Ad Hoc Networks: Peng Hu, Mohamed Ibnkahla
Ad Hoc Networks: Peng Hu, Mohamed Ibnkahla
Ad Hoc Networks: Peng Hu, Mohamed Ibnkahla
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
a r t i c l e
i n f o
Article history:
Received 28 July 2012
Received in revised form 8 November 2013
Accepted 18 January 2014
Available online 24 January 2014
Keywords:
Mobility
Medium access control
Throughput analysis
Cognitive radio ad hoc networks
a b s t r a c t
Cognitive radio ad hoc networks (CRAHNs) have recently been proposed as a way to bring
cognitive radio (CR) technology to traditional ad hoc networks. An important problem is to
design a medium access control (MAC) protocol that addresses the decentralized control
and local observation for spectrum management. In this paper, we propose a cognitive
MAC protocol with mobility support (CM-MAC) based on carrier sense multiple access/collision avoidance (CSMA/CA) technique, where our protocol can respond to the vicinity state
of CR nodes to primary exclusive regions. This paper analyzes the throughput performance
for the proposed MAC protocol with the consideration of multiple PU activities and CR
nodes. Our analytical results show that the proposed MAC protocol outperforms the
throughput performance of the classical CSMA/CA MAC and statistical channel allocation
(SCA) MAC protocols.
2014 Elsevier B.V. All rights reserved.
1. Introduction
As a result of the development of cognitive radio technology, the concept of cognitive radio ad hoc networks
(CRAHNs) has recently been proposed in the literature
[1], which involve more challenges than those in classical
cognitive radio networks (CRNs). These challenges are
due to variable radio environments caused by spectrumdependent communication links, hop-by-hop transmission, changing topology, and node mobility.
Different from traditional medium access control (MAC)
protocol used in ad hoc networks, the MAC protocol for
CRAHNs has to address the spectrum sharing function [2],
as well as to improve the throughput and spectral efciency.
Furthermore, because the primary exclusive region (PER) [3]
of primary users (PUs) is an important factor that can make a
signicant impact on CR and PU communications, a scheme
addressing the PER should be considered in MAC protocols.
Corresponding author. Tel.: +1 613 533 3074; fax: +1 613 533 6615.
E-mail addresses: peng.hu@queensu.ca (P. Hu), mohamed.ibnkahla@
queensu.ca (M. Ibnkahla).
http://dx.doi.org/10.1016/j.adhoc.2014.01.008
1570-8705/ 2014 Elsevier B.V. All rights reserved.
2. Related work
The objectives of the CRAHN MAC protocol not only include the improvement of channel utilization and throughput without degrading PU communications, but also
include the control of spectrum management modules
such as spectrum access and spectrum sharing functions
to determine the timing for data transmissions [1].
The use of multiple channels for throughput improvement has been addressed in several MAC protocols. A feasible solution for throughput improvement is to nd a set of
good quality channels. A dual-channel MAC protocol
(DUCHA) was proposed in [10] which can improve the
one-hop throughput up to 1.2 times and multi-hop
throughput up to ve times compared to the IEEE 802.11
MAC protocol. An opportunistic multi-radio MAC (OMMAC)
was proposed in [11], where a multi-channel-based packet
scheduling algorithm was employed and packets were sent
on a channel having best spectral efciency (i.e., the channel with the highest bit rate).
In a CRN, the spectrum utilization can be improved if
we choose the appropriate set of channels that meet the
transmission rate requirement. A MAC protocol based on
statistical channel allocation (SCA) was proposed in [4]
which uses a channel aggregation approach to improve
the throughput and dynamic operating range to reduce
the computational complexity. Results of [4] show that
SCA-MAC can use spectrum holes effectively to improve
spectrum efciency while keeping the performance of
coexisting PUs. However, the PER issue was not addressed
explicitly in [4]. In order to meet data rate requirement for
data transmissions, a MAC with a so-called multi-channel
parallel transmission protocol was proposed in [7], where
the minimum number of channels was selected to meet a
certain data rate. The results of [7] show that the proposed
MAC protocol improves spectrum utilization and system
throughput than the results shown in [8], where the
proposed scheme selects a channel by the best signal-to-
115
interference-plus-noise ratio (SINR) value. In [9], an opportunistic auto-rate MAC protocol was used to maximize the
utilization on individual channels.
Spectrum sharing and spectrum access functions are
explicitly addressed in [6], where spectrum access and
spectrum allocation schemes are introduced in the proposed cognitive radio MAC (COMAC) protocol. Specically,
the spectrum utilization is improved by providing enough
channels instead of assigning all the possible channels to a
CR node, so that the other available channels could be reserved for other CR transmissions. In [5], the authors employed a distance-dependent channel assignment scheme
in a proposed distance-dependent MAC (DDMAC).
However, the aforementioned works did not comprehensively consider several important factors. Firstly,
although the spectrum sensing can be simultaneously performed in one shot [12], the sensing time cannot be ignored, as it may be relatively long, which may lead to
end-to-end throughput degradation [13]. Secondly, with
the existence of PER where CR communications tend to
interfere with PU communications, the CR should retain silent when moving into this region if maintaining PU communication is a priority.
Because CRAHN MAC protocols favor distributed solutions, the distributed function like distributed coordination
function (DCF) is a good option for protocol design. In fact,
most of the aforementioned MAC protocols [59,11] are
DCF-based with request-to-send (RTS)/clear-to-send (CTS)
handshaking procedures, which intrinsically solved the hidden terminal problem. Other non-CSMA/CA-based MAC
protocols like multi-channel MAC (MMAC) [14] and cognitive MAC (C-MAC) [15] can also solve the hidden terminal
problem; however, they require a periodic synchronization
which can hardly be applied to large-scale CRAHNs.
116
3.2. Motivation
A MAC protocol needs to decide the availability of spectrum bands for current and future data transmissions.
These spectrum bands can facilitate the upper-layer protocol (e.g., routing protocol) in order to obtain an optimized
path for data transmissions. Moreover, in order to keep a
desirable throughput, a MAC protocol is expected to perform local observation without extra communication efforts. As such, the information exchange based on the
built-in handshaking procedure in a CSMA/CA MAC protocol is a preferred solution.
Traditionally, the MAC sub-layer is at the link layer,
where the link layer is in charge of the communication
between adjacent nodes. Therefore, based on the layered
perspective for the CRAHN protocol stack, maintaining
the communications with adjacent nodes while sharing
the spectrum resources among nodes is a major
challenge.
In order to determine why a CRAHN MAC is important for
data transmissions, we consider an example of a typical data
transmission scenario shown in Fig. 2, where node S tries to
transmit data frames to node E through the path from node
A to D. In the previous time slots, the data was transmitted
on channel 3, which was not occupied by either PU 1 or PU
2. However, channel 3 is now occupied by PU 2, and the link
from node C to D and the link from node D to E are broken.
Therefore, the rest of nodes need to be informed of the spectrum change of node D and E. Due to the nature of changing
PU activity, it is efcient to perform updates of spectrum
changes before each data transmission. Moreover, because
this PU spectrum availability is dependent on the PER region
induced by a PU, PER regions should be considered by a
CRAHN MAC protocol.
{1,2,3,5}
A
S
PU 1
{1,2,4,5}
D
E
PU 2
Fig. 2. An example of the necessity of a CRAHN MAC protocol in a CRAHN. The available spectrum bands for the nodes covered by a PU are shown in
brackets. The links are broken (shown in dashed arrows) when the data transmission from S to E is operated on channel 3.
R e2
R2
117
6
7
EI0 a4 dpP 4
5
2 2
e 2R0 e2
R2 R20
DPU
DCR 6
m
T
m
T
log 1
log 1
PPU
!
2
R20 N0 EI0
PCR
R0 e2 N0 PPU
m
PCR
1 log 1
T
R0 e2 N0
!
3
Fig. 3. The normalized throughput of a PU and CRs versus PCR and R/R0,
when (a) m = 0.3 and (b) m = 0.7.
118
(a)
(b)
Fig. 4. Frame structures of (a) the traditional CSMA/CA-based MAC protocol and (b) the proposed CM-MAC protocol.
119
MPDU
#2-2
A
C
K
MPDU
#2-3
SIFS
A
C
K
A
C
K
Channel k
SIFS
MPDU
#2-1
A
C
K
Channel k+1
SIFS
MPDU
#1-3
SIFS
MPDU
#1-2
A
C
K
SIFS
MPDU
#1-1
SIFS
A
C
K
Channel k+2
(a)
i thCR
(i +1)th CR
Negotiation Stage:
TSS/RSS
SPEC_CHANGE
Transmission Stage:
Transmit data on the
channels
ACK(1)
ACK(2)
ACK(3)
(b)
Fig. 5. An example of channel aggregation in the view of (a) the MAC frame and (b) the sequence diagram.
rate, DCR, on a link between ith CR and (i + 1)th CR. Therefore, the set of channels accessed by a CR on this link is
PjKi;i1 tj
Ki,i+1(t) = Ki(t) \ Ki+1(t) and DCR k1
rk, where r(k)
is the rate supported on channel k. Besides, if we consider
the case where a CR uses all available channels to meet the
rate DCR, the link will have |Ki,i+1(t)| available channels for
data transmissions.
For spectrum sharing, instead of using the central coordination in IEEE 802.22 standard [22], we employ the distributed spectrum information exchange. A main goal in
the proposed CM-MAC is to ensure successful next onehop transmission. Therefore, it is necessary to show the
convergence of spectrum information exchange of the
TSS/RSS procedure.
For example, Fig. 6 illustrates that after the TSS procedure, CR nodes 2, 4, and 6 have the updated spectrum
information of CR node 1; and after RSS procedure, CR
nodes 1, 3, 5, 7 can receive updated spectrum information
from node 6. Although CR nodes 2 and 4 cannot get the updated spectrum information of CR node 6, it is not a problem as CR nodes 2 and 4 are not on the next transmission
link of node 6. The candidate CR nodes for the next transmission are CR nodes 1, 3, 5, and 7. As such, we can see that
the TSS/RSS procedure integrated in RTS/CTS/ACTS handshaking is sufcient and no signicant communication
overhead is required. All neighboring CRs can receive the
spectrum information which assures the successful next
one-hop transmission.
2
7
RTS
CTS
1
4
(a)
ACTS
7
4
4
5
(b)
(c)
Fig. 6. An example of intermediate results of the spectrum sharing procedure after (a) a RTS transmission, (b) a CTS transmission, and (c) an ACTS
transmission. The dotted lines are transmission ranges of CR node 1 and CR node 6.
120
121
EDeg 2ph
R0 er 0
R0 r 0
PKi; i 1jsi; i 1
1 1
10a
r0
erf p log
bth
2 2
2#
10a10dB
!
5
ET MSA P0 T SS P 11 T STOP P 12 T S
CHANGE P 1
T STOP P2 T CTS P3
122
T cr T CTS SIFS D
10
12
T c SIFS D DIFS
13
Pf
CT s
1 P0 r T c rf0 T s T c f 1C
P0 T MSA
14
T 0data T data u
1u
jKi;i1 tj
15
P s P tr EP
P re kT s
1 P 0 1 Ptr r P tr P s T s Ptr 1 P s T c 1P
P 0 T MSA
re k
11
where Ts is the time length of a successful data transmission, Tc is the time length that a channel is busy because
123
Value
Parameter
Value
8184 bits
272 bits
128 bits
160bits + PHY header
112 bits + PHY header
112 bits + PHY header
20 ls
120 ls
50 ls
1 Mbps
112 bits + PHY header
1 ls
6
100 mW
100 dBm
20 ls
20 ls
50 ls
50 dB
4
1000
0.02
0.7
=0.0015
CM-MAC
CSMA/CA RTS/CTS MAC
SCA-MAC
=0.001 =0.002
=0.003 =0.004
0.25
0.5
0.2
Throughput
Throughput
N=50
N=20
N=10
0.4
0.3
0.15
0.1
0.2
0.05
0.1
0
0
10
20
30
40
50
60
70
80
90
0.5
100
Number of CRs
(a)
0.18
0.16
CM-MAC
CSMA/CA RTS/CTS MAC
SCA-MAC
0.35
=0.0015
0.3
0.1
Throughput
Throughput
=0.002, =0.0015
0.12
0.08
0.06
1.5
x 10-3
=0.002, =0.0001
0.14
N=50
N=10
N=20
0.25
0.2
0.15
0.04
0.1
0.02
0
20
40
60
80
100
0.05
Number of CRs
(b)
Fig. 9. Theoretical results of CR link throughput in the (a) saturated mode
and (b) non-saturated mode.
0.5
1.5
x 10-3
124
0.7
Pre k 1 1
U CR n
1
1 U CRPU r m 1
17
0.18
K =0
P
K =1
P
K =2
P
K =3
P
K =4
P
K =5
0.5
16
0.2
0.6
0.16
0.14
Throughput
0.4
0.3
KP = 0
KP = 1
KP = 2
KP = 3
KP = 4
KP = 5
0.12
0.1
0.08
0.06
0.2
0.04
0.1
0.02
10
20
30
40
50
60
70
80
90
100
20
40
60
80
Number of CRs
Number of CRs
(b)
(a)
0.2
PU Poisson traffic: =0.002
CR Poisson traffic: '= 0.0015
Mobility probability: P0=0.5
0.18
0.16
0.14
Throughput
Throughput
P0re k P Nt > 0jN0 t > 0 1 ekTs
KP =0
KP =1
KP =2
KP =3
KP =4
KP =5
0.12
0.1
0.08
0.06
0.04
0.02
0
20
40
60
80
100
Number of CRs
(c)
Fig. 12. CR link throughput performance with different values of Kp in the (a) saturated mode, and (b)-(c) non-saturated mode.
100
125
be compared in the same condition. The essential parameters represented in Table 1, for example, are i.e.,
/ 0:03; P 8584 bits, TRTS+CTS+ACTS = 768 ls, Tc = 141 ls,
and TACK = 240 ls.
With the parameter values, we can get T s 1151:03
7938:48
jK
. Then, we can derive (14) as
i;i1 tj
g0
8584
@91f0
f
1
257:6P0 50 1151:037938:48KK
A 1010:03 7938:48
KK P
C=1C
6. Numerical results
18
0.3
0.3
0.25
0.25
0.2
0.2
Throughput
Throughput
P0 =0.0
0.15
P0 =0.1
P0 =0.3
0.1
P0 =0.0
0.15
P0 = 0.1
P0 =0.3
0.1
P0 =0.5
P0 =0.5
P0 =0.7
P0 =0.7
0.05
0.05
20
40
60
80
100
20
40
Number of CRs
60
80
100
Number of CRs
(a)
(b)
PU Poisson traffic: =0.0015
CR Poisson traffic: '= 0.0015
0.3
Throughput
0.25
0.2
P0= 0.0
P0= 0.1
0.15
P0= 0.3
0.1
P0= 0.5
P0= 0.7
0.05
20
40
60
80
100
Number of CRs
(c)
Fig. 13. CR link throughput performance versus P0, where CR trafc is in the (a) saturated mode and (b)-(c) non-saturated mode with PU trafc.
126
successful transmitted frames per frame time. Furthermore, we will compare CM-MAC protocol with the aforementioned special case of CM-MAC protocol.
Fig. 9(a) shows the throughput performance versus the
number of CRs (assumed to be in the saturated mode)
when we take the value KP = 1 for all links. Using Kp = 1
for all nodes is to make the three protocols be compared
in the fair condition. For example, the CSMA/CA RTS/CTS
MAC is the baseline which can support the data communication in one spectrum band. The CR throughput decreases
when the value of k increases. This is because the PU trafc
with increasing k has a high possibility of affecting TSS/RSS
procedures. In this case, the PU becomes more active
which reduces CR access. Moreover, as shown in Fig. 9(a),
with any given value of k and N, the throughput performance of CM-MAC outperforms that of SCA-MAC. The reason for this result is that the delay caused by MSA
algorithm and TSS/RSS procedures in CM-MAC is smaller
than that of SCA-MAC. Furthermore, when the PU trafc
is heavy, CM-MAC can successfully reduce the effect of
the existence of PER regions. Besides, if we consider the
0.12
0.1
0.08
0.06
0.04
0.02
0
10
20
30
40
50
60
Network size
(a)
CM-MAC (Simulation)
CM-MAC (Simulation w/ mobility)
CM-MAC
CSMA/CA RTS/CTS MAC (Simulation)
CSMA/CA RTS/CTS MAC (Simulation w/ mobility)
CSMA/CA RTS/CTS MAC
60
50
40
30
20
10
0
10
20
30
40
50
60
Network size
(b)
Fig. 14. Simulation results. (a) Response time and (b) throughout performance.
7. Conclusions
In this paper, we introduced the CM-MAC protocol, a
MAC protocol for CRAHNs, by mainly considering CR
mobility of CRs and PUs PER regions. We included the
spectrum sensing in the handshaking procedure, and thus
the spectrum information updates on CRs are highly
dependent on the PU trafc and the CR data trafc. Moreover, we demonstrated the effectiveness of CM-MAC by
127
128
Peng Hu received his M.S. degree in communication and information systems from
Wuhan University of Technology, Wuhan,
China and his Ph.D. degree from Queens
University, Kingston, Canada. He has served as
a reviewer for several international journals
and conferences including IEEE Transactions
on Mobile Computing, EURASIP Journal on
Wireless Communications and Networking,
and Wireless Communications and Mobile
Computing. His current research interest is in
the eld of cognitive radio ad hoc networks,
sensor networks, and Internet of Things.