Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract—Cognitive radio is a smart technology which simulation model for the two C-MACs are introduced using
can enhance the wireless communications by using the NS-2. In section IV, the simulation results have been shown.
opportunistic access of the spectrum. Cognitive Radio Ad
Hoc Network is a promising wireless network which II. DESCRIPTION OF PROPOSED C-MACS SCENARIOS
depends on this technology. In this paper, we evaluate the
performance evaluation of two different medium Access A. Single Radio–Multi channels Cognitive Medium Access
control protocols scenarios; single radio-multi channels Control protocol
Cognitive medium Access Control Protocol and two radios In a single radio-multi channels cognitive medium Access
-multi channels cognitive medium access control protocol control protocol (1 RM-CMAC), each SU is equipped with
using Network Simulator 2 (NS-2). This study investigates one radio transceiver. “Fig. 1,” shows the flowchart of single
the impact of increasing the packet size on the performance radio-multi channels cognitive medium access control Protocol
metrics such as network throughput. Simulation results
proves that single radio-multi channels cognitive medium
access control protocol outperforms the two radios-multi Sense all LCs.
channels cognitive medium access control protocol in all
aspects of performance metrics with increasing the packet
size.
Create a free LCS list.
Keywords—Cognitive Radio; Cognitive Radio Ad Hoc
Networks; Meduim Access Control Protocols; Spectrum
Opportunstic Access. Select one of free LCS to be operating Channel.
I. INTRODUCTION
Broadcast the free channel list and selected (Chi).
Emerging the cognitive radio technology (CRT) is an
important step for enhancing the performance of wireless
communication networks. It leads to emerge an idea of new
Perform carrier sensing for selected channel (Ch i).
wireless networks called cognitive radio ad hoc networks
(CRAHNs). In CRAHNs, each user called secondary user (SU)
can communicate with another SU by opportunistically using No
the licensed channels (LCs) if the owners of the LCS called If Chi
primary users (PUs) are absent. This communication way is free
known as Opportunistic Spectrum Access (OSA). Hence, the
cognitive medium access control protocols (C-MAC) for Yes
CRAHNs have been introduced in order to simply achieve the
OSA concept [1,2,6,8,9]. Perform CSMA\ CA on (Ch i)
76
The performance of SUs can be summarized as In two radios-multi channels cognitive medium access
follows: control protocol (2 RM-CMAC), Every SU possess two radios
• Start an initialization state for an interval time (Ti); which can be operated on (N) of free channels of licensed
Sense all LCs. channels with different raw channel bandwidth. Each SU has
• Create a free LCS list. two radio interfaces; fixed interface and switchable one. The
SU assigns one of free licensed channels to the fixed radio
• Select one of free LCS to be operating Channel based
interface and dynamically change a selected channel to another
on a desired Q.o.S metric.
free one as soon as PU appears on it.
• Broadcast the free channel list and selected one.
• End the initialization state. • Using fixed radio interface enables the SU to
• Start operating state. perform the sensing cycle. The sensing cycle
• Perform carrier sensing for selected channel (Ch i). consists of two states; sensing state for a time
interval (Ts) and control state for a time interval
• If Ch i is not free, select one of free LCS to be
(To) in order to send control data.
operating Channel based on a desired Q.o.S metric in
order to perform the hand-off process. Else, perform • By using switchable radio interface, the SU can
CSMA\ CA on Ch i; content for Ch i, perform bake- switch among all available channels from free
off, send the message and then end the operating state. licensed channels in order to communicate to
another SU and keep the network connectivity.
• If PU suddenly appears during the transmission, stop
the transmission. The performance of SUs can be summarized as follows:
• Start initialization state for an interval time T i;
B. Two Radio–Multi channels Cognitive Medium Access
sense All LCS.
Control protocol
• Determine free LCs.
The flowchart of SU activity is depicted as shown in “Fig. 2”. • Select one of free LCs in order to assign it to the
fixed radio
Sense all LCs. • Start Sensing Cycle by using a fixed radio
interface.
• Start Sensing state; sense a selected channel (Ch i)
Create a free LCS list. for Ts period
• If PU appear for Ts period, then leave Ch i.
Select one of free LCS for the fixed radio. • Else, Start Control state for period to broadcast
the control data.
• Start communication state; if SU1 needs to
Sense a selected channel (Ch i). communicate with SU2, then it tunes its
switchable interface to the channel used by fixed
interface of SU2.
No
If Chi • If PU suddenly appears during the transmission,
free stop the transmission.
Yes
III. STYLINSIMULATION MODEL
77
TABLE1 SIMULATION PARAMETTER
50000
45000
Parameter Value / type
40000
CRAHN topology parameters 35000
30000
Network area 400 * 400 m2 Throughput
25000
(kbps)
SU number 26 20000
15000
SUs Spatial distribution Uniform random distribution
10000
Physical layer parameters 5000
0
The number of LCs 11 1000 1200 1400 1600 1800 2000
Propagation model Two-ray ground Packet Size (bytes)
Sensing time 0.025 s
Operating time 0.6 s 2 RM-CMAC 1 RM-CMAC
Simulation time 100
Fig. 3. the impact of increasing the packet size on network throughput for
C. Performance evaluation metrics both protocols
Fig. 4. the impact of increasing the packet size on packet delivery ratio for
both protocols
78
in Cognitive Radio Networks", IEEE Wireless
Communnication Letters,vol. 6(3), pp.358-361,2017.
70000 [4] M. Di Felice, K Chowdhury, W kim, A.Kassler, L.
60000 Bononi, “ End-to-end protocols for Cognitive Radio Ad
Hoc Networks: An evaluation study”, ELSVEIR, J.
50000 performance evaluation., vol. 68, pp. 859-875, 2011.
[5] https://ns2tutor.weebly.com/simulation-of-adhoc-
Recieved 40000 networks.html. Last access August 2018.
Packet 30000 [6] Y. Han, E. Ekici, H. Kremo, O. Altintas, "A survey of
MAC issues for TV white space access", ElSIEVER, J.
20000 Ad Hoc Networks, vol. 27, pp. 195–218, 2015.
10000 [7] http://cogns.net/. Last access August 2018.
[8] H. Al-Mahdi, M. Kalil, “A Dynamic Hop-Aware Buffer Management
0 Scheme for Multi-Hop Ad Hoc Networks”, Jour. IEEE Wireless
1000 1200 1400 1600 1800 2000 Commun. Letters, vol 6(1), pp.22-25, 2017.
Packet Size (bytes) [9] Z. Fuhui , W. Yongpeng, L. Ying-Chang, L. Zan, W.
Yuhao, W. Kai-Kit, “ State of the Art, Taxonomy, and
Open Issues on Cognitive Radio Networks with NOMA”,
2RM-CMAC 1RM-CMAC IEEE Wireless Communications, vol. 25(2), pp.1-17,
2018.
Fig.5. the impact of increasing the packet size on received packet for both
protocols
V. Conclusion
We perform simulation model to evaluate the performance of
C-MACs for CRAHNs. The impacts of increasing the packet
size affect the performance of whole CRAHNs. Simulation
results displays that single radio-multi channels cognitive
medium access control protocol outperforms two radios-Multi
Channels Cognitive medium Access Control Protocol in all
aspects of performance metrics with increasing the packet size.
We noticed that the sensing cycle of 2RM-MAC is responsible
for lower performance metrics of 2RM-CMAC than
performance metrics of 1RM-CMAC.
The cons of using both protocols:
1. Both protocols utilize licensed channel without using
dedicated common control channel for control
packets.
2. They use dynamic manner to enhance the access to
the spectrum.
3. They consider the Q.o.S requirements.
The pros of using 2 RM-CMAC protocol:
1. 2 RM-CMAC protocol is used two radios. Hence, it
does not save the battery live.
2. In2 RM-CMAC protocol, the transmission will stop
if PU appears in the operating channel.
REFERENCES
79