SlideShare uma empresa Scribd logo
1 de 25
Authors: 
Mishra Vishram, 
Lau Chiew Tong, and 
Chan Syin 
Presented By: 
Iffat Anjum 
Date: 
20-11-14
2
 The recent outburst of high definition content delivery 
over wireless network 
 exist a paradox between the shortage of the frequency 
spectrum and its underutilization 
 Cognitive radio based dynamic spectrum access 
technique has been proposed to alleviate such paradox 
by opportunistically utilizing the spectral holes in the 
channels 
3
 In MAC protocols for CRN 
 The idea is to develop a mechanism sharing the media (channel) 
such that: 
 interference is minimized and 
 CR nodes can communicate with each other effectively. 
 MAC scheme requires exchange of control signals 
 Over a common signaling channel 
 control channel saturation problem, can create a bottleneck for the 
communication 
4
 hopping based control channel less protocol can be used 
 which utilizes rendezvous channel as a common channel for 
information exchange. 
 But, it requires a tight synchronization among all nodes 
 ensuring a grade of QoS 
 traffic from different application need to be prioritized in order to 
mitigate the detrimental effects of uniform resource allocation. 
 service latency, signal-to-noise ratio, response time, bandwidth 
etc, should be maintained too. 
5
 In DC-MAC 
 a control channel less, non-channel-hopping MAC protocol for 
single-hop cognitive radio network 
 distributes the contention for channel access onto respective 
channel. 
 A time slotted beacon based structure is utilized on each channel 
to distribute the contention 
 solving the problem of control channel saturation. 
 Four priorities of data type is supported by utilizing different 
inter-frame spaces 
 ensuring of QoS provisioning. 
 Four way handshakes are utilized 
 mitigating the problem of hidden terminals (if any) 
6
 Distributed ad-hoc cognitive radio network comprising of N CR 
nodes and Z licensed users 
 Each CR user equipped with a single half-duplex transceiver for 
communication purpose. 
 A rendezvous channel (RC) selected similar process of C-MAC 
[Cordeiro C., Challapali K., "C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks,"IEEE DySPAN 2007, pp. 
147-157] 
 Four priority classes 
[WMM: Wi-Fi Alliance. "Wi-fi certified for wmm - support for multimedia applications with Quality of Service in Wi-Fi networks," 
Technical report, Wi-Fi Alliance, 2004. 
7
 The CR network is non-hopping network 
 a CR node in the network stay on the selected channel until the 
channel ceases to be free or the node has to move to other channel 
for some reason. 
 The channel on which a node resides is called as home channel 
while all other channels w.r.t. it are termed as foreign channels. 
 Each channel has a representative which broadcasts the 
information about the nodes residing on the home channel 
onto RC. 
 The representative node (RN) is selected periodically 
 Periodic Quiet periods are used for the purpose of sensing an 
incumbent user on a channel. 
 A node can perform in-band sensing or out-of-band sensing. 
8
9 
Figure: Superframe structures for channels in DC-MAC
 The superframe of RC is composed of three separate intervals: 
 Rendezvous channel beacon (RCB), 
 Data transfer and 
 Quiet period. 
 A RCB has time-slotted architecture, where the size of RCB 
depends on 
 the number of channels used in the system+2 (C+2) 
 During RCB, RN from all channels transmit their beacons on their 
respective slots 
 During quiet period of RC, all nodes which have home channel as 
RC stop their communication and perform in-band sensing. 
10
 A superframe of data channel is composed of four separate 
intervals: 
 Home channel beacon (HCB), 
 Home channel information beacon (HCI), 
 data transfer and 
 quiet period. 
 A home channel beacon has a time-slotted architecture 
 size of HCB depends upon the number of nodes on home channel. 
 number of time-slot = number of nodes on home channel + 1 
 RN distributes the information gained from RCB 
 all the nodes on a home channel know about the information about 
the home channels of all other nodes in the network 
 distribution of quiet period 
 channel conditions 
11
 A superframe of data channel is composed of four separate 
intervals: 
 Home channel beacon (HCB), 
 Home channel information beacon (HCI), 
 data transfer and 
 quiet period. 
 A home channel beacon has a time-slotted architecture 
 size of HCB depends upon the number of nodes on home channel. 
 The number of time-slot equals the number of nodes on home 
channel + 1. 
 RN distributes the information gained from RCB, 
 all the nodes on a home channel know about the information about 
the home channels of all other nodes in the network including the 
distribution of quiet period and channel conditions. 
12
 A HCI is used to elect a RN from the set of all home nodes. 
 The home node which has the least amount of load is elected 
as a RN. 
 Assume, the load metric to be weighted average of 
packets sent/received in last 5 frames. 
13 
Ni: represents the number of packets 
sent/received in last ith frame
 Rendezvous Channel (RC) is established 
 all nodes join through Rendezvous Channel Beacon (RCB) 
 Initially nodes on RC perform out-of-band sensing to gather 
information about other channels and this information is used for 
migration purpose. 
 If no node exists on a channel, then a new node migrates from RC 
to that channel and starts its own beacon so that other nodes can 
follow up (migrate). 
 Assume 
 all node uniformly select a channel as home channel. 
 average N/C CR users on each channel. 
14 
Network Initialization
 The data transfer on RC and data channel follows RTS/CTS 
mechanism similar to 802.11. 
 Here a four way handshake is employed to handle the multi-channel 
hidden terminal problem. 
 RTS/CTS packet contains network allocation vector (NAV) to 
indicate the duration of transmission. 
 The size of NAV can be calculated as: 
 This allows other nodes in the network to go into doze mode 
for power saving 
15 
DC-MAC Working
 The system employs different set of inter-frame spaces for the 
purpose of provisioning of QoS. 
 An IFS is a random duration of time defined in [0, interval] 
 Before transmitting any message a node perform sensing of the 
channel 
 decreases its counter at each step when the channel is sensed 
free; 
 if the channel is sensed busy the counter is freezed. 
 sends the packet when the counter has reached zero. 
16 
DC-MAC Working
 Depending upon the home channels of transmitter and 
receiver 
 the communication may take place on either of the home 
channels of participating node. 
 If the specified channel characteristics are not available on any 
of the home channels, 
 then the communication may take place over a foreign channel 
17 
DC-MAC Working
 If both transmitter and receiver are on the same channel 
 then communication takes place using RTS/CTS/DATA/ACK 
mechanism, after IFS. 
 All nodes which overhear the transmission 
 Back-off their own transmission and goes into doze mode until the current 
communication is finished. 
 If the destination node lies on a channel other than that of the 
home channel of sender 
 the sender moves to the home channel of destination node 
 Once the communication is finished or HCI of the home channel of 
the sender starts, the sender moves back to its own home channel. 
18 
Data Transfer on Home Channel
 A sender first moves to the home channel of the destination 
node 
 sends MOV packet which contains the destination ID along with 
the channel the channel to which the destination node should 
move on. 
 If the receiver agrees, it replies with an acknowledgement. 
 Immediately after acknowledgement, both transmitter and 
receiver moves to the foreign channel 
 Once the communication is finished or the HCI of the home 
channel of the nodes starts, the nodes move back to their home 
channels. 
19 
Data Transfer on a Foreign Channel
 A sender first moves to the home channel of the destination 
node 
 sends MOV packet which contains the destination ID along with 
the channel info 
 If the receiver agrees, it replies with an acknowledgement. 
 Immediately after acknowledgement, both transmitter and 
receiver moves to the foreign channel 
 Once the communication is finished or the HCI of the home 
channel of the nodes starts, the nodes move back to their home 
channels. 
20 
Data Transfer on a Foreign Channel
 All C channels are modeled as ON-OFF source depending upon 
the presence or absence of the PU respectively. 
 The probability that a given channel will be available is 
calculated by, 
21
 Performance evaluation of the system done in a discrete event 
simulator in MATLAB which simulates the system up to MAC 
frame level. 
 The proposed scheme is compared against similar literature work 
(C-MAC) done in [5]. 
 proposed a distributed contention based MAC scheme for ad-hoc 
cognitive radio network with QoS provisioning. 
 distributes the contention of channel access onto different channels 
 reduces the control channel saturation problem. 
 simple temporal synchronization across all channels with non-hopping 
nodes in the network. 
 four different access categories to data packets based on different 
priorities. 
22
23
24
25

Mais conteúdo relacionado

Mais procurados

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
meenamunesh
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
hinalala
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Polytechnique Montreal
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
hinalala
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 

Mais procurados (20)

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
clas 8
clas 8clas 8
clas 8
 
Ea34772776
Ea34772776Ea34772776
Ea34772776
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
MAC
MACMAC
MAC
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 

Destaque

Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
Iffat Anjum
 

Destaque (15)

Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptx
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environment
 
Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generation
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to Compiler
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
 

Semelhante a Distributed contention based mac protocol for cognitive radio

Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
Mumbai Academisc
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
Mahesh Rajawat
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 

Semelhante a Distributed contention based mac protocol for cognitive radio (20)

Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
I017616468
I017616468I017616468
I017616468
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
New rough
New roughNew rough
New rough
 
Wcdma channels
Wcdma channelsWcdma channels
Wcdma channels
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network
 
Sctp
SctpSctp
Sctp
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 

Mais de Iffat Anjum

Qo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networksQo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networks
Iffat Anjum
 

Mais de Iffat Anjum (15)

Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysis
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcare
 
Data link control
Data link controlData link control
Data link control
 
Pnp mac preemptive slot allocation and non preemptive transmission for provid...
Pnp mac preemptive slot allocation and non preemptive transmission for provid...Pnp mac preemptive slot allocation and non preemptive transmission for provid...
Pnp mac preemptive slot allocation and non preemptive transmission for provid...
 
Qo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networksQo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networks
 
A reinforcement learning based routing protocol with qo s support for biomedi...
A reinforcement learning based routing protocol with qo s support for biomedi...A reinforcement learning based routing protocol with qo s support for biomedi...
A reinforcement learning based routing protocol with qo s support for biomedi...
 
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
Library system
Library systemLibrary system
Library system
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Motorola microprocessor
Motorola microprocessorMotorola microprocessor
Motorola microprocessor
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Distributed contention based mac protocol for cognitive radio

  • 1. Authors: Mishra Vishram, Lau Chiew Tong, and Chan Syin Presented By: Iffat Anjum Date: 20-11-14
  • 2. 2
  • 3.  The recent outburst of high definition content delivery over wireless network  exist a paradox between the shortage of the frequency spectrum and its underutilization  Cognitive radio based dynamic spectrum access technique has been proposed to alleviate such paradox by opportunistically utilizing the spectral holes in the channels 3
  • 4.  In MAC protocols for CRN  The idea is to develop a mechanism sharing the media (channel) such that:  interference is minimized and  CR nodes can communicate with each other effectively.  MAC scheme requires exchange of control signals  Over a common signaling channel  control channel saturation problem, can create a bottleneck for the communication 4
  • 5.  hopping based control channel less protocol can be used  which utilizes rendezvous channel as a common channel for information exchange.  But, it requires a tight synchronization among all nodes  ensuring a grade of QoS  traffic from different application need to be prioritized in order to mitigate the detrimental effects of uniform resource allocation.  service latency, signal-to-noise ratio, response time, bandwidth etc, should be maintained too. 5
  • 6.  In DC-MAC  a control channel less, non-channel-hopping MAC protocol for single-hop cognitive radio network  distributes the contention for channel access onto respective channel.  A time slotted beacon based structure is utilized on each channel to distribute the contention  solving the problem of control channel saturation.  Four priorities of data type is supported by utilizing different inter-frame spaces  ensuring of QoS provisioning.  Four way handshakes are utilized  mitigating the problem of hidden terminals (if any) 6
  • 7.  Distributed ad-hoc cognitive radio network comprising of N CR nodes and Z licensed users  Each CR user equipped with a single half-duplex transceiver for communication purpose.  A rendezvous channel (RC) selected similar process of C-MAC [Cordeiro C., Challapali K., "C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks,"IEEE DySPAN 2007, pp. 147-157]  Four priority classes [WMM: Wi-Fi Alliance. "Wi-fi certified for wmm - support for multimedia applications with Quality of Service in Wi-Fi networks," Technical report, Wi-Fi Alliance, 2004. 7
  • 8.  The CR network is non-hopping network  a CR node in the network stay on the selected channel until the channel ceases to be free or the node has to move to other channel for some reason.  The channel on which a node resides is called as home channel while all other channels w.r.t. it are termed as foreign channels.  Each channel has a representative which broadcasts the information about the nodes residing on the home channel onto RC.  The representative node (RN) is selected periodically  Periodic Quiet periods are used for the purpose of sensing an incumbent user on a channel.  A node can perform in-band sensing or out-of-band sensing. 8
  • 9. 9 Figure: Superframe structures for channels in DC-MAC
  • 10.  The superframe of RC is composed of three separate intervals:  Rendezvous channel beacon (RCB),  Data transfer and  Quiet period.  A RCB has time-slotted architecture, where the size of RCB depends on  the number of channels used in the system+2 (C+2)  During RCB, RN from all channels transmit their beacons on their respective slots  During quiet period of RC, all nodes which have home channel as RC stop their communication and perform in-band sensing. 10
  • 11.  A superframe of data channel is composed of four separate intervals:  Home channel beacon (HCB),  Home channel information beacon (HCI),  data transfer and  quiet period.  A home channel beacon has a time-slotted architecture  size of HCB depends upon the number of nodes on home channel.  number of time-slot = number of nodes on home channel + 1  RN distributes the information gained from RCB  all the nodes on a home channel know about the information about the home channels of all other nodes in the network  distribution of quiet period  channel conditions 11
  • 12.  A superframe of data channel is composed of four separate intervals:  Home channel beacon (HCB),  Home channel information beacon (HCI),  data transfer and  quiet period.  A home channel beacon has a time-slotted architecture  size of HCB depends upon the number of nodes on home channel.  The number of time-slot equals the number of nodes on home channel + 1.  RN distributes the information gained from RCB,  all the nodes on a home channel know about the information about the home channels of all other nodes in the network including the distribution of quiet period and channel conditions. 12
  • 13.  A HCI is used to elect a RN from the set of all home nodes.  The home node which has the least amount of load is elected as a RN.  Assume, the load metric to be weighted average of packets sent/received in last 5 frames. 13 Ni: represents the number of packets sent/received in last ith frame
  • 14.  Rendezvous Channel (RC) is established  all nodes join through Rendezvous Channel Beacon (RCB)  Initially nodes on RC perform out-of-band sensing to gather information about other channels and this information is used for migration purpose.  If no node exists on a channel, then a new node migrates from RC to that channel and starts its own beacon so that other nodes can follow up (migrate).  Assume  all node uniformly select a channel as home channel.  average N/C CR users on each channel. 14 Network Initialization
  • 15.  The data transfer on RC and data channel follows RTS/CTS mechanism similar to 802.11.  Here a four way handshake is employed to handle the multi-channel hidden terminal problem.  RTS/CTS packet contains network allocation vector (NAV) to indicate the duration of transmission.  The size of NAV can be calculated as:  This allows other nodes in the network to go into doze mode for power saving 15 DC-MAC Working
  • 16.  The system employs different set of inter-frame spaces for the purpose of provisioning of QoS.  An IFS is a random duration of time defined in [0, interval]  Before transmitting any message a node perform sensing of the channel  decreases its counter at each step when the channel is sensed free;  if the channel is sensed busy the counter is freezed.  sends the packet when the counter has reached zero. 16 DC-MAC Working
  • 17.  Depending upon the home channels of transmitter and receiver  the communication may take place on either of the home channels of participating node.  If the specified channel characteristics are not available on any of the home channels,  then the communication may take place over a foreign channel 17 DC-MAC Working
  • 18.  If both transmitter and receiver are on the same channel  then communication takes place using RTS/CTS/DATA/ACK mechanism, after IFS.  All nodes which overhear the transmission  Back-off their own transmission and goes into doze mode until the current communication is finished.  If the destination node lies on a channel other than that of the home channel of sender  the sender moves to the home channel of destination node  Once the communication is finished or HCI of the home channel of the sender starts, the sender moves back to its own home channel. 18 Data Transfer on Home Channel
  • 19.  A sender first moves to the home channel of the destination node  sends MOV packet which contains the destination ID along with the channel the channel to which the destination node should move on.  If the receiver agrees, it replies with an acknowledgement.  Immediately after acknowledgement, both transmitter and receiver moves to the foreign channel  Once the communication is finished or the HCI of the home channel of the nodes starts, the nodes move back to their home channels. 19 Data Transfer on a Foreign Channel
  • 20.  A sender first moves to the home channel of the destination node  sends MOV packet which contains the destination ID along with the channel info  If the receiver agrees, it replies with an acknowledgement.  Immediately after acknowledgement, both transmitter and receiver moves to the foreign channel  Once the communication is finished or the HCI of the home channel of the nodes starts, the nodes move back to their home channels. 20 Data Transfer on a Foreign Channel
  • 21.  All C channels are modeled as ON-OFF source depending upon the presence or absence of the PU respectively.  The probability that a given channel will be available is calculated by, 21
  • 22.  Performance evaluation of the system done in a discrete event simulator in MATLAB which simulates the system up to MAC frame level.  The proposed scheme is compared against similar literature work (C-MAC) done in [5].  proposed a distributed contention based MAC scheme for ad-hoc cognitive radio network with QoS provisioning.  distributes the contention of channel access onto different channels  reduces the control channel saturation problem.  simple temporal synchronization across all channels with non-hopping nodes in the network.  four different access categories to data packets based on different priorities. 22
  • 23. 23
  • 24. 24
  • 25. 25