The difference in the channel bandwidths that the victim and the invader are exploiting is considered so that the error rates of all the 20 MHz channels are averaged to obtain the effective PER. Then the effective SINR of the entire channel can be derived eversely. The way of calculating the effective PER and the SINR is the same as in [23] except that they calculate the PER as an average over all available subcarriers instead of channels. While calculating the PER from the SINR, we adopt the PER equation in [24] because it is effective in incorporating various MAC layer operations such as perfect AMC scheme, Viterbi algorithm, and packet size (1,500 bytes in our case)