Академический Документы
Профессиональный Документы
Культура Документы
Introduction
c
978-1-4244-2100-8/08/$25.00 2008
IEEE
To amend the aforementioned problems of the existing schemes, in this paper we propose an efficient Cognitive Radio EnAbled Multi-channel MAC protocol, called
CREAM-MAC protocol, for wireless networks. Under the
CREAM-MAC protocol, each secondary user is equipped
with a SDR-based transceiver that can dynamically utilize one or multiple licensed channels to receive/transmit
the secondary users packets, and multiple sensors that
can detect multiple licensed channels simultaneously. The
CREAM-MAC protocol enables the secondary users to dynamically utilize the unused licensed frequency spectrum
in a way that confines the level of interference to the primary users. With the help of the four-way handshakes of
control packets, the CREAM-MAC protocol with a single transceiver can efficiently handle the traditional hidden terminal and the multi-channel hidden terminal problems. In addition, the CREAM-MAC protocol does not
need any centralized controllers. We also study the aggregate throughput of CREAM-MAC based on our developed
analytical models.
The rest of this paper is organized as follows. Section II presents the system model. Section III develops the
CREAM-MAC protocol. Section IV develops the analytical models to study the CREAM-MAC protocol. Section V
evaluates our multi-channel MAC protocol by using our developed analytical models and simulation experiments. The
paper concludes with Section VI.
2.1
i
,
i + i
(1)
2.2
3
3.1
3.2
...
Control
Channel
Time
Channel Negotiation
Contention
Backoff
RTS
DIFS
Channel Group
SIFS
Backoff
CSR
CS T
SIFS
Contention
SIFS
RTS
DIFS
CH 1
CH 2
CTS
...
CH 3
Frequency
3.3
Channel Contention
The CREAM-MAC does not require global synchronization among all the primary users and the secondary users.
Under the CREAM-MAC, the contention mechanism over
the control channel is similar to the IEEE 802.11 DCF, as
shown in Figure 1. In particular, the secondary users reserve time for the following transmission operations within
the neighborhood through the control channel by exchanging RTS/CTS control packets with the destinations. When a
secondary user wants to send packets to another secondary
user, it first transmits a RTS packet including its channel
group list to the destination over the control channel. Upon
receiving the RTS packet, if at least one channel in the channel group is currently not used by its neighboring secondary
users, the destination secondary user replies to the source
with a CTS packet and uses its sensors to detect the channel
group indicted in the RTS packet. The other neighboring
secondary users overhear the RTS/CTS control packets to
update the list of available channels.
After the pair of secondary users successful reserve the
control channel by successfully exchanging RTS/CTS packets, they negotiate on the licensed channels which are vacant for both the sender and the receiver. More precisely,
the source secondary user first sends the CST packet which
includes the vacant channel list at the senders side. Upon
receiving the CST packet, the destination secondary user
replies with the CSR packet telling the source which common channels are vacant and how long the communication
will last over these common channels. Since the communication interval can be less than or equal to Tdmax , the other
neighboring secondary users can overhear the CST/CSR
3.4
Data Transmission
In this section, we develop the analytical models to analyze the aggregate throughput of our proposed CREAMMAC protocol under the saturated network case, where
each secondary user has always unlimited data packets to
send.
4.1
n
i=0
i Pr{H = i} = n(1 ).
(3)
4.2
In order to analyze the saturation throughput of the proposed CREAM-MAC, we need to study the contention behavior over the control channel where the control packets
are transmitted based on the IEEE 802.11 DCF. We develop
the analytical model based on the work of [18, 19], which
uses a two-dimensional Markov chain model to analyze the
backoff operations for IEEE 802.11 DCF. Following the
previous work, if we denote the probability that a given secondary user transmits in a randomly chosen slot time by ,
and the probability that a transmitted packet collides by p,
respectively, then we obtain the following equations:
2(12p)
(p) = (12p)(CWmin +1)+CW
m
min p[1(2p) ]
(4)
u1
p( ) = 1 (1 )
where m is the maximum backoff stage, u is the number of
the contending secondary users, CWmin is the initial contention backoff window size. Solving simultaneously the
two equations in Eq. (4), we can obtain the numerical solution of and p. Obviously, 0 < , p < 1. Observing
Eq. (4), we can learn that p only depends on the number of
the contending secondary users (u), the maximum backoff
stage (m), and the initial contention backoff window size
(CWmin ).
Let Ptr be the probability that there is at least one transmission in a given time. Since each contending secondary
user transmits with probability at any given time, given
there are u contending secondary users, Ptr can be expressed as:
Ptr = 1 (1 )u
(5)
The probability, denoted by Ps , that a secondary user transmits successfully without collisions, given that at least one
secondary user transmits, can be written as:
Ps =
u (1 )u1
u (1 )u1
=
Ptr
1 (1 )u
(6)
(7)
Table 1. The parameters for design and analysis of the CREAM-MAC protocol.
RTS
CTS
CST
CSR
SIFS
DIFS
Rc
Rd
n
u
M
E[Tc ]
Tdmax
CWmin
20 B
20 B
20 B
20 B
9 s
15 s
34 s
1 Mbps
1 Mbps
10 ms
256
Co n tro l
Ch a nn el
i
Pr{Nbusy = i} = Pbusy
(1 Pbusy ),
(8)
i=0
i Pr{Nbusy
n
= i} =
.
1 n
(9)
Contenti on
Peri od
Contenti on
Period
Contenti on
P eri od
Channe l
N e go tiatio n
for C G 1
Channe l
N e g o tiatio n
for C G 2
Channe l
N e g o tiation
fo r CG 3
Channe l
N e g o tiation
fo r CG 4
C ha n nel
G ro u p 2
C ha n nel
G ro u p 3
C ha n nel
G ro u p 4
(a)
Contenti on
P eri od
Idl e Contenti on
Period
C hanne l
Ne g otiatio n
fo r C G 1
Co ntro l
Ch an n el
Ch an n el
G ro u p 1
E[Tc ] =
C ha n nel
G ro u p 1
Contenti on
Peri od
Ch an n el
Gro u p 2
Idle
C hanne l
Ne g o tiation
fo r CG 2
Contenti on
Period
Channe l
N e g o tiatio n
fo r CG 1
Data
(b)
Figure 2. Illustrations of the CREAM-MAC protocol for
the saturated network case. (a) The number of channel
groups is larger than (Nc + 1). (b) The number of channel
groups is less than (Nc + 1). Here CG is short for channel
group.
4.3
Aggregate Throughput
For convenience of presentation, Table 1 lists the important parameters for the design and analysis of the proposed CREAM-MAC protocol. Let Nc be the maximum
number of secondary users that successfully reserve the licensed channel groups during the length of Tdmax on average. Clearly Nc is inversely proportional to E[Tc ], and
thus we obtain Nc = Tdmax /E[Tc ]. Note that on average
the number of secondary users, denoted by Nd , that can simultaneously utilize the licensed channels depends on not
only the number of secondary users that can win the contention over control channel in duration of Tdmax , but also
the number of licensed channel groups. Then, we obtain
M
Nd = min (Nc + 1),
.
(12)
n
That is, there are at most Nd secondary users opportunistically transmitting data over the licensed channels at one
time from the global viewpoint. Note that we can predict
if the control channel get saturated by identifying the relationship between (Nc + 1) and (M/n). Figures 2(a) and
(b) show the cases when the number of channel groups is
larger than and less than (Nc + 1), respectively. In particular, when Nd = (Nc + 1), it indicates that the control channel is saturated and the aggregate throughput only
depends on the pairs secondary users that can successfully
exchange RTS/CTS/CST/CSR packets during the period of
11.4
11
10.8
10.6
10.4
10.2
16
14
12
10
8
6
4
10
9.8
16
18
Aggregate Throughput in Mbps ()
11.2
20
u=20
u=30
u=50
2
32
64
128
256
Size of Contetion Window
512
1024
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Channel Utilization of Primary Users ()
0.8
0.9
Tdmax Nd E[H]Rd
Tdmax Nd n(1 )Rd
=
,
E[Tc ] + Tdmax
E[Tc ] + Tdmax
(13)
Performance Evaluations
The parameters used to evaluate the CREAM-MAC protocol are summarized in Table 1. We first investigate the
aggregate throughput for the saturated network case. Let
the number (n) of sensors of each secondary user be 4, the
channel utilization () of primary users be fixed at 0.5, and
Rc be equal to 1 Mbps. Using Eq. (13), we plot the aggregate throughput () against the size of the contention window (CWmin ) in Figure 3. In Figure 3, we observe that
our proposed CREAM-MAC protocol. The simulation results verified our developed analytical model.
14
12
References
R =2 Mbps
c
10
Rc=1 Mbps
R =1 Mbps, Analytical
c
2
3
4
The number of sensors (n)
user increases before they reach the state where all the licensed channels are saturated. This is expected by Eqs. (12)
and (13). More precisely, when the secondary users can
only access small number of channels simultaneously with
less sensors, there are sufficient channel groups for the secondary users to access. As a result, the control channel becomes saturated, which means that the average number of
winning secondary users during a fixed amount of time is
constant. Thus, increasing the number of sensors can efficiently increase the aggregate throughput. On the other
hand, when the secondary users are equipped more sensors,
they can access more channels at one time, which implying that the control channel is not the bottleneck any more.
In this case, the licensed data channels become saturated,
and thus further increasing the sensors cannot enlarge the
aggregate throughput. However, as shown in Figure 5, we
can still increase the aggregate throughput by increasing
the data rate of the control channel because higher control
channel data rate means less time spent to accomplish the
RTS/CTS/CST/CSR four-way handshakes.
Conclusions