Professional Documents
Culture Documents
Bosung Kim*, Sehoon Kwon*, Nguyen Manh Tuan*, Jong-yon Kim*, Byeong-hee Roh*, Jungwook Choi**,
and Soo Bum Park**
*Graduate School of Information and Communication, Ajou University, Suwon-si, Gyeonggi-do, Korea, 443-749
**LIGNex1, Pangyo Techno Valley, Sampyeong-dong, Bundang-gu, Seongnam-si, Gyeonggi-do, Korea, 463-400
E-mail: {kbs8354, kksh1098, nmtuan, kmakjy, bhroh}@ajou.ac.kr, {jungwook.choi, sbpark93}@lignex1.com
Abstract the available spectrum [2], through the use of cognitive radio
Cognitive Radio (CR) technology is envisaged to solve the (CR) technology [3].
problems in wireless networks resulting from the limited
available spectrum and the inefficiency in the spectrum usage by The CR is considered to the key enabling technology that
exploiting the existing wireless spectrum opportunistically. In enables next generation (XG) communication networks, also
CR networks, identifying the available spectrum resource known as DSA networks, to utilize the spectrum more efficiently
through spectrum sensing, deciding on the optimal sensing and in an opportunistic fashion without interfering with PUs [4].
transmission times, and coordinating with the other users for
spectrum access are the important functions of the Medium DSA technologies allow CR to operate in the best available
Access Control (MAC) protocols. Unfortunately, even though channel. More specifically, the CR technology will enable the
Modeling and Simulation (M&S) such networks have become users to (1) determine which portions of the spectrum is
important for further study, they are not currently available in available and detect the presence of licensed users when a user
some popular simulators, such as OPNET. In this paper, we operates in a licensed band (spectrum sensing), (2) select the
implement a Spectrum Sensing model with two-state Markov best available channel (spectrum decision), (3) coordinate access
chain to estimate the Primary User (PU) activities, and Spectrum to this channel with other users (spectrum sharing), and (4)
Sharing model, i.e. CR MAC, to use remaining resources each vacate the channel when a licensed user is detected (spectrum
Secondary Users (SUs) efficiently. We evaluate the system mobility) [1].
performance, e.g. throughput, of CR devices with configuration
of attributes in accordance with primary and secondary networks. Once a CR supports the capability to select the best available
channel, the next challenge is to make the network protocols
1. Introduction adaptive to the available spectrum. Hence above four spectrum
Todays wireless networks are regulated by a fixed spectrum management functions are required in an XG communication
assignment policy, i.e., the spectrum is regulated by national networks to support this adaptivity. These functions of XG
regulatory organization, such as Federal Communications networks enable spectrum-aware communication protocols [1].
Commission (FCC). The FCC assigns spectrum to licensed
holders, also known as primary users (PUs), or services on a Considering the more flexible and comprehensive use of the
long term basis for large geographical regions. However, a large spectrum resources, especially when SUs coexist with PUs,
portion of the assigned spectrum remains underutilized as shown traditional spectrum allocation schemes and spectrum access
in Figure 1 [1]. protocols may no longer be applicable. So, new spectrum
management approaches need to be developed to solve new
challenges in research related to CR, specifically, in spectrum
sensing and dynamic spectrum sharing [4].
In this paper, we assume that SU can only select one channel for
sensing and the state of the system is only partially observable.
As a solution of the constraints, simple memoryless access
policies with periodic channel sensing are employed as follows:
2.3.4. Spectrum Mobility For sensing control of spectrum sensing, this is classified into
If a PU is detected in the specific portion of the spectrum in use, out-of-band sensing, which SUs can find available spectrum
SUs should vacate the spectrum immediately and continue their holes over a wide frequency range for their transmission, and in-
communications in another vacant portion of the spectrum. For band sensing, which SUs can monitor the spectrum band during
this, either a new spectrum must be chosen or the affected link the transmission and detect the presence of primary networks. In
may be circumvented entirely. Thus, spectrum mobility this paper, we adopt a Partially Observable Markov Decision
necessitates a spectrum handoff scheme to detect the link failure Process (POMDP) [9]. So, we implement that SUs can select
and to switch the current transmission to a new route or a new one channel, and check whether the channel is idle or busy at the
spectrum band with minimum quality degradation. This requires beginning of each slot.
3
3.3. Spectrum Decision Model transmission in N channels, and provides the data structure for
As we mentioned in Section 3.1 and 3.2, we use SU with single CR_node, e.g., SU to be able to select one channel and sense the
radio and applications requiring rapid but short-term deployment channel. The CR_config plays a role in channel selection of
and applications denied of cooperation from existing radio spectrum decision, in-band sensing of spectrum sensing, and
access networks. In the case of SU with single radio, this spectrum access of spectrum sharing.
limitation makes the problem of finding an optimal access
strategy challenging, since the state of the system at any time is
only partially observed [10]. In this paper, we postulate a
periodic sensing (PS) approach to render the problem, thus
separating the sensing and the access part of the problem.
Figure 7 shows the sequence of the CR_node from receiving OPNET Modeler defines thirteen event types to support variety
packet from higher layer to transmitting packet to lower layer. of modeling activities. Especially in Idle state, it can handle
When a packet is delivered from higher layer, the CR_node three event types: Self, Stream, and Statistic. Type Self is for
checks whether the packet is larger than segment size or not. If the process that may have multiple events of this type pending at
yes, the packet is assembled. In order to transmit the packet, the the time, event code is usually of interest. Type Stream is for
CR_node needs to spectrum sensing. Firstly, the CR_node when a packet arrives at a processor or queue, causing a stream
selects the spectrum band by one of PS approaches, and senses interrupt, the Simulation Kernel places the packet in the input
this spectrum band to check whether this spectrum band is idle streams FIFO queue. Type Statistic is for when a change
or not at the beginning of slot. After that, the CR_node can occurs in a statistic that is the source of a statistic wire, this may
enable or disable the back-off algorithm. If the CR_node does generate an event for the statistic wires destination processor /
not use the back-off algorithm, it just transmits the packet. queue, depending on the nature of the change and the
Otherwise it also can enable or disable the RTS/CTS exchange configuration of the statistic wire object. In this model,
to solve the hidden terminal problem. If the CR_node does not Statistic type is used for the carrier sensing like in CSMA/CA.
use the RTS/CTS exchange, it just transmits the packet. For this, Idle state uses op_intrpt_type (), op_intrpt_strm (), and
Otherwise, it transmits the RTS, and waits for the CTS. If the op_intrpt_code ().
CR_node receives the CTS, it transmits the packet. This is whole
sequence of the CR_node and it is repeated if the packet exists in For the spectrum management functions, the forced states are
the queue. seven: CH_sense, From_HL, Deference, Xmit, From_LL, Timer,
and Back_off.
As shown in Figure 8, the cr_mac process model consists of
various unforced and forced states, which is different in CH_sense This state plays role in channel selection and
execution-timing. identification of current channel state. As we mentioned before
SU with single radio can sense one channel at the beginning of
Considering relationship with other process model, the Init_# slot. So, channel index, which SU will sense, is determined in
states are three. In Init_1, it performs the initialization of state this state by FO-OSA, OPS-MA, and modified version of IS-MA.
variables, registration of own process model. In Init_2, it Just in case that channel is idle, its node can transmit packet.
performs the creation of nodes MAC address randomly or
manually, and registration of its address in the global address list. From_HL This state plays role in handling packet from higher
In init_3, it performs the initialization of transceivers attributes layer. This process model has two buffers: subq and segbuf. If
and taking destination MAC address manually or automatically segbuf is not empty, the packet is inserted in the subq, otherwise,
to transmit packet. It also interrupts the event of initial channel it is insert in segbuf. The packet will be transmitted if sensing
sensing event. result is idle at the beginning of certain slot in specific channel.
6
Deference This state plays role in deference until the medium MA for single user access), to compare with each other. To
is available for transmission interrupt. As mentioned before, evaluate the SU utilization or throughput according to PU
CR_node can access the channel with the random access utilization, each SU can generate the Poisson traffic as much as
techniques. For this, it considers four kinds of packet: RTS, CTS, the data rate. For more accurate simulation, we set the
DATA, and ACK. The RTS/CTS are for virtual carrier sensing simulation time as 2 hours.
to solve the hidden terminal problem, and the DATA/ACK are
used in any random access techniques such as ALOHA and Number of Channels 5
CSMA. Each node can transmit these kinds of packet interrupted Data Channel Rate 1 (Mbps)
by this state with some Inter-Frame Spaces, e.g. DIFS and SIFS. Number of Secondary Users 1 (single) or 5 (multiple)
Transmission Range 250 (m)
Xmit This state plays role in handling events interrupted by Comparison Group FO-OSA, OPS-MA, OIS-MA
Deference state. It checks the frame type which will be Traffic Generation Model Poisson
transmitted next, and makes the data header structure according Simulation Time 7,200 (sec)
to the frame type. Generally, this data header consists of source
address, destination address, and frame type. If the frame type is Table 1: Simulation parameters
DATA, the packet from higher layer is encrypted in data field, 5.1. Single User Access
otherwise, this field is empty. We first consider the case involving a single user who learns
transmission opportunities by sensing one channel at a time. For
From_LL This state plays role in handling packet from lower the performance upper bound, we consider a FO-OSA policy
layer. When a node receives a packet from lowering, firstly it and for the performance lower bound, we consider a PS-MA
decrypts the received packet and checks whether the destination policy. Figure 9 shows the maximum throughput of SU as PU
address is matched or not. If yes, secondly it checks frame type utilization increases. Since FO-OSA policy senses all channels
to handle differently and handles the received packet according simultaneously at the beginning of every time slot, it shows
to the concept of RTS/CTS/DATA/ACK handshaking. Just in better performance than any other policies. Even though FO-
case that the frame type is the DATA, this state sends the packet OSA is not optimal and cost-consuming, this scheme suggests
to the higher layer. According to the algorithm what we insert, the upper bound of performance in terms of throughput. In the
RTS/CTS handshaking can be enabled or disabled. case of PS-MA policy, since it senses the channels in an
increasing order and only depends on the current sensing
Timer This state plays role in timeout interrupt. The node outcome, it shows lower performance than any other policies.
needs to wait for the expected frame. If expected frame is not Lastly, the IS-MA policy is shown to be throughput optimal for
received, then the node infers collision. In this case, the frame single user cognitive network.
time-out procedure is necessary. This model uses next slot as the
expiry time to wait for the expected frame. Using this time, this
state interrupts event of next channel sensing to transmit existing
packet in the queue.
5. Performance Evaluation
In this section we show the simulation results to evaluate the
performance of the proposed framework by varying PS
approaches. The schemes are evaluated in terms of throughput.
We consider the cases involving single SU and multiple SUs
who learn transmission opportunities by sensing one channel at a
time. Figure 9: SU throughput in single user access case
To evaluate the SU utilization in single-hop topology, we use the 5.2. Multiple User Access
simple scenario as shown in Figure 4. We set the simulation We also consider FO-OSA policy for performance upper bound
parameters as shown in Table 1. We use five data channel with and OPS-MA policy for lower bound in multiple user access
1Mbps data rate to evaluate the performance considering single case. Generally, this case shows lower performance than the case
user and multiple users. We set the transmission range of each of single user access because multiple users can get low
transmission opportunities and collision probabilities between
SU as 250m, and for the single user access, i.e. K N , we set each SU increase. The FO-OSA policy also gives better
the number of SUs as one and for the multiple user access, i.e. performance than any other policies, and the OPS-MA policy
K N , we set the number of SUs as five. We adopt three PS gives lower performance than any others, although it select a
approaches, FO-OSA, OPS-MA, and OIS-MA (PS-MA and IS- channel in orthogonal manner. OIS-MA, which is modified
7
version of IS-MA to select channel orthogonally, shows better technology research for the next TMMR through the LIG Nex1
performance than OPS-MA in this scenario. corporation (Y11-026).
Reference
[1] I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, NeXt
generation/dynamic spectrum access/cognitive radio wireless
networks: A survey, ELSEVIER Computer Networks, vol. 50,
May 2006, pp. 2127-2159.
[2] Facilitating opportunities for flexible, efficient and reliable
spectrum use employing cognitive radio technologies: Notice of
proposed rule making and order, FCC, December 2003, FCC
Doc. ET Docket No. 03-108.
[3] J. Mitola, Cognitive radio: An integrated agent architecture for
software defined radio, Ph. D. Dissertation, KTH Royal Inst. Of
Technol., Stockholm, Sweden, 2000.
[4] B. Wang and K. J. R. Liu, Advances in Cognitive Radio
Networks: A Survey, IEEE Journal of Selected Topics in Signal
Processing, vol. 5, no. 1, February 2011, pp. 5-23.
[5] I. F. Akyildiz, W. Y. Lee, and K. R. Chowdhury, CRAHNs:
Cognitive radio ad hoc networks, ELSEVIER Ad Hoc Networks,
vol. 7, January 2009, pp. 810-836.
[6] C. Cormio and K. R. Chowdhury, A survey on MAC protocols
Figure 10: SU throughput in multiple user access case for cognitive radio networks, ELSEVIER Ad Hoc Networks, vol.
6. Conclusion 7, February 2009, pp. 1315-1329.
[7] S. Haykin, Cognitive Radio: brain-empowered wireless
The CR is regarded to significantly boost spectrum utilization by
communications, IEEE Journal on Selected Areas in
exploiting spectrum bands unused by licensed users. So, we Communications, vol. 23, no. 2, February 2005, pp. 201-220.
introduced CR M&S framework to support development of new [8] R. W. Thomas, L. A. DaSilva, and A. B. MacKenzie, Cognitive
technologies, Firstly, according to spectrum management Networks, in: Proceeding of the IEEE DySPAN, November 2005,
functions, we suggested the modeling direction for CR networks pp. 352-360.
together with system model. Secondly, with this modeling [9] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized
direction, we modeled the network and node models for CR Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc
networks by use of OPNET modeler. For the verification of this Networks: A POMDP Framework, IEEE Journal on Selected
framework, we evaluated the performance varying periodic Areas in Communications, vol. 25, no. 3, April 2007, pp. 589-600.
[10] Q. Zhao, S. Geirhofer, L. Tong, and B. M. Sadler, Optimal
sensing policies. As a result, modified IS-MA policy, i.e., OIS-
Dynamic Spectrum Access via Periodic Channel Sensing, IEEE
MA, showed better performance than the OPS-MA policy. For WCNC, March 2007, pp. 33-37.
future work, we will upgrade the CR framework concerning [11] S. Chen and L. Tong, Maximum Throughput Region of
about spectrum mobility related to nodes mobility and routing Multiuser Cognitive Access of Continuous Time Markov
issues. Channels, IEEE Journal on Selected Areas in Communications,
vol. 29, no. 10, December 2011, pp.1959-1969.
Acknowledgment [12] X. Li, Q. Zhao, X. Guan, and L. Tong, Optimal Cognitive
This research was supported by the MKE (The Ministry of Access of Markovian Channels under Tight Collision
Knowledge Economy), Korea, under the ITRC (Information Constraints, IEEE Journal on Selected Areas in Communications,
vol. 29, no. 4, April 2011, pp. 746-756.
Technology Research Center) support program supervised by the
NIPA (National IT Industry Promotion Agency (NIPA-2012-
(H0301-12-2003)), and also supported by the network protocol