) log2 (1 + γD2), 806
and t1 is the same as in (21). Here, T01
S and T11
D denote the 807
amount of data delivered in the FD sensing and transmis- 808
sion stages for the underlying case, respectively. After some 809
manipulations, we attain 810
B3 = Ke
TS
t=0
T01
S (t) + T11
D − P01
d (t) T11
D 811
fτid
(t) exp
t
¯τac
dt = B31 + B32, (24) 812
where 813
B31 = Ke
TS
t=0
T01
S (t) + T11
D fτid
(t) exp
t
¯τac
dt 814
= Ke
τ
¯τid
τ
TS
τ
−1 exp
TS
τ
+1 log2
1+γS1
1+γS2
815
+ exp
TS
τ
− 1 T11
D + TS log2 (1 + γS2) , 816
(25) 817
and 818
B32 = −KeT11
D
¯T32, (26) 819
where ¯T32 =
TS
t=0 P01
d (t) fτid
(t) exp t
¯τac
dt. 820
APPENDIX C 821
FALSE ALARM AND DETECTION PROBABILITIES 822
We derive the detection and false alarm probabilities for 823
FD sensing and two PU’s state-changing events h00 and h01 824
in this appendix. Assume that the transmitted signals from 825
the PU and SU are circularly symmetric complex 826
Gaussian (CSCG) signals while the noise at the secondary 827
receiver is independently and identically distributed CSCG 828
CN (0, N0) [5]. Under FD sensing, the false alarm probability 829
for event h00 can be derived using the similar method as in [5], 830
which is given as 831
P00
f = Q
N0 + I(Psen)
− 1 fsTS , (27) 832
where Q (x) =
+∞
x exp −t2/2 dt; fs, N0, , I(Psen) are the 833
sampling frequency, the noise power, the detection threshold 834
and the self-interference, respectively; TS is the FD sensing 835
duration. 836
The detection probability for event h01 is given as 837
P01
d = Q


N0+I(Psen) − TS −t
TS
γPS − 1
√
fsTS
TS −t
TS
(γPS + 1)2
+ t
TS

, (28) 838
VOLUME 3, 2015 11
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
where t is the interval from the beginning of the data phase to839
the instant when the PU changes its state, γPS =
Pp
N0+I(Psen)840
is the signal-to-interference-plus-noise ratio (SINR) of the841
PU’s signal at the SU.842
APPENDIX D843
PROOF OF THEOREM 1844
The first derivative of NT can be written as follows:845
∂NT
∂TS
=
1
Tove + T
3
i=1
∂Bi
∂TS
. (29)846
We derive the first derivative of Bi (i = 1, 2, 3) in the847
following. Toward this end, we will employ the approxima-848
tion of exp (x) ≈ 1 + x, x = Tx
τx
, Tx ∈ {T, TS, T − TS},849
τx ∈ {¯τid, ¯τac, τ} where recall that 1
τ = 1
¯τac
− 1
¯τid
. This850
approximation holds under the assumption that Tx << τx851
since we can omit all higher-power terms xn for n > 1852
from the Maclaurin series expansion of function exp (x).853
Using this approximation, we can express the first derivative854
of B1 as855
∂B1
∂TS
= Ke exp
T
τ
log2 (1 + γS1)856
−ϕ (T − TS)
∂P00
f
∂TS
+ 1−P00
f log2(1 + γD1) ,857
(30)858
where
∂P00
f
∂TS
is the first derivative of P00
f whose derivation is859
given in Appendix E.860
Moreover, the first derivative of B2 can be written as861
∂B2
∂TS
= Ke
τ
¯τid
862
× exp
T
τ
− 1 +
T
τ
exp
TS
τ
log2 (1 + γS1)863
− ϕ
∂P00
f
∂TS
τ exp
TS
τ
−exp
T
τ
log2
1+γD1
1+γD2
864
+ (T−TS) exp
T
τ
log2(1+γD1)−exp
TS
τ
log2(1+γD2)865
+ ϕ 1 − P00
f −
T − TS
τ
exp
TS
τ
log2 (1 + γD2)866
− exp
T
τ
log2(1+γD1)−exp
TS
τ
log2(1+γD2)867
+ exp
TS
τ
log2
1 + γD1
1 + γD2
. (31)868
Finally, the first derivative of B3 can be written as869
∂B3
∂TS
=
∂B31
∂TS
+
∂B32
∂TS
, (32)870
where 871
∂B31
∂TS
= Ke
τ
¯τid
τ 1 +
TS
τ
− 1 exp
TS
τ
872
log2
1 + γS1
1 + γS2
+ exp
TS
τ
− 1 873
TS log2(1 + γS2) + ϕ(T − TS) log2(1 + γD2) . 874
(33) 875
To obtain the derivative for B32, we note that 1 ≤ 876
exp t
¯τac
≤ exp TS
¯τac
for ∀t ∈ [0, TS]. Moreover, 877
from the results in (5) and (6) and using the definition 878
of ¯T32 in (26), we have Pd 1 − exp −TS
¯τid
≤ ¯T32 ≤ 879
Pd 1 − exp −TS
¯τid
exp TS
¯τac
. Using these results, the first 880
derivative of B32 can be expressed as 881
∂B32
∂TS
= −KePd ϕ
T − 2TS
¯τid
log2 (1 + γD2) . (34) 882
Therefore, we have obtained the first derivative of NT and 883
we are ready to prove the first statement of Theorem 1. Sub- 884
stitute TS = 0 to the derived ∂NT
∂TS
and use the approximation 885
exp (x) ≈ 1 + x, we yield the following result after some 886
manipulations 887
lim
TS →0
∂NT
∂TS
= −K0K1 lim
TS →0
∂P00
f
∂TS
, (35) 888
where K0 = 1
Tove+T Ke and 889
K1 = ϕ T 1 +
T
τ
+
T2
¯τid
log2 (1 + γD1) 890
+ ϕ
T τ
¯τid
log2 (1 + γD2) . (36) 891
It can be verified that K0 > 0, K1 > 0 and lim
TS →0
∂P00
f
∂TS
= 892
−∞ by using the derivations in Appendix E; hence, we have 893
lim
TS →0
∂NT
∂TS
= +∞ > 0. This completes the proof of the first 894
statement of the theorem. 895
We now present the proof for the second statement of 896
the theorem. Substitute TS = T to ∂NT
∂TS
and utilize the 897
approximation exp (x) ≈ 1 + x, we yield 898
lim
TS →T
∂NT
∂TS
=
1
Tove + T
3
i=1
∂Bi
∂TS
(T), (37) 899
where we have 900
∂B1
∂TS
(T) = Ke 1 +
T
τ
901
× log2 (1 + γS1) − ϕ 1 − P00
f (T) log2 (1 + γD1) 902
(38) 903
∂B2
∂TS
(T) = −Ke
T
¯τid
log2 (1 + γS1) (39) 904
12 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
∂B31
∂TS
(T) = Ke
T
¯τid
[log2(1+γS1)(1+γS2)−ϕ log2(1+γD2)]905
(40)906
∂B32
∂TS
(T) = Keϕ
T
¯τid
Pd log2 (1 + γD2) .907
Omit all high-power terms in the expansion of exp(x)908
(i.e., xn with n > 1) where x = Tx
τx
, Tx ∈ {T, TS, T − TS},909
τx ∈ {¯τid, ¯τac, τ}, we yield910
lim
TS →T
∂NT
∂TS
≈
1
Tove + T
∂B1
∂TS
(T). (41)911
We consider the HDTx and FDTx modes in the fol-912
lowing. For the HDTx mode, we have ϕ = 1 and913
θ = 0. Then, it can be verified that lim
TS →T
∂NT
∂TS
< 0914
by using the results in (38) and (41). This is because915
we have log2 (1 + γS1) − 1 − P00
f (T) log2 (1 + γD1) ≈916
log2 (1 + γS1) − log2 (1 + γD1) < 0 (since we have917
P00
f (T) ≈ 0 and γS1 ≤ γD1).918
For the FDTx mode, we have ϕ = 2, θ = 1, and also γS1 =919
Psen
N0
and γD1 = Pdat
N0+I(Pdat) = Pdat
N0+ζP
ξ
dat
. We would like to920
define a critical value of Psen which satisfies lim
TS →T
∂NT
∂TS
= 0921
to proceed further. Using the result in (38) and (41) as well as922
the approximation P00
f (T) ≈ 0, and by solving lim
TS →T
∂NT
∂TS
=923
0 we yield924
Psen = N0

 1 +
Pdat
N0 + ζP
ξ
dat
2
− 1

. (42)925
Using (38), it can be verified that if Psen > Psen then926
lim
TS →T
∂NT
∂TS
> 0; otherwise, we have lim
TS →T
∂NT
∂TS
≤ 0. So927
we have completed the proof for the second statement of928
Theorem 1.929
To prove the third statement of the theorem, we derive the930
second derivative of NT as931
∂2NT
∂T2
S
=
1
Tove + T
3
i=1
∂2Bi
∂T2
S
, (43)932
where we have933
∂2B1
∂T2
S
= −Keϕ exp
T
τ
log2 (1 + γD1)934
× (T − TS)
∂2P00
f
∂T2
S
− 2
∂P00
f
∂TS
, (44)935
where
∂2P00
f
∂T2
S
is the second derivative of P00
f and according to936
the derivations in Appendix E, we have
∂2P00
f
∂T2
S
> 0,
∂P00
f
∂TS
< 0,937
∀TS. Therefore, we yield ∂2B1
∂T2
S
< 0 ∀TS.938
Consequently, we have the following upper bound for ∂2B1
∂T2
S
939
by omitting the term exp T
τ > 1 in (44)940
∂2B1
∂T2
S
≤ Ke [h1(TS) + h2(TS)] , (45)941
where 942
h1(TS) = −ϕ (T − TS)
∂2P00
f
∂T2
S
log2 (1 + γD1), 943
h2(TS) = 2ϕ
∂P00
f
∂TS
log2 (1 + γD1). 944
Moreover, we have 945
∂2B2
∂T2
S
=
Ke τ
¯τid
−
2 + TS
τ
τ
exp
TS
τ
log2 (1 + γS1) 946
− ϕ
∂2P00
f
∂T2
S
τ exp
TS
τ
−exp
T
τ
log2
1+γD1
1+γD2
947
+ (T − TS) exp
T
τ
log2(1 + γD1) 948
− exp
TS
τ
log2(1 + γD2) 949
+ 2ϕ
∂P00
f
∂TS
exp
T
τ
− exp
TS
τ
log2(1 + γD1) 950
+
T − TS
τ
exp
TS
τ
log2 (1 + γD2) 951
− ϕ 1 − P00
f
T − TS
τ
exp
TS
τ
log2 (1 + γD2) 952
+ ϕ 1 − P00
f
1
τ
exp
TS
τ
log2
1 + γD1
1 + γD2
. 953
(46) 954
Therefore, we can approximate ∂2B2
∂T2
S
as follows: 955
∂2B2
∂T2
S
= Ke [h3(TS) + h4(TS) + h5(TS)], (47) 956
where 957
h3(TS) = −
2 + TS
τ 1 + TS
τ
¯τid
log2 (1 + γS1) , 958
h4(TS) = −ϕ 1 − P00
f
T−TS
¯τid
1 +
TS
τ
log2(1+γD2) 959
− ϕ
∂2P00
f
∂T2
S
(T −TS)
T
¯τid
log2(1 +γD1)−
TS
¯τid
log2(1 +γD2) 960
+ 2ϕ
∂P00
f
∂TS
T − TS
¯τid
log2
1+γD1
1+γD2
+
TS
τ
log2(1+γD2) , 961
h5(TS) = ϕ 1 − P00
f
1
¯τid
1 +
TS
τ
log2
1 + γD1
1 + γD2
. 962
In addition, we have 963
∂2B31
∂T2
S
=
Ke
¯τid
exp
TS
τ
1 +
T
τ
log2 (1 + γS1) 964
+ log2 (1 + γS2) + ϕ
T − TS
τ
− 2 log2 (1 + γD2) . 965
(48) 966
VOLUME 3, 2015 13
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
We can approximate ∂2B31
∂T2
S
as follows:967
∂2B31
∂T2
S
= Ke [h6(TS) + h6(TS)] , (49)968
where969
h6(TS) =
1
¯τid
log2 (1+γS1) (1+γS2) ,970
h7(TS) = −
2ϕ
¯τid
log2 (1+γD2) . (50)971
Finally, we have972
∂2B32
∂T2
S
= Keh8(TS), (51)973
where974
h8(TS) =
2ϕ ¯Pd
¯τid
log2 (1+γD2) . (52)975
The above analysis yields ∂2NT
∂T2
S
= Ke
8
i=1 hi(TS). There-976
fore, to prove that ∂2NT
∂T2
S
< 0, we should prove that h(TS) < 0977
since Ke > 0 where978
h(TS) =
8
i=1
hi(TS). (53)979
It can be verified that h1(TS) < 0 and h4(TS) < 0, ∀TS980
because
∂2P00
f
∂T2
S
> 0,
∂P00
f
∂TS
< 0 according to Appendix E981
and γD2 < γD1. Moreover, we have982
h3(TS) < −
2
¯τid
log2 (1 + γS1) , (54)983
and because γS1 > γS2, we have984
h3(TS) < −
1
¯τid
log2 (1 + γS1) (1 + γS2) = −h6(TS). (55)985
Therefore, we have h3(TS)+h6(TS) < 0. Furthermore, we can986
also obtain the following result h7(TS) + h8(TS) ≤ 0 because987
¯Pd ≤ 1. To complete the proof, we must prove that h2(TS) +988
h5(TS) ≤ 0, which is equivalent to989
−2¯τid
∂P00
f
∂TS
log2 (1 + γD1)
log2
1+γD1
1+γD2
≥ 1 − P00
f 1 +
TS
τ
, (56)990
where according to Appendix E991
∂P00
f
∂TS
= −
¯γ
√
fsTS
2
√
2πTS
exp −
¯α + ¯γ
√
fsTS
2
2
, (57)992
where ¯α = ( ¯γ1 + 1) Q−1 Pd . It can be verified that (56)993
indeed holds because the LHS of (56) is always larger than994
to 2 while the RHS of (56) is always less than 2. Hence, we995
have completed the proof of the third statement of Theorem 1.996
Finally, the fourth statement in the theorem obviously997
holds because Bi (i = 1, 2, 3) are all bounded from above.998
Hence, we have completed the proof of Theorem 1.999
APPENDIX E 1000
APPROXIMATION OF P00
f
AND ITS 1001
FIRST AND SECOND DERIVATIVES 1002
We can approximate ˆPd in (5) as follows: 1003
ˆPd = Q
N0 + I
− ¯γ − 1
√
fsTS
¯γ1 + 1
, (58) 1004
where ¯γ and ¯γ1 are evaluated by a numerical method. Hence, 1005
P00
f can be calculated as we set ˆPd = Pd , which is given as 1006
follows: 1007
P00
f = Q ¯α + ¯γ fsTS , (59) 1008
where ¯α = ( ¯γ1 + 1) Q−1 Pd . 1009
We now derive the first derivative of P00
f as 1010
∂P00
f
∂TS
= −
¯γ
√
fsTS
2
√
2πTS
exp −
¯α + ¯γ
√
fsTS
2
2
. (60) 1011
It can be seen that
∂P00
f
∂TS
< 0 since ¯γ > 0. Moreover, the 1012
second derivative of P00
f is 1013
∂2P00
f
∂T2
S
=
¯γ
√
fsTS
4
√
2πT2
S
1 +
1
2
y ¯γ fsTS exp −
y2
2
, (61) 1014
where y = ¯α + ¯γ
√
fsTS. 1015
We can prove that
∂2P00
f
∂T2
S
> 0 by considering two different 1016
cases as follows. For the first case with ¯α2
¯γ 2fs
≤ TS ≤ T (0 ≤ 1017
P00
f ≤ 0.5), this statement holds since y > 0. For the second 1018
case with 0 ≤ TS ≤ ¯α2
¯γ 2fs
(0.5 ≤ P00
f ≤ 1), y ≤ 0, then 1019
we have 0 < y − ¯α = ¯γ
√
fsTS ≤ −¯α and 0 ≤ −y ≤ −¯α. 1020
By applying the Cauchy-Schwarz inequality, we obtain 0 ≤ 1021
−y(y − ¯α) ≤ ¯γ 2
4 < 1 < 2; hence 1 + 1
2 y ¯γ
√
fsTS > 0. This 1022
result implies that
∂2P00
f
∂T2
S
> 0. 1023
REFERENCES 1024
[1] C. Cormio and K. R. Chowdhury, ‘‘A survey on MAC protocols for 1025
cognitive radio networks,’’ Ad Hoc Netw., vol. 7, no. 7, pp. 1315–1329, 1026
Sep. 2009. 1027
[2] T. Yucek and H. Arslan, ‘‘A survey of spectrum sensing algorithms for 1028
cognitive radio applications,’’ IEEE Commun. Surveys Tuts., vol. 11, no. 1, 1029
pp. 116–130, 2009. AQ:11030
[3] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, ‘‘Cognitive radio net- 1031
working and communications: An overview,’’ IEEE Trans. Veh. Technol., 1032
vol. 60, no. 7, pp. 3386–3407, Sep. 2011. 1033
[4] Y. Zou, Y.-D. Yao, and B. Zheng, ‘‘Cooperative relay techniques for cogni- 1034
tive radio systems: Spectrum sensing and secondary user transmissions,’’ 1035
IEEE Commun. Mag., vol. 50, no. 4, pp. 98–103, Apr. 2012. 1036
[5] Y.-C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang, ‘‘Sensing- 1037
throughput tradeoff for cognitive radio networks,’’ IEEE Trans. Wireless 1038
Commun., vol. 7, no. 4, pp. 1326–1337, Apr. 2008. 1039
[6] L. T. Tan and L. B. Le, ‘‘Distributed MAC protocol for cognitive radio 1040
networks: Design, analysis, and optimization,’’ IEEE Trans. Veh. Technol., 1041
vol. 60, no. 8, pp. 3990–4003, Oct. 2011. 1042
[7] L. T. Tan and L. B. Le, ‘‘Joint cooperative spectrum sensing and MAC 1043
protocol design for multi-channel cognitive radio networks,’’ EURASIP J. 1044
Wireless Commun. Netw., vol. 2014, p. 101, Dec. 2014. AQ:21045
[8] L. T. Tan and L. B. Le, ‘‘Channel assignment with access contention 1046
resolution for cognitive radio networks,’’ IEEE Trans. Veh. Technol., 1047
vol. 61, no. 6, pp. 2808–2823, Jul. 2012. 1048
14 VOLUME 3, 2015
IEEEProof
L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference
[9] Q. Zhao, L. Tong, A. Swami, and Y. Chen, ‘‘Decentralized cognitive1049
MAC for opportunistic spectrum access in ad hoc networks: A POMDP1050
framework,’’ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589–600,1051
Apr. 2007.1052
[10] H. Kim and K. G. Shin, ‘‘Efficient discovery of spectrum opportunities1053
with MAC-layer sensing in cognitive radio networks,’’ IEEE Trans. Mobile1054
Comput., vol. 7, no. 5, pp. 533–545, May 2008.1055
[11] F. Wang, M. Krunz, and S. Cui, ‘‘Price-based spectrum management in1056
cognitive radio networks,’’ IEEE J. Sel. Topics Signal Process., vol. 2, no. 1,1057
pp. 74–87, Feb. 2008.1058
[12] S. Haykin, D. J. Thomson, and J. H. Reed, ‘‘Spectrum sensing for cognitive1059
radio,’’ Proc. IEEE, vol. 97, no. 5, pp. 849–877, May 2009.1060
[13] E. Axell, G. Leus, E. G. Larsson, and H. V. Poor, ‘‘Spectrum sensing1061
for cognitive radio: State-of-the-art and recent advances,’’ IEEE Signal1062
Process. Mag., vol. 29, no. 3, pp. 101–116, May 2012.1063
[14] Y. R. Kondareddy and P. Agrawal, ‘‘Synchronized MAC protocol for1064
multi-hop cognitive radio networks,’’ in Proc. IEEE ICC, May 2008,1065
pp. 3198–3202.1066
[15] C. Thorpe and L. Murphy, ‘‘A survey of adaptive carrier sensing mecha-1067
nisms for IEEE 802.11 wireless networks,’’ IEEE Commun. Surveys Tuts.,1068
vol. 16, no. 3, pp. 1266–1293, 2014.1069
[16] G. Bianchi, ‘‘Performance analysis of the IEEE 802.11 distributed1070
coordination function,’’ IEEE J. Sel. Areas Commun., vol. 18, no. 3,1071
pp. 535–547, Mar. 2000.1072
[17] F. Cali, M. Conti, and E. Gregori, ‘‘Dynamic tuning of the IEEE 802.111073
protocol to achieve a theoretical throughput limit,’’ IEEE/ACM Trans.1074
Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.1075
[18] H. S. Chhaya and S. Gupta, ‘‘Performance modeling of asynchronous data1076
transfer methods of IEEE 802.11 MAC protocol,’’ Wireless Netw., vol. 3,1077
no. 3, pp. 217–234, Aug. 1997.1078
[19] I. F. Akyildiz, J. McNair, L. C. Martorell, R. Puigjaner, and Y. Yesha,1079
‘‘Medium access control protocols for multimedia traffic in wireless net-1080
works,’’ IEEE Netw., vol. 13, no. 4, pp. 39–47, Jul./Aug. 1999.1081
[20] M. Duarte, C. Dick, and A. Sabharwal, ‘‘Experiment-driven characteri-1082
zation of full-duplex wireless systems,’’ IEEE Trans. Wireless Commun.,1083
vol. 11, no. 12, pp. 4296–4307, Dec. 2012.1084
[21] E. Everett, A. Sahai, and A. Sabharwal, ‘‘Passive self-interference suppres-1085
sion for full-duplex infrastructure nodes,’’ IEEE Trans. Wireless Commun.,1086
vol. 13, no. 2, pp. 680–694, Jan. 2014.1087
[22] A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and1088
R. Wichman, ‘‘In-band full-duplex wireless: Challenges and opportu-1089
nities,’’ IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652,1090
Sep. 2014.1091
[23] D. Korpi, L. Anttila, V. Syrjala, and M. Valkama, ‘‘Widely linear digital1092
self-interference cancellation in direct-conversion full-duplex transceiver,’’1093
IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1674–1687, Sep. 2014.1094
[24] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, ‘‘Achieving single1095
channel, full duplex wireless communication,’’ in Proc. ACM 16th Annu.1096
Int. Conf. MobiCom, 2010, pp. 1–12.1097
[25] M. Jain et al., ‘‘Practical, real-time, full duplex wireless,’’ in Proc. ACM1098
17th Annu. Int. Conf. MobiCom, 2011, pp. 301–312.1099
[26] E. Hossain, L. B. Le, and D. Niyato, Radio Resource Management in Multi-1100
Tier Cellular Wireless Networks. New York, NY, USA: Wiley, 2013.1101
[27] L. B. Le et al., ‘‘Enabling 5G mobile wireless technologies,’’ EURASIP J.1102
Wireless Commun. Netw., vol. 2015, p. 218, Dec. 2015.1103
[28] M. Duarte et al., ‘‘Design and characterization of a full-duplex multi-1104
antenna system for WiFi networks,’’ IEEE Trans. Veh. Technol., vol. 63,1105
no. 3, pp. 1160–1177, Mar. 2014.1106
[29] S. Goyal, P. Liu, O. Gurbuz, E. Erkip, and S. Panwar, ‘‘A distributed MAC1107
protocol for full duplex radio,’’ in Proc. Asilomar Conf. Signals, Syst.,1108
Comput., Nov. 2013, pp. 788–792.1109
[30] D. Ramirez and B. Aazhang, ‘‘Optimal routing and power allocation for1110
wireless networks with imperfect full-duplex nodes,’’ IEEE Trans. Wireless1111
Commun., vol. 12, no. 9, pp. 4692–4704, Sep. 2013.1112
[31] W. Choi, H. Lim, and A. Sabharwal, ‘‘Power-controlled medium access1113
control protocol for full-duplex WiFi networks,’’ IEEE Trans. Wireless1114
Commun., vol. 14, no. 7, pp. 3601–3613, Jul. 2015.1115
[32] W. Cheng, X. Zhang, and H. Zhang, ‘‘Full-duplex spectrum-sensing 1116
and MAC-protocol for multichannel nontime-slotted cognitive radio net- 1117
works,’’ IEEE J. Sel. Areas Commun., vol. 33, no. 5, pp. 820–831, 1118
May 2015. 1119
[33] L. T. Tan and L. B. Le, ‘‘Distributed MAC protocol design for full-duplex 1120
cognitive radio networks,’’ in Proc. IEEE GLOBECOM, 2015. AQ:31121
[34] H. Kim, S. Lim, H. Wang, and D. Hong, ‘‘Optimal power allocation and 1122
outage analysis for cognitive full duplex relay systems,’’ IEEE Trans. 1123
Wireless Commun., vol. 11, no. 10, pp. 3754–3765, Oct. 2012. 1124
[35] J. Bang, J. Lee, S. Kim, and D. Hong, ‘‘An efficient relay selection strategy 1125
for random cognitive relay networks,’’ IEEE Trans. Wireless Commun., 1126
vol. 14, no. 3, pp. 1555–1566, Mar. 2015. 1127
[36] G. Zheng, I. Krikidis, and B. Ottersten, ‘‘Full-duplex cooperative cogni- 1128
tive radio with transmit imperfections,’’ IEEE Trans. Wireless Commun., 1129
vol. 12, no. 5, pp. 2498–2511, May 2013. 1130
LE THANH TAN (S’11–M’15) received the 1131
B.Eng. and M.Eng. degrees from the Ho Chi Minh 1132
City University of Technology, in 2002 and 2004, 1133
respectively, and the Ph.D. degree from the Institut 1134
National de la Recherche Scientifique–Énergie 1135
Matériaux Télécommunications, Canada, in 2015. 1136
He was a Lecturer with the Ho Chi Minh City 1137
University of Technical Education from 2002 to 1138
2010. He is currently a Post-Doctoral Research 1139
Associate with the École Polytechnique de 1140
Montréal, Canada. His current research activities focus on Internet of Things 1141
(IoT over LTE/LTE-A network, cyber-physical systems, big data, distributed 1142
sensing, and control), time series analysis and dynamic factor models 1143
(stationary and non-stationary), wireless communications and networking, 1144
cloud-RAN, cognitive radios (software defined radio architectures, proto- 1145
col design, spectrum sensing, detection, and estimation), statistical signal 1146
processing, random matrix theory, compressed sensing, and compressed 1147
sampling. He has served on TPCs of different international conferences, 1148
including the IEEE CROWNCOM, VTC, and PIMRC. 1149
AQ:4
LONG BAO LE (S’04–M’07–SM’12) received 1150
the B.Eng. degree in electrical engineering from 1151
the Ho Chi Minh City University of Technology, 1152
Vietnam, in 1999, the M.Eng. degree in telecom- 1153
munications from the Asian Institute of Technol- 1154
ogy, Thailand, in 2002, and the Ph.D. degree in 1155
electrical engineering from the University of Man- 1156
itoba, Canada, in 2007. He was a Post-Doctoral 1157
Researcher with the Massachusetts Institute of 1158
Technology (2008–2010) and the University of 1159
Waterloo (2007–2008). Since 2010, he has been with the Institut National 1160
de la Recherche Scientifique, Université du Québec, Montréal, QC, Canada, 1161
where he is currently an Associate Professor. He has co-authored the 1162
book entitled Radio Resource Management in Multi-Tier Cellular Wireless 1163
Networks (Wiley, 2013). His current research interests include smart grids, 1164
cognitive radio, radio resource management, network control and optimiza- 1165
tion, and emerging enabling technologies for 5G wireless systems. He is 1166
a member of the Editorial Board of the IEEE TRANSACTIONS ON WIRELESS 1167
COMMUNICATIONS, the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, and 1168
the IEEE WIRELESS COMMUNICATIONS LETTERS. He has served as a Technical 1169
Program Committee Chair/Co-Chair for several IEEE conferences, including 1170
the IEEE WCNC, the IEEE VTC, and the IEEE PIMRC. 1171
1172
VOLUME 3, 2015 15

More Related Content

PDF
PhD dissertation presentation
PPTX
MEDIUM ACCESS CONTROL
PPT
Common protocols
PPTX
A preamble-based approach for Providing QOS support in Wireless Sensor Network
PPTX
Distributed contention based mac protocol for cognitive radio
PDF
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
PDF
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
PhD dissertation presentation
MEDIUM ACCESS CONTROL
Common protocols
A preamble-based approach for Providing QOS support in Wireless Sensor Network
Distributed contention based mac protocol for cognitive radio
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...

What's hot (19)

PDF
Ea34772776
PDF
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...
PDF
System performance evaluation of fixed and adaptive resource allocation of 3 ...
PPTX
Mobile computing
PDF
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
DOCX
seminar report on multiple access control protocol submitted by munesh
PDF
Topic5
PPTX
WSN-Routing Protocols Energy Efficient Routing
PPTX
Media Access Control
PDF
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PPTX
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
PPT
Multiple Access in wireless communication
PPTX
Wierless networks ch3 (1)
PDF
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
PPTX
M.A.C (Medium Access Control)
PDF
Mac protocols sensor_20071105_slideshare
PPT
Mac adhoc (1)
PDF
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
PDF
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
Ea34772776
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
Mobile computing
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
seminar report on multiple access control protocol submitted by munesh
Topic5
WSN-Routing Protocols Energy Efficient Routing
Media Access Control
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Multiple Access in wireless communication
Wierless networks ch3 (1)
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
M.A.C (Medium Access Control)
Mac protocols sensor_20071105_slideshare
Mac adhoc (1)
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
Ad

Viewers also liked (6)

PDF
PhD dissertation presentation
PDF
Thesis_Tan_Le
PDF
journal_doublecol
PDF
MAC Protocol for Cognitive Radio Networks
PDF
IT6601 MOBILE COMPUTING
PhD dissertation presentation
Thesis_Tan_Le
journal_doublecol
MAC Protocol for Cognitive Radio Networks
IT6601 MOBILE COMPUTING
Ad

Similar to Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference (20)

PDF
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
PDF
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
PDF
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
PDF
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
PDF
IEEE paper
PDF
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
PDF
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
PDF
50120130405012
PDF
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
PDF
7 literature survey M.TECH ( PDF FILE )
DOCX
7 literature survey M.TECH ( M S WORD FILE )
PDF
Wireless communication system with frequency selective channel OFDM modulatio...
PDF
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PDF
Paper id 25201440
DOC
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
PDF
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
PDF
A017210110
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
PDF
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IEEE paper
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
50120130405012
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
7 literature survey M.TECH ( PDF FILE )
7 literature survey M.TECH ( M S WORD FILE )
Wireless communication system with frequency selective channel OFDM modulatio...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
Paper id 25201440
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
A017210110
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...

More from Polytechnique Montreal (17)

PDF
TechreportTan14
PDF
PDF
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
PDF
Performance of Spiked Population Models for Spectrum Sensing
PDF
Using Subspace Pursuit Algorithm to Improve Performance of the Distributed Co...
PDF
Simulation of A Communications System Using Matlab
PDF
Capacity Performance Analysis for Decode-and-Forward OFDMDual-Hop System
PDF
Tech report: Fair Channel Allocation and Access Design for Cognitive Ad Hoc N...
PDF
Performance of cognitive radio networks with maximal ratio combining over cor...
PDF
A novel and efficient mixed-signal compressed sensing for wide-band cognitive...
PDF
Projected Barzilai-Borwein Methods Applied to Distributed Compressive Spectru...
PDF
General analytical framework for cooperative sensing and access trade-off opt...
PDF
Channel assignment for throughput maximization in cognitive radio networks
PDF
Fair channel allocation and access design for cognitive ad hoc networks
PDF
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
PDF
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
TechreportTan14
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Performance of Spiked Population Models for Spectrum Sensing
Using Subspace Pursuit Algorithm to Improve Performance of the Distributed Co...
Simulation of A Communications System Using Matlab
Capacity Performance Analysis for Decode-and-Forward OFDMDual-Hop System
Tech report: Fair Channel Allocation and Access Design for Cognitive Ad Hoc N...
Performance of cognitive radio networks with maximal ratio combining over cor...
A novel and efficient mixed-signal compressed sensing for wide-band cognitive...
Projected Barzilai-Borwein Methods Applied to Distributed Compressive Spectru...
General analytical framework for cooperative sensing and access trade-off opt...
Channel assignment for throughput maximization in cognitive radio networks
Fair channel allocation and access design for cognitive ad hoc networks
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Approach and Philosophy of On baking technology
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25-Week II
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Approach and Philosophy of On baking technology
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Assigned Numbers - 2025 - Bluetooth® Document
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
A comparative analysis of optical character recognition models for extracting...
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference

  • 1. IEEEProof Received November 8, 2015, accepted December 10, 2015. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2015.2509449 Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference LE THANH TAN, (Member, IEEE), AND LONG BAO LE, (Senior Member, IEEE) Institut National de la Recherche Scientifique-Énergie, Matériaux et Télécommunications, Université du Québec, Montreal, QC J3X 1S2, Canada Corresponding author: L. T. Le (long.le@emt.inrs.ca) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ABSTRACT In this paper, we propose an adaptive medium access control (MAC) protocol for full-duplex (FD) cognitive radio networks in which FD secondary users (SUs) perform channel contention followed by concurrent spectrum sensing and transmission, and transmission only with maximum power in two different stages (called the FD sensing and transmission stages, respectively) in each contention and access cycle. The proposed FD cognitive MAC (FDC-MAC) protocol does not require synchronization among SUs, and it efficiently utilizes the spectrum and mitigates the self-interference in the FD transceiver. We develop a mathematical model to analyze the throughput performance of the FDC-MAC protocol, where both half-duplex (HD) transmission and FD transmission modes are considered in the transmission stage. Then, we study the FDC-MAC configuration optimization through adaptively controlling the spectrum sensing duration and transmit power level in the FD sensing stage. We prove that there exists optimal sensing time and transmit power to achieve the maximum throughput, and we develop an algorithm to configure the proposed FDC-MAC protocol. Extensive numerical results are presented to illustrate the optimal FDC-MAC configuration and the impacts of protocol parameters and the self-interference cancellation quality on the throughput performance. Moreover, we demonstrate the significant throughput gains of the FDC-MAC protocol with respect to the existing HD MAC and single-stage FD MAC protocols. 16 17 18 INDEX TERMS Asynchronous MAC, full-duplex MAC, full-duplex spectrum sensing, optimal sensing duration, throughput maximization, self-interference control, full-duplex cognitive radios, throughput analysis. I. INTRODUCTION19 Engineering MAC protocols for efficient sharing of white20 spaces is an important research topic in cognitive radio21 networks (CRNs). One critical requirement for the cognitive22 MAC design is that transmissions on the licensed frequency23 band from primary users (PUs) should be satisfactorily pro-24 tected from the SUs’ spectrum access. Therefore, a cognitive25 MAC protocol for the secondary network must realize both26 the spectrum sensing and access functions so that timely27 detection of the PUs’ communications and effective spectrum28 sharing among SUs can be achieved. Most existing research29 works on cognitive MAC protocols have focused on the30 design and analysis of HD MAC (e.g., see [1]–[4] and the31 references therein).32 Due to the HD constraint, SUs typically employ a33 two-stage sensing/access procedure where they perform34 spectrum sensing in the first stage before accessing35 available spectrum for data transmission in the second 36 stage [5]–[11]. The HD constraint also requires SUs be syn- 37 chronized during the spectrum sensing stage, which could 38 be difficult to achieve in practice. In fact, spectrum sensing 39 enables SUs to detect white spaces that are not occupied by 40 PUs [2]–[8], [12], [13]; therefore, imperfect spectrum sens- 41 ing can reduce the spectrum utilization due to failure in 42 detecting white spaces and potentially result in collisions 43 with active PUs. Consequently, sophisticated design and 44 parameter configuration of cognitive MAC protocols must be 45 conducted to achieve good performance while appropriately 46 protecting PUs [1], [6]–[11], [14]. As a result, traditional 47 MAC protocols [15]–[19] adapted to the CRN may not 48 provide satisfactory performance. 49 In general, HD MAC protocols may not exploit white 50 spaces very efficiently since significant sensing time may 51 be required, which would otherwise be utilized for data 52 VOLUME 3, 2015 2169-3536 2015 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. 1
  • 2. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference transmission. Moreover, SUs may not timely detect the PUs’53 activity during their transmissions, which can cause severe54 interference to active PUs. Thanks to recent advances on55 FD technologies, a FD radio can transmit and receive56 data simultaneously on the same frequency band [20]–[25].57 In fact, the FD technology can be integrated into58 next-generation wireless networks, e.g., small cell networks59 and heterogeneous wireless networks [26], [27], to signifi-60 cantly enhance the network performance. One of the most61 critical issues of wireless FD communication is the presence62 of self-interference, which is caused by power leakage from63 the transmitter to the receiver of a FD transceiver. The64 self-interference may indeed lead to serious communication65 performance degradation of FD wireless systems. Despite66 recent advances on self-interference cancellation (SIC) tech-67 niques [21]–[23] (e.g., propagation SIC, analog-circuit SIC,68 and digital baseband SIC), self-interference still exists due69 to various reasons such as the limitation of hardware and70 channel estimation errors.71 A. RELATED WORKS72 There are some recent works that propose to exploit the73 FD communications for MAC-level channel access in multi-74 user wireless networks [25]–[31]. In [25], the authors develop75 a centralized MAC protocol to support asymmetric data76 traffic where network nodes may transmit data packets of77 different lengths, and they propose to mitigate the hidden78 node problem by employing a busy tone. To overcome this79 hidden node problem, Duarte et al. propose to adapt the80 standard 802.11 MAC protocol with the RTS/CTS handshake81 in [28]. Moreover, Goyal et al. in [29] extend this study82 to consider interference between two nodes due to their83 concurrent transmissions. Different from conventional84 wireless networks, designing MAC protocols in CRNs is85 more challenging because the spectrum sensing function86 must be efficiently integrated into the MAC protocol.87 In addition, the self-interference must be carefully addressed88 in the simultaneous spectrum sensing and access to mitigate89 its negative impacts on the sensing and throughput90 performance.91 The FD technology has been employed for more efficient92 spectrum access design in cognitive radio networks [32]–[35]93 where SUs can perform sensing and transmission simulta-94 neously. In [32], a FD MAC protocol is developed which95 allows simultaneous spectrum access of the SU and PU net-96 works where both PUs and SUs are assumed to employ the97 p-persistent MAC protocol for channel contention resolu-98 tion and access. This design is, however, not applicable99 to the hierarchical spectrum access in the CRNs where100 PUs should have higher spectrum access priority compared101 to SUs.102 In our previous work [33], we propose the FD MAC103 protocol by using the standard backoff mechanism as in104 the 802.11 MAC protocol where we employ concurrent FD105 sensing and access during the data transmission phase as106 well as frame fragmentation. Moreover, engineering of a107 cognitive FD relaying network is considered in [34] and [35], 108 where various resource allocation algorithms to improve the 109 outage probability are proposed. In addition, the authors 110 in [30] develop the joint routing and distributed resource 111 allocation for FD wireless networks. In [31], Choi et al. 112 study the distributed power allocation for a hybrid FD/HD 113 system where all network nodes operate in the HD mode 114 but the access point (AP) communicates by using the FD 115 mode. In practice, it would be desirable to design an adapt- 116 able MAC protocol, which can be configured to operate in 117 an optimal fashion depending on specific channel and net- 118 work conditions. This design will be pursued in our current 119 work. 120 B. OUR CONTRIBUTIONS 121 In this paper, we make a further bold step in designing, 122 analyzing, and optimizing an adaptive FDC–MAC protocol 123 for CRNs, where the self-interference and imperfect 124 spectrum sensing are explicitly considered. In particular, 125 the contributions of this paper can be summarized 126 as follows. 127 1) We propose a novel FDC–MAC protocol that can effi- 128 ciently exploit the FD transceiver for spectrum sens- 129 ing and access of the white space without requiring 130 synchronization among SUs. In this protocol, after the 131 p-persistent based channel contention phase, the 132 winning SU enters the data phase consisting of two 133 stages, i.e., concurrent sensing and transmission in the 134 first stage (called FD sensing stage) and transmission 135 only in the second stage (called transmission stage). 136 The developed FDC–MAC protocol, therefore, enables 137 the optimized configuration of transmit power level 138 and sensing time during the FD sensing stage to mit- 139 igate the self-interference and appropriately protect the 140 active PU. After the FD sensing stage, the SU can 141 transmit with the maximum power to achieve the 142 highest throughput. 143 2) We develop a mathematical model for throughput per- 144 formance analysis of the proposed FDC-MAC proto- 145 col considering the imperfect sensing, self-interference 146 effects, and the dynamic status changes of the PU. 147 In addition, both one-way and two-way transmission 148 scenarios, which are called HD transmission (HDTx) 149 and FD transmission (FDTx) modes, respectively, are 150 considered in the analysis. Since the PU can change its 151 idle/active status during the FD sensing and transmis- 152 sion stages, different potential status-change scenarios 153 are studied in the analytical model. 154 3) We study the optimal configuration of FDC-MAC 155 protocol parameters including the SU’s sensing dura- 156 tion and transmit power to maximize the achievable 157 throughput under both FDTx and HDTx modes. 158 We prove that there exists an optimal sensing time to 159 achieve the maximum throughput for a given transmit 160 power value during the FD sensing stage under both 161 FDTx and HDTx modes. Therefore, optimal protocol 162 2 VOLUME 3, 2015
  • 3. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference parameters can be determined through standard163 numerical search methods.164 4) Extensive numerical results are presented to illustrate165 the impacts of different protocol parameters on the166 throughput performance and the optimal configura-167 tions of the proposed FDC-MAC protocol. Moreover,168 we show the significant throughput enhancement169 of the proposed FDC-MAC protocol compared170 to existing cognitive MAC protocols, namely the171 HD MAC protocol and a single-stage FD MAC pro-172 tocol with concurrent sensing and access during the173 whole data phase. Specifically, our FDC-MAC pro-174 tocol achieves higher throughput with the increasing175 maximum power while the throughput of the176 single-stage FD MAC protocol decreases with the177 maximum power in the high power regime due178 to the self-interference. Moreover, the proposed179 FDC-MAC protocol significantly outperforms the HD180 MAC protocol in terms of system throughput.181 The remaining of this paper is organized as follows.182 Section II describes the system and PU models. FDC–MAC183 protocol design, and throughput analysis are performed in184 Section III. Then, Section IV studies the optimal con-185 figuration of the proposed FDC–MAC protocol. Section V186 demonstrates numerical results followed by concluding187 remarks in Section VI.188 II. SYSTEM AND PU ACTIVITY MODELS189 A. SYSTEM MODEL190 We consider a cognitive radio network where n0 pairs of191 SUs opportunistically exploit white spaces on one channel192 for communications. We assume that each SU is equipped193 with a FD transceiver; hence, the SUs can perform sens-194 ing and transmission simultaneously. However, the sensing195 performance of each SU is affected by the self-interference196 from its transmitter since the transmitted power is leaked197 into the received signal. We denote I(P) as the average self-198 interference power, which is modeled as I(P) = ζ (P)ξ [20]199 where P is the SU’s transmit power, ζ and ξ (0 ≤ ξ ≤ 1)200 are predetermined coefficients which represent the quality201 of self-interference cancellation (QSIC). In this work, we202 design a asynchronous cognitive MAC protocol where no203 synchronization is required among SUs and between SUs and204 the PU. We assume that different pairs of SUs can overhear205 transmissions from the others (i.e., a collocated network is206 assumed). In the following, we refer to pair i of SUs as SU i207 for brevity.208 B. PRIMARY USER ACTIVITY209 We assume that the PU’s idle/active status follows two210 independent random processes. We say that the channel is211 available and busy for SUs’ access if the PU is in the idle and212 active (or busy) states, respectively. Let H0 and H1 denote the213 events that the PU is idle and active, respectively. To protect214 the PU, we assume that SUs must stop their transmissions215 and evacuate from the busy channel within the maximum216 delay of Teva, which is referred to as channel evacuation 217 time. 218 Let τac and τid denote the random variables which repre- 219 sent the durations of active and idle channel states, respec- 220 tively. We denote probability density functions (pdf) of τac 221 and τid as fτac (t) and fτid (t), respectively. While most results 222 in this paper can be applied to general pdfs fτac (t) and fτid (t), 223 we mostly consider the exponential pdf in the analysis. 224 In addition, let P (H0) = ¯τid ¯τid+¯τac and P (H1) = 1 − P (H0) 225 present the probabilities that the channel is available and 226 busy, respectively where ¯τid and ¯τac denote the average values 227 of τac and τid, respectively. We assume that the probabilities 228 that τac and τid are smaller than Teva are sufficiently small 229 (i.e., the PU changes its status slowly) so that we can ignore 230 events with multiple idle/active status changes in one channel 231 evacuation interval Teva. 232 III. FULL-DUPLEX COGNITIVE MAC PROTOCOL 233 In this section, we describe the proposed FDC-MAC protocol 234 and conduct its throughput analysis considering imperfect 235 sensing, self-interference of the FD transceiver, and dynamic 236 status change of the PUs. 237 A. FDC-MAC PROTOCOL DESIGN 238 The proposed FDC-MAC protocol integrates three important 239 elements of a cognitive MAC protocol, namely contention 240 resolution, spectrum sensing, and access functions. 241 Specifically, SUs employ the p-persistent CSMA princi- 242 ple [17] for contention resolution where each SU with data 243 to transmit attempts to capture an available channel with 244 a probability p after the channel is sensed to be idle dur- 245 ing the standard DIFS interval (DCF Interframe Space). 246 If a particular SU decides not to transmit (with probability 247 of 1 − p), it will sense the channel and attempt to trans- 248 mit again in the next slot of length σ with probability p. 249 To complete the reservation, the four-way handshake with 250 Request-to-Send/Clear-to-Send (RTS/CST) exchanges [16] 251 is employed to reserve the available channel for transmission. 252 Specifically, the secondary transmitter sends RTS to the 253 secondary receiver and waits until it successfully receives 254 the CTS from the secondary receiver. All other SUs, which 255 hear the RTS and CTS exchange from the winning SU, defer 256 to access the channel for a duration equal to the data trans- 257 mission time, T. Then, an acknowledgment (ACK) from the 258 SU’s receiver is transmitted to its corresponding transmitter 259 to notify the successful reception of a packet. Furthermore, 260 the standard small interval, namely SIFS (Short Interframe 261 Space), is used before the transmissions of CTS, ACK, and 262 data frame as in the standard 802.11 MAC protocol [16]. 263 In our design, the data phase after the channel con- 264 tention phase comprises two stages where the SU performs 265 concurrent sensing and transmission in the first stage with 266 duration TS and transmission only in the second stage with 267 duration T − TS. Here, the SU exploits the FD capability of 268 its transceiver to realize concurrent sensing and transmission 269 VOLUME 3, 2015 3
  • 4. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference FIGURE 1. Timing diagram of the proposed full-duplex cognitive MAC protocol. the first stage (called FD sensing stage) where the sensing270 outcome at the end of this stage (i.e., an idle or busy channel271 status) determines its further actions as follows. Specifically,272 if the sensing outcome indicates an available channel then273 the SU transmits data in the second stage; otherwise, it274 remains silent for the remaining time of the data phase with275 duration T − TS.276 We assume that the duration of the SU’s data phase T is277 smaller than the channel evacuation time Teva so timely278 evacuation from the busy channel can be realized with reli-279 able FD spectrum sensing. Therefore, our design allows280 to protect the PU with evacuation delay at most T if the281 MAC carrier sensing during the contention phase and282 the FD spectrum sensing in the data phase are perfect.283 Furthermore, we assume that the SU transmits at power levels284 Psen ≤ Pmax and Pdat = Pmax during the FD sensing285 and transmission stages, respectively where Pmax denotes286 the maximum power and the transmit power Psen in the287 FD sensing stage will be optimized to effectively mitigate288 the self-interference and achieve good sensing-throughput289 tradeoff. The timing diagram of the proposed FDC–MAC290 protocol is illustrated in Fig. 1.291 We allow two possible operation modes in the transmission 292 stage. The first is the HD transmission mode (HDTx mode) 293 where there is only one direction of data transmission from 294 the SU transmitter to the SU receiver. In this mode, there 295 is no self-interference in the transmission stage. The second 296 is the FD transmission mode (FDTx mode) where two-way 297 communications between the pair of SUs are assumed 298 (i.e., there are two data flows between the two SU nodes in 299 opposite directions). In this mode, the achieved throughput 300 can be potentially enhanced (at most doubling the throughput 301 of the HDTx mode) but self-interference must be taken into 302 account in throughput quantification. 303 Our proposed FDC–MAC protocol design indeed enables 304 flexible and adaptive configuration, which can efficiently 305 exploit the capability of the FD transceiver. Specifically, if the 306 duration of the FD sensing stage is set equal to the duration 307 of the whole data phase (i.e., TS = T), then the SU per- 308 forms concurrent sensing and transmission for the whole data 309 phase as in our previous design [33]. This configuration may 310 degrade the achievable throughput since the transmit power 311 during the FD sensing stage is typically set smaller Pmax 312 to mitigate the self-interference and achieve the required 313 4 VOLUME 3, 2015
  • 5. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference sensing performance. We will refer the corresponding MAC314 protocol with TS = T as one-stage FD MAC in the sequel.315 Moreover, if we set the SU transmit power Psen in the316 sensing stage equal to zero, i.e., Psen = 0, then we317 achieve the traditional two-stage cognitive HD MAC protocol318 where sensing and transmission are performed sequentially319 in two different stages [6], [8]. Moreover, the proposed320 FDC–MAC protocol is more flexible than existing321 designs [6], [8], [33] since different existing designs can322 be achieved through suitable configuration of its protocol323 parameters. It will be demonstrated later that the proposed324 FDC–MAC protocol achieves significant better throughput325 than that of the existing cognitive MAC protocols. In the326 following, we present the throughput analysis based on which327 the protocol configuration optimization can be performed.328 B. THROUGHPUT ANALYSIS329 We now conduct the saturation throughput analysis for the330 secondary network where all SUs are assumed to always331 have data to transmit. The resulting throughput can be served332 as an upper bound for the throughput in the non-saturated333 scenario [16]. This analysis is performed by studying one334 specific contention and access cycle (CA cycle) with the335 contention phase and data phase as shown in Fig. 1. Without336 loss of generality, we will consider the normalized throughput337 achieved per one unit of system bandwidth (in bits/s/Hz).338 Specifically, the normalized throughput of the FDC–MAC339 protocol can be expressed as340 NT = B Tove + T , (1)341 where Tove represents the time overhead required for one342 successful channel reservation (i.e., successful RTS/CTS343 exchanges), T denotes the packet transmission time, and B344 denotes the amount of data (bits) transmitted in one CA cycle345 per one unit of system bandwidth, which is expressed in346 bits/Hz. To complete the throughput analysis, we derive the347 quantities Tove and B in the remaining of this subsection.348 1) DERIVATION OF Tove349 The average time overhead for one successful channel reser-350 vation can be calculated as351 Tove = Tcont + 2SIFS + 2PD + ACK, (2)352 where ACK is the length of an ACK message, SIFS is the353 length of a short interframe space, and PD is the propagation354 delay where PD is usually small compared to the slot size σ,355 and Tcont denotes the average time overhead due to idle356 periods, collisions, and successful transmissions of RTS/CTS357 messages in one CA cycle. For better presentation of the358 paper, the derivation of Tcont is given in Appendix A.359 2) DERIVATION OF B360 To calculate B, we consider all possible cases that capture361 the activities of SUs and status changes of the PU in the362 FDC-MAC data phase of duration T. Because the PU’s activ-363 ity is not synchronized with the SU’s transmission, the PU can364 change its idle/active status any time. We assume that there 365 can be at most one transition between the idle and active states 366 of the PU during one data phase interval. This is consistent 367 with the assumption on the slow status changes of the PU as 368 described in Section II-B since T < Teva. Furthermore, we 369 assume that the carrier sensing of the FDC-MAC protocol 370 is perfect; therefore, the PU is idle at the beginning of the 371 FDC-MAC data phase. Note that the PU may change its status 372 during the SU’s FD sensing or transmission stage, which 373 requires us to consider different possible events in the data 374 phase. 375 We use hij (i, j ∈ {0, 1}) to represent events capturing status 376 changes of the PU in the FD sensing stage and transmission 377 stage where i = 0 and i = 1 represent the idle and active 378 states of the PU, respectively. For example, if the PU is idle 379 during the FD sensing stage and becomes active during the 380 transmission stage, then we represent this event as (h00, h01) 381 where sub-events h00 and h01 represent the status changes in 382 the FD sensing and transmission stages, respectively. More- 383 over, if the PU changes from the idle to the active state during 384 the FD sensing stage and remains active in the remaining of 385 the data phase, then we represent this event as (h01, h11). 386 It can be verified that we must consider the following three 387 cases with the corresponding status changes of the PU during 388 the FDC-MAC data phase to analyze B. 389 • Case 1: The PU is idle for the whole FDC-MAC data 390 phase (i.e., there is no PU’s signal in both FD sensing 391 and transmission stages) and we denote this event as 392 (h00, h00). The average number of bits (in bits/Hz) trans- 393 mitted during the data phase in this case is denoted as B1. 394 • Case 2: The PU is idle during the FD sensing stage but 395 the PU changes from the idle to the active status in the 396 transmission stage. We denote the event corresponding 397 to this case as (h00, h01) where h00 and h01 capture the 398 sub-events in the FD sensing and transmission stages, 399 respectively. The average number of bits (in bits/Hz) 400 transmitted during the data phase in this case is repre- 401 sented by B2. 402 • Case 3: The PU is first idle then becomes active during 403 the FD sensing stage and it remains active during the 404 whole transmission stage. Similarly we denote this event 405 as (h01, h11) and the average number of bits (in bits/Hz) 406 transmitted during the data phase in this case is denoted 407 as B3. 408 Then, we can calculate B as follows: 409 B = B1 + B2 + B3. (3) 410 To complete the analysis, we will need to derive B1, B2, 411 and B3, which are given in Appendix B. 412 IV. FDC–MAC PROTOCOL CONFIGURATION FOR 413 THROUGHPUT MAXIMIZATION 414 In this section, we study the optimal configuration of the 415 proposed FDC–MAC protocol to achieve the maximum 416 throughput while satisfactorily protecting the PU. 417 VOLUME 3, 2015 5
  • 6. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference A. PROBLEM FORMULATION418 Let NT (TS, p, Psen) denote the normalized secondary419 throughput, which is the function of the sensing time TS,420 transmission probability p, and the SU’s transmit power Psen421 in the FD sensing stage. In the following, we assume422 a fixed frame length T, which is set smaller the required423 evacuation time Teva to achieve timely evacuation from a424 busy channel for the SUs. We are interested in determining425 suitable configuration for p, TS and Psen to maximize the sec-426 ondary throughput, NT (TS, p, Psen). In general, the optimal427 transmission probability p should balance between reducing428 collisions among SUs and limiting the protocol overhead.429 However, the achieved throughput is less sensitive to the430 transmission probability p as will be demonstrated later via431 the numerical study. Therefore, we will seek to optimize the432 throughput over Psen and TS for a reasonable and fixed value433 of p.434 For brevity, we express the throughput as a function of Psen435 and TS only, i.e., NT (TS, Psen). Suppose that the PU requires436 that the average detection probability is at least Pd . Then, the437 throughput maximization problem can be stated as follows:438 max TS ,Psen NT (TS, Psen)439 s.t. ˆPd (ε, TS) ≥ Pd ,440 0 ≤ Psen ≤ Pmax, 0 ≤ TS ≤ T, (4)441 where Pmax is the maximum power for SUs, and TS is upper442 bounded by T. In fact, the first constraint on ˆPd (ε, TS)443 implies that the spectrum sensing should be sufficiently444 reliable to protect the PU which can be achieved with suf-445 ficiently large sensing time TS. Moreover, the SU’s transmit446 power Psen must be appropriately set to achieve good tradeoff447 between the network throughput and self-interference448 mitigation.449 B. PARAMETER CONFIGURATION FOR FDC–MAC450 PROTOCOL451 To gain insights into the parameter configuration of the452 FDC–MAC protocol, we first study the optimization with453 respect to the sensing time TS for a given Psen. For any454 value of TS, we would need to set the sensing detection455 threshold ε so that the detection probability constraint is met456 with equality, i.e., ˆPd (ε, TS) = Pd as in [5] and [6]. Since457 the detection probability is smaller in Case 3 (i.e., the PU458 changes from the idle to active status during the FD sensing459 stage of duration TS) compared to that in Case 1 and Case 2460 (i.e., the PU remains idle during the FD sensing stage) consid-461 ered in the previous section, we only need to consider Case 3462 to maintain the detection probability constraint. The average463 probability of detection for the FD sensing in Case 3 can be464 expressed as465 ˆPd = TS 0 P01 d (t)fτid (t |0 ≤ t ≤ TS ) dt, (5)466 where t denotes the duration from the beginning of the FD467 sensing stage to the instant when the PU changes to the active468 Algorithm 1 FDC-MAC Configuration Algorithm 1: for each considered value of Psen ∈ [0, Pmax] do 2: Find optimal TS for problem (7) using the bisection method as TS (Psen) = argmax 0≤TS ≤T NT (T, Psen). 3: end for 4: The final solution T∗ S , P∗ sen is determined as T∗ S , P∗ sen = argmax Psen,TS (Psen) NT (TS (Psen) , Psen). state, and fτid (t |A) is the pdf of τid conditioned on event A 469 capturing the condition 0 ≤ t ≤ TS, which is given as 470 fτid (t |A) = fτid (t) Pr {A} = 1 ¯τid exp(− t ¯τid ) 1 − exp(−TS ¯τid ) . (6) 471 Note that P01 d (t) is derived in Appendix C and fτid (t) is given 472 in (18). 473 We consider the following single-variable optimization 474 problem for a given Psen: 475 max 0<TS ≤T NT (TS, Psen) . (7) 476 We characterize the properties of function NT (TS, Psen) 477 with respect to TS for a given Psen in the following theorem 478 whose proof is provided in Appendix D. For simplicity, the 479 throughput function is written as NT (TS). 480 Theorem 1: The objective function NT(TS) of (7) satisfies 481 the following properties 482 1) lim TS →0 ∂NT ∂TS = +∞, 483 2) a) For HDTx mode with ∀Psen and FDTx mode with 484 Psen < Psen, we have lim TS →T ∂NT ∂TS < 0, 485 b) For FDTx mode with Psen > Psen, we have 486 lim TS →T ∂NT ∂TS > 0, 487 3) ∂2NT ∂T2 S < 0, ∀TS, 488 4) The objective function NT(TS) is bounded from above, 489 where Psen = N0 1 + Pdat N0+ζP ξ dat 2 − 1 is the critical 490 value of Psen such that lim TS →T ∂NT ∂TS = 0. 491 We would like to discuss the properties stated in 492 Theorem 1. For the HDTx mode with ∀Psen and FDTx mode 493 with low Psen, then properties 1, 2a, and 4 imply that there 494 must be at least one TS in [0, T] that maximizes NT (TS). 495 The third property implies that this maximum is indeed 496 unique. Moreover, for the FDTx with high Psen, then 497 properties 1, 2b, 3 and 4 imply that NT(TS) increases 498 in [0, T]. Hence, the throughput NT(TS) achieves its maxi- 499 mum with sensing time TS = T. We propose an algorithm 500 to determine optimal (TS, Psen), which is summarized in 501 Algorithm 1. Here, we can employ the bisection scheme and 502 other numerical methods to determine the optimal value TS 503 for a given Psen. 504 6 VOLUME 3, 2015
  • 7. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference V. NUMERICAL RESULTS505 For numerical studies, we set the key parameters for the506 FDC–MAC protocol as follows: mini-slot duration is507 σ = 20µs; PD = 1µs; SIFS = 2σ µs; DIFS = 10σ µs;508 ACK = 20σ µs; CTS = 20σ µs; RTS = 20σ µs. Other509 parameters are chosen as follows unless stated otherwise:510 the sampling frequency fs = 6 MHz; bandwidth of PU’s511 signal 6 MHz; Pd = 0.8; T = 15 ms; p = 0.0022; the512 SNR of the PU signal at each SU γP = Pp N0 = −20 dB;513 varying self-interference parameters ζ and ξ. Without loss514 of generality, the noise power is normalized to one; hence,515 the SU transmit power Psen becomes Psen = SNRs; and we516 set Pmax = 15dB.517 We first study the impacts of self-interference parameters518 on the throughput performance with the following parameter519 setting: (¯τid, ¯τac) = (1000, 100) ms, Pmax = 25 dB, Teva =520 40 ms, ζ = 0.4, ξ is varied in ξ = {0.12, 0.1, 0.08, 0.05},521 and Pdat = Pmax. Recall that the self-interference depends522 on the transmit power P as I(P) = ζ (P)ξ where P = Psen523 and P = Pdat in the FD sensing and transmission stages,524 respectively. Fig. 2 illustrates the variations of the throughput525 versus the transmission probability p. It can be observed that526 when ξ decreases (i.e., the self-interference is smaller), the527 achieved throughput increases. This is because SUs can trans-528 mit with higher power while still maintaining the sensing con-529 straint during the FD sensing stage, which leads to throughput530 improvement. The optimal Psen corresponding to these val-531 ues of ξ are Psen = SNRs = {25.00, 18.01, 14.23, 11.28} dB532 and the optimal probability of transmission is p∗ = 0.0022533 as indicated by a star symbol. Therefore, to obtain all other534 results in this section, we set p∗ = 0.0022.535 FIGURE 2. Normalized throughput versus transmission probability p for T = 18 ms, ¯τid = 1000 ms, ¯τac = 100 ms, and varying ξ. Fig. 3 illustrates the throughput performance versus536 number of SUs n0 when we keep the same parameter set-537 tings as those for Fig. 2 and p∗ = 0.0022. Again, when538 ξ decreases (i.e., the self-interference becomes smaller), the539 achieved throughput increases. In this figure, the optimal540 FIGURE 3. Normalized throughput versus the number of SUs n0 for T = 18 ms, p = 0.0022, ¯τid = 1000 ms, ¯τac = 100 ms, and varying ξ. FIGURE 4. Normalized throughput versus SU transmit power Psen and sensing time TS for p = 0.0022, ¯τid = 500 ms, ¯τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.7 and FDTx with Pdat = 15 dB. SNRs achieving the maximum throughput corresponding 541 to the considered values of ξ are Psen = SNRs = 542 {25.00, 18.01, 14.23, 11.28} dB, respectively. 543 We now verify the results stated in Theorem 1 for the FDTx 544 mode. Specifically, Fig. 4 shows the throughput performance 545 for the scenario where the QSIC is very low with large ξ and ζ 546 where we set the network parameters as follows: p = 0.0022, 547 ¯τid = 500 ms, ¯τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.7, 548 and Pdat = 15 dB. Moreover, we can obtain Psen as in (42) 549 in Appendix D, which is equal to Psen = 6.6294 dB. In this 550 figure, the curve indicated by asterisks, which corresponds to 551 Psen = Psen, shows the monotonic increase of the through- 552 put with sensing time TS and other curves corresponding 553 to Psen > Psen have the same characteristic. In contrast, 554 all remaining curves (corresponding to Psen < Psen) first 555 increase to the maximum values and then decrease as we 556 increase TS. 557 Fig. 5 illustrates the throughput performance for the very 558 high QSIC with small ξ and ζ where we set the network 559 VOLUME 3, 2015 7
  • 8. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference FIGURE 5. Normalized throughput versus SU transmit power Psen and sensing time TS for p = 0.0022, ¯τid = 500 ms, ¯τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.08 and FDTx with Pdat = 15 dB. parameters as follows: p = 0.0022, ¯τid = 500 ms,560 ¯τac = 50 ms, n0 = 40, ξ = 1, ζ = 0.08, and561 Pdat = 15 dB. Moreover, we can obtain Psen as in (42) in562 Appendix D, which is equal to Psen = 19.9201 dB. We have563 Psen < Pmax = 15dB < Psen in this scenario; hence, all564 the curves first increases to the maximum throughput and565 then decreases with the increasing TS. Therefore, we have566 correctly validated the properties stated in Theorem 1.567 Now we investigate the throughput performance versus SU568 transmit power Psen and sensing time TS for the case of569 high QSIC with ξ = 0.95 and ζ = 0.08. Fig. 6 shows the570 throughput versus the SU transmit power Psen and sensing571 time TS for the FDTx mode with Pdat = 15 dB, p = 0.0022,572 ¯τid = 150 ms, ¯τac = 50 ms, and n0 = 40. It can be observed573 that there exists an optimal configuration of the SU transmit574 power P∗ sen = 4.6552 dB and sensing time T∗ S = 2.44 ms to575 FIGURE 6. Normalized throughput versus SU transmit power Psen and sensing time TS for p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.08 and FDTx with Pdat = 15 dB. achieve the maximum throughput NT T∗ S , P∗ sen = 2.3924, 576 which is indicated by a star symbol. These results confirm that 577 SUs must set appropriate sensing time and transmit power for 578 the FDC–MAC protocol to achieve the maximize throughput, 579 which cannot be achieved by setting Ts = T as proposed in 580 existing designs such as in [33]. 581 FIGURE 7. Normalized throughput versus SU transmit power Psen and sensing time TS for p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.8 and FDTx with Pdat = 15 dB. In Fig. 7, we present the throughput versus the SU transmit 582 power Psen and sensing time TS for the low QSIC sce- 583 nario where p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, 584 Pmax = 15 dB, n0 = 40, ξ = 0.95, and ζ = 0.8. The 585 optimal configuration of SU transmit power P∗ sen = 15 dB 586 and sensing time T∗ S = 15 ms to achieve the maximum 587 throughput NT T∗ S , P∗ sen = 1.6757 is again indicated 588 by a star symbol. Under this optimal configuration, the FD 589 sensing is performed during the whole data phase (i.e., there 590 is no transmission stage). In fact, to achieve the maximum 591 throughput, the SU must provide the satisfactory sensing 592 performance and attempt to achieve high transmission rate. 593 Therefore, if the QSIC is low, the data rate achieved during 594 the transmission stage can be lower than that in the FD sens- 595 ing stage because of the very strong self-interference in the 596 transmission stage. Therefore, setting longer FD sensing time 597 enables to achieve more satisfactory sensing performance 598 and higher transmission rate, which explains that the optimal 599 configuration should set T∗ S = T for the low QSIC scenario. 600 This protocol configuration corresponds to existing design 601 in [33], which is a special case of the proposed FDC–MAC 602 protocol. 603 We now investigate the throughput performance with 604 respect to the SU transmit power Psen and sensing time TS 605 for the HDTx mode. Fig. 8 illustrates the throughput per- 606 formance for the high QSIC scenario with ξ = 0.95 and 607 ζ = 0.08. It can be observed that there exists an optimal 608 configuration of SU transmit power P∗ sen = 5.6897 dB 609 and sensing time T∗ S = 3.5 ms to achieve the maximum 610 throughput NT T∗ S , P∗ sen = 1.4802, which is indicated 611 8 VOLUME 3, 2015
  • 9. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference FIGURE 8. Normalized throughput versus SU transmit power Psen and sensing time TS for p = 0.0022, ¯τid = 150 ms, ¯τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.08 and HDTx. by a star symbol. The maximum achieved throughput of the612 HDTx mode is lower than that in the FDTx mode presented in613 Fig. 6. This is because with high QSIC, the FDTx mode can614 transmit more data than the HDTx mode in the transmission615 stage.616 In Fig. 9, we show the throughput versus the SU transmit617 power Psen for TS = 2.2 ms, p = 0.0022, ¯τid = 1000 ms,618 ¯τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.08 and various619 values of T (i.e., the data phase duration) for the FDTx mode620 with Pdat = 15 dB. For each value of T, there exists the621 optimal SU transmit power P∗ sen which is indicated by an622 asterisk. It can be observed that as T increases from 8 ms623 to 25 ms, the achieved maximum throughput first increases624 then decreases with T. Also in the case with T∗ = 15 ms,625 the SU achieves the largest throughput which is indicated by626 a star symbol. Furthermore, the achieved throughput signifi-627 cantly decreases when the pair of (T, Psen) deviates from the628 optimal values, T∗, P∗ sen .629 FIGURE 9. Normalized throughput versus SU transmit power Psen for TS = 2.2 ms, p = 0.0022, ¯τid = 1000 ms, ¯τac = 50 ms, n0 = 40, ξ = 0.95, ζ = 0.08, varying T , and FDTx with Pdat = 15 dB. FIGURE 10. Normalized throughput versus Pmax for ¯τid = 150 ms, ¯τac = 75 ms, n0 = 40, ξ = 0.85, n0 = 40, ζ = 0.2, 0.7 , and FDTx with Pdat = Pmax dB. Finally, we compare the throughput of our proposed 630 FDC-MAC protocol, the single-stage FD MAC protocol 631 where FD sensing (concurrent spectrum sensing and trans- 632 mission) is performed during the whole data phase [33] and 633 the HD MAC protocol which does not allow the transmission 634 during the spectrum sensing interval in Fig. 10. For brevity, 635 the single-stage FD MAC protocol is refereed to as FD 636 MAC in this figure. The parameter settings are as follows: 637 ¯τid = 150 ms, ¯τac = 75 ms, n0 = 40, ξ = 0.85, n0 = 40, 638 ζ = {0.2, 0.7}, and FDTx with Pdat = Pmax dB. For fair 639 comparison, we first obtain the optimal configuration of the 640 single-stage FD MAC protocol, i.e., then we use (T∗, p∗) 641 for the HD MAC protocol and FDC-MAC protocol. For the 642 single-stage FD MAC protocol, the transmit power is set 643 to Pmax because there is only a single stage where the SU 644 performs sensing and transmission simultaneously during the 645 data phase. In addition, the HD MAC protocol will also trans- 646 mit with the maximum transmit power Pmax to achieve the 647 highest throughput. For both studied cases of ζ = {0.2, 0.7}, 648 our proposed FDC-MAC protocol significantly outperforms 649 the other two protocols. Moreover, the single-stage FD MAC 650 protocol [33] with power allocation outperforms the HD 651 MAC protocol at the corresponding optimal value of Pmax 652 required by the single-stage FD MAC protocol. However, 653 both single-stage FDC-MAC and HD MAC protocols achieve 654 increasing throughput with higher Pmax while the single- 655 stage FD MAC protocol has the throughput first increased 656 then decreased as Pmax increases. This demonstrates the neg- 657 ative self-interference effect on the throughput performance 658 of the single-stage FD MAC protocol, which is efficiently 659 mitigated by our proposed FDC-MAC protocol. 660 VI. CONCLUSION 661 In this paper, we have proposed the FDC–MAC protocol 662 for cognitive radio networks, analyzed its throughput per- 663 formance, and studied its optimal parameter configuration. 664 VOLUME 3, 2015 9
  • 10. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference The design and analysis have taken into account the665 FD communication capability and the self-interference of666 the FD transceiver. We have shown that there exists an667 optimal FD sensing time to achieve the maximum through-668 put. We have then presented extensive numerical results to669 demonstrate the impacts of self-interference and protocol670 parameters on the throughput performance. In particular, we671 have shown that the FDC–MAC protocol achieves signifi-672 cantly higher throughput than the HD MAC protocol, which673 confirms that the FDC–MAC protocol can efficiently exploit674 the FD communication capability. Moreover, the FDC–MAC675 protocol results in higher throughput with the increasing max-676 imum power budget while the throughput of the single-stage677 FD MAC can decrease in the high power regime. This result678 validates the importance of adopting the two-stage procedure679 in the data phase and the optimization of sensing time and680 transmit power during the FD sensing stage to mitigate the681 negative self-interference effect.682 APPENDIX A683 DERIVATION OF T cont684 To calculate Tcont, we define some further parameters as685 follows. Denote Tcoll as the duration of the collision and Tsucc686 as the required time for successful RTS/CTS transmission.687 These quantities can be calculated as follows [17]:688 Tsucc = DIFS + RTS + SIFS + CTS + 2PD Tcoll = DIFS + RTS + PD, (8)689 where DIFS is the length of a DCF (distributed coordination690 function) interframe space, RTS and CTS denote the lengths691 of the RTS and CTS messages, respectively.692 As being shown in Fig. 1, there can be several idle periods693 and collisions before one successful channel reservation. Let694 Ti idle denote the i-th idle duration between two consecutive695 RTS/CTS exchanges, which can be collisions or successful696 exchanges. Then, Ti idle can be calculated based on its prob-697 ability mass function (pmf), which is derived as follows.698 In the following, all relevant quantities are defined in terms of699 the number of time slots. With n0 SUs joining the contention700 resolution, let Psucc, Pcoll and Pidle denote the probabilities701 that a particular generic slot corresponds to a successful702 transmission, a collision, and an idle slot, respectively. These703 probabilities can be calculated as follows:704 Psucc = n0p (1 − p)n0−1 (9)705 Pidle = (1 − p)n0 (10)706 Pcoll = 1 − Psucc − Pidle, (11)707 where p is the transmission probability of an SU in a generic708 slot. In general, the interval Tcont, whose average value is709 Tcont given in (2), consists of several intervals correspond-710 ing to idle periods, collisions, and one successful RTS/CTS711 transmission. Hence, this quantity can be expressed as712 Tcont = Ncoll i=1 Tcoll + Ti idle + T Ncoll+1 idle + Tsucc, (12)713 where Ncoll is the number of collisions before the success- 714 ful RTS/CTS exchange and Ncoll is a geometric random 715 variable (RV) with parameter 1 − Pcoll/Pidle where 716 Pidle = 1 − Pidle. Therefore, its pmf can be expressed as 717 f Ncoll X (x) = Pcoll Pidle x 1 − Pcoll Pidle , x = 0, 1, 2, . . . 718 (13) 719 Also, Tidle represents the number of consecutive idle slots, 720 which is also a geometric RV with parameter 1 − Pidle with 721 the following pmf 722 f Tidle X (x) = (Pidle)x (1 − Pidle), x = 0, 1, 2, . . . (14) 723 Therefore, Tcont (the average value of Tcont) can be written 724 as follows [17]: 725 Tcont = NcollTcoll + Tidle Ncoll + 1 + Tsucc, (15) 726 where Tidle and Ncoll can be calculated as 727 Tidle = (1 − p)n0 1 − (1 − p)n0 (16) 728 Ncoll = 1 − (1 − p)n0 n0p (1 − p)n0−1 − 1. (17) 729 These expressions are obtained by using the pmfs of the 730 corresponding RVs given in (13) and (14), respectively [17]. 731 APPENDIX B 732 DERIVATIONS OF B1, B2, B3 733 We will employ a pair of parameters (θ, ϕ) to represent the 734 HDTX and FDTX modes where ((θ, ϕ) = (0, 1)) for HDTx 735 mode and ((θ, ϕ) = (1, 2)) for the FDTx mode. Moreover, 736 since the transmit powers in the FD sensing and transmis- 737 sion stages are different, which are equal to Psen and Pdat, 738 respectively, we define different SNRs and SINRs in these 739 two stages as follows: γS1 = Psen N0 and γS2 = Psen N0+Pp are 740 the SNR and SINR achieved by the SU in the FD sensing 741 stage with and without the presence of the PU, respectively; 742 γD1 = Pdat N0+θI and γD2 = Pdat N0+Pp+θI for I = ζP ξ dat are 743 the SNR and SINR achieved by the SU in the transmission 744 stage with and without the presence of the PU, respectively. It 745 can be seen that we have accounted for the self-interference 746 for the FDTx mode during the transmission stage in γD1 by 747 noting that θ = 1 in this case. The parameter ϕ for the 748 HDTx and FDTx modes will be employed to capture the 749 throughput for one-way and two-way transmissions in these 750 modes, respectively. 751 The derivations of B1, B2, and B3 require us to consider 752 different possible sensing outcomes in the FD sensing stage. 753 In particular, we need to determine the detection 754 probability P ij d , which is the probability of correctly detecting 755 the PU given the PU is active, and the false alarm probabil- 756 ity P ij f , which is the probability of the erroneous sensing 757 of an idle channel, for each event hij capturing the state 758 changes of the PU. In the following analysis, we assume 759 the exponential distribution for τac and τid where ¯τac and ¯τid 760 10 VOLUME 3, 2015
  • 11. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference denote the corresponding average values of these active and761 idle intervals. Specifically, let fτx (t) denote the pdf of τx762 (x represents ac or id in the pdf of τac or τid, respectively)763 then764 fτx (t) = 1 ¯τx exp(− t ¯τx ). (18)765 Similarly, we employ T ij S and T ij D to denote the number of766 bits transmitted on one unit of system bandwidth during the767 FD sensing and transmission stages under the PU’s state-768 changing event hij, respectively.769 We can now calculate B1 as follows:770 B1 = P (H0) ∞ t=Tove+T T00 1 fτid (t)dt771 = P (H0) T00 1 exp − Tove + T ¯τid , (19)772 where P (H0) denotes the probability of the idle state of773 the PU, and P00 f is the false alarm probability for event774 h00 given in Appendix C. Moreover, T00 1 = P00 f T00 S +775 (1 − P00 f )(T00 S + T00 D ), T00 S = TS log2 (1 + γS1), T00 D =776 ϕ (T − TS) log2 (1 + γD1) where T00 S and T00 D denote the777 number of bits transmitted (over one Hz of system bandwidth)778 in the FD sensing and transmission stages of the data phase,779 respectively. After some manipulations, we achieve780 B1 = Ke exp T τ TS log2(1 + γS1)+ ϕ 1 − P00 f781 (T − TS) log2(1 + γD1) , (20)782 where Ke = P (H0) exp − Tove ¯τid + T ¯τac and 1 τ =783 1 ¯τac − 1 ¯τid .784 Moreover, we can calculate B2 as785 B2 = P (H0) Tove+T t1=Tove+TS ∞ t2=Tove+T−t1 786 T01 2 (t1)fτid (t1)fτac (t2)dt1dt2, (21)787 where T01 2 (t1) = P00 f T00 S + (1 − P00 f )(T00 S + T01 D ¯t1 ),788 T01 D (t1) = ϕ T − TS − ¯t1 log2 (1 + γD2) + ϕ¯t1 log2789 (1 + γD1), and ¯t1 = t1 − (Tove + TS). In this expression,790 t1 denotes the interval from the beginning of the CA cycle791 to the instant when the PU changes to the active state from792 an idle state. Again, T00 S and T01 D denote the amount of data793 transmitted in the FD sensing and transmission stages for this794 case, respectively. After some manipulations, we achieve795 B2 = Ke τ ¯τid exp T τ − exp TS τ 796 × TS log2 (1+γS1)−ϕ τ 1−P00 f log2 1+γD1 1+γD2 797 + ϕ (T − TS) 1−P00 f798 × exp T τ log2(1+γD1)−exp TS τ log2(1+γD2) .799 (22)800 Finally, we can express B3 as follows: 801 B3 = P (H0) Tove+TS t1=Tove ∞ t2=Tove+T−t1 802 × P01 d ¯t1 T01 S ¯t1 + (1−P01 d ¯t1 )(T01 S ¯t1 + T11 D ) 803 fτid (t1)fτac (t2)dt1dt2, (23) 804 where ¯t1 = t1 − Tove, T01 S ¯t1 = ¯t1 log2 (1 + γS1) + 805 TS − ¯t1 log2 (1 + γS2), T11 D = ϕ (T − TS) log2 (1 + γD2), 806 and t1 is the same as in (21). Here, T01 S and T11 D denote the 807 amount of data delivered in the FD sensing and transmis- 808 sion stages for the underlying case, respectively. After some 809 manipulations, we attain 810 B3 = Ke TS t=0 T01 S (t) + T11 D − P01 d (t) T11 D 811 fτid (t) exp t ¯τac dt = B31 + B32, (24) 812 where 813 B31 = Ke TS t=0 T01 S (t) + T11 D fτid (t) exp t ¯τac dt 814 = Ke τ ¯τid τ TS τ −1 exp TS τ +1 log2 1+γS1 1+γS2 815 + exp TS τ − 1 T11 D + TS log2 (1 + γS2) , 816 (25) 817 and 818 B32 = −KeT11 D ¯T32, (26) 819 where ¯T32 = TS t=0 P01 d (t) fτid (t) exp t ¯τac dt. 820 APPENDIX C 821 FALSE ALARM AND DETECTION PROBABILITIES 822 We derive the detection and false alarm probabilities for 823 FD sensing and two PU’s state-changing events h00 and h01 824 in this appendix. Assume that the transmitted signals from 825 the PU and SU are circularly symmetric complex 826 Gaussian (CSCG) signals while the noise at the secondary 827 receiver is independently and identically distributed CSCG 828 CN (0, N0) [5]. Under FD sensing, the false alarm probability 829 for event h00 can be derived using the similar method as in [5], 830 which is given as 831 P00 f = Q N0 + I(Psen) − 1 fsTS , (27) 832 where Q (x) = +∞ x exp −t2/2 dt; fs, N0, , I(Psen) are the 833 sampling frequency, the noise power, the detection threshold 834 and the self-interference, respectively; TS is the FD sensing 835 duration. 836 The detection probability for event h01 is given as 837 P01 d = Q   N0+I(Psen) − TS −t TS γPS − 1 √ fsTS TS −t TS (γPS + 1)2 + t TS  , (28) 838 VOLUME 3, 2015 11
  • 12. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference where t is the interval from the beginning of the data phase to839 the instant when the PU changes its state, γPS = Pp N0+I(Psen)840 is the signal-to-interference-plus-noise ratio (SINR) of the841 PU’s signal at the SU.842 APPENDIX D843 PROOF OF THEOREM 1844 The first derivative of NT can be written as follows:845 ∂NT ∂TS = 1 Tove + T 3 i=1 ∂Bi ∂TS . (29)846 We derive the first derivative of Bi (i = 1, 2, 3) in the847 following. Toward this end, we will employ the approxima-848 tion of exp (x) ≈ 1 + x, x = Tx τx , Tx ∈ {T, TS, T − TS},849 τx ∈ {¯τid, ¯τac, τ} where recall that 1 τ = 1 ¯τac − 1 ¯τid . This850 approximation holds under the assumption that Tx << τx851 since we can omit all higher-power terms xn for n > 1852 from the Maclaurin series expansion of function exp (x).853 Using this approximation, we can express the first derivative854 of B1 as855 ∂B1 ∂TS = Ke exp T τ log2 (1 + γS1)856 −ϕ (T − TS) ∂P00 f ∂TS + 1−P00 f log2(1 + γD1) ,857 (30)858 where ∂P00 f ∂TS is the first derivative of P00 f whose derivation is859 given in Appendix E.860 Moreover, the first derivative of B2 can be written as861 ∂B2 ∂TS = Ke τ ¯τid 862 × exp T τ − 1 + T τ exp TS τ log2 (1 + γS1)863 − ϕ ∂P00 f ∂TS τ exp TS τ −exp T τ log2 1+γD1 1+γD2 864 + (T−TS) exp T τ log2(1+γD1)−exp TS τ log2(1+γD2)865 + ϕ 1 − P00 f − T − TS τ exp TS τ log2 (1 + γD2)866 − exp T τ log2(1+γD1)−exp TS τ log2(1+γD2)867 + exp TS τ log2 1 + γD1 1 + γD2 . (31)868 Finally, the first derivative of B3 can be written as869 ∂B3 ∂TS = ∂B31 ∂TS + ∂B32 ∂TS , (32)870 where 871 ∂B31 ∂TS = Ke τ ¯τid τ 1 + TS τ − 1 exp TS τ 872 log2 1 + γS1 1 + γS2 + exp TS τ − 1 873 TS log2(1 + γS2) + ϕ(T − TS) log2(1 + γD2) . 874 (33) 875 To obtain the derivative for B32, we note that 1 ≤ 876 exp t ¯τac ≤ exp TS ¯τac for ∀t ∈ [0, TS]. Moreover, 877 from the results in (5) and (6) and using the definition 878 of ¯T32 in (26), we have Pd 1 − exp −TS ¯τid ≤ ¯T32 ≤ 879 Pd 1 − exp −TS ¯τid exp TS ¯τac . Using these results, the first 880 derivative of B32 can be expressed as 881 ∂B32 ∂TS = −KePd ϕ T − 2TS ¯τid log2 (1 + γD2) . (34) 882 Therefore, we have obtained the first derivative of NT and 883 we are ready to prove the first statement of Theorem 1. Sub- 884 stitute TS = 0 to the derived ∂NT ∂TS and use the approximation 885 exp (x) ≈ 1 + x, we yield the following result after some 886 manipulations 887 lim TS →0 ∂NT ∂TS = −K0K1 lim TS →0 ∂P00 f ∂TS , (35) 888 where K0 = 1 Tove+T Ke and 889 K1 = ϕ T 1 + T τ + T2 ¯τid log2 (1 + γD1) 890 + ϕ T τ ¯τid log2 (1 + γD2) . (36) 891 It can be verified that K0 > 0, K1 > 0 and lim TS →0 ∂P00 f ∂TS = 892 −∞ by using the derivations in Appendix E; hence, we have 893 lim TS →0 ∂NT ∂TS = +∞ > 0. This completes the proof of the first 894 statement of the theorem. 895 We now present the proof for the second statement of 896 the theorem. Substitute TS = T to ∂NT ∂TS and utilize the 897 approximation exp (x) ≈ 1 + x, we yield 898 lim TS →T ∂NT ∂TS = 1 Tove + T 3 i=1 ∂Bi ∂TS (T), (37) 899 where we have 900 ∂B1 ∂TS (T) = Ke 1 + T τ 901 × log2 (1 + γS1) − ϕ 1 − P00 f (T) log2 (1 + γD1) 902 (38) 903 ∂B2 ∂TS (T) = −Ke T ¯τid log2 (1 + γS1) (39) 904 12 VOLUME 3, 2015
  • 13. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference ∂B31 ∂TS (T) = Ke T ¯τid [log2(1+γS1)(1+γS2)−ϕ log2(1+γD2)]905 (40)906 ∂B32 ∂TS (T) = Keϕ T ¯τid Pd log2 (1 + γD2) .907 Omit all high-power terms in the expansion of exp(x)908 (i.e., xn with n > 1) where x = Tx τx , Tx ∈ {T, TS, T − TS},909 τx ∈ {¯τid, ¯τac, τ}, we yield910 lim TS →T ∂NT ∂TS ≈ 1 Tove + T ∂B1 ∂TS (T). (41)911 We consider the HDTx and FDTx modes in the fol-912 lowing. For the HDTx mode, we have ϕ = 1 and913 θ = 0. Then, it can be verified that lim TS →T ∂NT ∂TS < 0914 by using the results in (38) and (41). This is because915 we have log2 (1 + γS1) − 1 − P00 f (T) log2 (1 + γD1) ≈916 log2 (1 + γS1) − log2 (1 + γD1) < 0 (since we have917 P00 f (T) ≈ 0 and γS1 ≤ γD1).918 For the FDTx mode, we have ϕ = 2, θ = 1, and also γS1 =919 Psen N0 and γD1 = Pdat N0+I(Pdat) = Pdat N0+ζP ξ dat . We would like to920 define a critical value of Psen which satisfies lim TS →T ∂NT ∂TS = 0921 to proceed further. Using the result in (38) and (41) as well as922 the approximation P00 f (T) ≈ 0, and by solving lim TS →T ∂NT ∂TS =923 0 we yield924 Psen = N0   1 + Pdat N0 + ζP ξ dat 2 − 1  . (42)925 Using (38), it can be verified that if Psen > Psen then926 lim TS →T ∂NT ∂TS > 0; otherwise, we have lim TS →T ∂NT ∂TS ≤ 0. So927 we have completed the proof for the second statement of928 Theorem 1.929 To prove the third statement of the theorem, we derive the930 second derivative of NT as931 ∂2NT ∂T2 S = 1 Tove + T 3 i=1 ∂2Bi ∂T2 S , (43)932 where we have933 ∂2B1 ∂T2 S = −Keϕ exp T τ log2 (1 + γD1)934 × (T − TS) ∂2P00 f ∂T2 S − 2 ∂P00 f ∂TS , (44)935 where ∂2P00 f ∂T2 S is the second derivative of P00 f and according to936 the derivations in Appendix E, we have ∂2P00 f ∂T2 S > 0, ∂P00 f ∂TS < 0,937 ∀TS. Therefore, we yield ∂2B1 ∂T2 S < 0 ∀TS.938 Consequently, we have the following upper bound for ∂2B1 ∂T2 S 939 by omitting the term exp T τ > 1 in (44)940 ∂2B1 ∂T2 S ≤ Ke [h1(TS) + h2(TS)] , (45)941 where 942 h1(TS) = −ϕ (T − TS) ∂2P00 f ∂T2 S log2 (1 + γD1), 943 h2(TS) = 2ϕ ∂P00 f ∂TS log2 (1 + γD1). 944 Moreover, we have 945 ∂2B2 ∂T2 S = Ke τ ¯τid − 2 + TS τ τ exp TS τ log2 (1 + γS1) 946 − ϕ ∂2P00 f ∂T2 S τ exp TS τ −exp T τ log2 1+γD1 1+γD2 947 + (T − TS) exp T τ log2(1 + γD1) 948 − exp TS τ log2(1 + γD2) 949 + 2ϕ ∂P00 f ∂TS exp T τ − exp TS τ log2(1 + γD1) 950 + T − TS τ exp TS τ log2 (1 + γD2) 951 − ϕ 1 − P00 f T − TS τ exp TS τ log2 (1 + γD2) 952 + ϕ 1 − P00 f 1 τ exp TS τ log2 1 + γD1 1 + γD2 . 953 (46) 954 Therefore, we can approximate ∂2B2 ∂T2 S as follows: 955 ∂2B2 ∂T2 S = Ke [h3(TS) + h4(TS) + h5(TS)], (47) 956 where 957 h3(TS) = − 2 + TS τ 1 + TS τ ¯τid log2 (1 + γS1) , 958 h4(TS) = −ϕ 1 − P00 f T−TS ¯τid 1 + TS τ log2(1+γD2) 959 − ϕ ∂2P00 f ∂T2 S (T −TS) T ¯τid log2(1 +γD1)− TS ¯τid log2(1 +γD2) 960 + 2ϕ ∂P00 f ∂TS T − TS ¯τid log2 1+γD1 1+γD2 + TS τ log2(1+γD2) , 961 h5(TS) = ϕ 1 − P00 f 1 ¯τid 1 + TS τ log2 1 + γD1 1 + γD2 . 962 In addition, we have 963 ∂2B31 ∂T2 S = Ke ¯τid exp TS τ 1 + T τ log2 (1 + γS1) 964 + log2 (1 + γS2) + ϕ T − TS τ − 2 log2 (1 + γD2) . 965 (48) 966 VOLUME 3, 2015 13
  • 14. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference We can approximate ∂2B31 ∂T2 S as follows:967 ∂2B31 ∂T2 S = Ke [h6(TS) + h6(TS)] , (49)968 where969 h6(TS) = 1 ¯τid log2 (1+γS1) (1+γS2) ,970 h7(TS) = − 2ϕ ¯τid log2 (1+γD2) . (50)971 Finally, we have972 ∂2B32 ∂T2 S = Keh8(TS), (51)973 where974 h8(TS) = 2ϕ ¯Pd ¯τid log2 (1+γD2) . (52)975 The above analysis yields ∂2NT ∂T2 S = Ke 8 i=1 hi(TS). There-976 fore, to prove that ∂2NT ∂T2 S < 0, we should prove that h(TS) < 0977 since Ke > 0 where978 h(TS) = 8 i=1 hi(TS). (53)979 It can be verified that h1(TS) < 0 and h4(TS) < 0, ∀TS980 because ∂2P00 f ∂T2 S > 0, ∂P00 f ∂TS < 0 according to Appendix E981 and γD2 < γD1. Moreover, we have982 h3(TS) < − 2 ¯τid log2 (1 + γS1) , (54)983 and because γS1 > γS2, we have984 h3(TS) < − 1 ¯τid log2 (1 + γS1) (1 + γS2) = −h6(TS). (55)985 Therefore, we have h3(TS)+h6(TS) < 0. Furthermore, we can986 also obtain the following result h7(TS) + h8(TS) ≤ 0 because987 ¯Pd ≤ 1. To complete the proof, we must prove that h2(TS) +988 h5(TS) ≤ 0, which is equivalent to989 −2¯τid ∂P00 f ∂TS log2 (1 + γD1) log2 1+γD1 1+γD2 ≥ 1 − P00 f 1 + TS τ , (56)990 where according to Appendix E991 ∂P00 f ∂TS = − ¯γ √ fsTS 2 √ 2πTS exp − ¯α + ¯γ √ fsTS 2 2 , (57)992 where ¯α = ( ¯γ1 + 1) Q−1 Pd . It can be verified that (56)993 indeed holds because the LHS of (56) is always larger than994 to 2 while the RHS of (56) is always less than 2. Hence, we995 have completed the proof of the third statement of Theorem 1.996 Finally, the fourth statement in the theorem obviously997 holds because Bi (i = 1, 2, 3) are all bounded from above.998 Hence, we have completed the proof of Theorem 1.999 APPENDIX E 1000 APPROXIMATION OF P00 f AND ITS 1001 FIRST AND SECOND DERIVATIVES 1002 We can approximate ˆPd in (5) as follows: 1003 ˆPd = Q N0 + I − ¯γ − 1 √ fsTS ¯γ1 + 1 , (58) 1004 where ¯γ and ¯γ1 are evaluated by a numerical method. Hence, 1005 P00 f can be calculated as we set ˆPd = Pd , which is given as 1006 follows: 1007 P00 f = Q ¯α + ¯γ fsTS , (59) 1008 where ¯α = ( ¯γ1 + 1) Q−1 Pd . 1009 We now derive the first derivative of P00 f as 1010 ∂P00 f ∂TS = − ¯γ √ fsTS 2 √ 2πTS exp − ¯α + ¯γ √ fsTS 2 2 . (60) 1011 It can be seen that ∂P00 f ∂TS < 0 since ¯γ > 0. Moreover, the 1012 second derivative of P00 f is 1013 ∂2P00 f ∂T2 S = ¯γ √ fsTS 4 √ 2πT2 S 1 + 1 2 y ¯γ fsTS exp − y2 2 , (61) 1014 where y = ¯α + ¯γ √ fsTS. 1015 We can prove that ∂2P00 f ∂T2 S > 0 by considering two different 1016 cases as follows. For the first case with ¯α2 ¯γ 2fs ≤ TS ≤ T (0 ≤ 1017 P00 f ≤ 0.5), this statement holds since y > 0. For the second 1018 case with 0 ≤ TS ≤ ¯α2 ¯γ 2fs (0.5 ≤ P00 f ≤ 1), y ≤ 0, then 1019 we have 0 < y − ¯α = ¯γ √ fsTS ≤ −¯α and 0 ≤ −y ≤ −¯α. 1020 By applying the Cauchy-Schwarz inequality, we obtain 0 ≤ 1021 −y(y − ¯α) ≤ ¯γ 2 4 < 1 < 2; hence 1 + 1 2 y ¯γ √ fsTS > 0. This 1022 result implies that ∂2P00 f ∂T2 S > 0. 1023 REFERENCES 1024 [1] C. Cormio and K. R. Chowdhury, ‘‘A survey on MAC protocols for 1025 cognitive radio networks,’’ Ad Hoc Netw., vol. 7, no. 7, pp. 1315–1329, 1026 Sep. 2009. 1027 [2] T. Yucek and H. Arslan, ‘‘A survey of spectrum sensing algorithms for 1028 cognitive radio applications,’’ IEEE Commun. Surveys Tuts., vol. 11, no. 1, 1029 pp. 116–130, 2009. AQ:11030 [3] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, ‘‘Cognitive radio net- 1031 working and communications: An overview,’’ IEEE Trans. Veh. Technol., 1032 vol. 60, no. 7, pp. 3386–3407, Sep. 2011. 1033 [4] Y. Zou, Y.-D. Yao, and B. Zheng, ‘‘Cooperative relay techniques for cogni- 1034 tive radio systems: Spectrum sensing and secondary user transmissions,’’ 1035 IEEE Commun. Mag., vol. 50, no. 4, pp. 98–103, Apr. 2012. 1036 [5] Y.-C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang, ‘‘Sensing- 1037 throughput tradeoff for cognitive radio networks,’’ IEEE Trans. Wireless 1038 Commun., vol. 7, no. 4, pp. 1326–1337, Apr. 2008. 1039 [6] L. T. Tan and L. B. Le, ‘‘Distributed MAC protocol for cognitive radio 1040 networks: Design, analysis, and optimization,’’ IEEE Trans. Veh. Technol., 1041 vol. 60, no. 8, pp. 3990–4003, Oct. 2011. 1042 [7] L. T. Tan and L. B. Le, ‘‘Joint cooperative spectrum sensing and MAC 1043 protocol design for multi-channel cognitive radio networks,’’ EURASIP J. 1044 Wireless Commun. Netw., vol. 2014, p. 101, Dec. 2014. AQ:21045 [8] L. T. Tan and L. B. Le, ‘‘Channel assignment with access contention 1046 resolution for cognitive radio networks,’’ IEEE Trans. Veh. Technol., 1047 vol. 61, no. 6, pp. 2808–2823, Jul. 2012. 1048 14 VOLUME 3, 2015
  • 15. IEEEProof L. T. Tan, L. B. Le: Design and Optimal Configuration of FD MAC Protocol for CRNs Considering Self-Interference [9] Q. Zhao, L. Tong, A. Swami, and Y. Chen, ‘‘Decentralized cognitive1049 MAC for opportunistic spectrum access in ad hoc networks: A POMDP1050 framework,’’ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589–600,1051 Apr. 2007.1052 [10] H. Kim and K. G. Shin, ‘‘Efficient discovery of spectrum opportunities1053 with MAC-layer sensing in cognitive radio networks,’’ IEEE Trans. Mobile1054 Comput., vol. 7, no. 5, pp. 533–545, May 2008.1055 [11] F. Wang, M. Krunz, and S. Cui, ‘‘Price-based spectrum management in1056 cognitive radio networks,’’ IEEE J. Sel. Topics Signal Process., vol. 2, no. 1,1057 pp. 74–87, Feb. 2008.1058 [12] S. Haykin, D. J. Thomson, and J. H. Reed, ‘‘Spectrum sensing for cognitive1059 radio,’’ Proc. IEEE, vol. 97, no. 5, pp. 849–877, May 2009.1060 [13] E. Axell, G. Leus, E. G. Larsson, and H. V. Poor, ‘‘Spectrum sensing1061 for cognitive radio: State-of-the-art and recent advances,’’ IEEE Signal1062 Process. Mag., vol. 29, no. 3, pp. 101–116, May 2012.1063 [14] Y. R. Kondareddy and P. Agrawal, ‘‘Synchronized MAC protocol for1064 multi-hop cognitive radio networks,’’ in Proc. IEEE ICC, May 2008,1065 pp. 3198–3202.1066 [15] C. Thorpe and L. Murphy, ‘‘A survey of adaptive carrier sensing mecha-1067 nisms for IEEE 802.11 wireless networks,’’ IEEE Commun. Surveys Tuts.,1068 vol. 16, no. 3, pp. 1266–1293, 2014.1069 [16] G. Bianchi, ‘‘Performance analysis of the IEEE 802.11 distributed1070 coordination function,’’ IEEE J. Sel. Areas Commun., vol. 18, no. 3,1071 pp. 535–547, Mar. 2000.1072 [17] F. Cali, M. Conti, and E. Gregori, ‘‘Dynamic tuning of the IEEE 802.111073 protocol to achieve a theoretical throughput limit,’’ IEEE/ACM Trans.1074 Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.1075 [18] H. S. Chhaya and S. Gupta, ‘‘Performance modeling of asynchronous data1076 transfer methods of IEEE 802.11 MAC protocol,’’ Wireless Netw., vol. 3,1077 no. 3, pp. 217–234, Aug. 1997.1078 [19] I. F. Akyildiz, J. McNair, L. C. Martorell, R. Puigjaner, and Y. Yesha,1079 ‘‘Medium access control protocols for multimedia traffic in wireless net-1080 works,’’ IEEE Netw., vol. 13, no. 4, pp. 39–47, Jul./Aug. 1999.1081 [20] M. Duarte, C. Dick, and A. Sabharwal, ‘‘Experiment-driven characteri-1082 zation of full-duplex wireless systems,’’ IEEE Trans. Wireless Commun.,1083 vol. 11, no. 12, pp. 4296–4307, Dec. 2012.1084 [21] E. Everett, A. Sahai, and A. Sabharwal, ‘‘Passive self-interference suppres-1085 sion for full-duplex infrastructure nodes,’’ IEEE Trans. Wireless Commun.,1086 vol. 13, no. 2, pp. 680–694, Jan. 2014.1087 [22] A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and1088 R. Wichman, ‘‘In-band full-duplex wireless: Challenges and opportu-1089 nities,’’ IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652,1090 Sep. 2014.1091 [23] D. Korpi, L. Anttila, V. Syrjala, and M. Valkama, ‘‘Widely linear digital1092 self-interference cancellation in direct-conversion full-duplex transceiver,’’1093 IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1674–1687, Sep. 2014.1094 [24] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, ‘‘Achieving single1095 channel, full duplex wireless communication,’’ in Proc. ACM 16th Annu.1096 Int. Conf. MobiCom, 2010, pp. 1–12.1097 [25] M. Jain et al., ‘‘Practical, real-time, full duplex wireless,’’ in Proc. ACM1098 17th Annu. Int. Conf. MobiCom, 2011, pp. 301–312.1099 [26] E. Hossain, L. B. Le, and D. Niyato, Radio Resource Management in Multi-1100 Tier Cellular Wireless Networks. New York, NY, USA: Wiley, 2013.1101 [27] L. B. Le et al., ‘‘Enabling 5G mobile wireless technologies,’’ EURASIP J.1102 Wireless Commun. Netw., vol. 2015, p. 218, Dec. 2015.1103 [28] M. Duarte et al., ‘‘Design and characterization of a full-duplex multi-1104 antenna system for WiFi networks,’’ IEEE Trans. Veh. Technol., vol. 63,1105 no. 3, pp. 1160–1177, Mar. 2014.1106 [29] S. Goyal, P. Liu, O. Gurbuz, E. Erkip, and S. Panwar, ‘‘A distributed MAC1107 protocol for full duplex radio,’’ in Proc. Asilomar Conf. Signals, Syst.,1108 Comput., Nov. 2013, pp. 788–792.1109 [30] D. Ramirez and B. Aazhang, ‘‘Optimal routing and power allocation for1110 wireless networks with imperfect full-duplex nodes,’’ IEEE Trans. Wireless1111 Commun., vol. 12, no. 9, pp. 4692–4704, Sep. 2013.1112 [31] W. Choi, H. Lim, and A. Sabharwal, ‘‘Power-controlled medium access1113 control protocol for full-duplex WiFi networks,’’ IEEE Trans. Wireless1114 Commun., vol. 14, no. 7, pp. 3601–3613, Jul. 2015.1115 [32] W. Cheng, X. Zhang, and H. Zhang, ‘‘Full-duplex spectrum-sensing 1116 and MAC-protocol for multichannel nontime-slotted cognitive radio net- 1117 works,’’ IEEE J. Sel. Areas Commun., vol. 33, no. 5, pp. 820–831, 1118 May 2015. 1119 [33] L. T. Tan and L. B. Le, ‘‘Distributed MAC protocol design for full-duplex 1120 cognitive radio networks,’’ in Proc. IEEE GLOBECOM, 2015. AQ:31121 [34] H. Kim, S. Lim, H. Wang, and D. Hong, ‘‘Optimal power allocation and 1122 outage analysis for cognitive full duplex relay systems,’’ IEEE Trans. 1123 Wireless Commun., vol. 11, no. 10, pp. 3754–3765, Oct. 2012. 1124 [35] J. Bang, J. Lee, S. Kim, and D. Hong, ‘‘An efficient relay selection strategy 1125 for random cognitive relay networks,’’ IEEE Trans. Wireless Commun., 1126 vol. 14, no. 3, pp. 1555–1566, Mar. 2015. 1127 [36] G. Zheng, I. Krikidis, and B. Ottersten, ‘‘Full-duplex cooperative cogni- 1128 tive radio with transmit imperfections,’’ IEEE Trans. Wireless Commun., 1129 vol. 12, no. 5, pp. 2498–2511, May 2013. 1130 LE THANH TAN (S’11–M’15) received the 1131 B.Eng. and M.Eng. degrees from the Ho Chi Minh 1132 City University of Technology, in 2002 and 2004, 1133 respectively, and the Ph.D. degree from the Institut 1134 National de la Recherche Scientifique–Énergie 1135 Matériaux Télécommunications, Canada, in 2015. 1136 He was a Lecturer with the Ho Chi Minh City 1137 University of Technical Education from 2002 to 1138 2010. He is currently a Post-Doctoral Research 1139 Associate with the École Polytechnique de 1140 Montréal, Canada. His current research activities focus on Internet of Things 1141 (IoT over LTE/LTE-A network, cyber-physical systems, big data, distributed 1142 sensing, and control), time series analysis and dynamic factor models 1143 (stationary and non-stationary), wireless communications and networking, 1144 cloud-RAN, cognitive radios (software defined radio architectures, proto- 1145 col design, spectrum sensing, detection, and estimation), statistical signal 1146 processing, random matrix theory, compressed sensing, and compressed 1147 sampling. He has served on TPCs of different international conferences, 1148 including the IEEE CROWNCOM, VTC, and PIMRC. 1149 AQ:4 LONG BAO LE (S’04–M’07–SM’12) received 1150 the B.Eng. degree in electrical engineering from 1151 the Ho Chi Minh City University of Technology, 1152 Vietnam, in 1999, the M.Eng. degree in telecom- 1153 munications from the Asian Institute of Technol- 1154 ogy, Thailand, in 2002, and the Ph.D. degree in 1155 electrical engineering from the University of Man- 1156 itoba, Canada, in 2007. He was a Post-Doctoral 1157 Researcher with the Massachusetts Institute of 1158 Technology (2008–2010) and the University of 1159 Waterloo (2007–2008). Since 2010, he has been with the Institut National 1160 de la Recherche Scientifique, Université du Québec, Montréal, QC, Canada, 1161 where he is currently an Associate Professor. He has co-authored the 1162 book entitled Radio Resource Management in Multi-Tier Cellular Wireless 1163 Networks (Wiley, 2013). His current research interests include smart grids, 1164 cognitive radio, radio resource management, network control and optimiza- 1165 tion, and emerging enabling technologies for 5G wireless systems. He is 1166 a member of the Editorial Board of the IEEE TRANSACTIONS ON WIRELESS 1167 COMMUNICATIONS, the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, and 1168 the IEEE WIRELESS COMMUNICATIONS LETTERS. He has served as a Technical 1169 Program Committee Chair/Co-Chair for several IEEE conferences, including 1170 the IEEE WCNC, the IEEE VTC, and the IEEE PIMRC. 1171 1172 VOLUME 3, 2015 15