SlideShare a Scribd company logo
1 of 21
Wireless Pers Communication (2014) 74:803–821 
Springer Science + Business Media New York 2013 
Authors: 
Gyanendra Prasad Joshi 
Seung Yeob Nam 
SungWon Kim 
Presented By: 
Iffat Anjum 
Date : 22/03/2014
2
• Cognitive radio (CR) is a form of wireless communication in 
which a transceiver can intelligently detect which 
communication channels are in use and which are not, and 
instantly move into vacant channels while avoiding occupied 
ones. 
• Research Challenges: 
▫ Spectrum scarcity. 
▫ Expensive spectrum license. 
▫ Determining spectrum opportunity. 
▫ Ensuring incumbent licensees’ right. 
▫ Computing complexity and flexibility. 
▫ Traditional hidden node and exposed node problem. 
▫ Multichannel hidden node problem. 
3
• PMAC is a Synchronization based multi-transceiver and 
multichannel MAC protocol. 
• Historical prediction method used for channel selection 
algorithm. 
• Distributed sensing for spectrum opportunity. 
• Cooperative sensing. 
• Utilization of Channel Negotiation(CN) window. 
• Decentralized, flexible and low complexity. 
• Spectrum hand-off method. 
4
• IEEE 802.22: 
▫ Standardized a MAC layer based on CR[Cognitive Radio] for reusing 
the spectrum allocated to the TV broadcast service. 
▫ But, the architecture is centralized. 
• DCSS (Distributed coordinated spectrum sharing MAC 
protocol for cognitive radio)[Nan, H., Hyon,T.,&Yoo; IEEE symposium on new Frontiers in 
DySpan 2007] 
▫ RTS-CTS based data communication. 
▫ Multiple antenna-based protocol. 
▫ Negotiates for a data channel per data packet. 
▫ Relies fully on a dedicated common CCC[Common Control Channel]. 
▫ All nodes need to contend for access to the control channel and data 
channels remain underutilized. 
5
• MMAC-CR (A distributed multichannel MAC protocol for 
multi-hop cognitive radio networks)[Timmers,M., Pollin, S., Dejonghe, A.,Van der 
Perre, L.,&Catthoor, F. (2010); IEEE Transactions on Vehicular Technology, 59(1), 446–459.] 
6 
▫ Time is divided into an ad hoc traffic indication message 
(ATIM) window and data window. 
▫ One handshake on the CCC is needed per connection during the 
BI. 
▫ Have to wait until the end of ATIM window to send and receive 
data packets. 
▫ Multiple channel switching overheads 
▫ Multichannel hidden node problems.
7 
• OC-MAC (Cross-layer based opportunistic MAC protocols 
for QoS provisioning over cognitive radio wireless 
networks.)[Su, H., & Zhang, X. (2008); . IEEE Journal on Selected Areas in Communications, 26(1), 118–129 ] 
▫ Two transceivers, one is for a dedicated control channel and the 
other is for selected data channel. 
▫ P-persistent carrier sense multiple access is used in the 
negotiation phase for negotiation. 
▫ But, it cannot guarantee fairness to the Su’s[Secondary Users].
• {Ch|Chi , i = 1, 2, . . . N} non-overlapping incumbent license 
channels (LCs) conditionally and opportunistically 
accessible by the SUs. 
• Dedicated CCC available with all the required qualities for 
reliable communication for all times. 
• Each node is synchronized by periodic beacon transmission 
to learn the network-wide spectral opportunities. 
▫ Secondary Transmission are pushed on those times. 
8
9 
Figure: Structure of the P-MAC (a view from time-channel 
domain)
• Each CR[cognitive radio] device is equipped with two half-duplex 
transceivers 
▫ Control transceiver. 
 Wakes up before fast sensing ends, at middle of data window. 
 Enters into the doze state after the CN window. 
▫ Data transceiver. 
 Capable of switching multiple types of frequencies. 
 Send data and receive ACK. 
 Responsible for fine sensing and fast sensing. 
10
• Incumbent Detection or Sensing: 
▫ Fast sensing (time < 1ms/channel) 
 gives three results: 
 channel is busy, 
 channel is idle and 
 Uncertain. 
▫ Fine sensing 
 Provide sensing accuracy but at the cost of time. 
 Fine sensing gives two results: 
▫ channel is busy. 
▫ channel is idle. 
11
• Distributed Spectrum Sensing: 
▫ P-MAC employs distributed spectrum sensing (DSS) to 
prevent incumbent-SU collision. 
▫ At the very beginning, 
 the nodes wait for a synchronization signal. 
 When a node receives information about the next BI, it selects a 
channel randomly for fast sensing (FS). 
 From the next BI, as a node receives information of the other 
channels from distributed sensing 
 it selects a channel with the least nodes performing FS. 
▫ After sensing, 
 each SU updates the current channel status by its own 
sensing result & 
 overhearing the neighbors’ CNs on the CCC. 
12
13 
Table : Channel status table (CST) CUL :channel usage list 
SNR :signal to noise ratio 
The SUs maintain channel ranking according to the channel selection 
factor (CSF)
14 
Control Operation 
• Nodes has a minimum back-off of tm, 
tm = tf + tb 
tf -> time for fast sensing, 
tb -> random back-off time, 0 < tb ≤ CW. 
• Each node maintains its own level for PCL [preferred channel list] 
▫ Send it with the CN packet, or with the CN-ACK. 
• The PCL is derived from the CSF[channel selection factor]. 
Ut (Chi )-> Utilization of 
channel i by the incumbent 
SNRmin->threshold for the 
minimum SNR required 
SNR(Chi ) ->SNR of channel i
15 
Control Operation 
• P-MAC uses linear HPM[Historical Prediction Model] to predict the 
incumbent’s arrival. 
Ut−1 (Chi ) ->channel 
utilization in the last time slot 
γ ->smoothing factor 
ˆU (Chi ) ->average 
utilization of the time slot of 
channel i in the past 
η-> number of records kept so 
far 
• After receiving the CN message from any sender that is destined 
to the receiver, 
▫ It selects the channel common to both and with the best PCL level. 
▫ Sends CN-ACK including RCPCL[receiver’s common PCL] to the sender.
16 
Control Operation 
• The sender sends a CN reservation packet (CN-RES) to confirm 
the channel reservation after receiving the RCPCL. 
• Neighboring nodes update their channel status. 
• The random back-off time (RBT) is calculated, 
 If the current packet has its first transmission, CW is set to W. 
CW is doubled after each collision with this packet, until it 
reaches Wm. 
• The CN/CN-ACK packet contains network allocation vector 
(NAV) information to avoid the hidden terminal problem.
17 
Data Operation 
• In PMAC, the nodes do not wait to send data until the start of 
the data window. 
▫ Maximum achievement in 
each BI with this strategy is, 
Prs ->success probability of a CR 
node for channel access 
CNW->size of CN window 
CN-> number of available data 
channels 
• If there is no data in the transmission queue and no packets to 
receive, 
▫ It begins fine sensing (FiS) after the CN window. 
▫ The node enters the doze state after fine sensing.
18 
Incumbents’ Reclaiming Resolution and Spectrum Handoff 
• When the incumbents reclaim the band, the affected 
communication links of the SUs will be lost. 
• On the other hand, if the SUs can sense idle sub-bands, they 
can reconstruct the communication links to them. 
Channel Access Delay in CN Window 
• The channel access delay[Contention Delay] is the time a node 
spends to obtain access to the channel. 
• The contention window size Wi in the back-off stage i:
• X denote the MAC layer access delay. 
• The expectation of X can be expressed as: 
19 
Channel Access Delay in CN Window
• The simulation results show that the P-MAC protocol 
increases the good-put and decreases the delay. 
• Although P-MAC uses two transceivers, it turns off the 
transceivers to conserve energy without decreasing SU 
performance. 
20 
• The analysis results show that the CN window becomes a 
bottleneck as the number of active nodes increases. More 
study will be needed to address the CCC bottleneck problem.
21

More Related Content

What's hot

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
meenamunesh
 
The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
Factors affecting 2g data speed
Factors affecting 2g data speedFactors affecting 2g data speed
Factors affecting 2g data speed
Alfred Ongere
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
Spiros Louvros
 

What's hot (19)

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Layer 3 messages (2G)
Layer 3 messages (2G)Layer 3 messages (2G)
Layer 3 messages (2G)
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Harq
HarqHarq
Harq
 
MAC
MACMAC
MAC
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
819 Static Channel Allocation
819 Static Channel Allocation819 Static Channel Allocation
819 Static Channel Allocation
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Factors affecting 2g data speed
Factors affecting 2g data speedFactors affecting 2g data speed
Factors affecting 2g data speed
 
Ttsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newTtsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-new
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
GSM Channel concept and SDCCH
GSM Channel concept and SDCCHGSM Channel concept and SDCCH
GSM Channel concept and SDCCH
 

Similar to Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks

Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
IJSRED
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 

Similar to Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks (20)

Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
 
PhD dissertation presentation
PhD dissertation presentationPhD dissertation presentation
PhD dissertation presentation
 
PhD dissertation presentation
PhD dissertation presentationPhD dissertation presentation
PhD dissertation presentation
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
HSPA Essentials
HSPA EssentialsHSPA Essentials
HSPA Essentials
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio Networks
 
mimo
mimomimo
mimo
 
cdma-technology_compress.pdf
cdma-technology_compress.pdfcdma-technology_compress.pdf
cdma-technology_compress.pdf
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Ea34772776
Ea34772776Ea34772776
Ea34772776
 
8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf
 
Lte imp
Lte impLte imp
Lte imp
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
LTE Key Technologies
LTE Key TechnologiesLTE Key Technologies
LTE Key Technologies
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
can bus theory solution
can bus theory solutioncan bus theory solution
can bus theory solution
 
5G Enabled Vehicular Networks
5G Enabled Vehicular Networks5G Enabled Vehicular Networks
5G Enabled Vehicular Networks
 
Chap 03
Chap 03Chap 03
Chap 03
 
Chap 03
Chap 03Chap 03
Chap 03
 

More from Iffat Anjum

More from Iffat Anjum (20)

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generation
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environment
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
 
Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptx
 
Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysis
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to Compiler
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcare
 
Data link control
Data link controlData link control
Data link control
 
Pnp mac preemptive slot allocation and non preemptive transmission for provid...
Pnp mac preemptive slot allocation and non preemptive transmission for provid...Pnp mac preemptive slot allocation and non preemptive transmission for provid...
Pnp mac preemptive slot allocation and non preemptive transmission for provid...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks

  • 1. Wireless Pers Communication (2014) 74:803–821 Springer Science + Business Media New York 2013 Authors: Gyanendra Prasad Joshi Seung Yeob Nam SungWon Kim Presented By: Iffat Anjum Date : 22/03/2014
  • 2. 2
  • 3. • Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. • Research Challenges: ▫ Spectrum scarcity. ▫ Expensive spectrum license. ▫ Determining spectrum opportunity. ▫ Ensuring incumbent licensees’ right. ▫ Computing complexity and flexibility. ▫ Traditional hidden node and exposed node problem. ▫ Multichannel hidden node problem. 3
  • 4. • PMAC is a Synchronization based multi-transceiver and multichannel MAC protocol. • Historical prediction method used for channel selection algorithm. • Distributed sensing for spectrum opportunity. • Cooperative sensing. • Utilization of Channel Negotiation(CN) window. • Decentralized, flexible and low complexity. • Spectrum hand-off method. 4
  • 5. • IEEE 802.22: ▫ Standardized a MAC layer based on CR[Cognitive Radio] for reusing the spectrum allocated to the TV broadcast service. ▫ But, the architecture is centralized. • DCSS (Distributed coordinated spectrum sharing MAC protocol for cognitive radio)[Nan, H., Hyon,T.,&Yoo; IEEE symposium on new Frontiers in DySpan 2007] ▫ RTS-CTS based data communication. ▫ Multiple antenna-based protocol. ▫ Negotiates for a data channel per data packet. ▫ Relies fully on a dedicated common CCC[Common Control Channel]. ▫ All nodes need to contend for access to the control channel and data channels remain underutilized. 5
  • 6. • MMAC-CR (A distributed multichannel MAC protocol for multi-hop cognitive radio networks)[Timmers,M., Pollin, S., Dejonghe, A.,Van der Perre, L.,&Catthoor, F. (2010); IEEE Transactions on Vehicular Technology, 59(1), 446–459.] 6 ▫ Time is divided into an ad hoc traffic indication message (ATIM) window and data window. ▫ One handshake on the CCC is needed per connection during the BI. ▫ Have to wait until the end of ATIM window to send and receive data packets. ▫ Multiple channel switching overheads ▫ Multichannel hidden node problems.
  • 7. 7 • OC-MAC (Cross-layer based opportunistic MAC protocols for QoS provisioning over cognitive radio wireless networks.)[Su, H., & Zhang, X. (2008); . IEEE Journal on Selected Areas in Communications, 26(1), 118–129 ] ▫ Two transceivers, one is for a dedicated control channel and the other is for selected data channel. ▫ P-persistent carrier sense multiple access is used in the negotiation phase for negotiation. ▫ But, it cannot guarantee fairness to the Su’s[Secondary Users].
  • 8. • {Ch|Chi , i = 1, 2, . . . N} non-overlapping incumbent license channels (LCs) conditionally and opportunistically accessible by the SUs. • Dedicated CCC available with all the required qualities for reliable communication for all times. • Each node is synchronized by periodic beacon transmission to learn the network-wide spectral opportunities. ▫ Secondary Transmission are pushed on those times. 8
  • 9. 9 Figure: Structure of the P-MAC (a view from time-channel domain)
  • 10. • Each CR[cognitive radio] device is equipped with two half-duplex transceivers ▫ Control transceiver.  Wakes up before fast sensing ends, at middle of data window.  Enters into the doze state after the CN window. ▫ Data transceiver.  Capable of switching multiple types of frequencies.  Send data and receive ACK.  Responsible for fine sensing and fast sensing. 10
  • 11. • Incumbent Detection or Sensing: ▫ Fast sensing (time < 1ms/channel)  gives three results:  channel is busy,  channel is idle and  Uncertain. ▫ Fine sensing  Provide sensing accuracy but at the cost of time.  Fine sensing gives two results: ▫ channel is busy. ▫ channel is idle. 11
  • 12. • Distributed Spectrum Sensing: ▫ P-MAC employs distributed spectrum sensing (DSS) to prevent incumbent-SU collision. ▫ At the very beginning,  the nodes wait for a synchronization signal.  When a node receives information about the next BI, it selects a channel randomly for fast sensing (FS).  From the next BI, as a node receives information of the other channels from distributed sensing  it selects a channel with the least nodes performing FS. ▫ After sensing,  each SU updates the current channel status by its own sensing result &  overhearing the neighbors’ CNs on the CCC. 12
  • 13. 13 Table : Channel status table (CST) CUL :channel usage list SNR :signal to noise ratio The SUs maintain channel ranking according to the channel selection factor (CSF)
  • 14. 14 Control Operation • Nodes has a minimum back-off of tm, tm = tf + tb tf -> time for fast sensing, tb -> random back-off time, 0 < tb ≤ CW. • Each node maintains its own level for PCL [preferred channel list] ▫ Send it with the CN packet, or with the CN-ACK. • The PCL is derived from the CSF[channel selection factor]. Ut (Chi )-> Utilization of channel i by the incumbent SNRmin->threshold for the minimum SNR required SNR(Chi ) ->SNR of channel i
  • 15. 15 Control Operation • P-MAC uses linear HPM[Historical Prediction Model] to predict the incumbent’s arrival. Ut−1 (Chi ) ->channel utilization in the last time slot γ ->smoothing factor ˆU (Chi ) ->average utilization of the time slot of channel i in the past η-> number of records kept so far • After receiving the CN message from any sender that is destined to the receiver, ▫ It selects the channel common to both and with the best PCL level. ▫ Sends CN-ACK including RCPCL[receiver’s common PCL] to the sender.
  • 16. 16 Control Operation • The sender sends a CN reservation packet (CN-RES) to confirm the channel reservation after receiving the RCPCL. • Neighboring nodes update their channel status. • The random back-off time (RBT) is calculated,  If the current packet has its first transmission, CW is set to W. CW is doubled after each collision with this packet, until it reaches Wm. • The CN/CN-ACK packet contains network allocation vector (NAV) information to avoid the hidden terminal problem.
  • 17. 17 Data Operation • In PMAC, the nodes do not wait to send data until the start of the data window. ▫ Maximum achievement in each BI with this strategy is, Prs ->success probability of a CR node for channel access CNW->size of CN window CN-> number of available data channels • If there is no data in the transmission queue and no packets to receive, ▫ It begins fine sensing (FiS) after the CN window. ▫ The node enters the doze state after fine sensing.
  • 18. 18 Incumbents’ Reclaiming Resolution and Spectrum Handoff • When the incumbents reclaim the band, the affected communication links of the SUs will be lost. • On the other hand, if the SUs can sense idle sub-bands, they can reconstruct the communication links to them. Channel Access Delay in CN Window • The channel access delay[Contention Delay] is the time a node spends to obtain access to the channel. • The contention window size Wi in the back-off stage i:
  • 19. • X denote the MAC layer access delay. • The expectation of X can be expressed as: 19 Channel Access Delay in CN Window
  • 20. • The simulation results show that the P-MAC protocol increases the good-put and decreases the delay. • Although P-MAC uses two transceivers, it turns off the transceivers to conserve energy without decreasing SU performance. 20 • The analysis results show that the CN window becomes a bottleneck as the number of active nodes increases. More study will be needed to address the CCC bottleneck problem.
  • 21. 21