Professional Documents
Culture Documents
Faculty of engineering
MASTER OF ENGINEERING
Fig.2
Fig.3
Fig.4
Fig.5
Fig.6
Fig.7
Fig.8
Fig.9
Fig.10
Fig.11
Fig.12
Fig.13
Fig.14
Fig.15
Fig.16
Fig.17
List of Tables
Table.2
Table.3
Table.4
Table.5
Table.6
Table.7
Table.8
Table.9
Table.10
Abbreviations
Abbreviation illustration
CR Cognitive Radio
1. Problem statement.................................................................................1
2. Goals …………………………………………………………………1
3. Thesis organization...............................................................................1
1. Problem statement
The term radio spectrum refers to a limited frequency range, which
divided into different frequency bands, each having specific applications.
Therefore, there is a finite resource with competing demand which means
spectrum scarcity problem.
2. Goals
The Cognitive radio (CR) [1][2] is a futuristic technology formed to solve
the spectrum scarcity problem. A cognitive radio (CR) is the radio that is
able to be programmed and configured dynamically to use the best
wireless communication channels in its neighbor's channels to keep away
from user interference and congestion.
3. Thesis organization
Following this introduction, the thesis has five chapters reminder. These
chapters can be organized as follows:
Chapter 1: It is an overview includes cognitive radio networks
definitions, characteristics, Network architectures, and cognitive
radio cycle.
Chapter 2: This chapter shows different CR-MAC protocols
Chapter 3: This chapter presents the back-off algorithm as an
enhancing technique.
Chapter 4: This chapter presents the channel allocation schemes.
Chapter 5: It illustrates the wishing Cognitive Radio and its
Application for Next Generations.
Chapter 6: Conclusions of the simulation analysis of all proposed
techniques in last chapters and future works.
The thesis ends with a bibliography of all references cited in the
thesis.
Chapter 1:
Cognitive Radio Networks: an overview
Contents
Contents
The five steps of the proposed DOSS Mac protocol can be detailed in the
following flow chart.
Fig. 8. Flow chart for the DOSS algorithm
2.3 Time slotted CR MAC protocols [9]
In this category the control channel is divided into time slots fixed in
length. Each time slot represents one CR node, and nodes can only
communicate in their respective time slots. Each time slot has two
periods:
a) Listening period
b) Transceiving period.
The SYN-MAC [14] protocol has a dedicated radio one for listening to
the channel for control messages, the second transceiver is used for data
transmission. In this protocol Time is divided into time slots and each slot
represents a particular data channel. As shown in the following figure.
Figure 11: the structure of SYNC- MAC protocol.
1. The control signal exchange occurs in the channels
represented by the corresponding slots. At the beginning of each
time slot, the CR users tune their dedicated control radios to the
channel specified by it.
2. Users that wish to start a data transmission must send out a
beacon at this time.
3. Interested neighbors respond with their own list of available
channels
4. Then communication is done in one of those selected
channels.
5. After finishing the channel, returns it to be free.
Simulation analysis:
Conclusion.
Contents
vii. Blocking in DOSS protocol occurs when all channels are busy or
common control channel is used by other SU.
number of blocked data packets
Blockingratio=
total number of transmitted packets
Conclusion
In this research, an overview of the state of the art for cognitive radio
cycle and accessing protocols is presented. The ordinary DOSS-MAC
protocol for the cognitive radio based wireless networks is explained
briefly. Back-off algorithm is illustrated. A modified DOSS algorithm
based on BOT mechanism is investigated. Moreover, a simulation study
between the proposed technique and the ordinary DOSS-MAC protocol
is illustrated. The accessing channel mechanism of ordinary DOSS-MAC
protocol occurs by selecting a free channel from predefined free usage list
for control signals without any investigation or minimization to blocking
probability. Applying back-off algorithm (BOA) on DOSS-MAC
protocol increases the data transmission with priority of illuminating
blocking ratios.
Using simulation analysis, the proposed DOSS with BOA method has
significantly enhanced the performance. The number of successful data
delivered for cognitive users is increased. Hence, the proposed DOSS
with BOA method has enhanced the throughput compare with the
ordinary DOSS-MAC protocol. The simulated performance analyses of
the network for applying both of strategies prove that using BOA-DOSS
algorithm can decrease blocking ratio and increase throughput without
interfering with PU activities.
Chapter 4:
Enhancing DOSS MAC protocol with different
Channel allocation schemes
Contents
In this section DCA scheme of DOSS mac protocol with BOA will be
analyzed and simulated. The blocking and dropping ratios can be
estimated at 5 retransmissions. In these results, the DCA scheme of
DOSS mac protocol will be represented if number of retransmission n=0;
Otherwise, it will be DCA scheme of DOSS mac protocol with back-off
algorithm. Moreover, the effect of varying PU arrival rate λ pu from 0 to 1
can be analyzed.
The blocking ratio is increased linearly when PU arrival rate increases
as shown in Fig. 22. This linear increment occurs due to the decreasing in
free spectrum bands. It stops at appoint of network saturation. At this
point, the number of blocked data is seemed to be fixed. As shown in
figure 25, the blocking can be illuminated after 3 times of retransmission
trails n=3.
Fig. 25 Blocking ratio versus PU arrival rate
The dropping ratio versus PU arrival rate is presented as shown in Fig.
23. The dropping ratio is increased with PU arrival rate. This increment is
normally occurs due to the increment of increasing PU activity in the
network. As the increasing of PUs increases the probability of applying
on a used spectrum portion by SUs, this leads to drop the SU immediately
with respect to PU priority.
After using back-off algorithm, the blocking ratios decreased when
number of data re transmissions increases. The probability of delivering
data successfully without blocking is increased with the increment of
dropping ratio. After a certain number of data retransmission times, the
network congestion is occurred which leads a saturation in the network.
Therefore, the optimum number of data retransmission times can be
selected.
The trade-off is to select an optimum number of data re transmissions
that decrease blocking and dropping ratio. Fig. 9 shows the relation
between blocking and dropping ratios versus number of data re
transmissions.
Fig. 26 Dropping ratio versus PU arrival rate
That is means, blocking ratio will be nearly saturated after 3 trials of
data re transmissions. The dropping seems to be stabled. Any more trials
than 3will be worthless and increase network traffic. Hence, the optimum
number of data re transmission for this network scenario is three trails.
The optimum point of retransmissions will be at n=3. When PU arrival
rate equal to zero, the licensed channels will be occupied by SUs only,
the SU dropping ratio and blocking ratio will be zero in both MAC
protocols. The collision ratio is high if many users transmit in the
beginning of time slot. Thus, the collision ratio in DOSS-MAC protocol
is higher than the collision ratio in the BOT-DOSS MAC protocol.
Fig. 27 Success ratio of DCA scheme of DOSS and DCA scheme of
DOSS with BOA versus PU arrival rate
As shown in Fig. 27, the success ratio of DCA scheme of DOSS
-MAC protocol will be lower than the throughput of DCA scheme of
DOSS MAC protocol with BOA. By increasing the PU arrival rate, SU
blocking and SU dropping ratios will be increased. Hence, the throughput
will decrease. Due to the BOT technique, the throughput of the DCA
scheme of BOT-DOSS MAC protocol is higher than the throughput of
the ordinary DCA scheme of DOSS MAC protocol.
Finally, it is clearly observed that the enhancement of DOSS protocol
with BOA and DCA scheme can illuminate blocking occurrence by the
aid of retrying of transmission in BOA and dynamic channel selection in
DCA. It considers handling to blocked packets. This is shown in Fig.27.
Conclusion
حتت ارشاف
أ.د .صالح ابراهيم سعيد
أ.د .محمد فؤاد