SlideShare a Scribd company logo
1 of 25
Download to read offline
Multi-Channel MAC Protocols in
  Cognitive Radio Networks



 Prepared by:
            Mohammad J. Abdelhadi
             Muhammad K. Mustafa


         King Abdullah II School of Electrical Engineering
           Princess Sumaya University for Technology
Outline
 Multi-channel MAC
 Multi-channel MAC Approaches
 What is Cognitive Radio(CR)?
 Overview of some Cognitive multi-channel
  MAC protocols.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   1
Multi-channel MAC

       Multi-channel means that there are more than one channel
        available for communication in a system.


       Why Multi-channel MAC?
        • Reducing collusion among users
        • Higher throughput
        • Less normalized propagation delay




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   2
Multi-channel MAC




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   3
Multi-channel MAC Approaches

       There are three main approaches for Multi-channel
        MAC
      • Common Control Channel Approach(CCC).
      • Split Phase Approach(SP).
      • Common Hopping Approach(CH).




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   4
Common Control Channel Approach

       The CCC approach applies a single dedicated common control channel.
       Usually uses more than one transceiver, one of them is tuned to the
        common control channel at all time.
       Advantages:
         • Solves the hidden terminal problem( when using more than one
           transceiver).
         • Doesn't require time synchronization.
       Disadvantages:
         • Congestion can occur.
         • Energy inefficient
         • Bandwidth inefficient.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   5
Common Control Channel Approach




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   6
Split phase Approach

      It splits all channels into two phases:
         • Control phase
         • Data phase.
      During a control phase, all nodes tune to a common control channel.
      During the data phase, nodes tune to negotiated channels for data
       transmission.
      Advantages:
          •   Uses Only one transceiver
          •   Does not allow the hidden terminal problem
          •   Energy Efficient
      Disadvantages:
          •   Precise time Synchronization is required
          •   Data Channels are wasted during the control phase
          •   Data Channel negotiation is only during the control phase




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   7
Split phase Approach




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   8
Common Hopping Approach

   Every node hops through all available channels following a common
    hopping pattern.
   After sending the control packets and agree to send data, a node pair
    stop hopping until the transmission is completed.

   Advantages:
     • Using only one transceiver
     • No common Control channel
     • Data channel negotiation is performed simultaneously on different
       channels.
   Disadvantages:
     • The hidden terminal problem
     • There is a high Channel switching delay
     • Time Synchronization




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   9
Common Hopping Approach




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   10
Default Hopping Sequence Approach

       Every node determines its default hopping pattern using the seed
        of a pseudo random generator which is known by all nodes.
       same communication procedure that used in CH but with a
        scheduled sequence.
       Same advantages and disadvantages of CH.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   11
What is Cognitive Radio

       The main aim behind CR is to utilize the unused spectrum at
        a given time and place, thereby creating virtual unlicensed band.
       Two kinds of users in CR networks; primary users(PU) and
        secondary users(SU).
       A great principle of CR is the using of the spectrum from SU must
        not affect the communication of PU.
       Once the PU returns to a channel, the communication of the SU in
        that channel must stop immediately.
       SUs can exchange spectrum information with each other.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   13
FCC: In most places, Over 70% of
    the allocated spectrum is not used !




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   14
Cognitive MAC protocols and its
        Fundamentals

       Cognitive MAC protocols allow unlicensed users to share the
        licensed spectrum.
       The presence of PU distinguishes cognitive MAC protocols from
        other multi-channel MAC protocols.
       Sensing and distribution of channels is a major concern in CR MAC
        protocols.
       Each Cognitive MAC protocol may use more than one approach of
        multi-channel MAC approaches.
       Cognitive MAC protocols are in its infancy.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   15
Some Cognitive MAC protocols

       Hang Su and Xi Zhang's MAC Protocol.

       HC-MAC protocol.

       Noun Choi et al protocol.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   16
Hang Su and Xi Zhang's MAC Protocol.

       This protocol assumes that each SU is equipped with two transceivers
       One is for a dedicated control channel and the other is for a data
        channel.
       In the control channel the time is divided into time slots and each slot
        contains two phases; reporting phase and negotiation phase.
       When a node wants to transmit data, it first senses the channels and
        reports the channel state.
       If one channel is idle, it negotiates with the destination over the
        control channel on which channel to be used.
       Two sensing policies are used:
          • Random Sensing Policy(RSP)
          • Negotiation-based sensing policy (NSP)




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   17
Hang Su and Xi Zhang's MAC Protocol.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   18
HC-MAC protocol

      Assumes that a control channel is available for secondary users
       at any time.
      Each SU is equipped with single transceiver.
      Time frame is divided into three time slots, each with three
        phases; contention phase, sensing phase, and transmission phase.
      In contention phase, secondary users content the spectrum and reserve
     channels.
      In sensing phase, they conduct sensing in each channel.
      In transmission phase, secondary user will transmit data in channels
     sensed ideal.


           Contention                           Sensing                            Transmission
             Phase                               Phase                                Phase



King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology     19
HC-MAC protocol




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   20
Noun Choi et al MAC Protocol

       This protocol assumes that there are two transceivers at least for each
        node.
       One is used for transmitting data while the other is used for receiving
        data.
       Each node chooses an available channel and keep it as its Home
        Channel (HCh) which its information are broadcasted into a common
        control channel to its neighbors.
       If a node wants to transmit data to another one, it has to tune its
        transmitting radio to the HCh of the destination node.
       Another HCh is selected in the following cases:
          o PU returns to use the same channel.
          o Any disagrees with the node's HCh.
          o The selected HCh is noisy.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   21
Noun Choi et al MAC Protocol




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   22
A comparison between some
               Cognitive Radio MAC protocols




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   23
Summary
     The use of Multi-channel facilitates and
      improves many communication systems.
     Multi-channel MAC protocols have many categories and ways to
      be established.
     Cognitive Radio is a new idea aims to utilize the maximum
      bandwidth available.
     Cognitive Radio MAC protocols are based on Multi-channel MAC
      protocols with a lot of concern in channel sensing and distribution.




King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology   24
THANK YOU


    King Abdullah II School of Electrical
  Engineering - Princess Sumaya University
                for Technology

More Related Content

What's hot

Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network Dr Praveen Jain
 
Dynamic spectrum access
Dynamic spectrum accessDynamic spectrum access
Dynamic spectrum accessSanjana Prasad
 
Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Jeffrey Funk
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 
Study of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio NetworkStudy of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio Networkfaskone
 
OFDM Based Cognitive radio
OFDM Based Cognitive radioOFDM Based Cognitive radio
OFDM Based Cognitive radioDeepesh Sinnya
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Ameer Sameer
 
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICT
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICTCognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICT
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICTNurmaya Widuri
 
Cognitive Radio For Smart Grid
Cognitive Radio For Smart GridCognitive Radio For Smart Grid
Cognitive Radio For Smart Gridyasser hassen
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio RiyaSaini16
 
Cognitive Radio in 5G
Cognitive Radio in 5GCognitive Radio in 5G
Cognitive Radio in 5GHavar Bathaee
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 

What's hot (19)

Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network
 
Dynamic spectrum access
Dynamic spectrum accessDynamic spectrum access
Dynamic spectrum access
 
Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible?
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 
Study of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio NetworkStudy of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio Network
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
OFDM Based Cognitive radio
OFDM Based Cognitive radioOFDM Based Cognitive radio
OFDM Based Cognitive radio
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICT
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICTCognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICT
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICT
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Cognitive Radio For Smart Grid
Cognitive Radio For Smart GridCognitive Radio For Smart Grid
Cognitive Radio For Smart Grid
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio
 
Cognitive Radio in 5G
Cognitive Radio in 5GCognitive Radio in 5G
Cognitive Radio in 5G
 
Cr2012b
Cr2012bCr2012b
Cr2012b
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
What is Cognitive Radio ?
What is Cognitive Radio ?What is Cognitive Radio ?
What is Cognitive Radio ?
 

Viewers also liked

Optimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum SensingOptimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum SensingFabrizio Granelli
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopADVA
 
Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...
Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...
Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...ssk
 
Optical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifiersOptical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifierseSAT Journals
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptAnupam Yadav
 
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
 DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING) DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)vijay223225
 
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]APNIC
 
DWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access SystemsDWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access SystemsCPqD
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnologyvineetkathan
 
Autonomic nervous system Physiology
Autonomic nervous system PhysiologyAutonomic nervous system Physiology
Autonomic nervous system PhysiologyRaghu Veer
 

Viewers also liked (20)

What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Optimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum SensingOptimizing the Number of Samples for Multi-Channel Spectrum Sensing
Optimizing the Number of Samples for Multi-Channel Spectrum Sensing
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum Workshop
 
CHOKI
CHOKICHOKI
CHOKI
 
Dwdm good
Dwdm goodDwdm good
Dwdm good
 
Dwdm
DwdmDwdm
Dwdm
 
Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...
Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...
Radio Technologies for 5G using an Advanced Photonic Infrastructure for Dense...
 
Optical Networking & DWDM
Optical Networking & DWDMOptical Networking & DWDM
Optical Networking & DWDM
 
Optical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifiersOptical power debugging in dwdm system having fixed gain amplifiers
Optical power debugging in dwdm system having fixed gain amplifiers
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 ppt
 
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
 DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING) DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
DWDM( DENSE WAVELENTH DIVISON MULTIPLEXING)
 
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
DWDM & Packet Optical Fundamentals by Dion Leung [APRICOT 2015]
 
CWDM vs DWDM Technology
CWDM vs DWDM TechnologyCWDM vs DWDM Technology
CWDM vs DWDM Technology
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
DWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access SystemsDWDM Fiber-Wireless Access Systems
DWDM Fiber-Wireless Access Systems
 
Cognitiveradio
CognitiveradioCognitiveradio
Cognitiveradio
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 
Autonomic nervous system Physiology
Autonomic nervous system PhysiologyAutonomic nervous system Physiology
Autonomic nervous system Physiology
 

Similar to Multi Channel Protocols In Cognitive Radio Networks

Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksDecentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksIffat Anjum
 
Low power MAC for wireless sensor network
Low power MAC for wireless sensor networkLow power MAC for wireless sensor network
Low power MAC for wireless sensor networkAttia Chaudhry
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdfAbyThomas54
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
Cognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSimCognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSimSANJAY ANAND
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016ijcsbi
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...VLSICS Design
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxNoraNjepuome3
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
 

Similar to Multi Channel Protocols In Cognitive Radio Networks (20)

Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksDecentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
 
Low power MAC for wireless sensor network
Low power MAC for wireless sensor networkLow power MAC for wireless sensor network
Low power MAC for wireless sensor network
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Cognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSimCognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSim
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
Final prentation M.TECH ( PPT )
Final prentation  M.TECH ( PPT )Final prentation  M.TECH ( PPT )
Final prentation M.TECH ( PPT )
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
 
Ea34772776
Ea34772776Ea34772776
Ea34772776
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptx
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 

Multi Channel Protocols In Cognitive Radio Networks

  • 1. Multi-Channel MAC Protocols in Cognitive Radio Networks Prepared by: Mohammad J. Abdelhadi Muhammad K. Mustafa King Abdullah II School of Electrical Engineering Princess Sumaya University for Technology
  • 2. Outline Multi-channel MAC Multi-channel MAC Approaches What is Cognitive Radio(CR)? Overview of some Cognitive multi-channel MAC protocols. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 1
  • 3. Multi-channel MAC  Multi-channel means that there are more than one channel available for communication in a system.  Why Multi-channel MAC? • Reducing collusion among users • Higher throughput • Less normalized propagation delay King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 2
  • 4. Multi-channel MAC King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 3
  • 5. Multi-channel MAC Approaches  There are three main approaches for Multi-channel MAC • Common Control Channel Approach(CCC). • Split Phase Approach(SP). • Common Hopping Approach(CH). King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 4
  • 6. Common Control Channel Approach  The CCC approach applies a single dedicated common control channel.  Usually uses more than one transceiver, one of them is tuned to the common control channel at all time.  Advantages: • Solves the hidden terminal problem( when using more than one transceiver). • Doesn't require time synchronization.  Disadvantages: • Congestion can occur. • Energy inefficient • Bandwidth inefficient. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 5
  • 7. Common Control Channel Approach King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 6
  • 8. Split phase Approach  It splits all channels into two phases: • Control phase • Data phase.  During a control phase, all nodes tune to a common control channel.  During the data phase, nodes tune to negotiated channels for data transmission.  Advantages: • Uses Only one transceiver • Does not allow the hidden terminal problem • Energy Efficient  Disadvantages: • Precise time Synchronization is required • Data Channels are wasted during the control phase • Data Channel negotiation is only during the control phase King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 7
  • 9. Split phase Approach King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 8
  • 10. Common Hopping Approach  Every node hops through all available channels following a common hopping pattern.  After sending the control packets and agree to send data, a node pair stop hopping until the transmission is completed.  Advantages: • Using only one transceiver • No common Control channel • Data channel negotiation is performed simultaneously on different channels.  Disadvantages: • The hidden terminal problem • There is a high Channel switching delay • Time Synchronization King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 9
  • 11. Common Hopping Approach King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 10
  • 12. Default Hopping Sequence Approach  Every node determines its default hopping pattern using the seed of a pseudo random generator which is known by all nodes.  same communication procedure that used in CH but with a scheduled sequence.  Same advantages and disadvantages of CH. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 11
  • 13. What is Cognitive Radio  The main aim behind CR is to utilize the unused spectrum at a given time and place, thereby creating virtual unlicensed band.  Two kinds of users in CR networks; primary users(PU) and secondary users(SU).  A great principle of CR is the using of the spectrum from SU must not affect the communication of PU.  Once the PU returns to a channel, the communication of the SU in that channel must stop immediately.  SUs can exchange spectrum information with each other. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 13
  • 14. FCC: In most places, Over 70% of the allocated spectrum is not used ! King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 14
  • 15. Cognitive MAC protocols and its Fundamentals  Cognitive MAC protocols allow unlicensed users to share the licensed spectrum.  The presence of PU distinguishes cognitive MAC protocols from other multi-channel MAC protocols.  Sensing and distribution of channels is a major concern in CR MAC protocols.  Each Cognitive MAC protocol may use more than one approach of multi-channel MAC approaches.  Cognitive MAC protocols are in its infancy. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 15
  • 16. Some Cognitive MAC protocols  Hang Su and Xi Zhang's MAC Protocol.  HC-MAC protocol.  Noun Choi et al protocol. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 16
  • 17. Hang Su and Xi Zhang's MAC Protocol.  This protocol assumes that each SU is equipped with two transceivers  One is for a dedicated control channel and the other is for a data channel.  In the control channel the time is divided into time slots and each slot contains two phases; reporting phase and negotiation phase.  When a node wants to transmit data, it first senses the channels and reports the channel state.  If one channel is idle, it negotiates with the destination over the control channel on which channel to be used.  Two sensing policies are used: • Random Sensing Policy(RSP) • Negotiation-based sensing policy (NSP) King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 17
  • 18. Hang Su and Xi Zhang's MAC Protocol. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 18
  • 19. HC-MAC protocol  Assumes that a control channel is available for secondary users at any time.  Each SU is equipped with single transceiver.  Time frame is divided into three time slots, each with three phases; contention phase, sensing phase, and transmission phase.  In contention phase, secondary users content the spectrum and reserve channels.  In sensing phase, they conduct sensing in each channel.  In transmission phase, secondary user will transmit data in channels sensed ideal. Contention Sensing Transmission Phase Phase Phase King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 19
  • 20. HC-MAC protocol King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 20
  • 21. Noun Choi et al MAC Protocol  This protocol assumes that there are two transceivers at least for each node.  One is used for transmitting data while the other is used for receiving data.  Each node chooses an available channel and keep it as its Home Channel (HCh) which its information are broadcasted into a common control channel to its neighbors.  If a node wants to transmit data to another one, it has to tune its transmitting radio to the HCh of the destination node.  Another HCh is selected in the following cases: o PU returns to use the same channel. o Any disagrees with the node's HCh. o The selected HCh is noisy. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 21
  • 22. Noun Choi et al MAC Protocol King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 22
  • 23. A comparison between some Cognitive Radio MAC protocols King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 23
  • 24. Summary  The use of Multi-channel facilitates and improves many communication systems.  Multi-channel MAC protocols have many categories and ways to be established.  Cognitive Radio is a new idea aims to utilize the maximum bandwidth available.  Cognitive Radio MAC protocols are based on Multi-channel MAC protocols with a lot of concern in channel sensing and distribution. King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology 24
  • 25. THANK YOU King Abdullah II School of Electrical Engineering - Princess Sumaya University for Technology