FMAC: A Fair MAC Protocol for Coexisting Cognitive Radio Networks

Size: px
Start display at page:

Download "FMAC: A Fair MAC Protocol for Coexisting Cognitive Radio Networks"

Transcription

1 FMAC: A Fair MAC Protocol for Coexisting Cognitive Radio Networks Yanxiao Zhao ECE Department South Dakota School of Mines and Technology Rapid City, SD 5771 yanxiao.zhao@sdsmt.edu Min Song EECS Department The University of Toledo Toledo, OH 4366 Min.Song@utoledo.edu ChunSheng Xin CS Department Norfolk State University Norfolk, VA 2354 cxin@nsu.edu Abstract Cognitive radio is viewed as a disruptive technology innovation to improve spectrum efficiency. The deployment of coexisting cognitive radio networks, however, raises a great challenge to the medium access control (MAC) protocol design. While there have been many MAC protocols developed for cognitive radio networks, most of them have not considered the coexistence of cognitive radio networks, and thus do not provide a mechanism to ensure fair and efficient coexistence of cognitive radio networks. In this paper, we introduce a novel MAC protocol, termed fairness-oriented media access control (FMAC), to address the dynamic availability of channels and achieve fair and efficient coexistence of cognitive radio networks. Different from the existing MACs, FMAC utilizes a three-state spectrum sensing model to distinguish whether a busy channel is being used by a primary user or a secondary user from an adjacent cognitive radio network. As a result, secondary users from coexisting cognitive radio networks are able to share the channel together, and hence to achieve fair and efficient coexistence. We develop an analytical model using two-level Markov chain to analyze the performance of FMAC including throughput and fairness. Numerical results verify that FMAC is able to significantly improve the fairness of coexisting cognitive radio networks while maintaining a high throughput. I. INTRODUCTION Cognitive radio is viewed as a disruptive technology innovation to improve spectrum efficiency. It is expected that the cognitive radio technology will soon emerge from laboratory trials to become a general-purpose programmable radio that serves as a universal platform for wireless networks development. Thus cognitive radio networks (CRNs) have attracted a great attention in the literature. In addition, the government, particularly the spectrum authority, has been making efforts to promote CRNs to enhance access to radio spectrum. For instance, the Federal Communications Commission (FCC) has proposed the 5 MHz national broadband plan. CRNs are expected to be ubiquitous and multiple CRNs often co-exist with each other. Therefore, the fair and efficient coexistence of CRNs is critical to the success of CRNs. Due to the dynamic availability of channels in CRNs, it is very challenging to design a fair and efficient MAC protocol for coexisting CRNs. There have been many MAC protocols proposed for CRNs [1] [5]. However, those studies have not considered coexistence of CRNs, and thus they do not have a mechanism incorporated in the MAC to ensure fair and efficient coexistence of CRNs. In the existing CRN MAC protocols, the two-state sensing model is employed, which classifies a channel into only two states: idle or busy. When a secondary user (SU) of a CRN, say CRN A, detects that the channel is busy, it perceives that he channel is being used by the primary user (PU). It will simply give up the current channel and switch to a new one, together with its communication peer (another SU of the same CRN). However, the channel is not necessarily being used by the PU when the channel is busy. It is possible that another SU in a different CRN, say CRN B, which uses a different waveform, is accessing the channel. The SU in CRN A could not know this because it does not recognize the waveform of CRN B, and thus it has to take a conservative approach, giving up the current channel and switching to a new one. However, simply switching to a new channel may result in significant overhead, as channel switching may take a significant time. Note that different from channel switching in WiFi, which is within a small band and takes a small time, channel switching in CRNs may be involved in a switching across a large spectrum band, which may require a long time of radio hardware tuning, and hence can result in one or more magnitudes of order larger switching time.

2 2 Furthermore, with the rapid proliferation of wireless services, the number of SUs from multiple CRNs typically exceeds the number of channels. This results in a situation where it is difficult to find a free channel to be switched to. Due to these reasons, channel switching is often not the best option. Therefore, several CRNs often have to co-exist on the same channel. In this scenario, if a MAC based on the two-state sensing model is used, then when the SUs of one CRN are accessing the channel, the SUs of other CRNs often starve. Hence such a MAC protocol is not coexistence friendly and results in poor fairness. For a MAC to be coexistence friendly, the SUs of one CRN must be able to share a channel with the SUs of another CRN. In this paper, we propose a novel MAC protocol, termed fairness-oriented media access control (FMAC), for CRNs, to achieve fair and efficient coexistence while significantly reduce the channel switching overhead. Different from the existing CRN MACs, FMAC is designed based on a three-state sensing model which classifies a channel into three states: H (idle), H 1 (occupied by a PU), and H 2 (occupied by an SU). The three-state sensing model is first proposed in [6], which focuses primarily on how to accurately detect each of the three states. In this paper, we design a novel MAC protocol based on the three-state sensing model. Specifically, when the channel is detected as busy, FMAC does not simply let the node switch to a new channel. Instead, it utilizes a spectrum sensing algorithm to distinguish that the busy channel is due to a PU signal or an SU signal of another CRN. In the latter case, the SUs of a CRN can have the option to share the channel with the SUs of other CRNs that are currently using the channel. Specifically, with FMAC, when an SU detects that a channel state is H 2, the SU may choose to compete for channel access with the SU (of another CRN) that are accessing the channel. In other words, as long as a channel is not used by the PU, the SUs of all CRNs can fairly compete for the channel. Therefore, FMAC achieves excellent fairness for coexisting CRNs. Furthermore, we develop an analytical model to evaluate the performance of FMAC using a two-level Markov chain. The first level represents the conditional probability transiting from one state to another state without considering the PU activity. The second level illustrates a renewal process for a specific state when the PU reappears. From the two-level Markov chain model, the access probability of SUs is mathematically derived, which is a significant parameter to evaluate the network performance. We derive a closed-form solution for the throughput of SUs. We will also employ a new fairness performance metric, All-level Fairness for All (ALFA), to evaluate the comprehensive fairness, from a short time period (microlevel) to a long time period (macro-level). Numerical results verify that FMAC can significantly improve ALFA among multiple coexisting CRNs, while not degrading throughput compared with existing MAC protocols. The rest of the paper is organized as follows. In Section II, we briefly introduce the related work. Section III introduces the system model and spectrum sensing technology. In Section IV, we describe the FMAC protocol. Section V presents the performance analysis of FMAC. The numerical results are presented in Section VI. Concluding remarks are drawn in Section VII. II. RELATED WORK For SUs to access a channel, a cognitive MAC protocol is critical. Although the concept of cognitive radio was introduced over a decade ago, the MAC design in CRNs is still in its infancy. The IEEE working group has been making efforts on proposing a standard MAC protocol for Wireless Regional Area Network (WRAN) [7]. A general MAC design in CRNs is still an open problem and has received increasing attention recently. In [8], the authors developed a decentralized cognitive MAC protocol for CRNs. The sensing errors and collisions between SUs and PUs are taken into account in this MAC protocol. In [9], a cognitive MAC protocol was designed for multi-channel wireless networks, where each available channel is divided into recurring superframes and a rendezvous channel is assigned delicately for coordination among SUs. Several researchers have dedicated themselves to design a cognitive MAC based on the well-known IEEE The authors in [1] considered a CRN with a single channel and assumed that the PU operates on a slot-by-slot basis. Each slot is further divided into mini-slots for SU transmission. In [11], authors designed a periodic MAC protocol, in which SUs cooperate to periodically sense channels, report channel states, and exchange control signals. In the MAC design, spectrum sensing is a fundamental issue and plays two critical roles in CRNs. In the existing studies on MAC design, the two-state model is predominantly employed; that is, the state of a channel is classified into H (idle) or H 1 (busy). This two-state model is predominantly used for CRNs in the literature. However, as discussed in the preceding section, it is not suitable for a scenario with multiple co-existing CRNs.

3 3 In this paper, we design a MAC protocol utilizing the three-state sensing model. The performance analysis for CRNs is a challenging problem, but has received considerable attention. The throughput limit in the presence of dynamic and distributed spectral activity was studied in [12] [13]. Quality of service (QoS) was involved in the throughput analysis recently [14]. In contrast, there is little research on fairness performance of SUs among multiple co-existing CRNs. In this paper, we design a MAC protocol with a goal to achieve fairness among SUs from co-existing CRNs. An analytical model is developed to study the performance of the designed MAC, including throughput and fairness. III. SYSTEM MODEL AND SPECTRUM SENSING We consider a system with one PU, and M co-existing CRNs, denoted as CRN 1,..., CRN M. The CRN i has N i SUs. Each SU is equipped with two radios; one is dedicated for spectrum sensing and the other is for data transmission. Within each CRN, we assume that a centralized device, e.g., a base station (BS), exists. The SUs of the same CRN conduct cooperative sensing so that the BS makes a final decision on the channel state. Spectrum sensing requires a certain amount of time. Let DT denote the spectrum sensing time. That is, SUs need to spend a duration of DT to determine the channel state. The channel state is updated periodically every DT period of time. As discussed previously, the MAC protocols based on the two-state sensing model do not work properly when multiple CRNs co-exist, because those MACs result in an unfair channel access among SUs from different CRNs. To attack this problem, we propose to use a three-state smart sensing model in FMAC. The distinction between the two-state and the three-state models is that the state H busy is split into H 1 (occupied by a PU) and H 2 (occupied by an SU). The three-state sensing model is described as: r i = n i, H x p + n i, H 1 x s + n i, H 2, (1) where x s is the signal that an SU transmits, x p is the signal that the PU transmits, r i is the signal that an SU received, n i is the zero-mean additive white Gaussian noise (AWGN). When the channel is detected as busy, FMAC utilizes a spectrum sensing algorithm to distinguish whether a busy channel is due to a PU signal or an SU signal of another CRN. A two-stage detection technology is utilized for this purpose, as described in [6]. Specifically, in the first stage, energy detection is employed to identify whether a channel is idle or not. If the channel is busy, the received signal is further analyzed at the second stage based on a distance estimation technique, with the objective to determine either H 1 or H 2. Using this sensing technology, SUs can determine a channel state to be H, H 1 or H 2. With FMAC, SUs take distinct actions based on each channel state, which will be described in detail in the subsequent section. IV. FMAC: FAIRNESS-ORIENTED MAC FMAC is designed based on the three-state smart sensing model, to achieve fairness among multiple coexisting CRNs. In a MAC protocol, fairness refers to the ability of an SU from one CRN to share a common channel with multiple users of other CRNs (hereafter multiple users mean that they are from different networks unless otherwise indicated). In this paper, the fairness performance is measured in terms of channel access time. For instance, if there are N users competing for a channel, the ideal fairness is achieved if each user accesses the channel for 1/N of the total period that the channel is available for SU access. In FMAC, PUs have a strictly higher priority over SUs, and thus two distinct channel access methods for PUs and SUs are employed. To guarantee the privilege of PUs, when PUs have traffic for transmission, they immediately begin to transmit when the channel is idle. Since it takes a while for SUs to withdraw from the channel, the PU waits for a period up to the tolerable maximum, denoted as T max (T max 2DT ), when an SU is accessing the channel. Moreover, when the PU transmit a message consisting of a burst of frames, we assume that the idle interval between two consecutive PU frames transmission is smaller than DT. Hence, the PU will continue to capture the channel until all frames of a burst have been transmitted. Prior to going into the details of FMAC, we discuss how an SU should respond to each channel state, when the SU has traffic to transmit. There are three possible states for a channel at any time, i.e., H, H 1 and H 2. An SU that has traffic for transmission takes distinct actions based on the detected state of the channel. Specifically, if the channel state is H 1, the SU does not simply switch to another channel. Instead, it keeps silent and continues to monitor the channel. If the channel state is H, the SU accesses the channel immediately. In contrast, if the channel state is H 2, the SU knows that the channel is

4 Fig. 1. Operation of MAC: (a) operation of a MAC with the twostate sensing model, (b) operation of FMAC. occupied by another SU, which may be from a different CRN, and can participate in competition for channel access. During SU transmission, the SUs keep sensing the channel. If the sensing result is H or H 2, SUs continue accessing the channel. However, they have to vacate the channel whenever the PU comes back. The operation of the FMAC protocol is illustrated in Fig. 1 (b), which is compared with a MAC with the two-state model in Fig. 1 (a). Note that once an SU accesses an idle channel, the channel state is changed from H to H 2 from the perspective of other SUs. Next we describe the details on how multiple SUs compete for the same channel under the state of H 2. In FMAC, the channel access scheme by SUs under state H 2 is based on the IEEE MAC protocol. Specifically, an SU monitors the channel activity when it has a packet to transmit. The SU starts transmitting only after an idle period equal to a Distributed Inter-Frame Space (DIFS). In the case that the channel is busy, i.e., another SU is currently occupying the channel, the SU randomly selects a backoff interval from [, W 1], where W represents the size of a contention window. The backoff time counter is decremented whenever the channel is sensed idle, stopped when a transmission is detected, and reactivated when the channel is sensed as idle again for a DIFS. The SU transmits when the backoff time counter reaches. In case that a collision occurs, i.e., two or more SUs transmit simultaneously, the same backoff mechanism is repeated. SUs continue sensing the channel during transmission or a backoff period. The packets transmission of an SU may be interrupted by the resurgence of the PU traffic. If the PU reappears to transmit packets, then after the PU s transmission, all SUs are treated to have the same opportunity as the interrupted SU to access the channel. In other words, all SUs enter a renewal process after the PU reappears. In the renewal process, an SU randomly selects a new backoff time from [, W 1]. Note that although FMAC is designed based on IEEE 82.11, we have made significant contributions to add the cognition or spectrum sensing capability that is required for operation in a scenario of co-existing CRNs, as well as design mechanisms to achieve fairness. As a legacy protocol, IEEE does not have the cognition or spectrum sensing capability. Spectrum sensing is the unique feature of CRNs and it is fully considered in the design of FMAC. A novel renewal process is proposed for the situation whenever the PU comes back. Furthermore, FMAC is based on the three-state sensing model and responds distinctly when the channel is used by the PU or another SU. This is critical to improve the fairness for coexistence of CRNs. At last, we utilize the same contention windows size to further improve the fairness. Recent studies pointed out that the fairness performance of IEEE is not satisfactory because of the binary exponential backoff technology [15]. As studied in [16], users with different contention window sizes have different channel access probabilities, which then results in poor fairness among users. Therefore to achieve optimal fairness among SUs, the binary exponential backoff technology is not adopted by FMAC. Instead, the same contention window size is used for all SUs, and hence the channel access probability is the same for all SUs, which results in optimal fairness. V. PERFORMANCE ANALYSIS In this section, we develop a novel mathematical model to analyze the performance of FMAC. We focus on two crucial performance metrics: throughput and fairness. First, we analyze the PU activity and provide a statistical model. Second, we model the operation of FMAC as a two-level Markov chain, from which the channel access probability of SUs is derived. At last, throughput and fairness are examined. A. PU Activity Analysis In this subsection, the PU behavior is studied with a focus on the probability that the channel is accessible or inaccessible by SUs, denoted as P and P 1, respectively. Let X be a random variable representing a time period that the PU is continuously transmitting on the channel. Let f X (x) denote the probability density function (pdf) for X. 4

5 5 Fig. 2 illustrates the PU traffic arrival and the channel occupation by the PU and SUs. Let a random variable Y represent the period that the channel is not accessible by SUs, caused by a PU transmission and the following spectrum sensing duration. With a little abuse of language, we say Y is the period of PU occupation of the channel. By examining Fig. 2, the following equation holds Y = ( X DT + 1 ) DT = X + DT. Given the distribution of X, let us derive the cumulative distribution function of Y, denoted by F Y (y). F Y (y) = Pr(x + DT y) = y DT Consequently, the pdf of Y can be written as: f Y (y) = F Y (y) f X (x)dx Let us consider a very long period of time t, and calculate the average value of Y in this period, denoted by E(Y ). We have E(Y ) = DT+t DT y f Y (y)dy. For example, if X follows the exponential distribution with parameter µ, i.e., then, we have and E(Y ) = f X (x; µ) = µexp{ µx}, f Y (y) = F Y (y) = µexp{ µ(y DT)} DT+t DT y µexp{ µ(y DT)}dy = 1 µ + DT. We assume that the PU traffic follows Poisson arrival with an arrival rate λ. Hence, the average number of PU traffic arrival time SU transmit DT PU tolerable delay PU transmit X Y SU transmit PU traffic arrival time PU tolerable delay PU transmit Time Fig. 2. Channel occupation by the PU and SUs. X denotes a period of PU transmission. Y denotes the period that the channel is not accessible by SUs, caused by a PU transmission and the following spectrum sensing duration. The PU tolerable delay is the period between the arrival time of the PU traffic and the time when the PU begins to transmit the PU traffic. arrivals of PU traffic is λ t in a period of t. Therefore, P 1 can be obtained as P 1 = λ t E(Y ) t = ( 1 + DT) λ. (2) µ Correspondingly, P can be obtained immediately as: B. SU Channel Access Probability P = 1 P 1. (3) We model the operation of an SU in FMAC as a Markov chain, with state w ( w W 1) indicating the backoff stage of the SU, as shown in Fig. 3 (a), in which the PU activity is fully taken into account. In this paper, we focus to analyze the saturation throughput (to be discussed), and hence we assume that each SU always has a packet to transmit at any time. There are total N SUs from all CRNs. For the sake of analysis, we virtually divide the time into slots based on the channel activity. Specifically, each slot is a period of either PU occupation, successful SU transmission, idle, or collision among multiple SUs. For a give time slot, the probability that it is a PU occupation slot is P 1. The probability that it is a successful SU transmission slot, denoted by P s (k), can be derived as: P s = P N P a (1 P a ) (N 1), (4) where P a is the channel access probability of each SU. The derivation of P a is postponed to the end of this subsection. The probability that a given slot is an idle slot is: P i = P (1 P a ) N. (5) The probability that a given slot is a slot of collision caused among multiple SUs, denoted by P cs, can be obtained as: [ P cs = P 1 (1 P a ) N N P a (1 P a ) N 1]. (6) An SU transmission starts when the backoff time counter reaches, i.e., when the Markov chain is in state. This transmission is either a successful transmission with a probability (1 P 1 P cs ); or a collision with other SUs, with a probability P cs ; or a collision with the PU, with a probability P 1. In the first two cases, the SU needs to randomly select another backoff time from [, W 1] for next transmission (either a new packet transmission, or a retransmission in case of collision). Therefore the transition probability from state to state k is 1 P 1 P cs W + P cs W = 1 P 1 W.

6 + " + +,+ 82!7"9559 #8$ 86 #%59 +, ,+, & '( *'( ,+ +,+ '( *'(,,,, Fig. 3. State transition diagram of the Markov chain; (a) the transition probability among the W states of the Markov chain, where each state may conduct a renewal process; (b) an example of the renewal process at state k. Note that the renewal process applies to each state. Next let us study the case with a non-zero time counter. At the backoff stage k,(k > ), there are three possibilities. Specifically, the time counter k can decrease to (k 1) with a probability of P i, or goes to a renewal process with a probability of P 1 if the PU reappears, or stay at the same time counter with a probability of (1 P 1 P i ). Note that the PU may reappear at any time and disturb a back off process. We assume that every SU enters a renewal process whenever the PU comes back for a transmission, no matter that the SU switches to a different channel or chooses to stay on this channel. In the renewal process, an SU randomly selects a backoff time j from [, W 1] and the Markov chain then transits to state j from state k with a probability of P1 W, which is illustrated as the lower level chain in Fig. 3 (a) and further described in Fig. 3 (b). Based on the above Markov chain model, the conditional probabilities of the two-level Markov chain can be written as follows, where P k,j represent the transition probability from state k to state j. P,k = 1 P 1 W + P 1 W = 1, for k [, W 1] W P k,k 1 = P i + P 1, for k [1, W 1] W P k,j = P 1 W, for k [1, W 1], j k 1, k P k,k = 1 P 1 P i + P 1 W, for k Next we will get W equilibrium equations of the Markov chain. The stationary probabilities of the states of a Markov chain is typically denoted by a vector π, with π = [ π, π 1,..., π W 1 ] where π is the stationary probability that the Markov chain is at the state. Since we have π j = π k P k,j, k, j [, W 1], the equilibrium equations can be written down as follows, (1 1 W )π = (P i + P 1 W )π 1 + P 1 W ( and for k [1, W 1], j,1 6 π j ), (7) ( P 1 W P 1 P i )π k = 1 W π + (P i + P 1 W )π k+1+ P 1 W ( π j ). (8) j k,k+1 From (7) and (8), we get π = W P i + (W 1) P 1 W P i + (W 1) P 1 + (W 1) 2. (9) In a general case that W >> 1, it is reasonable to assume that W = (W 1). Then π in Eq. (9) can be simplified as π = P i + P 1 P i + P 1 + W (1) Recalling that SU transmissions only occur at state, π is actually the transmission probability of SUs, which is denoted as P a. Substituting P i in Eq. (5) into Eq. (1), we get the following equation: P a = 1 W P (1 P a ) N + P 1 + W. (11) Note that Eq. (11) is a non-linear function. This can be solved through a numerical method and get the value of P a, given other parameters. P a is an important parameter and will be used in the throughput and fairness analysis in the next two subsections.

7 7 C. SU Throughput Analysis We concentrate on throughput analysis of SUs, and hence ignore the time periods of PU transmissions. As a result, the SU throughput is calculated as: θ = P s T s P i σ + P s T s + P cs T cs + P 1 T cp, (12) where σ is the duration of an idle time slot, T s is the average time of a successful SU transmission slot, T cs is the average time of a collision slot caused by other SUs, and T cp is the average time of a collision slot caused by the PU. By [16], T s and T cs can be represented as follows in case of the RTS/CTS access mechanism: T s = RTS + SIFS + δ + CTS + SIFS + δ + H + T DATA + SIFS + δ + ACK + DIFS + δ T cs = DIFS + RTS + δ The T cp is referred to as the tolerable delay of the PU in Fig. 2 and can be expressed as T cp = E[(1 + τ) DT], where τ follows a uniform distribution in [, 1]. Hence T cp is given as T cp = 3 DT. (13) 2 The saturation throughput is the optimization of Eq. (12) and represented as: θ = max{θ}. (14) It can be seen that several parameters such as W, P a, P 1, and N play significant roles in the calculation of throughput. We will evaluate their impacts in Section VI. D. Fairness Analysis As discussed in Section I, we will focus on the proposed fairness metric ALFA in our analysis. Suppose that N CRNs use FMAC to contend for channel access. Since no SU is permitted to occupy the channel during the transmission of the PU, the period of PU transmission is ignored with regard to the fairness analysis. Let denote a short period of time, termed a cycle. We record the transmission time of each CRN continuously in K cycles. Let the vector T(k) = [T 1 (k),..., T N (k)] denote the recorded transmission time of the N CRNs in the first k cycles (with a period of k ). Next we calculate the Jain Index on vector T(k) for 1 k K as J( T(k)) = ( 1 T T (k)) 2 N T(k) 2, (15) where 1 = [1, 1,...,1] is a 1 N row vector whose elements are all 1. The larger the Jain Index, the better the fairness is. In the ideal case, the Jain Index is 1. The ALFA is characterized by a Mean-Deviation Fairness Model (MDFM). Specifically, the mean denoted by E[ T] and the standard deviation denoted by D[ T] are calculated from J( T(1)) to J( T(K)) as follows E[ T] = 1 K D[ T] = 1 K K k=1 K J( T(k)), (16) k=1 ( J( T(k)) E[ T]) 2. (17) A large E[ T] together with a small D[ T] indicates a good ALFA. A small E[ T] together with a large or small D[ T] indicates a poor ALFA. VI. NUMERICAL RESULTS In this section, the throughput and fairness of FMAC will be evaluated and compared with another scheme, in which the IEEE is used together with the two-state sensing model. The latter scheme is called as Two-state MAC (TMAC). We will show that the fairness of FMAC is significantly improved, while maintaining similar throughput as TMAC. The major parameters for channel access are listed in Table I. A. Throughput Evaluation In the first experiment, we study three scenarios with 2, 3, and 4 co-existing CRNs, respectively. Each CRN is assumed to have 1 users. We assume that the PU traffic arrival rate λ is.2, and the mean PU transmission time 1 µ is 1, which result in a PU activity probability P.8 by Eq. (3). In Fig. 4, each curve represents the throughput of FMAC or TMAC as a function of the contention window size. Note that the throughput TABLE I PARAMETERS FOR CHANNEL ACCESS Parameter Value MAC header 272 bits PHY header 128 bits ACK 112 bits + PHY header RTS 16 bits + PHY header CTS 112 bits + PHY header Channel Bit Rate 1 Mbits/s Propagation Delay 1 µs Slot Time 5 µs SIFS 28 µs DIFS 128 µs DT 6 µs

8 8 has been normalized with regard to the nominal channel data rate. With TMAC, only SUs within the same CRN is able to access the channel at any time. Thus, the number of SUs that compete for channel access is always 1, no matter how many CRNs co-exist. In contrast, with FMAC, the SUs of all co-existing CRNs have the opportunity to share the channel. The number of competing SUs is larger with FMAC. For instance, with 2 co-existing CRNs, there are total 2 SUs (N = 2) that share the channel. With 3 co-existing CRNs, 3 SUs (N = 3) compete for the channel. We can see that the optimal contention window size, i.e., the contention window size that maximizes the throughput, increases when the number of SUs grows. From Fig. 4, one can see that all scenarios have similar optimal throughput, which is the throughput at the optimal contention window size, i.e., the peak point of a curve in the figure. To further verify this, Fig. 5 plots the optimal throughput of TMAC and FMAC with 2 co-existing CRNs. This figure indicates that the optimal throughput of FMAC only slightly decreases compared with the one of TMAC. In the second experiment, we examine the impact of the PU activity on the SU throughput. We vary the PU traffic arrival rate λ to produce varying PU activity probabilities P, and plot the optimal throughput in Fig. 6. We can see that the optimal throughput of SUs gradually decreases when P or the PU activity decreases. This is because SUs have a smaller opportunity to transmit when the PU occupies the channel for more time. From Figs. 4 and 6, we can see that FMAC is able to maintain a similar optimal throughput as the one of TMAC. B. Fairness Evaluation In order to evaluate the fairness performance, two scenarios with 5 and 1 co-existing CRNs are studied. Throughput TMAC FMAC (N=2) FMAC (N=3) FMAC (N=4) Window Size Fig. 4. Throughput of FMAC and TMAC, P =.8 Optimal Throughput TMAC FMAC The total number of SUs from multiple CRNs Fig. 5. Optimal throughput of FMAC and TMAC, P =.8 Optimal Throughput TMAC FMAC P Fig. 6. Optimal throughput of FMAC and TMAC as a function of the PU activity (P ) We assume each CRN contains the same number of SUs. The observation period is 2 cycles. The is assumed to be equal to the time to transmit 5 frames. In the case of FMAC, all CRNs contend for channel access with an equal access probability P a. With TMAC, we assume that each CRN has 5 successive frames to transmit once it grasps the channel. Fig. 7 shows the Jain Index for 2 cycles, with 5 and 1 CRNs, respectively. It can be seen that the fairness of FMAC is dramatically improved compared with TMAC. In particular, the fairness of FMAC is very good even in a short period of time. Next we examine the influence of the number of CRNs on fairness. When the number of co-existing CRNs increases from 5 to 1, the fairness of TMAC degrades drastically. This suggests that the number of CRNs has a significant impact on fairness and a smaller number of CRNs achieves better fairness. However, in FMAC, the fairness is hardly affected by the number of CRNs. This further verifies the advantages of FMAC, from the perspective of fairness, especially with a large number of co-existing networks.

9 9 Fig. 7. Jain Index CRNs with FMAC 1 CRNs with TMAC 5 CRNs with FMAC 5 CRNs with TMAC Time Period ( ) Jain Index calculated from 1 to 2 for FMAC and TMAC TABLE II MEAN-DEVIATION FAIRNESS MODEL (MDFM) 5 SUs 5 SUs 1 SUs 1 SUs (FMAC) (TMAC) (FMAC) (TMAC) E[ T] D[ T] At last, we evaluate ALFA and record the results of E[ T] and D[ T] in Table II. It can be seen that the ALFA of FMAC is very good, with E[ T] as.913 for 5 CRNs and.8768 for 1 CRNs, and D[ T] as.15 for 5 CRNs and.132 for 1 CRNs. In contrast, the ALFA of TMAC is poor, with a considerably lower mean and higher deviation than FMAC. VII. CONCLUSIONS In this paper, we have considered multiple CRNs coexisting in an area and proposed a fairness-oriented MAC (FMAC) to improve the fairness among SUs from different CRNs. FMAC is based on the three-state sensing model. SUs take distinct actions for each state of the channel. In addition, FMAC fully takes the PU activity and fairness among CRNs into account. A twolevel Markov chain model and an analytical model have been developed for the proposed FMAC. Furthermore, the throughput and fairness of FMAC have been thoroughly examined. Numerical results have verified that the fairness of FMAC is significantly improved, while maintaining a high throughput. ACKNOWLEDGEMENT The research of Min Song is supported in part by NSF CAREER Award CNS and NSF IPA Independent Research and Development (IR/D) Program. Any opinion, finding, and conclusions or recommendations expressed in this material, are those of the authors and do not necessarily reflect the views of the National Science Foundation. The research of ChunSheng Xin is supported in part by NSF under grants CNS , CNS , and ECCS REFERENCES [1] Y. Kondareddy and P. Agrawal, Synchronized mac protocol for multi-hop cognitive radio networks, in IEEE ICC, 28, pp [2] M. Timmers, S. Pollin, A. Dejonghe, L. Van der Perre, and F. Catthoor, A distributed multichannel mac protocol for multihop cognitive radio networks, IEEE Transactions on Vehicular Technology, vol. 59, no. 1, pp , 21. [3] X. Zhang and H. Su, Cream-mac: Cognitive radio-enabled multi-channel mac protocol over dynamic spectrum access networks, Selected Topics in Signal Processing, IEEE Journal of, vol. 5, no. 1, pp , 211. [4] S. Yoo, H. Nan, and T. Hyon, Dcr-mac: distributed cognitive radio mac protocol for wireless ad hoc networks, Wireless Communications and Mobile Computing, vol. 9, no. 5, pp , 29. [5] Y. Wang, P. Ren, and G. Wu, A throughput-aimed mac protocol with qos provision for cognitive ad hoc networks, IEICE Transactions on Communications, vol. 93, pp , 21. [6] Y. Zhao, M. Song, C. Xin, and M. Wadhwa, Spectrum sensing based on three-state model to accomplish all-level fairness for co-existing multiple cognitive radio networks. in IEEE INFOCOM, 212, pp [7] C. Stevenson, G. Chouinard, Z. Lei, W. Hu, S. Shellhammer, and W. Caldwell, Ieee 82.22: The first cognitive radio wireless regional area network standard, IEEE Communications Magazine, vol. 47, no. 1, pp , 29. [8] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized cognitive mac for opportunistic spectrum access in ad hoc networks: A pomdp framework, IEEE Journal on Selected Areas in Communications, vol. 25, no. 3, pp , 27. [9] C. Cordeiro and K. Challapali, C-mac: A cognitive mac protocol for multi-channel wireless networks, in IEEE DySPAN, 27, pp [1] Y. Bae, A. Alfa, and B. Choi, Performance analysis of modified ieee based cognitive radio networks, IEEE Communications Letters, vol. 14, no. 1, pp , 21. [11] D. Xue, E. Ekici, and X. Wang, Opportunistic periodic mac protocol for cognitive radio networks, in Proceedings of the IEEE Global Telecommunications Conference, 21, pp [12] S. Jafar and S. Srinivasa, Capacity limits of cognitive radio with distributed and dynamic spectral activity, IEEE Journal on Selected Areas in Communications, vol. 25, no. 3, pp , 27. [13] S. Akin and M. Cenk Gursoy, Performance analysis of cognitive radio systems under qos constraints and channel uncertainty, IEEE transactions on wireless communications, vol. 1, no. 9, pp , 211. [14] P. Wang, D. Niyato, and H. Jiang, Voice-service capacity analysis for cognitive radio networks, IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp , 21. [15] G. Berger-Sabbatel, A. Duda, M. Heusse, and F. Rousseau, Short-term fairness of networks with several hosts, Mobile and Wireless Communication Networks, pp , 25. [16] G. Bianchi, Performance analysis of the ieee distributed coordination function, IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp , 2.

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks 22nd IEEE Personal Indoor Mobile Radio Communications Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks Ari Raptino H Graduate school of Shizuoka University Hamamatsu, Japan Email:

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),

More information

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2008 Characterising the interactions between unicast and broadcast in

More information

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Sima Hajmohammad Université du Québec à Montréal Montreal, Canada haj mohammad.sima@courrier.uqam.ca Halima Elbiaze

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

A Framework for Femtocells to Access Both Licensed and Unlicensed Bands

A Framework for Femtocells to Access Both Licensed and Unlicensed Bands Indoor and Outdoor Femto Cells A Framework for Femtocells to Access Both Licensed and Unlicensed Bands Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute of NYU, Brooklyn,

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays An Improved IEEE 802.11 CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays Nirmala Shenoy, John Hamilton, Andres Kwasinski and Kaiqi Xiong Rochester Institute of Technology,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Medium access control protocols in cognitive radio networks

Medium access control protocols in cognitive radio networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2010; 10:31 49 Published online in Wiley InterScience (www.interscience.wiley.com).906 Medium access control protocols in cognitive

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

The Impact of Transmission Overheads on IEEE Throughput: Analysis and Simulation

The Impact of Transmission Overheads on IEEE Throughput: Analysis and Simulation Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), March Edition, 2011 The Impact of Transmission Overheads on IEEE 802.11 Throughput:

More information

Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies

Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies European Wireless 2009 1 Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies Anders Grauballe, Mikkel Gade Jensen, Achuthan Paramanathan,

More information

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Jo oon Chong, Youngchul Sung, and Dan Keun Sung School of EECS, KAIST 373- Guseong-dong, Yuseong-gu, Daejeon 35-7,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals Adaptive Packetization for Error-Prone Transmission over 8.11 WLANs with Hidden Terminals Wei Song, Michael N. Krishnan, and Avideh Zakhor Video and Image Processing (VIP) Lab Department of Electrical

More information

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

Approaching Single-Hop Performance in Multi-Hop Networks: End-To-End Known-Interference Cancellation (E2E-KIC)

Approaching Single-Hop Performance in Multi-Hop Networks: End-To-End Known-Interference Cancellation (E2E-KIC) Approaching Single-Hop Performance in Multi-Hop Networks: End-To-End Known-Interference Cancellation (E2E-KIC) Fanzhao Wang, Student Member, IEEE, Lei Guo, Member, IEEE, Shiqiang Wang, Student Member,

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Design and analysis of MAC protocols for wireless networks

Design and analysis of MAC protocols for wireless networks Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

Study on TCP Performance Improvement in Dynamic Spectrum Access Networks Based on Spectrum Switch Estimation

Study on TCP Performance Improvement in Dynamic Spectrum Access Networks Based on Spectrum Switch Estimation International Symposium on Computers & Informatics (ISCI 2015) Study on TCP Performance Improvement in Dynamic Spectrum Access Networks Based on Spectrum Switch Estimation Peng Zhang 1, Kai Shi 1, Sheng

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

Bandwidth Allocation for DiffServ based Quality of Service over

Bandwidth Allocation for DiffServ based Quality of Service over Bandwidth Allocation for DiffServ based Quality of Service over 82.11 Martin Heusse, Paul Starzetz, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model Saturated Throughput Analysis of IEEE 80.e Using Two-Dimensional Markov Chain Model Lixiang Xiong and Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 006 Australia

More information

VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks

VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks This paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks Hassan Aboubakr

More information

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Wireless Pers Commun DOI 10.1007/s11277-013-1142-8 Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract

More information

When two-hop meets VoFi

When two-hop meets VoFi This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCC 00 proceedings. When two-hop meets VoFi Sathya arayanan *,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising

More information

Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks

Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar Department of Computer Science and Technology, University of

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks Multi-Rated Packet Transmission Scheme for IEEE 802.11 WLAN Networks Namgi Kim Telecommunication R&D Center, Samsung Electronics, 416, Maetan-3, Youngtong, Suwon, Kyounggi, 442-600, Korea namgi.kim@samsung.com

More information

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode Supporting VBR VoIP Traffic in IEEE 802.11 WLAN in PCF Mode Dongyan Chen*, Sachin Garg**, Martin Kappes** and Kishor S. Trivedi* * Center for Advanced Computing and Communications, ECE Department Duke

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information