CHANNEL AWARE MEDIUM ACCESS CONTROL IN COGNITIVE RADIO NETWORKS Supervisor – Dr. Ketan Rajawat PALASH KATIYAR(10475) ELECTRICAL ENGINEERING INDIAN INSTITUTE.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

PHY-MAC Dialogue with Multi-Packet Reception Workshop on Broadband Wireless Ad-Hoc Networks and Services 12 th -13 th September 2002 ETSI, Sophia Antipolis,
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Azin Dastpak August 2010 Simon Fraser University.
A Scalable MAC Protocol for Next-Generation Wireless LANs Zakhia (Zak) Abichar, J. Morris Chang, and Daji Qiao Dept. of Electrical and Computer Engineering.
By: Gamal El Din Fathy Amin Ahmed Ossama El Fiky Supervised By: Dr Tarek El Naffouri.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Speaker: You-Min Lin Advisor: Dr. Kai-Wei Ke Date: 2011/04/25 Cognitive Radio Networks (CRN) 1.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Medium Access Control Sublayer
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Utility Based Scheduling in Cognitive Radio Networks Term Project CmpE-300 Analysis of Algorithms Spring 2009 Computer Engineering, Boğaziçi University,
RELIABLE MULTIMEDIA TRANSMISSION OVER COGNITIVE RADIO NETWORKS USING FOUNTAIN CODES Proceedings of the IEEE | Vol. 96, No. 1, January 2008 Harikeshwar.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Cognitive Radio Networks
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Copyright © 2010 National Institute of Information and Communications Technology. All Rights Reserved 1 R&D and Standardization Activities on Distributed.
Tarun Bansal, Bo Chen and Prasun Sinha
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
Advanced Spectrum Management in Multicell OFDMA Networks enabling Cognitive Radio Usage F. Bernardo, J. Pérez-Romero, O. Sallent, R. Agustí Radio Communications.
Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United.
Cognition zone to support coexistence among IEEE m and other RATs Document Number: IEEE S80216m-08/1132 Date Submitted: Source: Feng YANG,
The 2014 APSIPA ASC Conference December 9-12, 2014, Siem Reap, city of Angkor Wat, Cambodia Improved Cross-Layer Cooperative MAC Protocol for Wireless.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Cognitive Radio: Next Generation Communication System
Static Spectrum Allocation
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Dipankar Raychaudhuri, Joseph B. Evans, Srinivasan Seshan Sin-choo Kim
Cognitive Radio
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
CHANNEL AWARE MEDIUM ACCESS CONTROL IN COGNITIVE RADIO NETWORKS
Spectrum Sensing In Cognitive Radio Networks
Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University VTC Spring 2008 SPLASH: a Simple Multi-Channel Migration Scheme for IEEE
Dynamic Spectrum Access/Management Models Exclusive-Use Model Shared-Use Model.
CHANNEL ALLOCATION FOR SMOOTH VIDEO DELIVERY OVER COGNITIVE RADIO NETWORKS Globecom 2010, FL, USA 1 Sanying Li, Tom H. Luan, Xuemin (Sherman) Shen Department.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
A discussion on channel sensing techniques By James Xu.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Cognitive Radio Networks
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Cognitive Radio Based 5G Wireless Networks
Enhancing the capacity of Spectrum Sharing in Cognitive Radio Network
Channel Allocation (MAC)
July 2009 doc.: IEEE /xxxxr0 July 2009
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Cognitive Radio Networks
Presented by Mohamad Haidar, Ph.D. May 13, 2009 Moncton, NB, Canada
An overview of the IEEE Standard
Spectrum Sharing in Cognitive Radio Networks
Subject Name: Adhoc Networks Subject Code: 10CS841
IEEE Standard Babak Siabi.
Mehdi Abolfathi SDR Course Spring 2008
Efficient QoS for secondary users in cognitive radio systems
Presentation transcript:

CHANNEL AWARE MEDIUM ACCESS CONTROL IN COGNITIVE RADIO NETWORKS Supervisor – Dr. Ketan Rajawat PALASH KATIYAR(10475) ELECTRICAL ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY KANPUR

Cognitive Radios and MAC Designing  Cognitive radio is a novel method that might propose new solutions for the problem of starved usage of spectrum  Medium Access control designing is a challenging topic – A highly dynamic scenario  A Cognitive radio medium access scheme should perform  Channel Sensing  Detection of primary users  Dynamic channel selection  Robust channel switching mechanism  Improve overall usage in both licensed and unlicensed bands

Control information exchange in design of distributed MAC  Overhead considerably higher than that in simple wireless networks  Most of the schemes exploit out of band signaling  Use of a dedicated control channel is quite popular – a widely accepted idea  Use of IEEE DCF [5] like architecture is also very common

Existing Approaches IEEE [3] WRAN standard  Aimed at using CR techniques to allow sharing of unused spectrum allocated to television broadcast services [4] What is WRAN - A WRAN network uses the white spaces in television broadcasts to facilitate broadband access. The point of a WRAN is to provide Internet access to areas that are difficult to reach by other means.  The standard is centralized and does not serve distributed architecture  No such standard exists for medium access in a distributed network cases

Channel aware MAC schemes  Exploit the Channel state information around a user  Better model the competitive scenario a user faces  Makes a user aware of the surroundings it is operating in and enables it to make independent decisions  Makes competition fair and ensure good throughput values, many of channel aware schemes have achieved throughput values comparable to centralized scheduling schemes  Some example of prior works done in this fields are - CAD-MAC [7] and CAAC [8]

Channel Aware Distributed MAC(CAD- MAC[7])  Protocol selects the best links in terms of channel states and therefore achieves performance close to that of centralized schedulers  A threshold driven protocol, calculation and modification of thresholds define the performance  The skeleton for working of the protocols is as follows :

Time frame organization in CAD-MAC[7] TIME FRAME COMPOSITION IN CAD-MAC

If Gains > Threshold Values, then only a user participates in channel contention Performs signaling exchange with the receiver A user that is active – Checks Thresholds Against Its Channel Gain Estimates Leaves contention if successfully negotiated, or else starts again, updates threshold values

Protocol Working  Only the best links are selected in a neighborhood  Unsuccessful transmitters change their behavior by updating the threshold values  Upon collision of requests – transmitters react by increasing threshold values  Upon reception of IDLE signals - transmitters react by decreasing threshold values  Cycle continues for a maximum allotted time

Detailed Working procedure of the Single Channel CAD-MAC design

Work Done in Previous Semester  Reproduced the results published in the research paper [7], related to the simulation of the single channel case of the proposed protocol  Extended the protocol design for the multiband case  Simulated for networks with 2 bands only and one primary user  Followed threshold updating mechanism as used for single channel case for the multiband case also

Proposal For This Semester  - Updating threshold calculation mechanism for multiband case  - Testing the protocol on more number of Secondary users, more number of Bands and more number of Primary users and evaluate its performance

An Example – Setting Threshold Values

 We propose the use only one threshold value to control the activity of a user in control signaling exchange  The spectral environment changes around a secondary user almost every CRS  Some users might win, some might give up and some may keep silent – all of this happens across the spectrum  Therefore, it will not be possible to maintain different thresholds for different bands  Also it is not possible for a transmitter to keep track of the reservations of all the channels and maintain individual thresholds  All the control signaling occurs on one channel

Channel gain between two users in such networks – General Case

Threshold value updating for the case where a user switches  Calculate the new CDF between users i and j,without including the individual CDFs of the channels that are not free  Calculate new set of probabilities, with changed sets |N|, |T|, and |L|.  Update these values and follow routine procedure with changed values, until another switch occurs

Example test case with presence of both primary and secondary users

Revised control signaling exchange

Threshold Value behavior for a typical user in Multiband case, in presence of primary users Threshold values

Protocol Performance with one, two and three primary users, in environments with 4 and 6 free channels available to users

Results And Conclusions  We are able to see that the application of a slotted aloha protocol for contention among users with varying spectral opportunities can produce good values of network throughput for secondary users.  Not only our design is able to fairly choose interference free links among the contending users making it highly probable the selection of those links with comparably better channel states in a neighborhood  We were able to implement the protocol for network cases with both primary and secondary users present.

References [1]. By Raghvendra Rao, Qi Cheng, Aditya Kelkar and Dhavel Chaudhary, in ICAST global community magazine [2]. Ekram Hossain, Vijay K. Bhargava (2007) Cognitive Wireless Communication Networks, 1st edition, Springer, New York. [3]. C. M. Cordeiro, K. Challapali, and D. Birru, \IEEE : An Introduction to the First Wireless Standard based on Cognitive Radios, J. Commun., Special Issue from selected papers from DySPAN 2005, vol. 1, no. 1, pp , April 2006 (Invited Paper). [4]. http ://en:wikipedia:org/wiki/CognitiveRadio [5]. IEEE WG,\Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specication, in IEEE Std , August 1999.

References [6]. Antonio De Domenico, Emilio Calvanese Strinati, and Maria-Gabriella Di Benedetto,\A Survey on MAC Strategies for Cognitive Radio Networks,“ IEEE communications surveys and tutorials, Vol. 14, NO. 1, first quarter 2012 [7]. Guowang Miao, Ye(Georey)Li and Ananthram Swami,\Channel aware distributed Medium Access control", in IEEE/ACM transactions on networking, Vol. 20, No. 4,August [8]. Bo Yang, Gang Feng, Yanyan Shen, Chengnian Long, Xinping Guan,\Channel-Aware Access for Cognitive Radio Networks", IEEE transactions on vehicular technology, VOL. 58, NO. 7, September 2009.