SlideShare a Scribd company logo
1 of 15
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

INVESTIGATING THE EFFECTS OF THE
COMMON CONTROL CHANNEL
CHALLENGE IN MULTICHANNEL
COGNITIVE NETWORKS WITH
HYPOTHETICAL SPECTRUM HOLE
Mthulisi Velempini1 and Mqhele E. Dlodlo2
1

2

North-West University, South Africa, Mmabatho
University of Cape Town, South Africa, Cape Town

ABSTRACT
Multichannel MAC protocols have become a design choice of wireless access networks as they increase the
achievable throughput. However, the implementation of a common control channel has been a challenge.
The common control channel challenge has not been investigated in opportunistic networks where the
availability of medium is temporary and unpredictable. The uncertainty of the availability of the channel
coupled with the common control channel challenge makes this area an interesting research topic.
Unfortunately, this challenge requires further investigation in Cognitive Radio Ad Hoc Networks
(CRAHN), a promising next generation technology. The challenge makes an interesting study in CRAHN
given the opportunistic access and use of channels. Given a hypothetical spectrum hole of any size coupled
with the implementation of a control channel in a multi-channel environment, how much of good put can be
realized and be effectively utilized for data transmission. We investigate the common control channel
challenge in CRAHN through network simulations. The opportunistic nature of CRAHNs in the presence of
the common control channel challenge is investigated. The simulation results show that the combination of
the control channel challenge and the size of the spectrum hole degrade gracefully the network.
Furthermore, the size of the spectrum hole has a bearing on good put. The results show that a big hole
improves performance. Unfortunately, the opportunistic attribute of CRAHNs does not guarantee desirable
spectrum holes.

KEYWORDS
Common Control Channel Challenge, CRAHN, Multi-Channel MAC

1. INTRODUCTION
The paper examines the effects of the common control channel and the size of the spectrum hole
Cognitive Radio Ad Hoc Networks (CRAHN). The multi-channel approach is envisioned as one
of the possible strategies which can be employed to increase the achievable bandwidth. On the
other hand, the implementation of CRAHN addresses the scarcity and inefficient utilization of
spectrum. The two techniques do complement each other in availing the much needed bandwidth
in the wireless next generation networks (WNGN). However, the implementation and the
saturation of the control channel is a challenge which requires further investigation. The common
control channel is perceived to be a system bottleneck which degrades wireless access networks.
The impact of the common control channel is expected to be huge when a small spectrum hole is
smaller as compared to bigger ones. The paper explores and presents an in-depth analysis of the
DOI : 10.5121/ijnsa.2013.5607

75
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

performance of the common control channel in congested networks. Extensive simulations show
that the capacity of the control channel degrades the performance of networks with high traffic
loads. The size of the spectrum hole has also an effect on the performance of the networks; A
small hole constrains the network while a bigger one avails more data transmission opportunities.
The common control channel challenge is investigated in scenarios with different number of
channels ranging from 2 to 15 data channels. For each scenario, the number of nodes was
increased steadily from 4 to 30. The following scenarios in terms of t he number of nodes were
considered: 4, 6, 8, 10, and 30.
The paper is structured as follows: summery of multi-channel MAC schemes in CRAHN is
presented in Section II. The related work is analyzed in Section III. Section IV and V, presents the
simulation design and simulation results. The paper is concluded in Section VII.

2. MULTI-CHANNEL MAC SCHEMES
Multichannel MAC protocols increase the capacity of existing wireless access networks. Multichannel MAC protocol designs have demonstrated some encouraging results. The schemes have
shown an increase in achievable throughput is possible. As a result, multichannels have been
considered in CRAHNs. Unfortunately, the emphasis has been on capacity. The common control
channel challenge has not been investigated in opportunistic networks. This challenge requires
further investigation in the context of CRAHNs. The common control channel challenge is
investigated and how the size of the spectrum hole impacts on network performance. The size of
the spectrum hole is also considered in relation to the achievable throughput.
There are a few configurations of multichannel systems which have been considered in research,
for example multi-radio multi channel networks and single radio and multichannel networks. A
single radio multichannel network is considered in the context of CRAHNs in this paper. The
impact of the common control channel has been investigated elsewhere however; to the best of
our knowledge its impact on opportunistic CRAHNs with varying sizes of spectrum holes has not
been investigated. We explore the common control channel challenge in CRAHNs and
investigate the saturation problem in detail, in different possible network scenarios. The paper
contributes to the e implementation of multichannel CRAHNs networks.

3. RELATED WORK
The implementation of a common control channel in CRAHNs presents a number of design
challenges. The control channel scheme leads to the saturation problem cited in [1] and [2]. In
addition, the design of a global control channel is another option in CRAHNs. However, due to
the opportunistic use of spectrum, the existence of such a global channel may be a design
challenge. As a result, local control channel and switchable schemes have been proposed as
possible solutions. However, despite the challenges of the global control channel approach, such a
design challenge is preferred. The global control channel facilitates network connection and
provides a secondary user (SU) with a platform to detect a PU and share sensing information. The
information on PU activities can be determined and shared in a distributed manner subject to
challenges cited in [3] and [4] through the control channel however, an always on control channel
is desired and its reliability facilitates the discovery of neighbouring nodes in the CRAHNs [3].
In [5] the implementation of the control channel is subject to high signaling cost; however, though
it saturates, its design is significant in network setup and in the exchange of control messages and
in the sharing of the spectrum information.
One of the design challenges of CRAHNs is the optimization of sensing and transmission
durations which impacts negatively on the achievable throughput. The shorter sensing times are
76
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

desired however the PU detection accuracy should not be compromised. Such optimization relies
on the availability of network wide sensing information and network cooperation [5]. The sharing
of the sensing information can be possible given the availability of a global control channel which
also facilitates cooperation among nodes in a distributed manner. This shows the significance of
the control channel in CRAHNs which should be designed to address the saturation challenge.
As noted in [2], the design of a global control channel is a challenge however; the local control
channel design approach can addresses the need for local observation, cooperative sensing and the
sharing of spectrum information sharing at a local level. This facilitates cooperation in spectrum
sensing and sharing [6]. Furthermore, the localization of the sensing activities in a cooperative
manner can be considered as a design option which addresses mobility challenges.
Global control channel schemes are also proposed in [7], [8],[9], and [10]. However, the schemes
do require global synchronization which is a challenge in wireless networks. In [11] and [12] it is
envisioned that synchronization may be possible in a localized environment at the expense of
higher overheard costs due to the need to coordinate local sensing and information sharing. This
overheard leads to common control channel challenge which is examined in this paper.
In [13], [14], and [15] schemes implementing local control channels are proposed. Techniques
such as clustering are employed in the design of a local control channel.
A number of multi-channel MAC schemes have been designed to address different challenges.
They are designed to address the following challenges, throughput, Hidden Terminal problem,
and the Missing. The scheme in [16] addresses the HTP. The common control channel challenge
was not investigated. In [17] a scheme optimized for capacity oriented scheme is proposed
however the common control channel challenge was also not investigated. A reconfigured version
of this protocol is proposed in [18]. The scheme does not examine the impact of the common
control channel challenge on network performance. The two protocols are capacity based and the
impact of the common control channel challenge was not investigated.
A common control channel protocol is proposed in [19], with its improved version is proposed in
[20]. The two schemes are capacity oriented; the common control channel challenge was not
examined. There is therefore a need to common control challenge in the context of capacity or of
improving the end-to-end throughput. The performance and capacity of the common control
channel challenge has an effect on network capacity. Furthermore, the saturation challenge may
be explored in access networks such as the CRAHNs. The CRAHNs is the promising candidate of
the WNGN. Our paper analyzes the impact of the size of the spectrum hole and the capacity of
the network in the CRAHNs through analytical and network simulations. To this end, we
investigate the saturation challenge in different network scenarios.
In [21] a single transceiver scheme is proposed, however, it does not implement the common
control channel. Works in [22], [23] and [24] implement similar capacity based schemes. The
optimization of upper bound capacity requires attention as its design impacts on the performance
of the network.
The scheme in [25] implements a common control channel with a single transceiver. The
saturation problem was investigated in the absence of channel switching costs. Furthermore, the
saturation challenge was not rigorously examined in different network scenarios. The switching
cost effects network performance as two switching costs are involved. The switching penalty is
set to a maximum value of 224µs [26], [27], [28], and [29]. The total switching cost for the
penalties – for the two channel switching delays, to and from a given data channel is 448µs,
77
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

which is a significant cost. We added the two channel switching delays in our simulation
environment. Furthermore, the common control channel challenge in the context of CRAHNs in
different network scenarios is investigated.
Different approaches are proposed in [30] to [37], schemes which implement random home
channels [31], the quiescent channels [32], the default channels and, the fixed and the switchable
transceivers [35]. The schemes partition the network. Furthermore, a temporary control channel is
implemented in these schemes; as a result high channel switching cost is incurred due to frequent
channel switching. The protocols however, do not investigate the common control channel
challenge in multichannel MAC schemes and the implementation of upper bounds schemes.

4. ANALYTICAL MODEL
Cognitive networks are characteristic with the co-existence of primary and secondary spectrum
users. The primary user (PU) is the owner of the spectrum and its usage of the spectrum should
not be interfered with. The PU enjoys an uninterrupted usage of the spectrum every time is in
session. An idle PU has to be protected and given uninterrupted access to the spectrum when it
decides to utilize the spectrum. This means that the PU requires protection when it is using, and
when it is not using the spectrum. The most critical one is when the PU is not using the spectrum.
This critical in the sense that when a PU appears, other users are expected to vacant the spectrum
and make sure they do not interrupt it. On the other hand the secondary user (SU) is an
opportunistic user of the spectrum. It is a user who does not own the spectrum but would want to
use it as and when it is not in use. The design issue is the positive identification of a PU and
ability to differentiate the activities of a PU from other SUs.
The opportunistic usage of the spectrum by SUs and their coexistence with PU is depicted in Fig
1. The SU has to identify spectrum holes, which are durations in which the PU is idle. When the
PU is not active, the spectrum lies idle. The SU then utilizes the spectrum during these inactive
periods. When the PU begins transmitting the SU has to vacant the spectrum immediately and
move to the next vacant spectrum. In fig 1, there are three spectrum holes which are available to
the SU. As indicated by the arrows, the SU will transmit first in the first spectrum hole. When it
detects the PU, it jumps into the hole in the next frequency band. While in the next band, when
the PU appears, the SU has to jump into the third hole to continue it transmission. However, Fig 1
assumes that these holes are big enough to allow the SU to engage in meaningful transmission.
This is the general assumption which may not always be the case. If the hole is not big enough,
the SU not fail to complete its transmission resulting in the wastage of bandwidth and the need to
retransmit packets.

78
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 1. Opportunistic utilization of spectrum holes by secondary users during the absence of the primary
users [39]

We characterize the effect of the size of the spectrum hole in Fig 2. The model clearly shows that
he size of the spectrum hole matters; otherwise it may cause a number of retransmission and
network congestion.
Frequenc
y
RT
S

Primary User
RT
S

CT
S

Primary
User
RT
S

RT
S

Primary User

CT
S

RT
S

CT
S

Primary
User
RT
S

DATA

CT
S

AC
K

RT
S

AC
K

CT
S

RT
S

Primary
User

AC
K

DATA
Primary
User

DATA

Primary User

DATA

DATA

RT
S

CT
S

CT
S

RT
S

Primary
User

Primary
User
Primary
User

RT
S

Prima
ry
Time

Figure 2. Utilization of spectrum holes

Assuming that frequency x, has five frequency bands counting from bottom up and that we have
two spectrum holes in the first band. Given the first hole, an SU would be able to successfully
transmit a single packet which going to be positively acknowledged. The second attempt will not
succeed because the PU will appear after the exchange of RTS and CTS packets. An attempt to
jump into the hole in band two would succeed given that it is already occupied by another SU.
The SU-2 in band-2 fails to receive a positive ACK packet as a result the bandwidth would be
wasted necessitating the need for retransmission. The second spectrum holes in both bands 1 and
2 accommodate only an RTS packet which also wastes bandwidth.
The first hole in band-3 allows the SU to exchange only the RTS and CTS packets before the PU
appears while the second hole is big enough for the successful transmission of one data packet.
Band-4 hole accommodates only data transmission and the second attempt ends with only an RTS
packet having been transmitted. Lastly, band-5 has two holes which are not big enough for data
transmissions to be scheduled in them.
79
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

The model demonstrates that the size of the spectrum hole is significant. The availability of the
spectrum is not fundamental but their size. SUs can still fail to utilize the available hole due to
their size. Depending on the activities of other SUs, a given SU may not be able to hop from one
spectrum hole to another to complete its transmission. Having occupied the first hole, when it
fails to access the next one, it wastes bandwidth which may also lead to numerous
retransmissions. On the other hand retransmission may lead to the congestion of the frequency
bands. Finally, when these scenarios are considered in the light of the common control channel
challenge, a severe degradation of the performance of the network is expected. These may cause
SUs to fail to transmit successfully in holes which they have done so in the absence of the
common control channel challenge. There is therefore need to analyze the performance of
cognitive networks in the presence of these challenges. The correctly detection of the activities of
PUs and the available spectrum holes do not address these challenges.

5. SIMULATION MODEL
The simulated scenarios were investigated in the NS 2 network simulator. The simulation was
based on the IEEE 802.11 standard implemented in NS 2. The details of the simulation
parameters are depicted in table 1. Five main networks were evaluated and in each of the five
fourteen scenarios were examined. The networks were categorized by size in terms of the number
of nodes in a network. The number of nodes range from 4 to 30. The simulation environment
consist of one common control channel set aside for signaling purposes and the rest where
earmarked for data transmission. Furthermore, all the channels were assumed to be two Mbps.
The table below depicts all the parameters and their associated values which were considered in
the evaluation.
The saturation challenge was investigated in an NS 2.28 simulation environment. The
environment had a multi-channel patch installed. For routing purposes the No Ad Hoc (NOAH)
routing protocol was used. The network scenarios consisted of one control channel and one radio.
The multichannel switching cost was set to 224µs. The number of data channels was increased
steadily from 2 to 15 resulting in 14 different network scenarios. Given these network scenarios,
the saturation challenge was well investigated
Table 1. MAC Layer and other Parameter Settings
Parameter

Value

SIFS
DIFS
EIFS
CIFS
Slot time
Data rate
Basic rate
Channels
Switching time
Packet size
CW max
CW min
Short Retry Limit
Long Retry Limit
PLCP Length
PLCP rate
RTS
CTS
ACK

10 µs
50 µs
364µs
56 (µs)
20 µs
2 Mbps
2 Mbps
2,3,4,5,6,7,8,9,10,11,12,13,14,15
224µs
1000 bytes
1023
7
7
4
192 bits
1 Mbps
20 bytes
14 bytes
14 bytes

80
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013
MAC Header - Data
MAC Header rate
Routing Agent
Network Sizes

28 bytes
Basic rate
NOAH
4,5,6,8,10 and 30 nodes

The channels were assumed to be orthogonal for experimentation purposes. The different network
sizes were designed to evaluate the impact of the control channel saturation challenge. General
network topologies which were fully connected were considered in the simulations. For each
scenario, at least 10 simulations were run each for 300 seconds, the simulation time. The results
presented in the next Sections are averages of these simulations which were run to effectively
investigate the effects of the common control channel challenge. The x axis depicts the number of
data channels which were considered for the 14 different networks in terms of the number of data
channels involved.

6. SIMULATION RESULTS
We present and analyze simulation results in this Section. The simulation environment was
modeled according to Table.1 and its detailed description was presented in Section IV. The effect
of the common control channel challenge was investigated as the number of data channel was
increased from 2 to 15. Furthermore, different network sizes and scenarios were examined. The
different scenarios were designed to adequately investigate the common control channel
challenge. Figure 3 depicts the performance of a network with 4 nodes.
Fourteen scenarios with different number of nodes were investigated. The data channels were
increased from 2 to 15. The first network had two data channels, and thereafter, they were
increased steadily to 15. The largest network had 15 data channels. In Fig 3, the network
performance kept on fluctuating between 5.42 and 5.45 Mbps as the data channels were increased
steadily from 2 to 15 data channels. A recurring pattern was observed between two and ten
channels. The achieved throughput increased from the data channels added to four data channels.
Thereafter, it decreased when the data channels were increased to five. This same pattern was
then repeated between six and ten channels. The achieved throughput however, was the same in
networks with eight and nine data channels. After the 10th data channel, it increased marginally
before decreasing and exhibiting signs of saturation.

81
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

5.438
5.436
5.434

Throughput

5.432
5.43

5.428
5.426
5.424
5.422
5.42
5.418
5.416

2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH

10 11 CH 12

CH
No. of Channels

CH

13

14

15

CH

CH

CH

Figure 3.Achievable Network Throughput in a Network with 4 terminals

The saturation problem was noticeable from the ninth data channel. The achievable throughput
began decreasing until the fifteenth data channel. This shows that the effect of the saturation
problem becomes more severe in overloaded and congested networks. In the following results in
Fig 4, we further investigate common control channel challenge. In this case, we investigate the
performance of the buffer queues in the presence of the saturation challenge in similar set up.

24.45

Packet Drop Rate

24.4
24.35
24.3

24.25
24.2
24.15
2 CH

3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH

No. of Channels

Figure 4. Investigating the effect of the saturation on Packet Drop Rate

As it can be seen in Fig 4 above, the packet drop rate kept improving from the two channels to
sixth data channels. From seven channels to nine data channels it worsened, before improving
again. In general, the effects of the saturation problem are not as evident as in the achievable
82
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

throughput results. The results of the packet drop rate in general, seem to be improving. In the
next set of results, the network was increased to 6 nodes.

9
8

7
6

Throughput

5

4
3

2
1

0
2 CH

3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH

10 CH

11 CH

12 CH

13 CH

14 CH

15 CH

No. of Channels

Figure 5.Achievable Network Throughput in a Network with six nodes

The achievable throughput did plateau at 8 Mbps between the fifth and the fifteen data channels
after it had increased from 3Mbps in the second data channel. The effect of the saturation problem
causes the control channel to fail to coordinated and schedule more data transmissions, as a result,
it causes a system bottleneck. The number of channels does not increase the achievable
throughput when the control channel had saturated. The results of the packet drop rate in Fig 6
show a similar behaviour. Its performance improves and then remains unchanged just below a
packet drop rate of fifty packets per second. However, this is higher than the drop rate observed in
Fig 4. This depicts that the network size and the amount of traffic has an effect on the saturation
problem. The severity of the saturation problem increases with the increase in congestion.

Packet Drop Rate

400
350
300
250
200
150
100
50
0
2
3
4
5
6
7
8
9 10 11 12 13 14 15
CH CH CH CH CH CH CH of Channels CH CH CH CH
No. CH CH CH

Figure 6.Packet Drop Rate in a Network with six nodes

The results thus far show the effect of the saturation challenge and the congestion of the control
channel in overloaded networks. We now summarize the results of the other network scenarios
under the similar network configurations.
83
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

In Figs 7, 8, and 9, we closely analyze the effect of the saturation problem in large networks
which are overloaded. In these three figures, the nodes were increased to 8, 10 and 50
respectively.

12

Throughput

10
8
6
4
2
0
2 CH

3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH

10 CH

11 CH

12 CH

13 CH

14 CH

15 CH

No. of Channels

Figure 7.Achievable end-to-end Throughput in a Network with eight nodes

It can be noted that the saturation levels remain unchanged. For example, in Fig 5, the achievable
throughput is 4/3 Mbps per each node which is the same average achievable throughput which
was realized in Fig 9. However, in Figs 7 and 9 it is lower due to the effects of the saturation
problem. The saturation challenge is not severe in Fig 9 due to spatial reuse. There is therefore a
need to improve the efficiency of the network through design ingenuity instead of relying on
spatial reuse. However, despite the spatial reuse, the effects of the saturation problem are still
evident. The network in Fig 9 did plateau after the third channel as opposed to the sixth channel
in Fig 8. This clearly demonstrates the effects of the saturation problem.

16.00
14.00
12.00

Throughput

10.00
8.00
6.00
4.00
2.00
.00
2 CH

3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH

10 CH

11 CH

12 CH

13 CH

14 CH

15 CH

No. of Channels

Figure 8.Achievable end-to-end Throughput in a Network with 10 nodes

84
Throughput

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

45
40
35
30
25
20
15
10
5
0
2 CH 3 CH4 CH5 CH 6 CH 7 CH8 CH9 CH 10 11 12 13 14 15
CH CH CH CH CH CH
No. of Channels
Figure 9.Achievable Network Throughput in a Network with 30 nodes

In the throughput results, with the exception of Fig 3, the achievable throughput increased from
its minimum to its maximum as the spectrum hole remained available. The size of the spectrum
hole affects the achievable throughput in the sense that if the available transmission time is very
short, very few or no packets can be transmitted. The achievable throughput rises from its
minimum to its maximum given the availability of the spectrum hole. However, it does not
continue to rise due to the effects of the saturation problem. The small spectrum hole therefore
constrains throughput, while a bigger one enables nodes to realize more achievable throughput.

600

Packet Drop Rate

500

400

300

200

100

0
2 CH

3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH

10 CH

11 CH

12 CH

13 CH

14 CH

15 CH

No. of Channels

Figure 10.Packet Drop Rate in a Network with eight nodes

85
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

800

700

Packet Drop Rate

600

500

400

300

200

100

0
2 CH

3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH

10 CH

11 CH

12 CH

13 CH

14 CH

15 CH

No. of Channels

Figure 11.Packet Drop Rate in a Network with ten nodes

1200

Packet Drop Rate

1000
800
600
400
200
0
3 CH

4 CH

5 CH

6 CH

7 CH

8 CH

9 CH

10 CH

11 CH

12 CH

13 CH

14 CH

15 CH

No. of Channels

Figure 12.Packet Drop Rate in a Network with thirty nodes

We analyze the effects of the common control channel challenge in Figs 10, 11, and 12, on the
network buffers whose negative impact results in the increases the number of dropped packets. In
Figs 10 and 11, the packet drop rate, improves (drops) to below 100 packets per second while in
Fig 12 it drops down to 200 packets /simulation second. The results in Fig 12 are worse than
those in Figs 10 and 11. The poor performance was caused by the by the common control channel
challenge which worsens in large networks.

86
Network Average - Packet Drop Rate

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

600

Average Throughput

500
400
300
200
100
0

4N

6N

8 N 10 N
Network Size

30 N

4000
3500
3000
2500
2000
1500
1000
500
0
4N

6N

Figure 13(a). Average Achievable throughput in the five network scenarios
Rate in the five network scenarios

8N

10 N

30 N

Network Size

(b). Average Packet Drop

Fig 13 depicts the average results of all the network scenarios which were investigated. Fig 13(a)
shows the average achieved throughput in the five different networks investigated in this
simulation, while Fig 13 (b) depicts the average packet drop rate in these five network scenarios.
In Fig 13(a), the increase in the achievable throughput is not linear to the network size due to the
common control channel challenges while Fig 13 (b) the average packet drop rate increases
exponentially. The increase in the average packet drop rate at such a fast rate was caused by the
common control channel challenge.

7. CONCLUSION
The results of the investigation show that both the saturation problem and the size of the spectrum
hole have an effect on the performance of the Medium Access Control protocols. The results
show that these two challenges degrade the performance of the networks. The effect of the
common control channel challenge is clearly depicted in Fig 13 (b), in which the average packet
drop rate worsens at an exponential rate. As the network increases, the packet drop rate degrades
gracefully. The degradation of the average packet drop rate is caused by the common control
channel challenge in networks with heavy loads or networks with ever increasing traffic loads. On
the other hand, the size of the spectrum hole and its effect on the network performance can be
correlated with the available transmission time. The network takes time sensing channels and
communicating the spectrum sensing information. The transmission time is therefore reduced.
Given a small spectrum hole, signalling will constitute a larger percentage impacting negatively
on the available bandwidth which can be ear-marked for data transmission. There is therefore a
need to reconfigure transmission and sensing times. The effect of the common control channel
challenge given a relatively small spectrum hole becomes huge.

87
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

REFERENCES
1.
2.
3.
4.

5.
6.
7.
8.
9.
10.

11.
12.
13.
14.
15.
16.

17.

18.

19.

20.
21.

22.

23.
24.

T. Vamsi Krishna and Amitabha Das. A survey on MAC protocols in OSA networks, computer
networks 53 (2009), www.elsevier.com/locate/comnet
P. Bhal, R. Chandra, and J Dunagan . SSCH: Slotted Seeded Channel hoping for capacity improvement
in IEEE 802.11 ad hoc wireless networks, in proceedings of the ACM MobiCom 2004
I.F. Akyildiz, W.-Y. Lee, K.R. Chowdhury, CRAHNs: Cognitive radio ad hoc networks Ad Hoc
Networks Journal, Elsevier, 2009. www.elsevier.com/locate/adhoc
Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, and Shantidev Mohanty. NeXt generation/dynamic
spectrum access/cognitive radio wireless networks: A survey, Computer Networks 50 (2006).
www.elsevier.com/locate/comnet
C Cormio and K.R. Chowdhury (2009). A survey of MAC protocols for cognitive radio networks, Ad
Hoc Networks, www.elsevier.com/locate/adhoc
I.F. Akyildiz, W.-Y. Lee, K.R. Chowdhury, Cognitive radio ad hoc networks: research challenges, to
appear in Ad Hoc Networks Journal, Elsevier, 2009.
M. Thoppian, S. Venkatesan, R. Prakash, R. Chandrasekaran, MAClayer scheduling in multi-hop
wireless networks, in: Proceedings of the IEEE WoWMoM 2006, June 2006.
L. Ma, X. Han, C.-C. Shen, Dynamic open spectrum sharing MAC protocol for wireless ad hoc
networks, in: Proceedings of the IEEEDySPAN 2005, November 2005, pp. 203–213.
J. Jia, Q. Zhang, X. Shen, HC-MAC: a hardware constrained cognitive MAC for efficient spectrum
management, IEEE Journal on Selected Areas in Communications 26 (1) (2008) 106–117.
H. Su, X. Zhang, Cross-layered based opportunistic MAC protocols for QoS provisionings over
cognitive radio wireless networks, IEEE Journal on Selected Areas in Communications 26 (1) (2008)
118–129.
J. Zhao, H. Zheng, G.-H. Yang, Distributed coordination in dynamic spectrum allocation networks, in:
Proceedings of the IEEE DySPAN 2005, November 2005, pp. 259–268.
J. So, N. Vaidya, Channelization: multi-channel MAC for ad hoc networks: handling multi-channel
hidden terminals using a single transceiver, in: Proceedings of the ACM MobiHoc, May 2004.
T. Chen, H. Zhang, G.M. Maggio, M. Chlamtac, CogMesh: a clusterbased cognitive radio network, in:
Proceedings of the IEEE DySPAN 2007, April 2007, pp. 168–178.
A.V. Adamis, K.N. Maliatsos, P. Constantinou, A new MAC protocol with control channel autodiscovery for self-deployed cognitive radio networks, Program for European Wireless 2007, EW 2007.
C. Cordeiro, K. Challapali, C-MAC: a cognitive MAC protocol for multi-channel wireless networks,
in: Proceedings of the IEEE DySPAN 2007, April 2007, pp. 147–157.
J. Deng and Z. Haas (1998). Dual Busy Tone Multiple Access (DBTMA): A New Medium Access
Control for Packet Radio Networks, in Proc. of IEEE ICUPC, Florence, Italy, 1998J. Clerk Maxwell, A
Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
A. Nasipuri, J. Zhuang and S. R. Das (1999). A Multichannel CSMA MAC Protocol for Multihop
Wireless Networks, in Proc. of IEEE Wireless Communications and Networking Conference (WCNC),
September 1999.
A. Nasipuri and S. R. Das (2000). Multichannel CSMA with Signal Power-based Channel Selection for
Multihop Wireless Networks, in Proc. of IEEE Vehicular Technology Conference (VTC), September
2000.
S.-L. Wu, C.-Y. Lin, Y.-C. Tseng and J.-P. Sheu (2000). A New Multi-Channel MAC Protocol with
On-Demand Channel Assignment for Multi-Hop Mobile Ad Hoc Networks, in Int’l Symposium on
Parallel Architectures, Algorithms and Networks (I-SPAN), 2000.
W. Hung, K. Law and A. Leon-Garcia (2002). A Dynamic Multi-Channel MAC for Ad Hoc LAN,” in
Proc. Of 21st Biennial Symposium on Communications, April 2002.
Jungmin So and Nitin vaidya (2004). Multi-Channel MAC for Ad Hoc Networks: Handling MultiChannel Hidden Terminals Using A Single Transceiver. MobiHoc 2004, Roppongi, Japan, ACM.
N. Jain and S. Das (2001). A Multichannel CSMA MAC Protocol with Receiver-Based Channel
Selection for Multihop Wireless Networks, in Proc. of the 9th Int.Conf. on Computer Communications
and Networks (IC3N), October 2001.
A. Tzamaloukas and J.J. Garcia-Luna-Aceves (2001). A Receiver-Initiated Collision-Avoidance
Protocol for Multi-Channel Networks,” in Proc. of IEEEINFOCOM, 2001.
Ritesh Maheshwari, Himanshu Gupta and Samir R. Das. Multichannel MAC protocols for wireless
networks. SECON 2006, Volume 2, Issue , 28-28 Sept. 2006
88
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013
25. Jingpu Shi, Theodoros Salonidis, and Edward W. Knightly (2006). Starvation Mitigation Through
Multi-Channel Coordination in CSMA Multi-hop Wireless Networks, MobiHoc’06, May 22–25, 2006,
Florence, Italy.
26. IEEE computer society LAN MAN standards committee: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications. ANSI/IEEE Std. 802.11, 1999 Edition, The Institute
of Electrical and Electronic Engineers, New York, 1999.
27. IEEE-SA Standards Boards. Part 11: Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications, June 2003. http://standards.ieee.org
28. IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications. IEEE Standard 802.11-1997, New York, NY, 1997.
802.11x
family
of
standards.
29. IEEE
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4248378&isnumber=4248377
30. Arup Acharya, Archan Misra, and Sorav Bansal (2003). MACA-P : A MAC for Concurrent
Transmissions in Multi-hop Wireless Networks. Proc. Of PerCom, March 2003
31. Sudthida Wiwatthanasaranrom and Anan Phonphoem. Multichannel MAC Protocol for Ad-Hoc
Wireless Networks. Department of Computer Engineering, Kasetsart University.
32. Hoi-Sheung Wilson So, Jean Walrand, and Jeonghoon Mo. McMAC: A Parallel Rendezvous MultiChannel MAC Protocol.
33. Jeonghoon Mo, Hoi-Sheung Wilson So, and Jean Walrand (2005). Comparison of Multi-Channel MAC
Protocols. MSWiM 2005, 10 – 13 October, Montreal, Quebec, Canada.
34. Jenhui Chen, Shiann-Tsong Sheu (2004). Distributed multichannel MAC protocol for IEEE 802.11 ad
hoc wireless LANs. Computer Communications 28 (2005).
35. Pradeep Kyasanur Jungmin So, chandrakanth Chereddi, and Nitin H. Vaidya. Multi-Channel Mesh
Networks: Challenge and Protocols. University of Illinois
36. Myunghwan Seo and Joongsoo Ma (2007). Flexible Multi-channel Coordination MAC for Multi-hop
Ad hoc Network. Technical Report, January 2007.
37. Chandrakanth Chereddi, Pradeep Kyasanur, and Nitin H. Vaidya (2006). Design and Implementation
of a Multi-Channel Multi-Interface Network. REALMAN’06, May 26, 2006, Florence, Italy
38. Mthulisi Velempini and Mqhele E. Dlodlo. Analyzing the effects of increasing data channels and the
number of data flows on network performance (Wireless VITAE 2009) – Denmark, 17 – 20 May 2009,
ISBN 978-1-4244-4067-2
39. MOZHDEH MOLA & ZAHRA ALAVIKIA (2010). Spectrum Management in Cognitive Radio
Networks, Jul 14,2010

AUTHORS
Mthulisi Velempini is a full member of the Institute of Electrical and Electronics
Engineers. He is a telecommunications engineer with a computer science background.
His research interests are in Medium Access Control protocols, Wireless Networks,
Security and network performance.

MqheleEnock-Hershal Dlodlo (SIEEE’87–88, MIEEE’88) earned a PhD (1996) from
Delft University of Technology, a master’s degree in electrical engineering (1989) from
Kansas State University, and two bachelor’s degrees in electrical engineering (1980),
mathematics and independent studies in engineering management (1983), from Geneva
College, Beaver Falls, PA, USA.

89

More Related Content

What's hot

Improved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAImproved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
 
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Eswar Publications
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsVijay Karan
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
 
New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelijcses
 
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
 

What's hot (19)

Improved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAImproved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMA
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
 
New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
 

Similar to Investigating the effects of the common control channel challenge in multichannel cognitive networks with hypothetical spectrum hole

Addressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination CostAddressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination Costpijans
 
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Polytechnique Montreal
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Polytechnique Montreal
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
 
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamicranjith kumar
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...IOSR Journals
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IRJET- Reliable Transmission of Packets using Multiple Channels
IRJET- Reliable Transmission of Packets using Multiple ChannelsIRJET- Reliable Transmission of Packets using Multiple Channels
IRJET- Reliable Transmission of Packets using Multiple ChannelsIRJET Journal
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Polytechnique Montreal
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 

Similar to Investigating the effects of the common control channel challenge in multichannel cognitive networks with hypothetical spectrum hole (20)

Addressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination CostAddressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination Cost
 
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamic
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
A017210110
A017210110A017210110
A017210110
 
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IRJET- Reliable Transmission of Packets using Multiple Channels
IRJET- Reliable Transmission of Packets using Multiple ChannelsIRJET- Reliable Transmission of Packets using Multiple Channels
IRJET- Reliable Transmission of Packets using Multiple Channels
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Investigating the effects of the common control channel challenge in multichannel cognitive networks with hypothetical spectrum hole

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHANNEL COGNITIVE NETWORKS WITH HYPOTHETICAL SPECTRUM HOLE Mthulisi Velempini1 and Mqhele E. Dlodlo2 1 2 North-West University, South Africa, Mmabatho University of Cape Town, South Africa, Cape Town ABSTRACT Multichannel MAC protocols have become a design choice of wireless access networks as they increase the achievable throughput. However, the implementation of a common control channel has been a challenge. The common control channel challenge has not been investigated in opportunistic networks where the availability of medium is temporary and unpredictable. The uncertainty of the availability of the channel coupled with the common control channel challenge makes this area an interesting research topic. Unfortunately, this challenge requires further investigation in Cognitive Radio Ad Hoc Networks (CRAHN), a promising next generation technology. The challenge makes an interesting study in CRAHN given the opportunistic access and use of channels. Given a hypothetical spectrum hole of any size coupled with the implementation of a control channel in a multi-channel environment, how much of good put can be realized and be effectively utilized for data transmission. We investigate the common control channel challenge in CRAHN through network simulations. The opportunistic nature of CRAHNs in the presence of the common control channel challenge is investigated. The simulation results show that the combination of the control channel challenge and the size of the spectrum hole degrade gracefully the network. Furthermore, the size of the spectrum hole has a bearing on good put. The results show that a big hole improves performance. Unfortunately, the opportunistic attribute of CRAHNs does not guarantee desirable spectrum holes. KEYWORDS Common Control Channel Challenge, CRAHN, Multi-Channel MAC 1. INTRODUCTION The paper examines the effects of the common control channel and the size of the spectrum hole Cognitive Radio Ad Hoc Networks (CRAHN). The multi-channel approach is envisioned as one of the possible strategies which can be employed to increase the achievable bandwidth. On the other hand, the implementation of CRAHN addresses the scarcity and inefficient utilization of spectrum. The two techniques do complement each other in availing the much needed bandwidth in the wireless next generation networks (WNGN). However, the implementation and the saturation of the control channel is a challenge which requires further investigation. The common control channel is perceived to be a system bottleneck which degrades wireless access networks. The impact of the common control channel is expected to be huge when a small spectrum hole is smaller as compared to bigger ones. The paper explores and presents an in-depth analysis of the DOI : 10.5121/ijnsa.2013.5607 75
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 performance of the common control channel in congested networks. Extensive simulations show that the capacity of the control channel degrades the performance of networks with high traffic loads. The size of the spectrum hole has also an effect on the performance of the networks; A small hole constrains the network while a bigger one avails more data transmission opportunities. The common control channel challenge is investigated in scenarios with different number of channels ranging from 2 to 15 data channels. For each scenario, the number of nodes was increased steadily from 4 to 30. The following scenarios in terms of t he number of nodes were considered: 4, 6, 8, 10, and 30. The paper is structured as follows: summery of multi-channel MAC schemes in CRAHN is presented in Section II. The related work is analyzed in Section III. Section IV and V, presents the simulation design and simulation results. The paper is concluded in Section VII. 2. MULTI-CHANNEL MAC SCHEMES Multichannel MAC protocols increase the capacity of existing wireless access networks. Multichannel MAC protocol designs have demonstrated some encouraging results. The schemes have shown an increase in achievable throughput is possible. As a result, multichannels have been considered in CRAHNs. Unfortunately, the emphasis has been on capacity. The common control channel challenge has not been investigated in opportunistic networks. This challenge requires further investigation in the context of CRAHNs. The common control channel challenge is investigated and how the size of the spectrum hole impacts on network performance. The size of the spectrum hole is also considered in relation to the achievable throughput. There are a few configurations of multichannel systems which have been considered in research, for example multi-radio multi channel networks and single radio and multichannel networks. A single radio multichannel network is considered in the context of CRAHNs in this paper. The impact of the common control channel has been investigated elsewhere however; to the best of our knowledge its impact on opportunistic CRAHNs with varying sizes of spectrum holes has not been investigated. We explore the common control channel challenge in CRAHNs and investigate the saturation problem in detail, in different possible network scenarios. The paper contributes to the e implementation of multichannel CRAHNs networks. 3. RELATED WORK The implementation of a common control channel in CRAHNs presents a number of design challenges. The control channel scheme leads to the saturation problem cited in [1] and [2]. In addition, the design of a global control channel is another option in CRAHNs. However, due to the opportunistic use of spectrum, the existence of such a global channel may be a design challenge. As a result, local control channel and switchable schemes have been proposed as possible solutions. However, despite the challenges of the global control channel approach, such a design challenge is preferred. The global control channel facilitates network connection and provides a secondary user (SU) with a platform to detect a PU and share sensing information. The information on PU activities can be determined and shared in a distributed manner subject to challenges cited in [3] and [4] through the control channel however, an always on control channel is desired and its reliability facilitates the discovery of neighbouring nodes in the CRAHNs [3]. In [5] the implementation of the control channel is subject to high signaling cost; however, though it saturates, its design is significant in network setup and in the exchange of control messages and in the sharing of the spectrum information. One of the design challenges of CRAHNs is the optimization of sensing and transmission durations which impacts negatively on the achievable throughput. The shorter sensing times are 76
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 desired however the PU detection accuracy should not be compromised. Such optimization relies on the availability of network wide sensing information and network cooperation [5]. The sharing of the sensing information can be possible given the availability of a global control channel which also facilitates cooperation among nodes in a distributed manner. This shows the significance of the control channel in CRAHNs which should be designed to address the saturation challenge. As noted in [2], the design of a global control channel is a challenge however; the local control channel design approach can addresses the need for local observation, cooperative sensing and the sharing of spectrum information sharing at a local level. This facilitates cooperation in spectrum sensing and sharing [6]. Furthermore, the localization of the sensing activities in a cooperative manner can be considered as a design option which addresses mobility challenges. Global control channel schemes are also proposed in [7], [8],[9], and [10]. However, the schemes do require global synchronization which is a challenge in wireless networks. In [11] and [12] it is envisioned that synchronization may be possible in a localized environment at the expense of higher overheard costs due to the need to coordinate local sensing and information sharing. This overheard leads to common control channel challenge which is examined in this paper. In [13], [14], and [15] schemes implementing local control channels are proposed. Techniques such as clustering are employed in the design of a local control channel. A number of multi-channel MAC schemes have been designed to address different challenges. They are designed to address the following challenges, throughput, Hidden Terminal problem, and the Missing. The scheme in [16] addresses the HTP. The common control channel challenge was not investigated. In [17] a scheme optimized for capacity oriented scheme is proposed however the common control channel challenge was also not investigated. A reconfigured version of this protocol is proposed in [18]. The scheme does not examine the impact of the common control channel challenge on network performance. The two protocols are capacity based and the impact of the common control channel challenge was not investigated. A common control channel protocol is proposed in [19], with its improved version is proposed in [20]. The two schemes are capacity oriented; the common control channel challenge was not examined. There is therefore a need to common control challenge in the context of capacity or of improving the end-to-end throughput. The performance and capacity of the common control channel challenge has an effect on network capacity. Furthermore, the saturation challenge may be explored in access networks such as the CRAHNs. The CRAHNs is the promising candidate of the WNGN. Our paper analyzes the impact of the size of the spectrum hole and the capacity of the network in the CRAHNs through analytical and network simulations. To this end, we investigate the saturation challenge in different network scenarios. In [21] a single transceiver scheme is proposed, however, it does not implement the common control channel. Works in [22], [23] and [24] implement similar capacity based schemes. The optimization of upper bound capacity requires attention as its design impacts on the performance of the network. The scheme in [25] implements a common control channel with a single transceiver. The saturation problem was investigated in the absence of channel switching costs. Furthermore, the saturation challenge was not rigorously examined in different network scenarios. The switching cost effects network performance as two switching costs are involved. The switching penalty is set to a maximum value of 224µs [26], [27], [28], and [29]. The total switching cost for the penalties – for the two channel switching delays, to and from a given data channel is 448µs, 77
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 which is a significant cost. We added the two channel switching delays in our simulation environment. Furthermore, the common control channel challenge in the context of CRAHNs in different network scenarios is investigated. Different approaches are proposed in [30] to [37], schemes which implement random home channels [31], the quiescent channels [32], the default channels and, the fixed and the switchable transceivers [35]. The schemes partition the network. Furthermore, a temporary control channel is implemented in these schemes; as a result high channel switching cost is incurred due to frequent channel switching. The protocols however, do not investigate the common control channel challenge in multichannel MAC schemes and the implementation of upper bounds schemes. 4. ANALYTICAL MODEL Cognitive networks are characteristic with the co-existence of primary and secondary spectrum users. The primary user (PU) is the owner of the spectrum and its usage of the spectrum should not be interfered with. The PU enjoys an uninterrupted usage of the spectrum every time is in session. An idle PU has to be protected and given uninterrupted access to the spectrum when it decides to utilize the spectrum. This means that the PU requires protection when it is using, and when it is not using the spectrum. The most critical one is when the PU is not using the spectrum. This critical in the sense that when a PU appears, other users are expected to vacant the spectrum and make sure they do not interrupt it. On the other hand the secondary user (SU) is an opportunistic user of the spectrum. It is a user who does not own the spectrum but would want to use it as and when it is not in use. The design issue is the positive identification of a PU and ability to differentiate the activities of a PU from other SUs. The opportunistic usage of the spectrum by SUs and their coexistence with PU is depicted in Fig 1. The SU has to identify spectrum holes, which are durations in which the PU is idle. When the PU is not active, the spectrum lies idle. The SU then utilizes the spectrum during these inactive periods. When the PU begins transmitting the SU has to vacant the spectrum immediately and move to the next vacant spectrum. In fig 1, there are three spectrum holes which are available to the SU. As indicated by the arrows, the SU will transmit first in the first spectrum hole. When it detects the PU, it jumps into the hole in the next frequency band. While in the next band, when the PU appears, the SU has to jump into the third hole to continue it transmission. However, Fig 1 assumes that these holes are big enough to allow the SU to engage in meaningful transmission. This is the general assumption which may not always be the case. If the hole is not big enough, the SU not fail to complete its transmission resulting in the wastage of bandwidth and the need to retransmit packets. 78
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 1. Opportunistic utilization of spectrum holes by secondary users during the absence of the primary users [39] We characterize the effect of the size of the spectrum hole in Fig 2. The model clearly shows that he size of the spectrum hole matters; otherwise it may cause a number of retransmission and network congestion. Frequenc y RT S Primary User RT S CT S Primary User RT S RT S Primary User CT S RT S CT S Primary User RT S DATA CT S AC K RT S AC K CT S RT S Primary User AC K DATA Primary User DATA Primary User DATA DATA RT S CT S CT S RT S Primary User Primary User Primary User RT S Prima ry Time Figure 2. Utilization of spectrum holes Assuming that frequency x, has five frequency bands counting from bottom up and that we have two spectrum holes in the first band. Given the first hole, an SU would be able to successfully transmit a single packet which going to be positively acknowledged. The second attempt will not succeed because the PU will appear after the exchange of RTS and CTS packets. An attempt to jump into the hole in band two would succeed given that it is already occupied by another SU. The SU-2 in band-2 fails to receive a positive ACK packet as a result the bandwidth would be wasted necessitating the need for retransmission. The second spectrum holes in both bands 1 and 2 accommodate only an RTS packet which also wastes bandwidth. The first hole in band-3 allows the SU to exchange only the RTS and CTS packets before the PU appears while the second hole is big enough for the successful transmission of one data packet. Band-4 hole accommodates only data transmission and the second attempt ends with only an RTS packet having been transmitted. Lastly, band-5 has two holes which are not big enough for data transmissions to be scheduled in them. 79
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 The model demonstrates that the size of the spectrum hole is significant. The availability of the spectrum is not fundamental but their size. SUs can still fail to utilize the available hole due to their size. Depending on the activities of other SUs, a given SU may not be able to hop from one spectrum hole to another to complete its transmission. Having occupied the first hole, when it fails to access the next one, it wastes bandwidth which may also lead to numerous retransmissions. On the other hand retransmission may lead to the congestion of the frequency bands. Finally, when these scenarios are considered in the light of the common control channel challenge, a severe degradation of the performance of the network is expected. These may cause SUs to fail to transmit successfully in holes which they have done so in the absence of the common control channel challenge. There is therefore need to analyze the performance of cognitive networks in the presence of these challenges. The correctly detection of the activities of PUs and the available spectrum holes do not address these challenges. 5. SIMULATION MODEL The simulated scenarios were investigated in the NS 2 network simulator. The simulation was based on the IEEE 802.11 standard implemented in NS 2. The details of the simulation parameters are depicted in table 1. Five main networks were evaluated and in each of the five fourteen scenarios were examined. The networks were categorized by size in terms of the number of nodes in a network. The number of nodes range from 4 to 30. The simulation environment consist of one common control channel set aside for signaling purposes and the rest where earmarked for data transmission. Furthermore, all the channels were assumed to be two Mbps. The table below depicts all the parameters and their associated values which were considered in the evaluation. The saturation challenge was investigated in an NS 2.28 simulation environment. The environment had a multi-channel patch installed. For routing purposes the No Ad Hoc (NOAH) routing protocol was used. The network scenarios consisted of one control channel and one radio. The multichannel switching cost was set to 224µs. The number of data channels was increased steadily from 2 to 15 resulting in 14 different network scenarios. Given these network scenarios, the saturation challenge was well investigated Table 1. MAC Layer and other Parameter Settings Parameter Value SIFS DIFS EIFS CIFS Slot time Data rate Basic rate Channels Switching time Packet size CW max CW min Short Retry Limit Long Retry Limit PLCP Length PLCP rate RTS CTS ACK 10 µs 50 µs 364µs 56 (µs) 20 µs 2 Mbps 2 Mbps 2,3,4,5,6,7,8,9,10,11,12,13,14,15 224µs 1000 bytes 1023 7 7 4 192 bits 1 Mbps 20 bytes 14 bytes 14 bytes 80
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 MAC Header - Data MAC Header rate Routing Agent Network Sizes 28 bytes Basic rate NOAH 4,5,6,8,10 and 30 nodes The channels were assumed to be orthogonal for experimentation purposes. The different network sizes were designed to evaluate the impact of the control channel saturation challenge. General network topologies which were fully connected were considered in the simulations. For each scenario, at least 10 simulations were run each for 300 seconds, the simulation time. The results presented in the next Sections are averages of these simulations which were run to effectively investigate the effects of the common control channel challenge. The x axis depicts the number of data channels which were considered for the 14 different networks in terms of the number of data channels involved. 6. SIMULATION RESULTS We present and analyze simulation results in this Section. The simulation environment was modeled according to Table.1 and its detailed description was presented in Section IV. The effect of the common control channel challenge was investigated as the number of data channel was increased from 2 to 15. Furthermore, different network sizes and scenarios were examined. The different scenarios were designed to adequately investigate the common control channel challenge. Figure 3 depicts the performance of a network with 4 nodes. Fourteen scenarios with different number of nodes were investigated. The data channels were increased from 2 to 15. The first network had two data channels, and thereafter, they were increased steadily to 15. The largest network had 15 data channels. In Fig 3, the network performance kept on fluctuating between 5.42 and 5.45 Mbps as the data channels were increased steadily from 2 to 15 data channels. A recurring pattern was observed between two and ten channels. The achieved throughput increased from the data channels added to four data channels. Thereafter, it decreased when the data channels were increased to five. This same pattern was then repeated between six and ten channels. The achieved throughput however, was the same in networks with eight and nine data channels. After the 10th data channel, it increased marginally before decreasing and exhibiting signs of saturation. 81
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 5.438 5.436 5.434 Throughput 5.432 5.43 5.428 5.426 5.424 5.422 5.42 5.418 5.416 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 11 CH 12 CH No. of Channels CH 13 14 15 CH CH CH Figure 3.Achievable Network Throughput in a Network with 4 terminals The saturation problem was noticeable from the ninth data channel. The achievable throughput began decreasing until the fifteenth data channel. This shows that the effect of the saturation problem becomes more severe in overloaded and congested networks. In the following results in Fig 4, we further investigate common control channel challenge. In this case, we investigate the performance of the buffer queues in the presence of the saturation challenge in similar set up. 24.45 Packet Drop Rate 24.4 24.35 24.3 24.25 24.2 24.15 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 4. Investigating the effect of the saturation on Packet Drop Rate As it can be seen in Fig 4 above, the packet drop rate kept improving from the two channels to sixth data channels. From seven channels to nine data channels it worsened, before improving again. In general, the effects of the saturation problem are not as evident as in the achievable 82
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 throughput results. The results of the packet drop rate in general, seem to be improving. In the next set of results, the network was increased to 6 nodes. 9 8 7 6 Throughput 5 4 3 2 1 0 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 5.Achievable Network Throughput in a Network with six nodes The achievable throughput did plateau at 8 Mbps between the fifth and the fifteen data channels after it had increased from 3Mbps in the second data channel. The effect of the saturation problem causes the control channel to fail to coordinated and schedule more data transmissions, as a result, it causes a system bottleneck. The number of channels does not increase the achievable throughput when the control channel had saturated. The results of the packet drop rate in Fig 6 show a similar behaviour. Its performance improves and then remains unchanged just below a packet drop rate of fifty packets per second. However, this is higher than the drop rate observed in Fig 4. This depicts that the network size and the amount of traffic has an effect on the saturation problem. The severity of the saturation problem increases with the increase in congestion. Packet Drop Rate 400 350 300 250 200 150 100 50 0 2 3 4 5 6 7 8 9 10 11 12 13 14 15 CH CH CH CH CH CH CH of Channels CH CH CH CH No. CH CH CH Figure 6.Packet Drop Rate in a Network with six nodes The results thus far show the effect of the saturation challenge and the congestion of the control channel in overloaded networks. We now summarize the results of the other network scenarios under the similar network configurations. 83
  • 10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 In Figs 7, 8, and 9, we closely analyze the effect of the saturation problem in large networks which are overloaded. In these three figures, the nodes were increased to 8, 10 and 50 respectively. 12 Throughput 10 8 6 4 2 0 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 7.Achievable end-to-end Throughput in a Network with eight nodes It can be noted that the saturation levels remain unchanged. For example, in Fig 5, the achievable throughput is 4/3 Mbps per each node which is the same average achievable throughput which was realized in Fig 9. However, in Figs 7 and 9 it is lower due to the effects of the saturation problem. The saturation challenge is not severe in Fig 9 due to spatial reuse. There is therefore a need to improve the efficiency of the network through design ingenuity instead of relying on spatial reuse. However, despite the spatial reuse, the effects of the saturation problem are still evident. The network in Fig 9 did plateau after the third channel as opposed to the sixth channel in Fig 8. This clearly demonstrates the effects of the saturation problem. 16.00 14.00 12.00 Throughput 10.00 8.00 6.00 4.00 2.00 .00 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 8.Achievable end-to-end Throughput in a Network with 10 nodes 84
  • 11. Throughput International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 45 40 35 30 25 20 15 10 5 0 2 CH 3 CH4 CH5 CH 6 CH 7 CH8 CH9 CH 10 11 12 13 14 15 CH CH CH CH CH CH No. of Channels Figure 9.Achievable Network Throughput in a Network with 30 nodes In the throughput results, with the exception of Fig 3, the achievable throughput increased from its minimum to its maximum as the spectrum hole remained available. The size of the spectrum hole affects the achievable throughput in the sense that if the available transmission time is very short, very few or no packets can be transmitted. The achievable throughput rises from its minimum to its maximum given the availability of the spectrum hole. However, it does not continue to rise due to the effects of the saturation problem. The small spectrum hole therefore constrains throughput, while a bigger one enables nodes to realize more achievable throughput. 600 Packet Drop Rate 500 400 300 200 100 0 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 10.Packet Drop Rate in a Network with eight nodes 85
  • 12. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 800 700 Packet Drop Rate 600 500 400 300 200 100 0 2 CH 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 11.Packet Drop Rate in a Network with ten nodes 1200 Packet Drop Rate 1000 800 600 400 200 0 3 CH 4 CH 5 CH 6 CH 7 CH 8 CH 9 CH 10 CH 11 CH 12 CH 13 CH 14 CH 15 CH No. of Channels Figure 12.Packet Drop Rate in a Network with thirty nodes We analyze the effects of the common control channel challenge in Figs 10, 11, and 12, on the network buffers whose negative impact results in the increases the number of dropped packets. In Figs 10 and 11, the packet drop rate, improves (drops) to below 100 packets per second while in Fig 12 it drops down to 200 packets /simulation second. The results in Fig 12 are worse than those in Figs 10 and 11. The poor performance was caused by the by the common control channel challenge which worsens in large networks. 86
  • 13. Network Average - Packet Drop Rate International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 600 Average Throughput 500 400 300 200 100 0 4N 6N 8 N 10 N Network Size 30 N 4000 3500 3000 2500 2000 1500 1000 500 0 4N 6N Figure 13(a). Average Achievable throughput in the five network scenarios Rate in the five network scenarios 8N 10 N 30 N Network Size (b). Average Packet Drop Fig 13 depicts the average results of all the network scenarios which were investigated. Fig 13(a) shows the average achieved throughput in the five different networks investigated in this simulation, while Fig 13 (b) depicts the average packet drop rate in these five network scenarios. In Fig 13(a), the increase in the achievable throughput is not linear to the network size due to the common control channel challenges while Fig 13 (b) the average packet drop rate increases exponentially. The increase in the average packet drop rate at such a fast rate was caused by the common control channel challenge. 7. CONCLUSION The results of the investigation show that both the saturation problem and the size of the spectrum hole have an effect on the performance of the Medium Access Control protocols. The results show that these two challenges degrade the performance of the networks. The effect of the common control channel challenge is clearly depicted in Fig 13 (b), in which the average packet drop rate worsens at an exponential rate. As the network increases, the packet drop rate degrades gracefully. The degradation of the average packet drop rate is caused by the common control channel challenge in networks with heavy loads or networks with ever increasing traffic loads. On the other hand, the size of the spectrum hole and its effect on the network performance can be correlated with the available transmission time. The network takes time sensing channels and communicating the spectrum sensing information. The transmission time is therefore reduced. Given a small spectrum hole, signalling will constitute a larger percentage impacting negatively on the available bandwidth which can be ear-marked for data transmission. There is therefore a need to reconfigure transmission and sensing times. The effect of the common control channel challenge given a relatively small spectrum hole becomes huge. 87
  • 14. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 REFERENCES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. T. Vamsi Krishna and Amitabha Das. A survey on MAC protocols in OSA networks, computer networks 53 (2009), www.elsevier.com/locate/comnet P. Bhal, R. Chandra, and J Dunagan . SSCH: Slotted Seeded Channel hoping for capacity improvement in IEEE 802.11 ad hoc wireless networks, in proceedings of the ACM MobiCom 2004 I.F. Akyildiz, W.-Y. Lee, K.R. Chowdhury, CRAHNs: Cognitive radio ad hoc networks Ad Hoc Networks Journal, Elsevier, 2009. www.elsevier.com/locate/adhoc Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, and Shantidev Mohanty. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks 50 (2006). www.elsevier.com/locate/comnet C Cormio and K.R. Chowdhury (2009). A survey of MAC protocols for cognitive radio networks, Ad Hoc Networks, www.elsevier.com/locate/adhoc I.F. Akyildiz, W.-Y. Lee, K.R. Chowdhury, Cognitive radio ad hoc networks: research challenges, to appear in Ad Hoc Networks Journal, Elsevier, 2009. M. Thoppian, S. Venkatesan, R. Prakash, R. Chandrasekaran, MAClayer scheduling in multi-hop wireless networks, in: Proceedings of the IEEE WoWMoM 2006, June 2006. L. Ma, X. Han, C.-C. Shen, Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks, in: Proceedings of the IEEEDySPAN 2005, November 2005, pp. 203–213. J. Jia, Q. Zhang, X. Shen, HC-MAC: a hardware constrained cognitive MAC for efficient spectrum management, IEEE Journal on Selected Areas in Communications 26 (1) (2008) 106–117. H. Su, X. Zhang, Cross-layered based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks, IEEE Journal on Selected Areas in Communications 26 (1) (2008) 118–129. J. Zhao, H. Zheng, G.-H. Yang, Distributed coordination in dynamic spectrum allocation networks, in: Proceedings of the IEEE DySPAN 2005, November 2005, pp. 259–268. J. So, N. Vaidya, Channelization: multi-channel MAC for ad hoc networks: handling multi-channel hidden terminals using a single transceiver, in: Proceedings of the ACM MobiHoc, May 2004. T. Chen, H. Zhang, G.M. Maggio, M. Chlamtac, CogMesh: a clusterbased cognitive radio network, in: Proceedings of the IEEE DySPAN 2007, April 2007, pp. 168–178. A.V. Adamis, K.N. Maliatsos, P. Constantinou, A new MAC protocol with control channel autodiscovery for self-deployed cognitive radio networks, Program for European Wireless 2007, EW 2007. C. Cordeiro, K. Challapali, C-MAC: a cognitive MAC protocol for multi-channel wireless networks, in: Proceedings of the IEEE DySPAN 2007, April 2007, pp. 147–157. J. Deng and Z. Haas (1998). Dual Busy Tone Multiple Access (DBTMA): A New Medium Access Control for Packet Radio Networks, in Proc. of IEEE ICUPC, Florence, Italy, 1998J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73. A. Nasipuri, J. Zhuang and S. R. Das (1999). A Multichannel CSMA MAC Protocol for Multihop Wireless Networks, in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), September 1999. A. Nasipuri and S. R. Das (2000). Multichannel CSMA with Signal Power-based Channel Selection for Multihop Wireless Networks, in Proc. of IEEE Vehicular Technology Conference (VTC), September 2000. S.-L. Wu, C.-Y. Lin, Y.-C. Tseng and J.-P. Sheu (2000). A New Multi-Channel MAC Protocol with On-Demand Channel Assignment for Multi-Hop Mobile Ad Hoc Networks, in Int’l Symposium on Parallel Architectures, Algorithms and Networks (I-SPAN), 2000. W. Hung, K. Law and A. Leon-Garcia (2002). A Dynamic Multi-Channel MAC for Ad Hoc LAN,” in Proc. Of 21st Biennial Symposium on Communications, April 2002. Jungmin So and Nitin vaidya (2004). Multi-Channel MAC for Ad Hoc Networks: Handling MultiChannel Hidden Terminals Using A Single Transceiver. MobiHoc 2004, Roppongi, Japan, ACM. N. Jain and S. Das (2001). A Multichannel CSMA MAC Protocol with Receiver-Based Channel Selection for Multihop Wireless Networks, in Proc. of the 9th Int.Conf. on Computer Communications and Networks (IC3N), October 2001. A. Tzamaloukas and J.J. Garcia-Luna-Aceves (2001). A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks,” in Proc. of IEEEINFOCOM, 2001. Ritesh Maheshwari, Himanshu Gupta and Samir R. Das. Multichannel MAC protocols for wireless networks. SECON 2006, Volume 2, Issue , 28-28 Sept. 2006 88
  • 15. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 25. Jingpu Shi, Theodoros Salonidis, and Edward W. Knightly (2006). Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks, MobiHoc’06, May 22–25, 2006, Florence, Italy. 26. IEEE computer society LAN MAN standards committee: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ANSI/IEEE Std. 802.11, 1999 Edition, The Institute of Electrical and Electronic Engineers, New York, 1999. 27. IEEE-SA Standards Boards. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June 2003. http://standards.ieee.org 28. IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Standard 802.11-1997, New York, NY, 1997. 802.11x family of standards. 29. IEEE http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4248378&isnumber=4248377 30. Arup Acharya, Archan Misra, and Sorav Bansal (2003). MACA-P : A MAC for Concurrent Transmissions in Multi-hop Wireless Networks. Proc. Of PerCom, March 2003 31. Sudthida Wiwatthanasaranrom and Anan Phonphoem. Multichannel MAC Protocol for Ad-Hoc Wireless Networks. Department of Computer Engineering, Kasetsart University. 32. Hoi-Sheung Wilson So, Jean Walrand, and Jeonghoon Mo. McMAC: A Parallel Rendezvous MultiChannel MAC Protocol. 33. Jeonghoon Mo, Hoi-Sheung Wilson So, and Jean Walrand (2005). Comparison of Multi-Channel MAC Protocols. MSWiM 2005, 10 – 13 October, Montreal, Quebec, Canada. 34. Jenhui Chen, Shiann-Tsong Sheu (2004). Distributed multichannel MAC protocol for IEEE 802.11 ad hoc wireless LANs. Computer Communications 28 (2005). 35. Pradeep Kyasanur Jungmin So, chandrakanth Chereddi, and Nitin H. Vaidya. Multi-Channel Mesh Networks: Challenge and Protocols. University of Illinois 36. Myunghwan Seo and Joongsoo Ma (2007). Flexible Multi-channel Coordination MAC for Multi-hop Ad hoc Network. Technical Report, January 2007. 37. Chandrakanth Chereddi, Pradeep Kyasanur, and Nitin H. Vaidya (2006). Design and Implementation of a Multi-Channel Multi-Interface Network. REALMAN’06, May 26, 2006, Florence, Italy 38. Mthulisi Velempini and Mqhele E. Dlodlo. Analyzing the effects of increasing data channels and the number of data flows on network performance (Wireless VITAE 2009) – Denmark, 17 – 20 May 2009, ISBN 978-1-4244-4067-2 39. MOZHDEH MOLA & ZAHRA ALAVIKIA (2010). Spectrum Management in Cognitive Radio Networks, Jul 14,2010 AUTHORS Mthulisi Velempini is a full member of the Institute of Electrical and Electronics Engineers. He is a telecommunications engineer with a computer science background. His research interests are in Medium Access Control protocols, Wireless Networks, Security and network performance. MqheleEnock-Hershal Dlodlo (SIEEE’87–88, MIEEE’88) earned a PhD (1996) from Delft University of Technology, a master’s degree in electrical engineering (1989) from Kansas State University, and two bachelor’s degrees in electrical engineering (1980), mathematics and independent studies in engineering management (1983), from Geneva College, Beaver Falls, PA, USA. 89