Distance-And Traffic-Aware Channel Assignment in Cognitive Radio Networks
Distance-And Traffic-Aware Channel Assignment in Cognitive Radio Networks
Distance-And Traffic-Aware Channel Assignment in Cognitive Radio Networks
_
log
c
2
D
n2
f
2
d
n
, f s.t. D max
_
c
f
,
2D
2
f
c
_
log
c
n
f
n
d
n
, f s.t.
c
f
max
_
D,
2D
2
f
c
_
log
c
4n
(2D
2
)
n2
f
4n
d
n
, f s.t.
2D
2
f
c
max
_
D,
c
f
_
(5)
where
def
=
G
t
(f)G
r
(f)
(4)
2
. (6)
Note that the dependence of the path loss on d (i.e.,
1
d
n
) is the
same, irrespective of the carrier frequency.
Figure 4 depicts the path loss for a wide range of carrier
frequencies and two values of n at a distance d = 1 meter.
This gure and equation (5) reveal that the signal attenuation
increases as the distance between two communicating users in-
creases, and as the frequency used for communication increases.
These observations provide the motivation for our distance-
dependant channel assignment, discussed in section V.
0 1 2 3 4 5 6
x 10
9
20
30
40
50
60
70
f (Hz)
P
a
t
h
L
o
s
s
(
d
B
)
n = 4
n = 2
Fig. 4. Path loss vs. carrier frequency for two path loss exponents (D = 5
cm, Gt(f) = Gr(f) = 1).
IV. FORMULATION OF OPTIMAL CHANNEL ASSIGNMENT
Our objective is to maximize the number of simultaneous CR
transmissions, and consequently the overall network through-
put, by the means of optimal channel assignment. Toward
this end, we dene the term local spectrum utilization as
the total number of simultaneous CR transmissions that can
be supported in a given (one-hop) locality while meeting a
predened power mask. Before formulating the problem, we
discuss the requirements of a successful CR transmission.
A. CRN Transmission Requirements
Within a given neighborhood, multiple CR users may con-
tend for access to one or more of the available channels. Let
^ and denote the set of all N channels, and the set of all
CR transmission requests in the local neighborhood at a given
time, respectively. We say the jth CR transmission (j ) is
successful if both of the following two conditions are met:
It is possible to nd m
j
available channels from the set
^ such that
mj
i=1
r
(i)
j
R
j
, where r
(i)
j
is the data rate
of the ith selected channel and R
j
is the total rate demand
for the jth CR transmission.
Let /
j
be the set of m
j
selected channels. Then, the
received SINR of every i /
j
(SINR
(i)
j
) must be greater
than the SINR threshold (
i
) that is required at the CR
receiver to achieve a target bit error rate over channel i.
B. Maximizing the Local Spectrum Utilization
Let
(i)
j
be a binary variable denoting whether or not channel
i is assigned for transmission j. Formally,
(i)
j
=
_
1, if channel i is assigned for transmission j
0, Otherwise.
(7)
Similar to [10], [25], the problem of maximizing the total
number of simultaneous CR transmissions in a given neighbor-
hood can be formally stated as follows:
max
(i)
j
{0,1}
jJ
1
_
iN
(i)
j
r
(i)
j
R
j
_
(8)
jJ
(i)
j
1, i ^ (9)
iN
(i)
j
n
t
, j (10)
SINR
(i)
j
i
, j , s.t.
(i)
j
= 1 (11)
where 1[.] is the indicator function. The constraint in (9)
ensures that a channel cannot be assigned to more than one CR
transmission in the same vicinity. The constraint in (10) ensures
that at most n
t
channels can be assigned to a CR transmission.
For an ad hoc CRN, the above optimization problem must
run in a distributed manner at each CR user in the network.
This implies that each CR user must exchange instantaneous
SINR and rate demand information with neighboring CR users
before selecting channels, which incurs high control overhead
and delay (i.e., information may not be up-to-date). Worse yet,
even with perfect knowledge of the SINR of each link and
the rate demands, the above ILP problem belongs to the class
of NP-hard problems [9]. In our paper, we develop a heuristic
channel assignment scheme that provides a suboptimal solution
with lower complexity while still achieving good spectrum
utilization.
Our heuristic exploits distance and trafc awareness. The key
idea behind it is to assign channels with low SINR to short-
distance transmissions. Also, local trafc information is used
to assign more channels to more likely transmission distances.
V. DISTANCE-DEPENDENT CHANNEL ASSIGNMENT
ALGORITHM
In this section, we describe our proposed channel assignment
mechanism. The assignment process identies a preferable
channel list for each CR user. Such a list indicates which
channels are preferable to use depending on the estimated
distance between the transmitter and the receiver. Two variants
of the channel assignment mechanism are proposed. The rst
variant is suitable for static networks with known trafc pat-
terns, whereas the second one is for dynamic (mobile) networks
with unknown trafc patterns.
A. Assignment for a Static CRN with Known Trafc Patterns
Given s CR user with a packet to transmit, let r be the
distance to the intended receiver; r r
c
, where r
c
is the
maximum transmission range
3
. Let F
R
(r)
def
= PrR r. The
3
This is the largest distance from a CR transmitter over which the transmis-
sion at maximum power can be correctly decoded over all selected channels
in the absence of interference from other terminals (CR or PR users).
13
functional form of F
R
depends on both the distribution of users
as well as the trafc prole, which we now assume to be given.
Given F
R
, the channel assignment process is conducted as
follows:
The available bands are divided according to their mea-
sured SINR (given in (1))
4
into M sets S
1
, S
2
, . . . , S
M
,
where each band consists of multiple channels. The set S
1
contains the frequency channels of the band that has the
highest SINR, S
2
contains the next highest SINR, and so
on.
A CR user, say A, divides its maximum transmis-
sion region R
c
def
= r
2
c
into M non-overlapping rings
R
1
, . . . , R
M
. The ith ring contains the CR users whose
distances to A fall in (r
i1
, r
i
], where i = 1, . . . , M and
0 = r
0
r
1
r
2
. . . r
M
= r
c
. The rings are
divided such that the probability of communicating with
a CR receiver that falls within any of the M rings is the
same, i.e.,
F
R
(r
i
) F
R
(r
i1
) =
1
M
, i = 1, . . . , M. (12)
User A computes the radii r
i
, i = 1, . . . M, by substituting
for F
R
(r
i
) in (12) and solving for r
i
.
Finally, A constructs a preferable channel list for each
ring by assigning channels with lower SINR to shorter
transmission distances and channels with higher SINR
to longer transmission distances, i.e., assign S
M
to R
1
,
S
M1
to R
2
, . . ., and S
1
to R
M
.
To illustrate the idea, we consider a uniformly distributed
CRN. We assume that a CR transmitter chooses a destination
for its data randomly within R
c
. Therefore, F
R
(r) is given by:
F
R
(r) =
_
r
2
r
2
c
, r r
c
1, r r
c
. (13)
Using (12) and (13), and noting that r
0
= 0, we arrive at the
following expression for r
i
:
r
i
=
_
1
M
+
r
2
i1
r
2
c
_
r
c
=
_
i
M
r
c
. (14)
Figure 5 illustrates the non-overlapping rings around a CR
transmitter for M = 4. Within these rings, other CR and PR
users exist.
Fig. 5. Different rings for assigning channels around a CR transmitter (M =
4).
4
Note that P
L
s dependence on d is the same for all bands. Thus, for the
purpose of SINR comparison, we set d = 1 meter.
B. Assignment for a Dynamic CRN with Unknown Trafc
Patterns
In the previous analysis, we assumed a xed network and
prior knowledge of the trafc pattern (i.e., the form of F
R
). In
practice, the trafc pattern may change with time, depending
on the network dynamics and user mobility. Because users
can only possess local knowledge of their neighborhoods, it is
hard to reach and maintain the optimal network performance.
Nevertheless, we can develop a stochastic learning algorithm
that performs well with only localized information. Stochastic
learning techniques have been widely used in wireless networks
for online trafc prediction, tracking, and power control [26],
[27]. Our proposed learning approach is a distributed algorithm
that runs at each CR user in the network. A CR user, say A,
evenly divides its maximum transmission region R
c
into mnon-
overlapping regions, where m M. The ith region, D
i
, forms
a ring, dened by the area (x, y) : d
2
i1
< x
2
+ y
2
d
2
i
,
where d
i
= i
rc
m
, and d
i1
< d
i
i = 1, . . . , m. CR user
A maintains an m-entry transmission distance table. The ith
entry in that table corresponds to the region D
i
. It contains
the number of overheard CR packet requests during the recent
observation window T
win
for which the transmitter-receiver
distances fall in the range(d
i1
, d
i
]. Note that the proper setting
of T
win
depends on the dynamics of the network (the effect of
T
win
is studied in Section VII).
Fig. 6. Time diagram of pmfs updating process.
To initialize the assignment algorithm, all CR users employ
the BMC scheme discussed in Section I. At any time t, CR
user A constructs its transmission distance table based on
control packets that have been overheard during the observation
window [t T
win
, t]. Using the transmission distance table,
A estimates the current probability mass function p
i
(t) of
the distance r at time t (see Figure 6). It then computes an
exponentially weighted average of p
i
(t) :
p
i
(t) = p
i
(t) + (1 ) p
i
(t T
win
) (15)
where is a forgetting factor, 0 < 1. Once p
i
(t) is
computed, A computes the preferable channel list for each ring.
Let
i
(A) denote the preferable channel list for ring D
i
at CR
user A (how to construct
i
(A) will be given later). The new
preferable channel lists will be used during the next observation
window time. The proposed channel assignment process merges
the D
i
s into K regions according to p
i
(t), where K M. It
then assigns preferable channels for each region. The process
is now described in detail:
1) User A chooses k such that [
k1
i=0
p
i
(t)
m
i=k
p
i
(t)[
is minimized, i.e., it divides the regions into two groups;
short-distance and long-distance groups. The probabilities
of the short-distance and long-distance groups are given
14
by:
P
short
=
k1
i=0
p
i
(t) (16)
and
P
long
=
m
i=k
p
i
(t). (17)
2) User A divides the M bands into two frequency sets:
low SINR frequency set and high SINR frequency set. It
assigns the low SINR frequency set to the short-distance
group and the high SINR frequency set to the long-
distance group. The numbers of bands in the high (n
H
)
and low (n
L
) frequency sets depend on P
short
and P
long
as follows:
n
H
=
_
P
short
P
short
+P
long
M
_
n
L
= M n
H
(18)
where x| is the smallest integer x.
3) Step 1 and 2 are repeated for every group until either
only one band is assigned to that group or the group
contains only one region. Note that when repeating the
above process for a group, m in (17) and M in (18) are
replaced with the number of regions in that group and the
number of channels assigned to that group, respectively.
By this recursive procedure, the preferable channel list
i
(A), for all i, is computed for one observation window.
C. Example
We illustrate the previously discussed channel assignment
process via a simple example. Consider four PRNs and one
CRN. Each PRN occupies two adjacent non-overlapping chan-
nels. The PRNs are labeled such that f
1
< f
2
< f
3
< f
4
.
Consider a CR user A with SINR
(1)
> SINR
(2)
> SINR
(3)
>
SINR
(4)
. Suppose that A divides its transmission region R
c
into 8 rings, D
1
, D
2
, . . . , D
8
. At a given time t, assume that
the weighted average pmf p
i
(t) : i = 1, . . . , 8 is given
by 0.25, 0.1, 0.15, 0.05, 0.05, 0.15, 0.05, 0.2. Figure 7 shows
how the proposed channel assignment process is conducted.
The outcome of this process is as follows:
Band 4, which includes two channels, is assigned to all CR
transmissions whose distances are in D
1
(i.e.,
1
(A) =
4).
Band 3, which includes two channels, is assigned to all
CR transmissions whose distances are in D
2
and D
3
(i.e.,
2
(A) =
3
(A) = 3).
Band 2, which includes two channels, is assigned to all
CR transmissions whose distances are in D
4
, D
5
, and D
6
(i.e.,
4
(A) =
5
(A) =
6
(A) = 2).
Band 1, which includes two channels, is assigned to all
CR transmissions whose distances are in D
7
and D
8
(i.e.,
7
(A) =
8
(A) = 1).
VI. DDMAC PROTOCOL
Based on the channel assignment process presented in Sec-
tion V, we now propose a distributed, asynchronous MAC
protocol for CRNs. The proposed DDMAC uses contention-
based handshaking for exchanging control information. We rst
state our main assumptions. Then, we describe our protocol in
detail.
D
i
1 0.25
2 0.1
3 0.15
4 0.05
5 0.05
6 0.15
7 0.05
8 0.2
0.5
0.5
0.25 {f4, f3}
{f4}
{f3}
0.25
{f2, f1}
0.25
0.25
{f2}
{f1}
i
p
~
Fig. 7. Example that illustrates the channel assignment process in a dynamic
CRN.
A. Assumptions
For each frequency channel, we assume that the channel
gain is stationary for the duration of a few control and one
data packet transmission periods. This assumption holds for
typical mobility patterns and transmission rates [28]. We as-
sume symmetric channel gains between two CR users. This is
a typical assumption in any RTS/CTS-based protocol, including
the IEEE 802.11 scheme. We also assume that a CR user
transmits data to other CR users at a xed rate using the
maximum allowable power vector (
P
mask
). Finally, we assume
the availability of a prespecied control channel with Fourier
bandwidth B
c
, where B
c
B. This channel need not to
be reserved for the CRN. It can, for example, be one of the
subchannels in an ISM band.
B. Channel Access Mechanism
The purpose of the channel access mechanism is to allow
the CR transmitter and receiver to agree on the set of channels
to use for communication and to determine the rate allocation
across these selected channels in a manner that ensures that
the power mask and the rate demand are met. A CR user A
views its transmission region as K non-overlapping regions,
where each region is associated with a preferable channel list
i
(A), i = 1, . . . , K, determined according to the discussion
in Section V. This user maintains an N-entry channel list and
an m-entry transmission distance table (as described in Section
V). The jth entry of the channel list indicates the status of the
jth channel. It maintains a value of 1 if the channel is available
and 0 if the channel is occupied or reserved by any of As CR
neighbors. Every CR user listens to the control channel, and
accordingly updates its channel list and transmission distance
table.
Suppose that CR user A has data to transmit to another CR
user B at a constant aggregate rate demand R
A
, which corre-
sponds to the aggregate rate for the A B communication
over all selected channels. Then, A reacts as follows:
If user A does not sense a carrier over the control channel
for a random duration of time, it sends an RTS message
at the maximum (known) power P
max
. This P
max
is con-
strained by the power mask imposed on the prespecied
control channel. The RTS includes R
A
and the list of all
available channels at A. The RTS message is sent even
if As channel list contains no free channels. In this case,
the purpose of the RTS is to help CR users predict the
network trafc pattern.
15
The neighbors of A other than B that can correctly decode
the RTS refrain from accessing the control channel until
they receive one of two possible control packets, denoted
by EPCA and ENCA (explained below).
Upon receiving the RTS packet, B uses the received signal
strength of the RTS to estimate the distance between
A and B (d
AB
). It identies the preferable channel list
i
(B) that corresponds to d
AB
. Based on the available
channels at A and B, and the instantaneous interference
level over these channels as measured at B, user B
removes any channel that has a received SINR less than
its threshold SINR and determines the common channel
list that is potentially available for A B transmis-
sion, denoted by CCL(A, B). User B then computes the
intersection between
i
(B) and CCL(A, B) to identify
the preferable set of available channels for the A B
communication ((A, B)). To achieve good throughput,
B sorts the channels in (A, B) in a descending order
of their maximum possible data rate (calculated accord-
ing to the Shannons formula) and then appends the
rest of the common available channels that are not in
(A, B)
_
i.e., CCL(A, B)
(A, B)
_
, also listed in a
descending order of their maximum possible data rate,
to the bottom of the sorted preferable channels.
5
Then,
B cummulatively adds channels from the top of the new
sorted list until either the aggregate rate R
A
is satised or
the list is exhausted (i.e., no feasible channel assignment
can be found).
User B determines whether or not there exists a feasible
set of channels that can support the aggregate rate R
A
.
If not, then B responds by sending a Negative-Channel-
Assignment (NCA) message that includes the distance
d
AB
. The purpose of this packet is to help Bs neighbors
estimate the network trafc pattern and prompt A to back
off and retransmit later. If B can nd a set of available
channels that can support a total demand R
A
, it sends a
Positive-Channel-Assignment (PCA) message to A, which
contains the assigned channels for the transmission A
B, the distance d
AB
, and the duration needed to hold the
assigned channels for the ensuing data transmission and
corresponding ACK packet. The PCA implicitly instructs
Bs CR neighbors to mark the set of assigned channels
as unavailable for the indicated transmission duration. It
also helps these neighbors in estimating the network trafc
pattern.
Depending on which control message is received, user A
reacts as follows:
If A receives an NCA message, it responds by sending
an Echo-NCA (ENCA) message, which includes the
distance d
AB
. The purpose of this packet is to help
As neighbors estimate the network trafc pattern.
If A receives a PCA message, it replies back with an
Echo-PCA (EPCA) message, informing its neighbors
of the selected channel list, the distance d
AB
, and the
transmission duration. This EPCA also announces the
success of the control packet exchange between A and
B to As neighbors, which may not have heard Bs
PCA.
Once the RTS/PCA/EPCA exchange is completed, the data
5
As demonstrated in [6], [7], minimizing the number of assigned channels
results in the best throughput performance.
transmission A B proceeds. Once completed, B sends
back an ACK packet to A over the best assigned channel
that has the highest rate.
It is worth mentioning that there is no interference between
data and control packet transmissions because the two are
separated in frequency. Therefore, a CR user that hears the
RTS packet from A defers its attempt to access the control
channel until it receives an EPCA or an ENCA packet from
A. In addition, a CR user that receives only a PCA or an
NCA should defer its attempt to access the control channel
until the expected time for the EPCA/ENCA packet expires
(to avoid collision of control packets). This allows for more
parallel transmissions to take place in the same neighborhood.
VII. PROTOCOL EVALUATION
We now evaluate the performance of the DDMAC protocol
and contrast it with the BMC approach. Our results are based
on simulation experiments conducted using CSIM programs
(CSIM is a C-based process-oriented discrete-event simulation
package [29]). For simplicity, data packets are assumed to be
of a xed size (2 Kbytes). Since the maximum transmission
ranges under the DDMAC and BMC protocols are the same, it
is safe to assume that both protocols achieve the same forward
progress per hop. Consequently, our performance metrics are
the one-hop throughput, i.e., the packet destination is restricted
to one hop from the source, and the connection blocking rate.
The latter metric is dened as the percentage of CR packet
requests that are blocked due to the unavailability of a feasible
channel assignment. The signal propagation model in (4) is
used with n = 4 and G
t
(f) = G
r
(f) = 1 for every carrier
frequency f.
A. Simulation Setup
We consider four PRNs and one CRN. Users in each PRN
are uniformly distributed over a 500 500 meters
2
area. The
PRNs operate in the 600 MHz, 900 MHz, 2.4 GHz, and 5.7
GHz bands, respectively. Each PRN band consists of three non-
overlapping 1-MHz channels. The number of PR users in each
PRN is 300. We divide the time into slots, each of length 3.3
ms. A time slot corresponds to the transmission of one CR
packet at a xed data rate (5 Mbps). In any given slot, each
PR user in the ith PRN attempts to transmit over its own band
with probability
i
. The probabilities for the four PRNs are
0.5, 0.3, 0.3, 0.1, respectively. The transmission power for each
PR user is 0.5 Watt, and the antenna length (D) is 5 cm.
For the CRN, we consider a random-grid topology, where
225 mobile CR users are placed within the 500 500 meters
2
eld. The eld is split into 225 smaller squares, one for each
CR user. The location of a mobile user within the small square
is selected randomly. For each generated packet, the destination
is selected randomly from the one-hop neighbors. Each CR user
generates packets according to a Poisson process with rate
(same for all users) and requires an aggregate transmission rate
of 5 Mbps. The random waypoint model is used for mobility,
with the speed of a CR user uniformly distributed between
0 and 2 meters/sec. We set the CRN SINR threshold to 5
dB and the thermal noise to P
(i)
th
= 10
21
Watt/Hz for all
channels. We assume that a CR user can use up to three
data channels simultaneously. We set the interference mask to
P
(1)
mask
= P
(2)
mask
= . . . = P
(12)
mask
= 50 mW, which results in a
maximum transmission range of r
c
= 75 meters. The reported
results are the average of 100 experiments.
16
0 0.1 0.2 0.3 0.4 0.5
0.3
0.35
0.4
0.45
Packet genaration rate
B
l
o
c
k
i
n
g
r
a
t
e
(
%
)
BMC
DDMAC
(a) Blocking rate vs. .
0 0.1 0.2 0.3 0.4 0.5
0
5
10
15
20
25
30
35
40
Packet generation rate
S
i
n
g
l
e
h
o
p
t
h
r
o
u
g
p
u
t
(
P
a
c
k
e
t
/
t
i
m
e
s
l
o
t
)
=0.6
BMC
DDMAC
(b) Throughput vs. .
0 0.1 0.2 0.3 0.4 0.5
0
0.02
0.04
0.06
0.08
0.1
0.12
Packet generation rate
S
i
n
g
l
e
h
o
p
t
h
r
o
u
g
h
p
u
t
(
p
a
c
k
e
t
/
t
i
m
e
s
l
o
t
)
BMC
DDMAC
(c) Per-user single-hop throughput.
Fig. 8. Performance of a CRN.
B. Results
We rst compare the performance of DDMAC to that of the
BMC scheme. We set the forgetting factor to = 0.6, the
observation window to T
win
= 0.5 second, and the number
of rings around a CR user to m = 12. For a fair comparison,
we let both schemes use the maximum allowable power vector
P
mask
. Figures 8(a) and (b) show that under moderate and
high trafc loads, DDMAC signicantly reduces the connection
blocking rate and improves the overall one-hop throughput by
up to 30%. This improvement is attributed to the increase in
the number of simultaneous transmissions due to the proper
channel assignment algorithm. Note that under low trafc load,
a minor reduction in the throughput of DDMAC may occur
compared with BMC. This is mostly attributed to the larger
control overhead of DDMAC.
In Figure 8(c), we focus on the performance of one CR user
under DDMAC (other CR users depicted similar behaviors).
This gure shows that, although DDMAC requires a pair of CR
users to communicate over a set of channels that may not be
optimal from one users perspective, the per-user throughput
of DDMAC under moderate and high trafc loads is greater
than that of the BMC scheme. This is attributed to the fact
that DDMAC attempts to serve a given CR transmission rst
using the preferable channel list and preserves the better
channels for other transmissions. However, if the aggregate rate
of this transmission cannot be satised using the preferable
list, DDMAC attempts to serve this transmission using the
remaining available channels.
The effect of dividing the CR users transmission range is de-
picted in Figure 9(a) for different values of . As m increases,
the throughput also increases up to a certain point. For m 12,
no signicant improvement is observed in the CRN throughput.
This is because our proposed channel assignment merges the
m regions into K m regions. Thus, increasing m beyond a
certain value (over-dividing R
c
) becomes unnecessary.
In Figure 9(b), we study the impact of and T
win
on the
performance of DDMAC. We set = 0.3 packet/slot. The
throughput versus for different values of T
win
is shown in
the gure. It is clear the throughput depends on the choice
of and T
win
. As T
win
increases, should increase to give
much more importance to recent observations without entirely
discarding older observations. Table I shows the best throughput
performance and the associated optimal value of (
) for
Scheme
Best throughput(packet/slot)
BMC - 25
DDMAC(Twin = 0.03 s) 0.1 26
DDMAC(Twin = 0.3 s) 0.6 33.6
DDMAC(Twin = 0.4 s) 0.6 33.85
DDMAC(Twin = 1 s) 0.8 33.89
DDMAC(Twin = 4 s) 1.0 28
TABLE I
PERFORMANCE OF DDMAC AT THE OPTIMAL AS A FUNCTION OF T
win
.
different values of T
win
. It is clear that if T
win
is too small or
too large, the throughput reduces signicantly.
5 10 15
20
25
30
35
40
m
S
i
n
g
l
e
h
o
p
t
h
r
o
u
h
p
u
t
(
P
a
c
k
e
t
/
t
i
m
e
s
l
o
t
)
= 0.2
= 0.25
= 0.3
(a) Throughput vs. number of rings
(m) around a CR user.
0.2 0.4 0.6 0.8 1
22
24
26
28
30
32
34
36
38
Forgitting factor
S
i
n
g
l
e
h
o
p
t
h
r
o
u
p
u
t
(
P
a
c
k
e
t
/
t
i
m
e
s
l
o
t
)
T
win
= 0.03 s
T
win
= 0.3 s
T
win
= 0.4 s
T
win
= 1 s
=0.3
(b) Throughput vs. for different
T
win
values.
Fig. 9. Performance of DDMAC.
Finally, we investigate the robustness of DDMAC to inac-
curate distance estimation, which mainly results from multi-
path propagation, reection, and fading effects. We introduce
uniform estimation errors ( Uniform[, ]) into the dis-
tance d. Thus, the estimated distance
d is given by
d
(1 +) d. Figure 10(a) shows the effect of inaccurate distance
estimation on the perceived throughput as a function of under
different trafc loads. As the gure indicates, there are no
signicant difference in the throughput for different values of .
17
0.05 0.1 0.15 0.2 0.25
0
5
10
15
20
25
30
35
40
S
i
n
g
l
e
h
o
p
t
h
r
o
u
g
h
p
u
t
(
P
a
c
k
e
t
/
t
i
m
e
s
l
o
t
)
Low load
Moderate load
High load
(a) Throughput vs. .
0 0.1 0.2 0.3 0.4 0.5
0
1
2
3
4
5
6
Packet generation rate
A
b
s
o
l
u
t
e
p
e
r
c
e
n
t
a
g
e
e
r
r
o
r
= 5%
= 15%
= 25%
(b) Relative error vs. .
Fig. 10. Impact of inaccurately estimating d on performance.
Furthermore, Figure 10(b) shows that the maximum throughput
reduction due to inaccurate d is less than 6%.
Our results suggest that the assignment is reasonably robust
against estimation errors. This robustness arises from the fact
that DDMAC does not need accurate distances but only the
rough user distributions and local trafc conditions in order
to dynamically adapt the channel assignment to transmission
distances and prevailing trafc conditions.
VIII. CONCLUSIONS
In this paper, we proposed a novel distance-dependent
MAC protocol for opportunistic CRNs, known as DDMAC.
DDMAC improves the CRN throughput through a proper
channel assignment process. We presented a heuristic stochas-
tic channel assignment scheme that dynamically exploits the
dependence between the frequencys signal attenuation model
and the transmission distance, while considering the prevailing
trafc conditions, to enhance the throughput. The proposed
scheme assigns channels with lower average SINR to shorter
transmission distances. We integrated the proposed channel
assignment process in the design of DDMAC. To the best of
our knowledge, DDMAC is the rst CRN MAC protocol that
utilizes the radio propagation characteristics to improve the
overall network throughput under interference mask constraints.
We compared the performance of DDMAC with an optimum
multi-channel MAC protocol that is designed for typical multi-
channel systems (BMC). We showed that, under moderate and
high trafc loads, DDMAC achieves about 30% increase in
throughput over the BMC scheme. Although DDMAC requires
a pair of CR users to communicate on a channel that may not be
optimal from a users perspective, we showed that the average
per-user throughput of DDMAC under moderate and high trafc
loads is greater than that of the BMC scheme. In summary,
our simulation results showed that DDMAC provides better
spectrum utilization in terms of smaller connection blocking
probability and larger system throughput.
REFERENCES
[1] FCC, spectrum policy task force report, ET docket no. 02-155, Nov.
2002.
[2] A. Nasipuri and S. Das, Multichannel CSMA with signal power-based
channel selection for multihop wireless networks, in Proceedings of
the IEEE Fall Vehicular Technology Conference (VTC), Sept. 2000, pp.
2428.
[3] H. Bany Salameh, T. Shu, and M. Krunz, Adaptive cross-layer MAC
design for improved energy efciency in multi-channel wireless sensor
networks, Ad Hoc Network, vol. 5, no. 6, pp. 844854, 2007.
[4] N. Jain, S. Das, and A. Nasipuri, A multichannel CSMA MAC protocol
with receiver-based channel selection for multihop wireless networks,
in Proceedings of the 9th Int. Conf. on Computer Communications and
Networks (IC3N), Oct. 2001, pp. 432439.
[5] M. Riback, J. Medbo, J. Berg, F. Harrysson, and H. Asplund, Carrier
frequency effects on path loss, in Proceedings of Vehicular Technology
Conference (VTC), May 2006, pp. 27172721.
[6] I. Akyildiz, W.-Y. Lee, M.C. Vuran, and S. Mohanty, Next generation
dynamic spectrum access cognitive radio wireless networks: A survey,
Computer Networks, vol. 50, no. 13, pp. 21272159, 2006.
[7] T. Shu, S. Cui, and M. Krunz, Medium access control for multi-channel
parallel transmission in cognitive radio networks, in Proceedings of the
IEEE GLOBECOM Conference, Nov. 2006.
[8] A. Nasipuri and S. Das, Performance of multi-channel ad hoc networks,
International Journal of Wireless and Mobile Computing, vol. 1, no. 3/4,
pp. 191203, 2006.
[9] E. Arikan, Some complexity results about packet radio networks, IEEE
Transactions on Information Theory, vol. 30, no. 4, pp. 681685, 1984.
[10] A. Behzad and I. Rubin, Multiple access protocol for power-controlled
wireless access nets, IEEE Transactions on Mobile Computing, vol. 3,
no. 4, pp. 307316, 2004.
[11] Q. Zhao, L. Tong, and A. Swami, Decentralized cognitive MAC
for dynamic spectrum access, in Proceedings of the IEEE DySPAN
Conference, Nov. 2005, pp. 224232.
[12] Y. Xing, R. Chandramouli, S. Mangold, and S. Shankar, Dynamic
spectrum access in open spectrum wireless networks, IEEE Journal
on Selected Areas in Communications, vol. 24, no. 3, pp. 626637, 2006.
[13] Y. Xing, C. Mathur, M. Haleem, R. Chandramouli, and K. Subbalakshmi,
Dynamic spectrum access with QoS and interference temperature con-
straints, IEEE Transactions on Mobile Computing, vol. 6, no. 4, pp.
423433, 2007.
[14] T. C. Clancy, Achievable capacity under the interference temperature
model, in Proceedings of the IEEE INFOCOM Conference, May 2007,
pp. 794802.
[15] R. Menon, R. Buehrer, and J. Reed, Outage probability based compari-
son of underlay and overlay spectrum sharing techniques, in Proceedings
of the IEEE DySPAN Conference, Nov. 2005, pp. 101109.
[16] S. Sankaranarayanan, P. Papadimitratos, A. Mishra, and S. Hershey, A
bandwidth sharing approach to improve licensed spectrum utilization, in
Proceedings of the IEEE DySPAN Conference, Nov. 2005, pp. 279288.
[17] N. Nie and C. Comaniciu, Adaptive channel allocation spectrum etiquette
for cognitive radio networks, in Proceedings of the IEEE DySPAN
Conference, Nov. 2005, pp. 269278.
[18] S. Haykin, Cognitive radio: Brain-empowered wireless communica-
tions, IEEE Journal on Selected Areas in Communications, vol. 23,
no. 2, pp. 201220, 2005.
[19] D. Cabric, S. Mishra, and R. Brodersen, Implementation issues in
spectrum sensing for cognitive radios, in Proceedings of the 38th
Asilomar Conference on Signals, Systems and Computers, Nov. 2004,
pp. 772776.
[20] D. Cabric and R. Brodersen, Physical layer design issues unique to
cognitive radio systems, in Proceedings of the IEEE International
Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC), Sept. 2005, pp. 759763.
[21] A. Sabharwal, A. Khoshnevis, and E. Knightly, Opportunistic spectral
usage: Bounds and a multi-band CSMA/CA protocol, IEEE/ACM
Transactions on Networking, vol. 15, no. 3, pp. 533545, 2007.
[22] Application Note (AN-SR-7), Building a versatile low latency cognitive
radio for multi-mission applications with the ICS-572, Tech. Rep., 2003,
http://www.gefanucembedded.com/news-events/whitepapers/3067.
[23] S. Jones, N. Merheb, and I. Wang, A cognitive MAC protocol using
statistical channel allocation for wireless ad-hoc networks, in Proceed-
ings of Wireless Communications and Networking Conference (WCNC),
March 2007, pp. 105110.
[24] T. S. Rappaport, Wireless Communications-Principles and Practice,
Prentice-Hall Press, 2001, 2nd edition.
[25] A. Hoang and Y. Liang, Maximizing spectrum utilization of cognitive
radio networks using channel allocation and power control, in Proceed-
ings of Vehicular Technology Conference (VTC), Sept. 2006, pp. 15.
[26] S. Kiran and R. Chandramouli, An adaptive energy-efcient link layer
protocol using stochastic learning control, in Proceedings of the IEEE
ICC Conference, May 2003, pp. 11141118.
[27] Y. Chang, T. Ho, and L. Kaelbling, Mobilized ad-hoc networks: A
reinforcement learning approach, in Proceedings of the International
Conference on Autonomic Computing, May 2004, pp. 240247.
[28] A. Muqattash and M. Krunz, POWMAC: A single-channel power control
protocol for throughput enhancement in wireless ad hoc networks, IEEE
Journal on Selected Areas in Communications, vol. 23, no. 5, pp. 1067
1084, May 2005.
[29] Mesquite Software Incorporation, www.mesquite.com.
18