Conference PaperPDF Available

SWITCH: A Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks

Authors:

Abstract

Cognitive radio (CR) technology will empower wireless devices with the capabilities to dynamically exploit opportunities in both licensed and unlicensed spectra. Thus, the spectrum shortage problem that occurs due to the ever-increasing of wireless devices can be handled. In CR ad hoc network, a secondary user (SU) is allowed to utilize a channel of the primary system provided the channel is idle from primary user (PU) activity. In this environment, the way the SU copes with a sudden appearance of the PU is the most important feature of distributed CR-MAC protocols. In this paper, a multichannel CR-MAC protocol, which reacts efficiently to PU appearance, is developed. The new protocol is named opportunistic Spectrum access WITh backup CHannel (SWITCH). The SWITCH protocol is a decentralized, asynchronous, and contention-based MAC protocol for CR ad hoc networks. The proposed protocol operates over both licensed and unlicensed spectra. In addition, the concept of backup channel is introduced and employed to make the SU extremely robust to the appearance of PUs. The simulation results show that SWITCH accomplishes 91% throughput gain over other CR-MAC protocols.
SWITCH: A Multichannel MAC Protocol for
Cognitive Radio Ad Hoc Networks
Mohamed A. Kalil, Andr´
e Puschmann and Andreas Mitschele-Thiel
Integrated Communication Systems Group, Ilmenau University of Technology, Ilmenau, Germany
Email: mohamed.abdrabou, andre.puschmann, mitsch@tu-ilmenau.de
Abstract—Cognitive radio (CR) technology will empower wire-
less devices with the capabilities to dynamically exploit opportu-
nities in both licensed and unlicensed spectra. Thus, the spectrum
shortage problem that occurs due to the ever-increasing of wire-
less devices can be handled. In CR ad hoc network, a secondary
user (SU) is allowed to utilize a channel of the primary system
provided the channel is idle from primary user (PU) activity. In
this environment, the way the SU copes with a sudden appearance
of the PU is the most important feature of distributed CR-
MAC protocols. In this paper, a multichannel CR-MAC protocol,
which reacts efficiently to PU appearance, is developed. The new
protocol is named opportunistic Spectrum access WITh backup
CHannel (SWITCH). The SWITCH protocol is a decentralized,
asynchronous, and contention-based MAC protocol for CR ad hoc
networks. The proposed protocol operates over both licensed and
unlicensed spectra. In addition, the concept of backup channel
is introduced and employed to make the SU extremely robust
to the appearance of PUs. The simulation results show that
SWITCH accomplishes 91% throughput gain over other CR-
MAC protocols.
I. INT RO DUC TI O N
In the existing literature, several MAC protocols have
been extensively studied in the context of classical ad hoc
networks. However, they cannot be applied directly to CR
ad hoc networks, which have some unique characteristics
that clearly distinguish them from their classical counterparts.
Firstly, the SUs should have the ability to seek adaptively and
dynamically for opportunities in both licensed channels (LCs)
and unlicensed channels (UCs). Secondly, the SUs should react
efficiently to the sudden and the consecutive appearance of
PUs. These two characteristics make the design of an efficient
CR-MAC protocol a challenge.
An extensive survey of CR-MAC protocols has been given
in [1]. According to this survey, CR-MAC protocols can be
classified in: contention-based protocols, time slotted protocols
and hybrid protocols. Contention-based MAC protocols are
based on the classical CSMA/CA principle. In addition, one
or more features are added to these protocols to be adapted to
the CR environment. For contention-based MAC protocols,
no synchronization is needed between the SUs to access
the available channels. The DCA-MAC protocol [2] is an
example of this class. Time-slotted MAC protocols need a
global synchronization between SUs. Therefore, the time is
divided in slots for both the control and the data transmission.
Examples of this class are the Cognitive MAC (C-MAC)
protocol [3] and the Opportunistic Spectrum Access (OSA-
MAC) protocol [4]. Hybrid MAC protocols use a partially
slotted transmission, in which the control signaling generally
occurs over synchronized time slots. In addition, the fol-
lowing data transmission may have random channel access
schemes, without time synchronization. The SYNchronized
MAC (SYN-MAC) protocol [5] is an example from this class.
Most of aforementioned protocols operate over LCs only.
In [6], the authors have categorized MAC protocols for CR
into two major groups according to the way the SU copes with
the sudden appearance of the PU: 1) MAC protocols that en-
able buffering of SU connections preempted by the PU arrival,
and 2) MAC protocols that enable switching of SU connections
to a vacant channel when the SU preempted. The disadvantage
of the former group is that the SU buffers its connection even
if there is another free channel. Furthermore, it may happen
that the SU will not be able to re-establish its connection
after buffering because of continuous PU transmissions which
leads to a high delay. The disadvantage of the latter group is
the control message overhead between transmitter/receiver pair
to access the new channel. However, this problem is already
considered by the Opportunistic Spectrum Access with Backup
channel (OSAB) concept [7].
To benefit from the OSAB concept, a flexible MAC pro-
tocol, that coordinates the access to the medium (LCs and
UCs), should be developed. Therefore, the main goal of this
paper is introducing such a protocol. The proposed protocol is
called opportunistic Spectrum access WITh backup CHannel
(SWITCH) protocol. The SWITCH protocol is a decentralized,
asynchronous, and contention based MAC protocol for CR ad
hoc networks. The proposed protocol operates over both LCs
and UCs. In addition, the concept of Backup Channel (BC) is
introduced and employed to make the SU extremely robust to
the appearance of PUs.
The remainder of this paper is organized as follows. The
proposed protocol is described in details in Section II. The
cognitive cycle of the proposed protocol is presented in Section
III. The performance of the proposed protocol is evaluated by
simulation in Section IV. Next, in Section V, we present and
discuss selected results from our analysis. In Section VI, we
summarize the paper.
II. SW ITCH PROTOCO L
In this section, the SWITCH protocol is described in de-
tail. Firstly, the design features are presented. Secondly, the
assumptions are listed. Finally, the basic protocol operation is
given.
A. Design features
OSAB [7] [8] is an abstract concept that does not answer
questions such as: How does the transmitter/receiver pair
coordinate access to the available spectrum? How does the
SU cope with the sudden appearance of the PU? Thus, a
detailed MAC protocol is needed to answer the aforementioned
questions. This was a motivation for us to develop SWITCH.
For amending the first issue mentioned above, SWITCH
is a contention-based MAC protocol to coordinate the access
to the available channels. Contention-based MAC protocols
are asynchronous MAC protocols. This feature makes this
class an appropriate candidate for designing a MAC protocol
for CR ad hoc networks. In addition, this class utilizes a
Common Control Channel (CCC) as a rendezvous channel
for the exchange of control packets for the whole network.
Thus, all nodes in the networks are aware of the spectrum
availability in their vicinity. The End-to-End Reconfigurability
(E2R) project [9] has shown that CCC is very suited for CR
networks. On the contrary, time slotted protocols and hybrid
MAC protocols need synchronization among the nodes in the
network which is quite a challenge in an environment that
lacks a centralized entity.
To handle the second issue, SWITCH uses the BCs con-
cept proposed by OSAB. The BC is negotiated between the
transmitter and receiver prior to the actual data transmission.
Thus, when a PU appears (For simplicity, we assume that
PU appearance is sensed by both transmitter and receiver),
both transmitter and receiver switch to the BC without addi-
tional control messages. This minimizes the control overhead
required to find a new channel in the case of PUs appearance.
Furthermore, all nodes in the transmission range of both nodes
are informed about such a switch and therefore, the number
of data collisions is reduced.
B. Assumptions
SWITCH is developed based on the following assumptions:
Two types of users affect the SU’s performance: PUs and
Classical Users (CUs) which are wireless devices without
cognitive radio capabilities such as devices using the
conventional standards e.g. IEEE 802.11 and Bluetooth.
Two types of channels are assumed: a CCC and data
channels. The CCC is used as a rendezvous channel by
SUs for coordinating access to the medium. The selection
of the CCC is beyond the scope of this paper and we
assume that is statically assigned. The data channels
are of two types: LCs and UCs. The maximum number
of LCs and UCs are C1and C2respectively. The C1
channels are used as operating channels in the case of
PUs absence. In addition, the LCs are shared between
PUs and SUs with high priority for PUs to access the
channels. The C2channels are used as BCs in the case of
PUs appearance (Note: if there are no free channel from
UCs, the channel with the least PU activity is selected as
a BC). The UCs are shared between SUs and CUs with
equal priority.
Each SU is equipped with two transceivers (TRx): The
first transceiver, TRx1, is devoted to operating over
the CCC. The second transceiver, TRx2, consists of a
Software Defined Radio (SDR) module. The SDR module
can tune to any of the available channels, LCs and
UCs, to sense for the unused spectrum and moreover
receive/transmit the SUs packets.
III. C OGN ITIVE CY CLE O F SWITCH
To facilitate the description of the proposed protocol, we
present a simplified cognition cycle for the SWITCH proto-
col. This cycle contains the following components: spectrum
sensing, spectrum allocation, spectrum sharing and spectrum
mobility. The SWITCH cognitive cycle is consistent with the
generic cognition cycle presented in [1].
A. Spectrum sensing
Spectrum sensing is an essential component of the cognitive
cycle of the SWITCH protocol. It is used to identify unused
channels regardless of the fact that these channels are LCs
or UCs. In this paper, we assume that SUs use cooperative
spectrum sensing as a spectrum sensing strategy. In this
strategy, the sensing results (i.e. available channels from LCs
and UCs) are combined from all SUs in the network. Thus,
the chance of missing signals from PUs, CUs, and other
SUs can be reduced which leads to better utilization of the
available spectrum. To achieve this goal, coordination and
cooperation between both transceivers (i.e. TRx1 and TRx2),
employed by each SU, are essential to sense available channels
and to distribute the sensing information among SUs. The
coordination between both transceivers can be done by using
SDR transceiver, TRx2, to sense one of Cchannels randomly,
say k-th channel, (1kC;C=C1+C2). Afterwards,
the SU tunes to its TRx1 to inform other neighbors about the
availability of this channel over the CCC.
B. Spectrum allocation
The accuracy of spectrum allocation process has a great im-
pact on both the network throughput and the overall spectrum
utilization. In SWITCH, there are two spectrum allocation data
structures, Neighbors Channel List (NCL), and Free Channel
List (FCL). The NCL is used by each node Xto keep record
of the channels occupied by neighboring nodes. The NCL
is constructed by listening to control messages sent on the
CCC. The data structure for the NCL can be described as
follows: NCL(i).node presents the neighboring node iof
node X.NCL(i).ch.no indicates the channel used by node
i.NCL(i).ch.index presents the type of the channel (LC or
UC). This field has two values, 1 or 2, which indicates the
channel type, LC or UC, respectively. NC L(i).time shows
how long NCL(i).ch.no will be occupied?
The FCL contains the available channels in the transmission
range of the node (i.e. channels not used by other neigh-
bors). A node updates its NCL and FCL, once it receives
a new control messages. The data structure for the FCL of
node A can be described as follows: F C L(i).ch.no presents
the channel number. F CL(i).ch.index shows the type of
the channel (LC or UC). F C L(i).ch.priority indicates the
priority of each channel to be used by the node. Each
channel may be assigned one of three priorities: L, M or H
which presents the channel always has low, moderate or high
priority to be used, respectively. The priority is assigned to
a channel according to PU and CU activities. The channel
with least PU and CU activities is given the highest priority
(i.e. F C L(i).ch.priority =H) to be the data channel. If
there are more than one channel with high priority, then
the data channel is selected randomly. After maintaining the
FCL, the next logical step is the selection of the Proposed
Data Channel (PDC) and Backup Channel (BC) for data
transmission preparation. The PDC is selected firstly from the
LCs (i.e. channels with ch.index = 1) as mentioned before.
The transmitter checks its FCL and selects the first channel
with the least PU activity (i.e. F C L(i).ch.priority =H) as
the PDC. The BC is selected firstly from the UCs (i.e. channels
with ch.index = 2). If all UCs are busy, the second channel
with the least PU activity from the LCs, is selected as a BC.
C. Spectrum sharing
In this section, we describe the spectrum sharing process of
SWITCH. First, we introduce the control packet format. Sec-
ond, we present the two handshake modes used by SWITCH.
1) Control packets format: The control packet format
of SWITCH is similar to the IEEE 802.11 packet format.
However, some modifications are added to support the CR
operation. For Request To Send (RTS): Three more fields are
added to the packet format of the original RTS: PDC, BC and
FCL fields. For Clear To Send (CTS): Two fields are added
to the packet format of the original CTS: The Selected Data
Channel (SDC) and BC fields which indicate the data channel
selected by the receiver and the BC suggested in the case of
PUs appearance, respectively. In addition, a new packet named
Notification To Reserve (NTR) is added. This packet has the
same format as CTS. The NTR is sent by the transmitter to
its neighbors only in the case that the PDC or/and BC carried
by the RTS control message is not equal to the SDC or/and
BC carried by the CTS.
2) Handshake process: SWITCH has two modes of
handshake: Two-way RTS/CTS handshake and Three-way
RTS/CTS/NTR handshake. The usage of each mode depends
completely on: 1) the channel availability in both the trans-
mitter and receiver sides, and 2) the activity of PUs, CUs and
other SUs.
Figure 1. shows an example of the spectrum sharing process.
Suppose that we have five SUs: A, B, C, D and E. Each
user constructs its FCL during the spectrum sensing process.
There are two types of channels: four LCs and two UCs.
One of the LCs (Ch.no = 1) is selected as a CCC. We
assume that two LCs (i.e. Ch.no = 2 and Ch.no = 3) and
one UC (i.e.Ch.no = 5) are available for transmission. Both
Ch.no = 4 from LCs and Ch.no = 6 from UCs are busy.
This explains why those channels are not listed in the FCL.
Ch.no Ch.index Ch.priority
1 1 -
3 1 H
2 1 M
5 2 H
FCL for node B
FCL for node C
BC
DE
ATransmitter
Receiver
PU1
CU1
Ch.no Ch.index Ch.priority
1 1 -
3 1 H
2 1 M
5 2 H
Fig. 1. Node B communicates with node C depending on FCL
To establish a communication between B and C, the nodes use
one of the previously mentioned handshake modes.
Receiver
(node C)
Neighbors
(e.g. node E)
RTS RTS
CTS CTS
Neighbors
(e.g. node A)
Transmitter
(node B)
W_DATA
W_CTS
PDC=SDC
Switch
Sense
CCCCh3 from LCs
Receive
over LC
Transmit
over LC
Idle
Backoff
(RA,..., PDC=3, BC=5)
(RA,SDC=3, BC=5) (RA,SDC=3, BC=5)
DATADATA
ACKACK
t0
t1
t2
PU
appears
DATADATA
Transmit
over UC
Ch5 from UCs
Switch
Receive
over UC
W_ACK
(RA,..., PDC=3, BC=5)
Fig. 2. MSC for RTS/CTS handshake with SU interruption
In the two-way RTS/CTS handshake mode, the normal
handshake RTS/CTS, like IEEE 802.11 MAC, is used. Figure 2
presents the Message Sequence Chart (MSC) for this mode. In
this figure, the hexagon represents the state of both transmitter
and receiver. The RTS/CTS mode is used when the receiver
(node C) agrees with the transmitter’s (node B) proposal. In
Figure 2, the proposal from node B is Ch.no = 3 as PDC
and Ch.no = 5 as BC. On receiving RTS and CTS, the
neighboring nodes (e.g. node A and node E) update their
NCL accordingly. Afterwards, both node B and node C tune
their TRx2 to Ch.no = 3 and start data transmission. If a
PU appears during the data transmission between B and C,
both nodes wait for a time, TSwitch and then switch to the
BC (Ch.no = 5) from the UCs if available. TSwitch can be
defined as the time required by the SU to sense and switch to
the BC. This process is called spectrum mobility. This process
is presented by the Switch state in Figure 3. There is no need
to inform the neighboring nodes about such a switch since they
are already informed before by listening to the RTS and CTS.
The TSwitch time should be less than DIFS. If this condition
is not satisfied then there is a probability that another SU in
the vicinity of the transmitter wins the contention and thus
TABLE I
SIM UL ATION PARAMETER S
Parameter Value
Data rate 1 Mbps
Number of LCs and UCs varies
Transmission range for PUs 150m
Transmission range for SUs, CUs 50m
RTS size 24 Byte
CTS size 16 Byte
NTR size 16 Byte
DATA size 2300 Byte
ACK size 14 Byte
SIFS 10 µs
DIFS 50 µs
TSwitch 40 µs
the switching fails. If the BC is available, both users will not
perform any additional handoff since the UCs are free from
PUs. If the BC is not available, the transmitter/receiver pair
restart the negotiation process again.
The three-way RTS/CTS/NTR handshake is used when the
receiver (node C) did not agree with the transmitter’s (node
B) proposal. For example, it may happen that the proposal
from node B is Ch.no = 3 as PDC and C h.no = 5 as BC.
However, C h.no = 3 from LCs is not included in the FCL
of node C (i.e., Ch.no = 3 is busy). Therefore, node C will
match both its FCL with the FCL of node B to select a new
data channel. Based on this matching, C selects for example
Ch.no = 2 from LCs as the SDC and sends a CTS. Based
on this change on the data channel, a NTR control message
is sent by node B to inform its neighbors. The neighboring
nodes change the tentative reservation that happened for the
PDC as a response to the RTS with the new information carried
by the NTR message. If a PU appears on Ch.no = 2, both
nodes will wait for TSwitch and after that switch to the BC
from the UCs if available and follows the same procedure like
the aforementioned example. Remark: there is a possibility
that after performing a channel switching, the transmitter or
the receiver find the BC to be busy, this may occur due to
one of the following reasons: Conflicting reservations due to
loss of control packets or a CU occupies the BC during SU
transmission since we assume a soft reservation of the BC.
Soft reservation means that the BC can be utilized by other
CUs if there is no free UC.
IV. SIM ULATI ON
As saturation throughput is a major performance measure
to evaluate MAC protocols [10], we use it as the main
performance metric. The saturation throughput means that SUs
always have data packets in their queue to transmit.
The scenario used in our simulation can be described as
follows: There are 24 SUs, 12 CUs and 12 PUs. SUs are static.
Each two SUs establish a session. We assume that each SU
has always a packet in its queue to send. The SUs coexist with
both the PUs and CUs. Each SU in this network independently
generates traffic of fixed-size packets. Table I presents the
simulation parameters. All reported results are averages over
three different runs of the simulation. Each run is equal to
transmit 30,000 SU packets on aggregate.
SWITCH is comparatively evaluated along with CR-MAC
and DCA-MAC [2]. The CR-MAC protocol is a modified
version of the IEEE 802.11 MAC protocol. The modifica-
tion mimics and supports multichannel access methods. Like
SWITCH, CR-MAC also uses a dedicated CCC for control
packets exchange while using other channels for data commu-
nications. The data channels are assigned from the LCs only
and other UCs are ignored. CR-MAC uses always two-way
RTS/CTS handshake for coordinating access to the available
channels. The FCL of the transmitter is carried by the RTS.
Upon receiving RTS, the receiver matches this list with its
own FCL and based on that the data channel is selected. DCA-
MAC [2] uses always three-way RTS/CTS/Reservation(RES)
handshake for coordinating access to the available channels. In
addition, DCA-MAC is operating only over the LCs. SWITCH
has the following features compared to the two aforementioned
protocols
it operates over both LCs and UCs,
it reacts efficiently to the appearance of the PUs by using
the BC’s concept.
it is flexible to use the two-way RTS/CTS handshake
or three-way RTS/CTS/NTR handshake according to the
channels availability in both the transmitter and receiver.
V. RE SULTS
Simulation results are given as a function of the PU traffic
load since the appearance of PUs is the most important event
that affects CR ad hoc networks.
Fig. 3. Throughput of the SUs as a function of PU traffic load and using
the LCs only: C1= 12 and C2= 0
Impact of PU traffic load: The PU traffic load has a great
impact on the performance of SUs since once a PU appears
in a channel occupied by an SU, the SU should vacate this
channel and determine another free one. Figure 3 shows the
saturation throughput of the SUs using the SWITCH protocol
compared to DCA-MAC and CR-MAC vs. the PU traffic
load and using the LCs only. The number of LCs is set to
12 channels. In this Figure, the impact of the UCs is not
shown. Obviously, when the PUs traffic load increase, the
throughput for the three MAC protocols decreases however
with different levels. Although the UCs are not used here, the
performance of SWITCH outperforms the performance of the
other two protocols because of the BC concept. The throughput
of SWITCH increases compared to CR-MAC and DCA-MAC
by 91% and 19%, respectively.
   
7UDIILFORDGRI38V



6DWX
U
DWLRQ7K
U
RXJKSXW0ESV
6:,7&+
&
&
&
&
ORZ&8WUDIILF
&
&
KLJK&8WUDIILF
'&$&
&
Fig. 4. Throughput of the SUs as a function of PU traffic load with different
number of UCs: For SWITCH, C1= 12,C2= 0 or C1= 10,C2= 2. For
DCA, C1= 12 and C2= 0
Impact of UCs: Figure 4 shows the throughput of the SUs
using the SWITCH protocol as a function of the PU traffic
load and using both LCs and UCs. In addition, we generate
different CU traffic loads in the UCs to investigate the effect
of CUs on the SWITCH protocol. To make a fair comparison
between SWITCH and DCA-MAC, we use the same number
of channels for each protocol. However, the type of channel
will be different from one protocol to another. For DCA-MAC,
C1= 12 and C2= 0 are used since this protocol operates
over the LCs only. For the SWITCH protocol, C1= 10 and
C2= 2. The Figure illustrates that the performance of the
SWITCH protocol outperforms DCA-MAC. Furthermore, it
outperforms the performance of the SWITCH protocol when
operating LCs only. This improvement is expected within low
CU traffic since the two UCs are utilized somehow exclusively
by the SUs. On the contrary, when the PUs appears in DCA-
MAC, the SU data transmission is interrupted and a new
transmission is established. This process continues till the SU
data transmission is completed. This explains the significant
improvement on the throughput for the SWITCH protocol
compared to DCA-MAC. For a high traffic load of CUs and
using both LCs and UCs, SWITCH increases the throughput
compared to DCA-MAC and SWITCH, using the LCs only, by
91.7% and 63.5%, respectively. Interestingly, although DCA-
MAC utilizes 12 LCs and SWITCH utilizes only 10 LCs and
two highly loaded UCs, SWITCH outperforms DCA-MAC.
We can explain that as follows. Even if the two UCs are
highly loaded, there is a chance for the SUs to access the
UCs since all users in the UCs have the same priority to access
the channels. In addition, the concept of BC reduces the time
needed to establish a new connection.
VI. CO N CL USI ON
In this paper, a decentralized, asynchronous, and contention-
based MAC protocol named SWITCH, has been developed.
Using simulation, we were able to compare SWITCH with
other MAC protocols in a cohesive manner. We draw important
conclusions from our study such as: 1) A combination of
channels from LCs and UCs as a spectrum environment for
CR ad hoc devices is a better approach for efficient utilization
of the available spectrum, 2) The concept of BC minimizes
the overhead needed to maintain the SUs link in the case of
PU appearance. In future work, the SWITCH protocol will be
implemented using a SDR testbed developed at our university.
REF ER ENC ES
[1] I. F. Akyildiz, W.-Y. Lee, and K. R. Chowdhury, “Crahns: Cognitive
radio ad hoc networks,” Ad Hoc Networks Journal, vol. 7, no. 5, pp.
810–836, July 2009.
[2] P. Pawelczak, R. Venkatesha Prasad, L. Xia, and I. Niemegeers, “Cog-
nitive radio emergency networks - requirements and design,” in Proc.
of the 1st IEEE International Symposium on New Frontiers in Dynamic
Spectrum Access Networks (DySPAN 2005), Maryland, USA, November
2005, pp. 601–606.
[3] C. Cordeiro and K. Challapali, “C-mac: A cognitive mac protocol for
multi-channel wireless networks,” in Proc. of the 2nd IEEE International
Symposium on New Frontiers in Dynamic Spectrum Access Networks
(DySPAN 2007), Dublin, Ireland, April 2007, pp. 147–157.
[4] L. Le and E. Hossain, “Osa-mac: A mac protocol for opportunistic
spectrum access in cognitive radio networks,” in Proc. of the IEEE
Wireless Communications and Networking Conference (WCNC 2008),
Las Vegas, USA, April 2008, pp. 1426–1430.
[5] Y. R. Kondareddy and P. Agrawal, “Synchronized mac protocol for
multi-hop cognitive radio networks,” in Proc. of the IEEE International
Conference on Communications (ICC 2008), Beijing, China, 19-23 May
2008, pp. 3198–3202.
[6] J. Park, P. Pawelczak, and D. Cabric, “To buffer or to switch: Design
of multichannel mac for osa ad hoc networks,” in Proc. of the IEEE
International Symposium on New Frontiers in Dynamic Spectrum Access
Networks (DySPAN 2010), Singapore, 6-9 April 2010, pp. 1–10.
[7] M. A. Kalil, H. Al-Mahdi, and A. Mitschele-Thiel, “Analysis of oppor-
tunistic spectrum access in cognitive ad hoc networks,” in Proc. of the
16th International Conference on Analytical and Stochastic Modelling
Techniques and Applications (ASMTA 2009), Madrid, Spain, 9–12 June
2009, pp. 9–12.
[8] H. Al-Mahdi, M. A. Kalil, F. Liers, and A. Mitschele-Thiel, “Increasing
spectrum capacity for ad hoc networks using cognitive radios: An
analytical model,” IEEE Communications Letters, vol. 13, no. 9, pp.
676–678, September 2009.
[9] P. Cordier, P. Houze, S. B. Jemaa, O. Simon, D. Bourse, D. Grandblaise,
K. Moessner, J. Luo, C. Kloeck, K. Tsagkaris, R. Agusti, N. Olaziregi,
Z. Boufidis, E. Buracchini, P. Goria, and A. Trogolo, “E2r cognitive
pilot channel concept,” in Proc. of the 15th IST Mobile and Wireless
Communications Summit, Myconos, Greece, 4-6 June 2006, pp. 1–4.
[10] J. Mo, H.-S. So, and J. Walrand, “Comparison of multi-channel mac
protocols,” IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp.
50–65, Janaury 2008.
... Also, it is not clear how an SU reacts to the appearance of a PU in a given channel. SWITCH [5] is a contention based MAC protocol for CRAHN, where an SU can switch to a predefined BC in appearance of any PU. However, SWITCH does not provide any details on channel prioritization, backup channel maintenance, theoretical performance analysis, etc. ...
... In such a case, an LC is used as the data channel and a UC is used as a BC. SWITCH [5] is a multichannel MAC protocol for CRAHNs that was then designed to overcome some of the remaining limitations found in OSAB. In SWITCH [5], the details of the transmitter-receiver coordination were specified, and a better technique was presented for SUs to cope with the sudden appearance of the PUs in the data channel. ...
... SWITCH [5] is a multichannel MAC protocol for CRAHNs that was then designed to overcome some of the remaining limitations found in OSAB. In SWITCH [5], the details of the transmitter-receiver coordination were specified, and a better technique was presented for SUs to cope with the sudden appearance of the PUs in the data channel. ...
Article
Full-text available
Cognitive radio (CR) technology enables opportunistic exploration of unused licensed channels. By giving secondary users (SUs) the capability to utilize the licensed channels (LCs) when there are no primary users (PUs) present, the CR increases spectrum utilization and ameliorates the problem of spectrum shortage. However, the absence of a central controller in CR ad hoc network (CRAHN) introduces many challenges in the efficient selection of appropriate data and backup channels. Maintenance of the backup channels as well as managing the sudden appearance of PUs are critical issues for effective operation of CR. In this paper, a prioritized medium access control protocol for CRAHN, PCR-MAC, is developed which opportunistically selects the optimal data and backup channels from a list of available channels. We also design a scheme for reliable switching of a SU from the data channel to the backup channel and vice-versa. Thus, PCR-MAC increases network throughput and decreases SUs’ blocking rate. We also develop a Markov chain-based performance analysis model for the proposed PCR-MAC protocol. Our simulations, carried out in NS-3, show that the proposed PCR-MAC outperforms other state-of-the-art opportunistic medium access control protocols for CRAHNs.
... identify the PUs and its neighbors activity, and busy duration of the transmitter and receiver as well (Joe and Son 2008;Kalil et al. 2012;Zhang and Su 2011b;Fourati et al. 2011). Hence, this process is solved the single channel as well as multi-channel hidden problems and avoid collision among the SUs. ...
... The results also show the comparison of the proposed OCCRT and other benchmark well known cognitive known radio protocols. The OCCTR protocol has utilize least communication time as well as transmitted energy as compared to other proposed models of cognitive radio protocols, such as cognitive radio enabled multichannel MAC protocol over access networks (CREAM) (Joe and Son 2008), dynamic spectrum allocation MAC protocol based on cognitive radio for QoS support (DSA), vehicular technology conference (SWITCH) (Kalil et al. 2012) and A reactive multi-channel (RMC) MAC protocol for opportunistic spectrum access (Zhang and Su 2011b). Figure 14 delivers the communication time used by even numbered secondary users i.e. 2, 4, 6, 8 and 10. ...
Article
Full-text available
Fast evolution of the Internet, mobile technologies and energy efficient communication protocols has given a new momentum to e-businesses and world become a global village. Due to increase in the usage of internet and number of mobile users, many companies use these channels to make their products and brands visible to their customers all over the world. Although, some progress has been made towards this direction but further exploration is required, particularly it is still a challenge to enhance in-flight passengers’ shopping experience through efficient and reliable communication protocols. In this paper, we proposed a framework for omni-channel which is based on cognitive radio and machine learning. The proposed cognitive radio communication protocols provide seamless connectivity to in-flight passengers through energy efficient mode like machine learning (ML). Here, machine learning helps to develop user profile, based on relevance feedback that address the problem of catalogue and information overload. In this paper, we also discuss various challenges and opportunities associated with the proposed omni-channel business model. Moreover, the role and impact of emerging technologies such as cognitive radio and 5G in realizing omni-channel businesses is discussed in this paper. Our results explain the seamless communication between aircraft users and merchandise, through reliable and efficient connectivity when the aircraft passes over different geographic areas i.e. urban/rural land or sea at different altitudes and geographic locations. Here, backup data channel is introduced which further enhance the reliability of connection especially when primary users turns ON during the communication. Furthermore, the proposed model helps to reduce communication time and consume less energy to transmit with high throughput as compared to the benchmark cognitive radio protocols.
... A multichannel MAC protocol called the opportunistic spectrum access with backup channel (SWITCH) for CRAHN was proposed by Kalil et al. [20]. The protocol is a decentralized, asynchronous, and contention based MAC protocol. ...
... Recently a MAC protocol based on carrier sense multiple access/collision avoidance (CSMA/CA) with mobility support for CRAHN [23]. However, all these proposed protocols do not consider the coexistence of an SU from different CRAHNs, so there is not a treatment for fairness [20][21][22][23]. Furthermore, each SU does not record all activities of the nodes in its neighborhood. ...
Article
Full-text available
A secondary user (SU) in multichannel cognitive radio ad hoc network (CRAHN) has a limited transmission range, which may raise a hidden multichannel sensing problem. In addition, CRAHNs can be deployed ubiquitously, and SUs from any CRAHNs could co-exist utilizing the spectrum. This situation leads to the fairness issue of spectrum resource sharing between the SUs. Both cooperative and fairness issues are important to CRAHN performance. In this paper, a cooperative and a non-cooperative multichannel (MC)-MAC protocol is proposed. In order to address the fairness issue, a fair multichannel (FMC)-MAC protocol for CRAHN is proposed, which orientates to the fairness in resource sharing. In this FMC-MAC, the SU keeps the current backoff (CB) counter when a PU appears to claim the intended channel. These proposed MAC protocols are simulated using NS2 and compared with other protocols. In addition, a mathematical model using Markov chain is constructed for FMC-MAC and the performance measures are derived. From results, the MC-MAC protocol has enhanced the network utilization and the cooperative scheme has significantly enhanced the packet delivery ratio and decreased the end-to-end delay of SUs in high traffic. The cooperative protocol enhances packet delivery ratio up to 15 % and decreases end-to-end delay down to 32 %, compared to the non-cooperative one. The FMC-MAC protocol with other two existing protocols. From the comparison results, a higher fairness has been shown by FMC-MAC CB while still maintaining a high throughput.
... A novel protocol called truncated time division multiple access (TTDMA) is proposed that supports efficient distribution of sensing results using K-out-of-N fusion rule [103]. In order to handle sudden PU appearance efficiently with BC, a new contention-based multi-channel MAC protocol [104]. To cope with the appearance of the PUs, another unaided rendezvous, asynchronous and contention-based multi-channel MAC protocol named opportunistic spectrum access with backup channel and buffered data with resume (OSA-BR) is proposed in [69]. ...
Article
Full-text available
Cognitive radio (CR) is a promising wireless technology that provides efficient spectral usage. Medium Access Control (MAC) has an important role in several cognitive radio functions such as sensing, spectrum mobility, resource allocation and spectrum sharing. We focus on the opportunistic spectrum access (OSA) functionality of the CR network MAC layer by which the secondary users (SUs) access licensed spectrum in space and time with no harmful interference to primary users (PUs), without prior information on spectral usage. To achieve this, the unlicensed users should have the ability to adaptively and dynamically seek and exploit opportunities in licensed spectrum in time, polarization and frequency domains. There have been several OSA MAC schemes proposed for CR networks. This article presents a detailed review of such state-of-the-art schemes. First the differences between the conventional MAC protocols and OSA based MAC protocols are discussed. Existing OSA MAC protocols are classified according to their key attributes and their performances. Finally, future research directions are discussed.
... The OMC-MAC addressed QoS provisioning problem for DCRN using user application prioritization. The PMAC and PCR-MAC presented channel selection mechanisms using EWMA-based historical usage prediction to enhance the opportunistic spectrum utilization; the PCR-MAC also exploits the concept of backup channel, adopted from SWITCH [17], to further optimize the spectrum utilization. ...
Article
Full-text available
Opportunistic usage selection of a licensed channel by a secondary user (SU) and its contention for data transmission is a challenging problem in coexisting cognitive radio network (CCRN). This is caused by the presence of many SUs from different CRNs in a shared environment, and the problem is further intensified when the user applications, with heterogeneous quality-of-service (QoS) requirements, require prioritized access to the opportunistic spectrum. The state-of-the-art protocols did not address the problem of efficient coexistence following both the dynamic spectrum availability and prioritized medium access. In this paper, a weighted fair medium access control protocol, namely WF-MAC, has been developed for overlay CR network that gives users proportionate accesses to the opportunistic spectrum following their application QoS requirements. The channel availability prediction using autoregression (AR) model and channel utility perception using exponentially weighted moving average (EWMA) facilitate WF-MAC to achieve more stable and fair access to the opportunistic spectrum. Our simulation experiment results depict the efficiency of the proposed WF-MAC protocol in achieving better spectrum utilization, weighted fairness, throughput, and medium access delay compared to the state-of-the-art protocols.
Conference Paper
A secondary user (SU) in a multichannel cognitive radio ad hoc network (CRAHN) must be able to perform a primary user (PU) sensing and communicate with other SUs. With limited transmission range, each SU may face a hidden PU sensing problem. Hence the cooperative issue is considered to avoid the problem. In addition, CRAHNs can be deployed ubiquitously, and the SUs of any CRAHN could co-exist with each other when using the frequency spectrum. It may raise a fairness issue of resource sharing between SUs. Therefore, we propose the cooperative fair multichannel medium access control (CFMC-MAC) protocol, which aims to address a hidden PU problem and to achieve a high fairness among co-existing SUs from multiple CRAHNs. In CFMC-MAC, the SU keeps its current backoff (CB) value counter when a PU claims the channel. The proposed protocol performance is simulated using network simulator (NS)-2 in terms of fairness and packet delivery ratio (PDR). The protocol is compared to the renewal backoff (RB) counter approach and modified existing 802.11 protocols. The simulation results demonstrate the proposed protocol has the higher fairness than others. Moreover, the cooperative scheme shows enhancement of fairness and PDR compared to the non-cooperative scheme.
Conference Paper
We design, implement and evaluate a load-adaptive MAC protocol based on a flexible, component-based link layer architecture. We first present the overall architecture that facilitates a generic data transfer protocol used by ordinary user applications and management functions of the link layer, called link layer apps. Based on this architecture, we propose a load-adaptive MAC protocol for fixed spectrum networks that is designed as a link layer app on top of the data transfer protocol. The protocol reuses existing MAC blocks and allows switching between those based on run-time analysis of the wireless communication system performance. Finally, we evaluate a SDR implementation of the entire system through various experiments.
Article
Cognitive Radio (CR) systems are smart systems capable of sensing the surrounding radio environment and adapting their operating parameters in order to efficiently utilize the available radio spectrum. To reach this goal, different transmission parameters across the Open Systems Interconnection (OSI) layers, such as transmit power, modulation scheme, and packet length, should be optimized. This chapter discusses the Adaptive Discrete Particle Swarm Optimization (ADPSO) algorithm as an efficient algorithm for optimizing and adapting CR operating parameters from physical, MAC, and network layers. In addition, the authors present two extensions for the proposed algorithm. The first one is Automatic Repeat reQuest-ADPSO (ARQ-ADPSO) for efficient spectrum utilization. The second one is merging ARQ-ADPSO and Case-Based Reasoning (CBR) algorithms for autonomous link adaptation under dynamic radio environment. The simulation results show improvements in the convergence time, signaling overhead, and spectrum utilization compared to the well-known optimization algorithms such as the Genetic Algorithm (GA).
Article
Full-text available
The E 2 R project is pursuing research on the definition of the most appropriate distribution of intelligence and functionalities between end-users terminals and network, in the context of B3G heterogeneous environment. E 2 R is currently developing concepts and solutions for a Cognitive Pilot Channel (CPC), encompassing both in-band/out-band and downlink/uplink functionalities. The out-band CPC should provide sufficient information to a mobile terminal so as it can initiate a communication session in an optimal way, optimised to time, situation and location. The CPC is required to broadcast relevant information with regard to frequency bands, RATs, services, load situation, etc. in the terminal location and in a possible future case of DSA context.
Conference Paper
Full-text available
Cognitive networks enable efficient sharing of the radio spectrum. Multi-hop cognitive network is a cooperative network in which cognitive users take help of their neighbors to forward data to the destination. Control signals used to enable cooperation communicate through a common control channel (CCC). Such usage introduces conditions like channel saturation which degrades the overall performance of the network. Thus, exchanging control information is a major challenge in cognitive radio networks. This paper proposes an alternative MAC protocol for multi-hop cognitive radio networks in which the use of a CCC is avoided. The scheme is applicable in heterogeneous environments where channels have different bandwidths and frequencies of operation. It inherently provides a solution to issues like CCC saturation problem, Denial of Service attacks (DoS) and multi-channel hidden problem. The proposed protocol is shown to provide better connectivity and higher throughput than a CCC based protocol, especially when the network is congested.
Conference Paper
Full-text available
We present a MAC protocol for opportunistic spectrum access (OSA-MAC) in cognitive wireless networks. The proposed MAC protocol works in a multi-channel environment which is capable of performing channel sensing to discover spectrum opportunities. For this MAC protocol, two channel selection methods are considered which trade the implementation complexity with throughput improvement. We then analyze the saturation throughput performance of the proposed MAC protocol under scenarios where the probabilities for each channel to be available to different secondary flows are the same or different. We then derive analytically the probability of collision of secondary users with primary users due to sensing errors. This analysis can be used, for example, to determine the requirement of sensing accuracy for secondary users, and to design an admission control method. We present numerical results to demonstrate the throughput performance of the OSA-MAC protocol and applications of the proposed analytical model.
Article
Full-text available
Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. CR networks, equipped with the intrinsic capabilities of the cognitive radio, will provide an ultimate spectrum-aware communication paradigm in wireless communications. CR networks, however, impose unique challenges due to the high fluctuation in the available spectrum as well as diverse quality-of-service (QoS) requirements. Specifically, in cognitive radio ad hoc networks (CRAHNs), the distributed multi-hop architecture, the dynamic network topology, and the time and location varying spectrum availability are some of the key distinguishing factors. In this paper, intrinsic properties and current research challenges of the CRAHNs are presented. First, novel spectrum management functionalities such as spectrum sensing, spectrum sharing, and spectrum decision, and spectrum mobility are introduced from the viewpoint of a network requiring distributed coordination. A particular emphasis is given to distributed coordination between CR users through the establishment of a common control channel. Moreover, the influence of these functions on the performance of the upper layer protocols, such as the network layer, and transport layer protocols are investigated and open research issues in these areas are also outlined. Finally, a new direction called the commons model is explained, where CRAHN users may independently regulate their own operation based on pre-decided spectrum etiquette.
Conference Paper
Full-text available
This paper compares, through analysis and simulation, a number of multichannel MAC protocols for wireless net-works. We first classify these protocols into 4 categories based on their principles of operation. We then examine the effects of the number of channels and devices, channel switching times, and traffic patterns on throughput and de-lay. Our study focuses on a single collision domain.
Conference Paper
Full-text available
Cognitive radio (CR) is a promising technology for increasing the spectrum capacity for ad hoc networks. Based on CR, the unlicensed users will utilize the unused spectrum of the licensed users in an opportunistic manner. Therefore, the average spectrum usage will be increased. However, the sudden appearance of the licensed users forces the unlicensed user to vacate its operating channel and handoff to another free one. Spectrum handoff is one of the main challenges in cognitive ad hoc networks. In this paper, we aim to reduce the effect of consecutive spectrum handoff for cognitive ad hoc users. To achieve that, the licensed channels will be used as operating channels and the unlicensed channels will be used as backup channels when the primary user appears. Therefore, the number of spectrum handoff will be reduced, since unlicensed bands are primary user free bands. A Markov chain model is presented to evaluate the proposed scheme. Performance metrics such as blocking probability and dropping probabilities are obtained. The results show that the proposed scheme reduces all the aforementioned performance metrics.
Article
In this letter, an analytical model to evaluate the performance of ad hoc devices equipped with cognitive radio capabilities, is investigated. By applying cognitive radio technology, the ad hoc devices will utilize the unused spectrum of the existing legacy systems in an opportunistic manner in addition to using the unlicensed spectrum. Therefore, the network throughput will be increased. The results show that the performance is improved in terms of blocking and dropping probabilities.
Conference Paper
We present an analytical framework to assess the effectiveness of different combinations of medium access control (MAC) protocols for multichannel opportunistic spectrum access (OSA) ad hoc networks. As a performance metric we focus on average link layer throughput, and investigate dedicated control channel (DCC) and hopping control channel (HCC) MAC protocol abstractions. For DCC and HCC protocol classes we analyze two distinct strategies of managing active secondary user (SU) connection on the event of primary user (PU) arrival: to buffer the connection until PU leaves, or to switch the existing SU connection to a vacant channel. We come to an interesting conclusion: while, intuitively, OSA MAC protocols that support both SU connection buffering and SU connection switching should obtain the highest throughput, due to the channel switching overhead SU connection buffering alone performs better than the rest of the protocol combinations considered.
Conference Paper
A number of algorithmic and protocol assumptions taken for granted in the design of existing wireless communication technologies need to be revisited in extending their scope to the new cognitive radio (CR) paradigm. The fact that channel availability can rapidly change over time and the need for coordinated quiet periods in order to quickly and robustly detect the presence of incumbents, are just some of the examples of the unique challenges in protocol and algorithm design for CR networks and, in particular, in the medium access control (MAC) layer. With this in mind, in this paper we introduce a novel cognitive MAC (C-MAC) protocol for distributed multi-channel wireless networks. C-MAC operates over multiple channels, and hence is able to effectively deal with, among other things, the dynamics of resource availability due to primary users and mitigate the effects of distributed quiet periods utilized for primary user signal detection. In C-MAC, each channel is logically divided into recurring superframes which, in turn, include a slotted beaconing period (BP) where nodes exchange information and negotiate channel usage. Each node transmits a beacon in a designated beacon slot during the BP, which helps in dealing with hidden nodes, medium reservations, and mobility. For coordination amongst nodes in different channels, a rendezvous channel (RC) is employed that is decided dynamically and in a totally distributed fashion. Among other things, the RC is used to support network-wide multicast and broadcast which are often neglected in existing multi-channel MAC protocols. We present promising performance results of C- MAC. We also describe our efforts to implement features of C- MAC in a real CR prototype with Atheros chipset, which currently includes the spectrum sensing module and preliminary features of C-MAC.
Conference Paper
Currently deployed wireless emergency networks possess low spectrum efficiency, similar to their civilian wireless counterparts. It's due to the traditional radio frequency partitioning where each service has uniquely assigned bandwidth. To alleviate the problem one can propose dynamic channel assignment as a promising foundation for physical and link layer design of future wireless emergency communication networks. Here we identify functional requirements and system specifications for mobile ad hoc emergency networks built on top of cognitive radio. We also propose a simple Cognitive Radio medium access control protocol applicable to our network model, adopted from distributed channel assignment algorithm of IEEE 802.11