You are on page 1of 8

Modeling and Simulation for Cognitive Radio Networks in OPNET

Bosung Kim*, Sehoon Kwon*, Nguyen Manh Tuan*, Jong-yon Kim*, Byeong-hee Roh*, Jungwook Choi**,
and Soo Bum Park**
*Graduate School of Information and Communication, Ajou University, Suwon-si, Gyeonggi-do, Korea, 443-749
**LIGNex1, Pangyo Techno Valley, Sampyeong-dong, Bundang-gu, Seongnam-si, Gyeonggi-do, Korea, 463-400
E-mail: {kbs8354, kksh1098, nmtuan, kmakjy, bhroh}@ajou.ac.kr, {jungwook.choi, sbpark93}@lignex1.com

Abstract the available spectrum [2], through the use of cognitive radio
Cognitive Radio (CR) technology is envisaged to solve the (CR) technology [3].
problems in wireless networks resulting from the limited
available spectrum and the inefficiency in the spectrum usage by The CR is considered to the key enabling technology that
exploiting the existing wireless spectrum opportunistically. In enables next generation (XG) communication networks, also
CR networks, identifying the available spectrum resource known as DSA networks, to utilize the spectrum more efficiently
through spectrum sensing, deciding on the optimal sensing and in an opportunistic fashion without interfering with PUs [4].
transmission times, and coordinating with the other users for
spectrum access are the important functions of the Medium DSA technologies allow CR to operate in the best available
Access Control (MAC) protocols. Unfortunately, even though channel. More specifically, the CR technology will enable the
Modeling and Simulation (M&S) such networks have become users to (1) determine which portions of the spectrum is
important for further study, they are not currently available in available and detect the presence of licensed users when a user
some popular simulators, such as OPNET. In this paper, we operates in a licensed band (spectrum sensing), (2) select the
implement a Spectrum Sensing model with two-state Markov best available channel (spectrum decision), (3) coordinate access
chain to estimate the Primary User (PU) activities, and Spectrum to this channel with other users (spectrum sharing), and (4)
Sharing model, i.e. CR MAC, to use remaining resources each vacate the channel when a licensed user is detected (spectrum
Secondary Users (SUs) efficiently. We evaluate the system mobility) [1].
performance, e.g. throughput, of CR devices with configuration
of attributes in accordance with primary and secondary networks. Once a CR supports the capability to select the best available
channel, the next challenge is to make the network protocols
1. Introduction adaptive to the available spectrum. Hence above four spectrum
Todays wireless networks are regulated by a fixed spectrum management functions are required in an XG communication
assignment policy, i.e., the spectrum is regulated by national networks to support this adaptivity. These functions of XG
regulatory organization, such as Federal Communications networks enable spectrum-aware communication protocols [1].
Commission (FCC). The FCC assigns spectrum to licensed
holders, also known as primary users (PUs), or services on a Considering the more flexible and comprehensive use of the
long term basis for large geographical regions. However, a large spectrum resources, especially when SUs coexist with PUs,
portion of the assigned spectrum remains underutilized as shown traditional spectrum allocation schemes and spectrum access
in Figure 1 [1]. protocols may no longer be applicable. So, new spectrum
management approaches need to be developed to solve new
challenges in research related to CR, specifically, in spectrum
sensing and dynamic spectrum sharing [4].

DSA technologies in CR networks have been a research hotspot


because of its promise to improve the utilization of the assigned
but unused spectrum. In this paper, we introduce CR modeling
and simulation (M&S) framework to support development of
new technologies related to spectrum management functions.
Besides cost reduction through real test-bed, this M&S
framework can help us to apply previous schemes and
implement a proposed one on such a small budget. We also
expect that it can be used to extend simulation studies of CR
networks.
Figure 1: Spectrum utilization
The rest of the paper is organized as follows. In Section 2, the
The inefficient utilization of the limited spectrum necessitates concept of CR networks and spectrum management functions
the development of dynamic spectrum access (DSA) are introduced. In Section 3, the modeling direction for CR
technologies, where users who have no spectrum licenses, also networks is suggested. In Section 4, CR M&S framework in
known as secondary users (SUs), are allowed to use the terms of system and node models is proposed by use of OPNET
temporarily unused licensed spectrum. In recent years, the FCC modeler. In Section 5, with this framework, we evaluate the
has been considering more flexible and comprehensive uses of performance and compare one scheme with others in terms of
SU utilization. Finally, this paper is concluded in Section 6.
1
2. Related Works all the possible channels is not feasible. Thus, CRAHNs are
2.1. Cognitive Radio (CR) highly probable to have incomplete topology information,
The CR is the key technology that enables a Cognitive Radio Ad which leads in an increase in collisions among SUs as well as
Hoc Network (CRAHN) to use spectrum in a dynamic manner. interference to the PUs.
The term, cognitive radio, can formally be defined as follows
[2]: Multi-Hop/Multi-Spectrum Transmission: The end-to-end
route in the CRAHN consists of multiple hops having
A Cognitive Radio is radio that can change it transmitter different channels according to the spectrum availability.
parameters based on interaction with the environment in Thus, CRAHNs require collaboration between routing and
which it operates. spectrum allocation in establishing these routes. Moreover,
the spectrum switches on the links are frequent based on PU
From this definition, two main characteristics of the CR can be arrivals. As opposed to classical ad hoc networks,
defined as follows [7][8]: maintaining end-to-end QoS involves not only the traffic
load, but also how many different channels and possibly
Cognitive capability: Cognitive capability refers to the ability spectrum bands are used in the path, the number of PU
of the radio technology to capture or sense the information induced spectrum change events, consideration of periodic
from its radio environment. This capability cannot simply be spectrum sensing functions, among others.
realized by monitoring the power in some frequency bands of
interest but more sophisticated techniques, such as Distinguishing Mobility from PU Activity: In classical ad hoc
autonomous learning and action decision are required in networks, routes formed over multiple hops may periodically
order to capture the temporal and spatial variations in the experience disconnections caused by node mobility. These
radio environment and avoid interference to other uses. cases may be detected when the next hop node in the path
Through this capability, the portions of the spectrum that are does not reply to messages and the retry limit is exceeded at
unused at a specific time or location can be identified. the link layer. However, in CRAHNs, a node may not be able
Consequently, the best spectrum and appropriated operating to transmit immediately if it detects the presence of a PU on
parameters can be selected. the spectrum, even in the absence of mobility. Thus,
correctly inferring mobility conditions and initiating the
Reconfigurability: The cognitive capability provides appropriate recovery mechanism in CRAHNs necessitate a
spectrum awareness whereas reconfigurability enables the different approach from the classical ad hoc networks.
radio to be dynamically programmed according to the radio
environment. More specifically, the cognitive radio can 2.3. Spectrum Management Functions
programmed to transmit and receive on a variety of In order to adapt to dynamic spectrum environment, the CRAHN
frequencies and to use different transmission access necessitates the spectrum-aware operations, which form a
technologies supported by its hardware design. cognitive cycle [1]. As shown in Figure 2, the steps of the
cognitive cycle consist of four spectrum management functions:
2.2. Cognitive Radio Ad Hoc Networks (CRAHNs) spectrum sensing, spectrum decision, spectrum sharing, and
The changing spectrum environment and the importance of spectrum mobility. The followings are the main features of
protecting the transmission of the licensed users of the spectrum spectrum management functions [1]:
mainly differentiate classical ad hoc networks from CRAHNs.
These features of CRAHNs compared to classical ad hoc
networks as follows [5]:

Choice of Transmission Spectrum: In CRAHNs, the available


spectrum bands are distributed over a wide frequency range,
which vary over time and space. Thus each user shows
different spectrum availability according to the PU activity.
As opposed this, classical ad hoc networks generally operate
on a pre-decided channel that remains unchanged with time.
For the ad hoc networks with multi-channel support, all the
channels are continuously available for transmission, through
nodes may select few of the latter from this set based on self-
interference constraints. A key distinguishing factor is the Figure 2: Cognitive radio cycle
primary consideration of protecting the PU transmission, 2.3.1. Spectrum Sensing
which is entirely missing in classical ad hoc networks. A SU can be allocated to only on unused portion of the spectrum.
Therefore, a SU should monitor the available spectrum bands,
Topology Control: Ad hoc networks lack centralized support, and then detect spectrum holes. Spectrum sensing is a basic
and hence must rely on local coordination to gather topology functionality in CR networks, and hence it is closely related to
information. In classical ad hoc networks, this is easily other spectrum management functions as well as layering
accomplished by periodic beacon messages on the channel. protocol to provide information on spectrum availability. In
However, in CRAHNs, as the licensed spectrum opportunity
exists over large range of frequencies, sending beacons over
2
order to sense channels more precisely, following functionalities collaborating, and routing protocols. Furthermore, this
are required: PU detection, cooperation, and sensing control. functionality needs a connection management scheme to sustain
the performance of upper layer protocols by mitigating the
2.3.2. Spectrum Decision influence of spectrum switching.
Once the available spectrums are identified, it is essential that
the SUs select the most appropriate band according to their QoS 3. Modeling Direction for CR Networks
requirements. It is important to characterize the spectrum band 3.1. System Model
in terms of both radio environment and the statistical behaviors
of the PUs. In order to design a decision algorithm that
incorporates dynamic spectrum characteristics, we need to
obtain a priori information regarding the PU activity.

In this paper, we assume that SU can only select one channel for
sensing and the state of the system is only partially observable.
As a solution of the constraints, simple memoryless access
policies with periodic channel sensing are employed as follows:

Periodic Sensing with Memoryless Access (PS-MA) In


single-user network, the SU senses the channels in an Figure 3: Illustration of a general access protocol
increasing order at the beginning of each slot, starting from
an arbitrary channel. If the i-th channel is sensed to be idle, As shown in Figure 3, we consider the problem of multi-user
the SU transmits in the sensed channel with transmission cognitive access in decentralized CR networks with N primary
probability. channels, i.e., PUs, and K number of SUs. The SUs are capable
of channel sensing and follow a slotted transmission structure. In
Index Sensing with Memoryless Access (IS-MA) In particular, a SU chooses to sense one of the primary channels at
single-user network, the SU senses the first channel in the the beginning of each slot, i.e. sensing point, and makes the
ordered list. If idle, the SU then keeps sensing the first transmission decision accordingly, which mean that SU has
channel on the list until the first busy sensing result, after single radio.
which the SU switches to the next channel in the list and
transmit probabilistically. In this paper, we consider spectrum sensing, spectrum decision,
and spectrum sharing, except for spectrum mobility as spectrum
Orthogonal Periodic Sensing with Memoryless Access management functions. As a next step, we will upgrade the CR
(OPS-MA) In multi-user network, OPS-MA implements framework concerning about spectrum mobility related to nodes
PS-MA for each SU in an orthogonal manner. The K users mobility and routing issues.
periodically sense the channels using different sensing
phases. With larger N primary channels than SUs, the K 3.2. Spectrum Sensing Model
users can be fit in K orthogonal sensing phases. Firstly, in the case of spectrum sensing, we have to consider
three aspects: PU detection, cooperation, and sensing control.
2.3.3. Spectrum Sharing For PU detection of spectrum sensing, we employ the
Since there may be multiple SUs trying to access the spectrum, Continuous Time Markov Chain (CTMC) ON/OFF process as
their transmissions should be coordinated to prevent collisions in channel model to sense existence of primary transmission [9]. So,
overlapping portions of the spectrum. Spectrum sharing provides we can easily obtain the Channel Status Information (CSI) from
the capability to share the spectrum resource opportunistically the channel model, and it can reduce the overhead of simulation.
with multiple CR users which includes resource allocation to
avoid interference caused to the primary network. For this, game For cooperation of spectrum sensing, we assume applications
theoretical approaches have also been used to analyze the requiring rapid but short-term deployment and applications
behavior of selfish SUs. Furthermore, this function necessitates a denied of cooperation from existing radio access networks are
CR MAC protocol, which facilitates the sensing control to used. So, in this paper, a decentralized cognitive MAC [9],
distribute the sensing task among the coordinating nodes as well where each SU decides individually how to sense the spectrum
as spectrum access to determine the timing for transmission. and how to gain access, is employed.

2.3.4. Spectrum Mobility For sensing control of spectrum sensing, this is classified into
If a PU is detected in the specific portion of the spectrum in use, out-of-band sensing, which SUs can find available spectrum
SUs should vacate the spectrum immediately and continue their holes over a wide frequency range for their transmission, and in-
communications in another vacant portion of the spectrum. For band sensing, which SUs can monitor the spectrum band during
this, either a new spectrum must be chosen or the affected link the transmission and detect the presence of primary networks. In
may be circumvented entirely. Thus, spectrum mobility this paper, we adopt a Partially Observable Markov Decision
necessitates a spectrum handoff scheme to detect the link failure Process (POMDP) [9]. So, we implement that SUs can select
and to switch the current transmission to a new route or a new one channel, and check whether the channel is idle or busy at the
spectrum band with minimum quality degradation. This requires beginning of each slot.

3
3.3. Spectrum Decision Model transmission in N channels, and provides the data structure for
As we mentioned in Section 3.1 and 3.2, we use SU with single CR_node, e.g., SU to be able to select one channel and sense the
radio and applications requiring rapid but short-term deployment channel. The CR_config plays a role in channel selection of
and applications denied of cooperation from existing radio spectrum decision, in-band sensing of spectrum sensing, and
access networks. In the case of SU with single radio, this spectrum access of spectrum sharing.
limitation makes the problem of finding an optimal access
strategy challenging, since the state of the system at any time is
only partially observed [10]. In this paper, we postulate a
periodic sensing (PS) approach to render the problem, thus
separating the sensing and the access part of the problem.

In [11], they introduced such PS approaches: FO-OSA, PS-MA,


IS-MA, and OPS-MA. The FO-OSA, full observation and
optimal spectrum access, is used as a throughput upper bound in
simulations. The PS-MA and IS-MA are for single SU case and
OPS-MA is for multiple SUs case. In PS-MA, periodic sensing
with memoryless access, each primary channel is sensed equally
with 1 / N fraction of time. In IS-MA, index sensing with
memoryless access, the SU senses the first channel in the list. If
idle, the SU transmit, and then keeps sensing the first channel on
the list until the first busy sensing result, after which the SU
switches to the next channel in the list. In OPS-MA,
orthogonalized periodic sensing with memoryless access, it
implements PS-MA for each SU in an orthogonal manner. These
approaches can suggest the way of channel selection at the
beginning of slot with limitation which SU can observe channel
partially.

Since we consider the multiple SUs in N channels, we


implement the OPS-MA and modified version of IS-MA, i.e. Figure 4: Network model (single-hop scenario)
OIS-MA, and FO-OSA for upper bound in simulations.
4.2. CR_config Node Model
As we mentioned before, CR_config can generate the primary
3.4. Spectrum Sharing Model
Once a proper spectrum band is selected in spectrum decision, transmission in N channels. We also can generate the primary
communication channels in that spectrum need to be assigned to transmission with existing example network, such as WLAN,
a SU while determining its transmission power to avoid the WiMAX, or else in OPNET according to frequency range, and
interference to the primary network (resource allocation). Then SU can sense the channel status by use of op_stat_local_read ()
the SU decides when the spectrum should be accessed to avoid from statistic package, however it can be simulation overhead.
collisions with other SUs (spectrum access) [5]. In this paper, So, we use the continuous time markov chain (CTMC) ON/OFF
we consider overlay networks which SU cannot access channel process to generate the primary transmission.
in which primary transmission is in progress. So, just spectrum
access, i.e., CR MAC is considered for this framework. Assume that there are N parallel channels (indexed from 0 to
N 1 ) available for transmissions by the PUs [12]. The
Unlike classical MAC protocols in ad hoc networks, CR MAC occupancy of the N channels is modeled by N independent
protocols are closely coupled with spectrum sensing. Generally, CTMC. In particular, each channel has two sates with idle
CR MAC protocols are classified into three kinds of access
protocols: random access, time-slotted, and a hybrid protocol ( X i 0 ) and busy state ( X i 1 ), respectively. The holding
that is a combination of the two [5]. As mentioned before, we times are exponentially distributed with known parameters i 1
implement SU that follows a slotted transmission structure. So,
we consider the hybrid protocol which channels of primary for the idle and i 1 for the busy states, respectively. The state
network are slotted, and SUs employ random access techniques
transition rate matrix ( Q -matrix) under the CTMC process is
such as CSMA or ALOHA to minimize collisions.
given by
4. OPNET Models for CR Networks
4.1. CR Network Model i
Qi i , i 0,1, ... , N 1 .
i
The basic scenario for CR network is shown in Figure 4. Since (1)
we do not consider multi-hop scenario directly related to i
mobility and routing protocol, we construct the single-hop
network. This network consists of two nodes: CR_config and The stationary distribution of the i -th PU process can then be
CR_node. The CR_config plays a role in generation of primary determined as
4
i i Radio Transmitter. The Radio Receiver acts as the entry points
vi (0) , vi (1) . (2) in a node for packets received on radio communication links,
i i i i and the Radio Transmitter acts as the exit points of a node for
packets transmitted on radio links. Each process model is
The cr_config process model for CR_config can be shown in connected by the stream and the stream can be added between
Figure 5. This process model consists of two states: Init and cr_mac and transceiver according to the maximum number of
Discard states. In the Discard state, no any code for this process channels.
model is existed, and it prohibits from unexpected interrupts
from any others. In the Init state, it registers own process and
sets necessary attributes, and calls functions necessary for
generation of primary traffic.

Figure 6: CR_node node model


As mentioned in Section 4.1, CR_node supports functions as
Figure 5: cr_config process model channel selection, spectrum sensing, and spectrum access.
The functions needed for generation of primary traffic are as
follows:

cr_cnf_pu_traffic_init () This function performs the


initialization necessary for generation of primary traffic. It reads
attributes (e.g. Start Time, ON State Time, and OFF Sate
Time) according to the number of channels, and stores its values.
We assume that one PU exists in each channel.

cr_cnf_pu_traffic_gen () This function performs the


generation of primary traffic based attributes stored by
cr_cnf_pu_traffic_init (). Every generation of primary traffic in
each channel occurs at the beginning of simulation time.
oms_dist_outcome () is used in generation of random value for
ON State Time and OFF State Time.

cr_cnf_pu_traffic_reg () This function performs the


registration of generated primary traffic. In order to sense this
primary transmission, the process registration is required to
identify by each node model or process model. For this,
oms_pr_process_register () and oms_pr_attr_set () are used.

Above three functions are executed sequentially, and each node


model or process model can access (sense) the primary
transmission.

4.3. CR_node Node Model


CR_node consists of source, sink, cr_mac, and transceiver
process models as shown in Figure 6. Just cr_mac process model
is modeled by us and others are created by existing process
models.

The source process model uses existing source model, called


bursty_source which can generate traffic as ON/OFF pattern
explained in Section 4.2. The sink process model uses existing
sink model, called sink which can receive packet and perform
updating local and global statistics, and destroy received packet.
In the case of transceiver, it consists of Radio Receiver and Figure 7: Simplified algorithm of CR_node functions
5
Figure 8: cr_mac process model

Figure 7 shows the sequence of the CR_node from receiving OPNET Modeler defines thirteen event types to support variety
packet from higher layer to transmitting packet to lower layer. of modeling activities. Especially in Idle state, it can handle
When a packet is delivered from higher layer, the CR_node three event types: Self, Stream, and Statistic. Type Self is for
checks whether the packet is larger than segment size or not. If the process that may have multiple events of this type pending at
yes, the packet is assembled. In order to transmit the packet, the the time, event code is usually of interest. Type Stream is for
CR_node needs to spectrum sensing. Firstly, the CR_node when a packet arrives at a processor or queue, causing a stream
selects the spectrum band by one of PS approaches, and senses interrupt, the Simulation Kernel places the packet in the input
this spectrum band to check whether this spectrum band is idle streams FIFO queue. Type Statistic is for when a change
or not at the beginning of slot. After that, the CR_node can occurs in a statistic that is the source of a statistic wire, this may
enable or disable the back-off algorithm. If the CR_node does generate an event for the statistic wires destination processor /
not use the back-off algorithm, it just transmits the packet. queue, depending on the nature of the change and the
Otherwise it also can enable or disable the RTS/CTS exchange configuration of the statistic wire object. In this model,
to solve the hidden terminal problem. If the CR_node does not Statistic type is used for the carrier sensing like in CSMA/CA.
use the RTS/CTS exchange, it just transmits the packet. For this, Idle state uses op_intrpt_type (), op_intrpt_strm (), and
Otherwise, it transmits the RTS, and waits for the CTS. If the op_intrpt_code ().
CR_node receives the CTS, it transmits the packet. This is whole
sequence of the CR_node and it is repeated if the packet exists in For the spectrum management functions, the forced states are
the queue. seven: CH_sense, From_HL, Deference, Xmit, From_LL, Timer,
and Back_off.
As shown in Figure 8, the cr_mac process model consists of
various unforced and forced states, which is different in CH_sense This state plays role in channel selection and
execution-timing. identification of current channel state. As we mentioned before
SU with single radio can sense one channel at the beginning of
Considering relationship with other process model, the Init_# slot. So, channel index, which SU will sense, is determined in
states are three. In Init_1, it performs the initialization of state this state by FO-OSA, OPS-MA, and modified version of IS-MA.
variables, registration of own process model. In Init_2, it Just in case that channel is idle, its node can transmit packet.
performs the creation of nodes MAC address randomly or
manually, and registration of its address in the global address list. From_HL This state plays role in handling packet from higher
In init_3, it performs the initialization of transceivers attributes layer. This process model has two buffers: subq and segbuf. If
and taking destination MAC address manually or automatically segbuf is not empty, the packet is inserted in the subq, otherwise,
to transmit packet. It also interrupts the event of initial channel it is insert in segbuf. The packet will be transmitted if sensing
sensing event. result is idle at the beginning of certain slot in specific channel.

6
Deference This state plays role in deference until the medium MA for single user access), to compare with each other. To
is available for transmission interrupt. As mentioned before, evaluate the SU utilization or throughput according to PU
CR_node can access the channel with the random access utilization, each SU can generate the Poisson traffic as much as
techniques. For this, it considers four kinds of packet: RTS, CTS, the data rate. For more accurate simulation, we set the
DATA, and ACK. The RTS/CTS are for virtual carrier sensing simulation time as 2 hours.
to solve the hidden terminal problem, and the DATA/ACK are
used in any random access techniques such as ALOHA and Number of Channels 5
CSMA. Each node can transmit these kinds of packet interrupted Data Channel Rate 1 (Mbps)
by this state with some Inter-Frame Spaces, e.g. DIFS and SIFS. Number of Secondary Users 1 (single) or 5 (multiple)
Transmission Range 250 (m)
Xmit This state plays role in handling events interrupted by Comparison Group FO-OSA, OPS-MA, OIS-MA
Deference state. It checks the frame type which will be Traffic Generation Model Poisson
transmitted next, and makes the data header structure according Simulation Time 7,200 (sec)
to the frame type. Generally, this data header consists of source
address, destination address, and frame type. If the frame type is Table 1: Simulation parameters
DATA, the packet from higher layer is encrypted in data field, 5.1. Single User Access
otherwise, this field is empty. We first consider the case involving a single user who learns
transmission opportunities by sensing one channel at a time. For
From_LL This state plays role in handling packet from lower the performance upper bound, we consider a FO-OSA policy
layer. When a node receives a packet from lowering, firstly it and for the performance lower bound, we consider a PS-MA
decrypts the received packet and checks whether the destination policy. Figure 9 shows the maximum throughput of SU as PU
address is matched or not. If yes, secondly it checks frame type utilization increases. Since FO-OSA policy senses all channels
to handle differently and handles the received packet according simultaneously at the beginning of every time slot, it shows
to the concept of RTS/CTS/DATA/ACK handshaking. Just in better performance than any other policies. Even though FO-
case that the frame type is the DATA, this state sends the packet OSA is not optimal and cost-consuming, this scheme suggests
to the higher layer. According to the algorithm what we insert, the upper bound of performance in terms of throughput. In the
RTS/CTS handshaking can be enabled or disabled. case of PS-MA policy, since it senses the channels in an
increasing order and only depends on the current sensing
Timer This state plays role in timeout interrupt. The node outcome, it shows lower performance than any other policies.
needs to wait for the expected frame. If expected frame is not Lastly, the IS-MA policy is shown to be throughput optimal for
received, then the node infers collision. In this case, the frame single user cognitive network.
time-out procedure is necessary. This model uses next slot as the
expiry time to wait for the expected frame. Using this time, this
state interrupts event of next channel sensing to transmit existing
packet in the queue.

Back_off This state plays role in back-off procedure. It is


needed when the node preparing to transmit frame discovers that
the medium is busy or when the node infers collision. The back-
off is not needed when the node is responding to the frame.
Following a successful packet transmission, again a back-off
procedure is performed for a contention window period.

5. Performance Evaluation
In this section we show the simulation results to evaluate the
performance of the proposed framework by varying PS
approaches. The schemes are evaluated in terms of throughput.
We consider the cases involving single SU and multiple SUs
who learn transmission opportunities by sensing one channel at a
time. Figure 9: SU throughput in single user access case

To evaluate the SU utilization in single-hop topology, we use the 5.2. Multiple User Access
simple scenario as shown in Figure 4. We set the simulation We also consider FO-OSA policy for performance upper bound
parameters as shown in Table 1. We use five data channel with and OPS-MA policy for lower bound in multiple user access
1Mbps data rate to evaluate the performance considering single case. Generally, this case shows lower performance than the case
user and multiple users. We set the transmission range of each of single user access because multiple users can get low
transmission opportunities and collision probabilities between
SU as 250m, and for the single user access, i.e. K N , we set each SU increase. The FO-OSA policy also gives better
the number of SUs as one and for the multiple user access, i.e. performance than any other policies, and the OPS-MA policy
K N , we set the number of SUs as five. We adopt three PS gives lower performance than any others, although it select a
approaches, FO-OSA, OPS-MA, and OIS-MA (PS-MA and IS- channel in orthogonal manner. OIS-MA, which is modified
7
version of IS-MA to select channel orthogonally, shows better technology research for the next TMMR through the LIG Nex1
performance than OPS-MA in this scenario. corporation (Y11-026).

Reference
[1] I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, NeXt
generation/dynamic spectrum access/cognitive radio wireless
networks: A survey, ELSEVIER Computer Networks, vol. 50,
May 2006, pp. 2127-2159.
[2] Facilitating opportunities for flexible, efficient and reliable
spectrum use employing cognitive radio technologies: Notice of
proposed rule making and order, FCC, December 2003, FCC
Doc. ET Docket No. 03-108.
[3] J. Mitola, Cognitive radio: An integrated agent architecture for
software defined radio, Ph. D. Dissertation, KTH Royal Inst. Of
Technol., Stockholm, Sweden, 2000.
[4] B. Wang and K. J. R. Liu, Advances in Cognitive Radio
Networks: A Survey, IEEE Journal of Selected Topics in Signal
Processing, vol. 5, no. 1, February 2011, pp. 5-23.
[5] I. F. Akyildiz, W. Y. Lee, and K. R. Chowdhury, CRAHNs:
Cognitive radio ad hoc networks, ELSEVIER Ad Hoc Networks,
vol. 7, January 2009, pp. 810-836.
[6] C. Cormio and K. R. Chowdhury, A survey on MAC protocols
Figure 10: SU throughput in multiple user access case for cognitive radio networks, ELSEVIER Ad Hoc Networks, vol.
6. Conclusion 7, February 2009, pp. 1315-1329.
[7] S. Haykin, Cognitive Radio: brain-empowered wireless
The CR is regarded to significantly boost spectrum utilization by
communications, IEEE Journal on Selected Areas in
exploiting spectrum bands unused by licensed users. So, we Communications, vol. 23, no. 2, February 2005, pp. 201-220.
introduced CR M&S framework to support development of new [8] R. W. Thomas, L. A. DaSilva, and A. B. MacKenzie, Cognitive
technologies, Firstly, according to spectrum management Networks, in: Proceeding of the IEEE DySPAN, November 2005,
functions, we suggested the modeling direction for CR networks pp. 352-360.
together with system model. Secondly, with this modeling [9] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized
direction, we modeled the network and node models for CR Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc
networks by use of OPNET modeler. For the verification of this Networks: A POMDP Framework, IEEE Journal on Selected
framework, we evaluated the performance varying periodic Areas in Communications, vol. 25, no. 3, April 2007, pp. 589-600.
[10] Q. Zhao, S. Geirhofer, L. Tong, and B. M. Sadler, Optimal
sensing policies. As a result, modified IS-MA policy, i.e., OIS-
Dynamic Spectrum Access via Periodic Channel Sensing, IEEE
MA, showed better performance than the OPS-MA policy. For WCNC, March 2007, pp. 33-37.
future work, we will upgrade the CR framework concerning [11] S. Chen and L. Tong, Maximum Throughput Region of
about spectrum mobility related to nodes mobility and routing Multiuser Cognitive Access of Continuous Time Markov
issues. Channels, IEEE Journal on Selected Areas in Communications,
vol. 29, no. 10, December 2011, pp.1959-1969.
Acknowledgment [12] X. Li, Q. Zhao, X. Guan, and L. Tong, Optimal Cognitive
This research was supported by the MKE (The Ministry of Access of Markovian Channels under Tight Collision
Knowledge Economy), Korea, under the ITRC (Information Constraints, IEEE Journal on Selected Areas in Communications,
vol. 29, no. 4, April 2011, pp. 746-756.
Technology Research Center) support program supervised by the
NIPA (National IT Industry Promotion Agency (NIPA-2012-
(H0301-12-2003)), and also supported by the network protocol

You might also like