{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:16:35Z","timestamp":1761646595557,"version":"build-2065373602"},"reference-count":23,"publisher":"Institution of Engineering and Technology (IET)","issue":"7","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2014,5]]},"abstract":"<jats:p>\n                    In this study, the authors analyse the average end\u2010to\u2010end packet delay for a cognitive\n                    <jats:italic>ad hoc<\/jats:italic>\n                    network where multiple secondary nodes randomly contend for accessing the licensed bands of primary users in non\u2010slotted time mode. Before accessing the licensed bands, each node must perform spectrum sensing and collaboratively exchange the sensing results with other nodes of the corresponding communication as a means of improving the accuracy of spectrum sensing. Furthermore, the medium access control with collision avoidance mechanism based distributed coordination function specified by IEEE 802.11 is applied to coordinate spectrum access for this cognitive\n                    <jats:italic>ad hoc<\/jats:italic>\n                    network. To evaluate the system performance, the authors model the considered network as an open G\/G\/1 queuing network and utilise the method of diffusion approximation to analyse the end\u2010to\u2010end packet delay. The authors\u2019 analysis takes into account not only the number of secondary nodes, the arrival rate of primary users and the arrival rate of secondary users but also the effect of the number of licensed bands when assessing the average end\u2010to\u2010end packet delay of the networks.\n                  <\/jats:p>","DOI":"10.1049\/iet-com.2013.0908","type":"journal-article","created":{"date-parts":[[2014,3,17]],"date-time":"2014-03-17T14:30:24Z","timestamp":1395066624000},"page":"1083-1093","source":"Crossref","is-referenced-by-count":1,"title":["Delay analysis for cognitive\n                    <i>ad hoc<\/i>\n                    networks using multi\u2010channel medium access control"],"prefix":"10.1049","volume":"8","author":[{"given":"Thi My Chinh","family":"Chu","sequence":"first","affiliation":[{"name":"Faculty of Computing Blekinge Institute of Technology SE\u2010371 79 Karlskrona Sweden"}]},{"given":"Hoc","family":"Phan","sequence":"additional","affiliation":[{"name":"Faculty of Computing Blekinge Institute of Technology SE\u2010371 79 Karlskrona Sweden"}]},{"given":"Hans\u2010J\u00fcrgen","family":"Zepernick","sequence":"additional","affiliation":[{"name":"Faculty of Computing Blekinge Institute of Technology SE\u2010371 79 Karlskrona Sweden"}]}],"member":"265","published-online":{"date-parts":[[2014,5]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"crossref","unstructured":"HanbaliA.A. HaanR. BoucherieR.J. andOmmerenJ.\u2010K.: \u2018A tandem queueing model for delay analysis in disconnected ad hoc networks\u2019. Proc. Int. Conf. Analytical and Stochastic Modeling Techniques and Applications Nicosia Cyprus June2008 pp.189\u2013205","DOI":"10.1007\/978-3-540-68982-9_14"},{"key":"e_1_2_6_3_1","unstructured":"VassisD. andKormentzasG.: \u2018Delay analysis of IEEE 802.11 ad hoc networks in finite load conditions under the hidden terminal problem\u2019. Proc. European Wireless Conf. Athens Greece April2006 pp.1\u20134"},{"key":"e_1_2_6_4_1","unstructured":"OzdemirM. andMcDonaldA.B.: \u2018A queuing model of multi\u2010hop wireless ad hoc network with hidden nodes\u2019. Proc. Mobile and Wireless Communications Networks Marrakech Morocco September2005 pp.19\u201321"},{"key":"e_1_2_6_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"e_1_2_6_6_1","unstructured":"GamalA.E. MammenJ. PrabhakarB. andShahD.: \u2018Throughput\u2010delay trade\u2010off in wireless networks\u2019. Proc. IEEE Conf. Computer Communications Hong Kong China March2004 pp.464\u2013475"},{"key":"e_1_2_6_7_1","doi-asserted-by":"crossref","unstructured":"OzdemirM. andMcDonaldA.B.: \u2018An M\/MMGI\/1\/K queuing model for IEEE 802.11 ad hoc networks\u2019. Proc. ACM Int. Workshop on Performance Evaluation of Wireless Ad Hoc Sensor and Ubiquitous Networks Venice Italy October2004 pp.107\u2013111","DOI":"10.1145\/1023756.1023776"},{"key":"e_1_2_6_8_1","doi-asserted-by":"crossref","unstructured":"LeeW. WangC. andSohrabyK.: \u2018On use of traditional M\/G\/1 model for IEEE 802.11 DCF in unsaturated traffic conditions\u2019. Proc. IEEE Wireless Communications and Networking Conf. Las Vegas USA April2006 pp.1933\u20131937","DOI":"10.1109\/WCNC.2006.1696591"},{"issue":"108","key":"e_1_2_6_9_1","first-page":"1","article-title":"Delay throughput analysis of multi\u2010channel MAC protocols in ad hoc networks","volume":"2011","author":"Nieminen J.","year":"2011","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"e_1_2_6_10_1","doi-asserted-by":"publisher","DOI":"10.24297\/ijct.v10i4.3250"},{"issue":"2","key":"e_1_2_6_11_1","first-page":"99","article-title":"Average delay and throughput analysis on ad hoc network protocols","volume":"3","author":"Chezhian U.","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"volume-title":"Cognitive radio: an integrated agent architecture for software defined radio","year":"2000","author":"Mitola J.","key":"e_1_2_6_12_1"},{"key":"e_1_2_6_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1391490"},{"key":"e_1_2_6_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080111"},{"issue":"1","key":"e_1_2_6_16_1","first-page":"110","article-title":"CREAM\u2010MAC: cognitive radio\u2010enabled multi\u2010channel MAC protocol over dynamic spectrum access networks","volume":"5","author":"Zhang X.","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"e_1_2_6_17_1","doi-asserted-by":"crossref","unstructured":"WangS. ZhangJ. andTongL.: \u2018Delay analysis for cognitive radio networks with random access: a fluid queue view\u2019. Proc. IEEE Conf. Computer Communications San Diego USA March2010 pp.1\u20139","DOI":"10.1109\/INFCOM.2010.5461943"},{"key":"e_1_2_6_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471200581"},{"key":"e_1_2_6_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.12.001"},{"key":"e_1_2_6_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_2_6_21_1","unstructured":"GhasemiA. andSousaE.S.: \u2018Collaborative spectrum sensing for opportunistic access in fading environments\u2019. Proc. IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks Baltimore USA November2005 pp.131\u2013136"},{"volume-title":"\u2018Table of integrals, series, and products\u2019","year":"2007","author":"Gradshteyn I.S.","key":"e_1_2_6_22_1"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.031913.122759"},{"volume-title":"\u2018Queueing analysis: a foundation of performance evaluation vol. 2. finite systems\u2019","year":"1993","author":"Takagi H.","key":"e_1_2_6_24_1"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2013.0908","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-com.2013.0908","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2013.0908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:12:29Z","timestamp":1761646349000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/iet-com.2013.0908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["10.1049\/iet-com.2013.0908"],"URL":"https:\/\/doi.org\/10.1049\/iet-com.2013.0908","archive":["Portico"],"relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"type":"print","value":"1751-8628"},{"type":"electronic","value":"1751-8636"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}