Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment

Similar documents
Spectrum Sensing and Management in Cooperative Cognitive Radio

Spectrum Management in Cognitive Radio Networks

Cognitive Radio Networks

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS

Evaluating the Performance in Term of Throughput of Decentralized users in Cognitive Radio Wireless Torus Networks

Control Channel Allocation in Cognitive Radio Networks using Clustering

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band

MULTI-HOP DISTRIBUTED COORDINATION IN COGNITIVE RADIO NETWORKS

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

Cognitive Radio Networks

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks

PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3

OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS

Multichannel Outage-aware MAC Protocols for Wireless Networks

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach

An Adaptive Multiple Rendezvous Control Channel for Cognitive Radio Wireless Ad Hoc Networks

An Application-Oriented Routing Protocol for Multi-hop Cognitive Radio Networks

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Cognitive Radio MAC Protocol for WLAN

Medium access control protocols in cognitive radio networks

An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore

Intelligent Load Balancing Approach for Cognitive Radio Networks

Interference avoidance in wireless multi-hop networks 1

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Optimization on TEEN routing protocol in cognitive wireless sensor network

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

The Life Cycle of the Rendezvous Problem of Cognitive Radio Ad Hoc Networks: A Survey

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks

A survey on dynamic spectrum access protocols for distributed cognitive wireless networks

Survey: Routing Protocols in Cognitive Radio Mesh Networks

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES

Cognitive Radio Networks

Wireless and Mobile Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

Multiple Access Protocols

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Spectrum Sharing in Cognitive Radio Networks

Spectrum Handoff Strategy Using Cumulative Probability in Cognitive Radio Networks

SELFISH ATTACKS DETECTION IN COGITIVE RADIO NETWORKS USING CRV TECHNIQUE

Multiple Access in Cellular and Systems

An efficient trigger to improve intra-wifi handover performance

Cooperative and Opportunistic Transmission in Wireless and Mobile Ad-Hoc Networks

Strengthening Unlicensed Band Wireless Backhaul

Effect of Fragmentation in WLAN Systems with Interference Problems

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Addressing Asymmetric Link in Wireless Mesh Networks

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Multiple Access Links and Protocols

Last Lecture: Data Link Layer

PIONEER RESEARCH & DEVELOPMENT GROUP

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Cognitive Radio Network Security- A Survey

Collision Free and Energy Efficient MAC protocol for Wireless Networks

CSE 461: Wireless Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Using TV White Space for Interference Mitigation in LTE Femtocell Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

RACARP: A ROBUSTNESS AWARE ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS

A MAC protocol with an improved connectivity for cognitive radio networks

An efficient traffic management framework for multi-channel wireless backbone networks

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Reservation Packet Medium Access Control for Wireless Sensor Networks

Lecture 16: QoS and "

CSMA based Medium Access Control for Wireless Sensor Network

An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks

Wireless LANs. ITS 413 Internet Technologies and Applications

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

Mobile and Sensor Systems

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

Sri Krishna College of Engineering and Technology, Coimbatore. Sri Krishna College of Engineering and Technology, Coimbatore.

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Attack & Defense in Wireless Networks

A Survey on Modified RTS/CTS Mechanism

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

Multi-Interface Cognitive Radio for Enhanced Routing Performance in Multi-Hop Cellular Networks

Sample solution to Midterm

Research Directions in Low-Power Wireless Networks

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Enhancing the DCF mechanism in noisy environment

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

MAC AND ROUTING PROTOCOLS FOR MULTI-HOP COGNITIVE RADIO NETWORKS. Yogesh Reddy Kondareddy

Performance Analysis for Channel Utilization in Wireless LAN

An Energy-Balanced Cooperative MAC Protocol in MANETs

Transcription:

www.ijcsi.org 45 Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment 1 Ateeq Ur Rehman, 2 Muhammad Tariq Sadiq, 3 Noman Shabbir and 4 Ghayoor Abbas Jafri 1 Department of Electrical Engineering, Superior University Lahore, Punjab, Pakistan 2 Department of Electrical Engineering, Sharif College of Engineering & Technology Lahore, Punjab, Pakistan 3 Department of Electrical Engineering, GC University Lahore, Punjab, Pakistan 4 Customer Delivery Department, Alcatel-Lucent NP19 2YB Newport (South Wales), United Kingdom Abstract In the last decades, mobile communication services have progressed very rapidly, which demands wider spectrum band. Studies by Federal Communications Commission (FCC) show that much of fixed assigned spectra are not used efficiently. Such kind of spectrum scarcity can be overcome by a use of the cognitive radio (CR). It has the capability that allows the Secondary Users (SUs) to use the wireless licensed spectrum when it is not used by the Primary Users (PUs). In this paper, an Opportunistic Cognitive Medium Access Control (OC-MAC) protocol is proposed that helps the CR to use the spectrum efficiently whenever it is vacant. The proposed OC-MAC protocol increases the spectrum efficiency. Moreover, it also removes the traditional hidden terminal problem commonly faced by the CR. Interference between the PUs and SUs is removed by the use of Request to Send (RTS) and Clear to Send (CTS) packets. Keywords: Cognitive Radio, Radio Spectrum Management, Spectrum Analysis, Medium Access Control. 1. Introduction There is a rapid improvement in the field of telecommunications resulting in the scarcity of available spectrum. According to the studies carried out by Federal Communications Commission (FCC), the main cause of the spectrum scarcity is the poor utilization of the spectrum. Much worse is that, 90 percent of the time, certain portion of the spectrum remains unoccupied. [1] One way to improve the poor utilization is cognitive radio (CR) [4,7] technology. CR aims to improve spectrum utilization in which primary (licensed) and secondary (un-licensed) users co-exist simultaneously. The owner of the channel is referred as Primary User (PU) and all other users are termed as Secondary Users (SUs) [5]. SUs are allowed to opportunistically access the spectrum not used by primary users (PUs). SUs leave the occupied spectrum when PU requires it. SU get some other vacant spectrum which is not occupied by PU. Following this procedure allows both PUs and SUs to communicate seamlessly and simultaneously. Moreover CR has many smart features like quickly sensing the presence of PUs and utilizing unused bands efficiently [6]. In this paper, we consider a Wireless Local Area Network (WLAN) environment consisting of both primary users (PUs) and secondary users (SUs). Cognitive radio users or SUs need an Opportunistic Cognitive Medium Access Control (OC-MAC) protocol to borrow data channels when they are not used by PUs. We have proposed a cross layer designed OC-MAC protocol which integrates spectrum sensing at physical layer and packet scheduling at MAC layer. The proposed MAC protocol gives information about available data channels to SUs. Based on this information OC-MAC protocol is able to remove the conventional hidden terminal problem and improves the overall utilization of available data channels.

www.ijcsi.org 46 2. Survey of Related Works The MAC protocols such as frequency hopping of Bluetooth and channel allocation of cellular network does not consider the PUs while it is necessary for CR. These protocols can cause serious damage to PUs [1]. A CR node should take into account primary users, the interference between primary and secondary users, data channel selection and collision avoidance. Hence a new MAC protocol is required for realizing the concept of Cognitive Radio. The cognitive borrowing algorithm in [2] raises the utilization of channel with only rare damage to PUs. Meanwhile the drawback of this algorithm is that it uses only one data channel which can get saturated in the case of congestion. Each of the SU in [3] uses two transceivers. One of the transceiver is tuned to the dedicated control channel while the other keeps sensing available data channels and dynamically uses them. 3. Problem Statement and Main Contribution When the PU or a SU is using the data channel, due to shadowing or fading effects, it might not be familiar to other SUs that a specific data channel is under use. A SU might claim that inuse channel resulting into collision with the SU or PU using that channel. This will result in hidden terminal problem and will cause the inefficiency in spectrum utilization. Our research question is how the MAC protocol can cope with the issue of data channel selection and hidden terminal problem, and help to improve data channel utilization. We hypothesized that an OC-MAC protocol can solve the hidden terminal problem and improve channel utilization with the help of handshaking mechanism at control channel. By using this technique, appropriate data channels can be selected for both PUs and SUs. The collision rate between SUs and PUs is maintained below threshold level which is assumed to be provided by the primary network. The main contribution of this paper is to design and simulate OC-MAC protocol which improves spectrum utilization while keeping acceptable level of collisions. The solution is validated using simulation results from OPNET version 14.5. 4.1 Method Modeling 4. Problem Solution The OC-MAC protocol implies a cross layer design and uses N data channels and M control channels. The PUs Fig. 1. Flow Chart of OC-MAC Protocol have the higher priority to use the spectrum and on the dedicated control channel, only the CR nodes compete for the reservation of the data channel. Each CR device has basic knowledge about the channels, such as data rate and tolerable damage percentage. The cognitive nodes sense for the availability of data channel and keep updating their channel state table in a regular way. The content of channel state table consists of: avail_timer(x) which gives information, how much time the data channel is available for [1]. utilize(x) which categorizes channels depending on the previous utilization. The channel with the lowest utilization is given the higher priority. Handshaking is done on the control channel for the reservation of data channel. The sender sends the Request to Send (RTS) packet to the receiver containing the information about the set of available channels and possible transmission duration. Receiver compares the RTS packet s content with its available set of data channels. After this it responds with Clear to Send (CTS) packet to transmitter. CTS packet contains the information about maximum transmission duration and the available data channels, that are free to use on both transmitter and receiver end. The CTS packet is also sent to all neighbours. In [1] the CTS packet is sent to the transmitter first and then transmitter broadcasts it to all the neighbours but here the receiver sends the CTS packet to transmitter as well as to all the neighbours simultaneously. This reduces the delay in communication. From the received CTS packet, the neighbors get informed that specific data

www.ijcsi.org 47 channel is used by the pair of cognitive user and other users should not claim for that. In this way hidden terminal problem is resolved. The data channel that is available on both transmitter and receiver side is selected for data transmission. After sending the CTS packet, CR node switches from control channel to data channel and then starts transmission. Receiver will send acknowledgements to sender after receiving the data successfully [1]. The flow chart describing the whole process for the data channel reservation is shown in Fig. 1. When the available time for the connection is gone and the node still has the data to transmit, it again scans to reserve the data channel [1]. 4.2 Implementation and Validation All simulations are done in OPNET version 14.5. IEEE 802.11b is used as a primary network. In the project we consider 5 pairs of primary nodes communicating with each other while 2 pairs of CR nodes utilizing the spectrum opportunistically during communication. The project scenario size is an office (100x100) meters. PUs are operating at the data rate of 11 Mbps by using the modulation scheme of Differential Phase Shift Keying (DPSK). The tolerable collision rate is assumed to be 1% provided by the primary network. [8] 5. Performance Evaluations This section gives a detailed analysis of simulation and results for different scenarios to evaluate the performance. The performance of OC-MAC is evaluated with respect to average data sent over the network and number of collisions. Simulation duration is five minutes and results are collected for three different scenarios. In the first scenario, the performance of network is observed when only primary users are allowed to use the network. In second case, secondary users are permitted to use the network and in third scenario, both primary and secondary users are allowed to use the network simultaneously. 5.1 First Scenario In the first scenario, network is analyzed with random seeds of 128. Figure 2(a) and Figure 2(b) show the performance of network when only primary users are using the network. The peak traffic sent over the network is 2.1 Mbps approximately as sown in Figure 2(a) and Figure 2(b) shows the average traffic sent by 5 PU nodes. Here again, the blue curve represents the total average traffic sent over the network which is about 0.898 Mbps and the rest 5 curves represent individual average traffic of PU nodes. a). Total Instantaneous Traffic (PU) b). Total Average Traffic (PU) Fig. 2. Total Instantaneous and Average Traffic by PUs only

www.ijcsi.org 48 a). Total Instantaneous Traffic (PU+SU) b). Total Average Traffic (PU+SU) Fig. 3. Total Instantaneous and Average Traffic by both PUs and SUs The main objective of CR technology is to increase the utilization of the available spectrum in such a way that it will not affect the primary usage above an acceptable level. Now to evaluate the performance of the network with CR concepts, SUs are allowed to access the spectrum opportunistically by avoiding collision using the OC-MAC protocol. Figure 3(a) and Figure 3(b) shows the performance of the network with both PUs and SUs. Figure 3(a) shows the instantaneous traffic sent by 5 PU nodes and 4 SU nodes. The blue line is the total instantaneous traffic sent by all PU nodes over the network and the rest of the 9 curves represent individual traffic sent The total peak traffic sent over the network with both SU and PU nodes using the same spectrum is now about 5.2 Static Average Collision (Packet) Table 1: Collision Count on CR Nodes Maximum Collision (Packets) 0 2.0478 3 1 1 6.7942 10 1 2 2.9083 3 1 3 1 1 1 Minimum Collision (Packets) Fig. 4. Collision Count of CR Nodes

www.ijcsi.org 49 Fig. 6. Improved Utilization Fig. 5. Spectrum Hole Utilization (PU+SU) Mbps approximately as compare to 2.1Mbps with only PU nodes as shown in Figure 2(a) and Figure 3(a) respectively. 5.2 Second Scenario Figure 3(b) shows the average traffic sent by 5 PU nodes and 4 SU nodes. Here again, the blue curve represents the total average traffic sent over the network and the rest 9 curves represent individual average traffic of PU nodes. The average traffic now increases to 2.62 Mbps from 1.2 Mbps. The collision rate is less than tolerable damage of 1% which is supposed to be provided by the primary network. The collision count of each CR node is given in Table 1. a). Total Instantaneous Traffic (PU) Fig. 7. Total Instantaneous and Average Traffic by PUs only b). Total Average Traffic (PU)

www.ijcsi.org 50 a). Total Instantaneous Traffic (PU+SU) b). Total Average Traffic (PU+SU) Fig. 8. Total Instantaneous and Average Traffic by both PUs and SUs To validate our model we have compared our work with this of Hung et al [2]. As they do not involve channel selection mechanism, there is only one data channel and one control channel for MAC protocol. In one data channel situation, there is no choice but try to transmit over the same channel. But in multi-data channels cases, our MAC protocol can select other low-utilized channels for transmission. Therefore the collision probability can be reduced by using more than one data channels. The MAC protocol detects spectrum holes and utilizes them for secondary usage. An example of spectrum hole utilization is shown in Figure 5. In Figure 5, the red curve represents traffic sent by the PU node and the blue curve represents traffic sent by the CR node over the same channel. The CR node utilizes the portion of the spectrum not used by PU node, thus increasing the overall utilization of the available channel. When only PU nodes are using the network the overall throughput is 0.898 Mbps. When CR nodes are allowed to use the network the overall throughput increases to 2.62 Mbps from 0.898 Mbps as shown in Figure 6. Thus, the total utilization of available channels increases by introducing SUs and the collision rate is less than the specified threshold. The designed MAC protocol also allows custom settings for each user. This means the maximum allowed traffic for each user can be set individually. To check the reliability of OC-MAC protocol, its performance is now tested with another scenario under heavy traffic. In this scenario traffic sending capability of all SUs is increased to the maximum possible limit and traffic of PUs is also increased and finally new simulation results are observed. The ad hoc wireless network can handle up to 11 Mbps of traffic at any instant and at above 11 Mbps traffic, packet loss occurs. Figure 7(a) shows total instantaneous traffic and Figure 7(b) shows total average traffic sent when only primary users are allowed to use the network. Now, Figure 8(a) shows total instantaneous traffic and Figure 8(b) shows total average traffic sent when both primary and secondary users are allowed to use the network. 6. Conclusions By using OC-MAC protocol, spectrum efficiency is improved a lot. Traditional hidden terminal problem is removed by handshaking at the control channel. Furthermore by the use of RTS and CTS packets, we minimize the interference between SUs and PUs when channel is allocated for SUs usage and vice versa.

www.ijcsi.org 51 We analyzed that there is one control channel that can get saturated in condition whenever there is an increased demand for the reservation of data channels. Hence, we propose an efficient Cognitive Radio-Enabled Multi- Channel MAC Protocol for future research. References [1]. S. Hung, Y. Cheng, E. H. Wu and G. Chen, An Opportunistic Cognitive MAC Protocol for Coexistence with WLAN, in IEEE International Conference on Communications, Beijing, 2008, pp. 4059-4063. [2]. S. C. Hung, S. Y. Hung, G. H. Chen, A Decentralized CR System Algorithm for Cognitive Borrowing Scheme from Primary Users, in 17th IEEE International Conference on Indoor and Mobile Radio Communications, 2006, pp. 1-5. [3]. S. Hang, X. Zhang, "Opportunistic MAC Protocols for Cognitive Radio Based Wireless Networks," in 41st Annual Conference on Information Sciences and Systems, Baltimore, 2007, pp. 363-368. [4]. J. Mitola, Cognitive Radio an Integrated Agent Architecture for Software Defined Radio, Ph.D. Dissertation, Teleinformatics, KTH, Stockholm, 2008. [5]. Daniel Willkomm, Robert Brodersen and Adam Wolisz, A cognitive radio approach for usage of virtual unlicensed spectrum in Proc. Of 14 th IST Mobile Wireless Communications Summit, Dresden, Germany, 2005. [6]. I.F. Akyildiz, W.Y. Lee and M.C. Vuran, Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, IEEE Transaction on Computer Networks, vol. 50, no. 13, pp. 2127-2159, May, 2006. [7]. M. J. III and M. G. Q. Jr., Cognitive radio: making software radios more personal, in IEEE Personal Communications, vol. 6, no. 4, pp. 13 18, 1999. [8]. G.A. Jafri, A.U. Rehman and M.T. Sadiq, Spectrum Sensing and Management in Cooperative Cognitive Radio, supervised by Maria Erman and Jörgen Nordberg, 2011. Ateeq Ur Rehman was born in Rawalpindi, Pakistan, in 1987. He received Bachelor Degree in Electrical (Telecommunication) Engineering from COMSATS Institute of Information Technology (CIIT), Lahore, Pakistan, in 2009 and MS Electrical Engineering (Telecommunications) degree from Blekinge Institute of Technology (BTH), Karlskrona, Sweden in 2011. He is currently working as a lecturer in the Dept. of Electrical Engineering., Superior University Lahore, Pakistan. His research interests are in the field of Next Generation Networks. Muhammad Tariq Sadiq was born in Lahore, Pakistan, in 1985. He received Bachelor Degree in Electrical Engineering from COMSATS Institute of Information Technology (CIIT), Lahore, Pakistan, in 2009 and MS Electrical Engineering (Telecommunications) degree from Blekinge Institute of Technology (BTH), Karlskrona, Sweden in 2011. His research interests are in the field of cognitive radio, speech processing and wireless networks. Noman Shabbir was born in Lahore, Pakistan in 1985. He got his BS Computer Engineering degree from COMSATS Institute of Information Technology (CIIT), Lahore, Pakistan, in 2007 and MS Electrical Engineering (Radio Comm.) degree from Blekinge Institute of Technology (BTH), Karlskrona, Sweden in 2009. His project on Unmanned Arial Vehicles (UAV) got 3 rd position in a National competition in 2006. He is currently working as a lecturer in the Dept. of Electrical Engineering., GC University Lahore, Pakistan. His research interests are in the field of wireless networks and computer networks. Ghayoor Abbas Jafri did his B.Sc (EE) from COMSATS University Lahore, Pakistan and M.Sc (EE) from Blekinge Institute of Technology (BTH), Karlskrona, Sweden. He is now working as Junior Network Engineer at Customer Delivery Department of Alcatel-Lucent in Newport, United Kingdom. His research interests include IP/MPLS Services Networks and Cognitive Radio Networks.