1
Cooperative Adaptive Spectrum Sharing in Cognitive
Radio Networks
Haythem Bany Salameh
Marwan Krunz
Dept. of Telecomm. Eng.
Dept. of Electrical and Computer Eng.
Yarmouk Univ., Irbid, Jordan
Univ. of Arizona, Tucson, AZ
Email: haythem@ece.arizona.edu
Email: krunz@ece.arizona.edu
Abstract— The cognitive radio (CR) paradigm calls for open
spectrum access according to a predetermined etiquette. Under
this paradigm, CR nodes access the spectrum opportunistically by
continuously monitoring the operating channels. A key challenge
in this domain is how the nodes in a CR network (CRN)
cooperate to access the medium in order to maximize the CRN
throughput. Typical multi-channel MAC protocols assume that
frequency channels are adjacent and that there are no constraints
on the transmission power. However, a CRN may operate over a
wide range of frequencies, and a power mask is often enforced
on the transmission of a CR user to avoid corrupting the
transmissions of spectrum-licensed primary-radio (PR) users. To
avoid unnecessary blocking of CR transmissions, we propose a
novel distance-dependent MAC protocol for CRNs. Our protocol,
called DDMAC, attempts to maximize the CRN throughput. It
uses a novel probabilistic channel assignment mechanism that
exploits the dependence between the signal’s attenuation model
and the transmission distance while considering the traffic profile.
DDMAC allows a pair of CR users to communicate on a channel
that may not be optimal from one user’s perspective, but that
allows more concurrent transmissions to take place, especially
under moderate and high traffic loads. Simulation results indicate
that compared to typical multi-channel CSMA-based protocols,
DDMAC reduces the blocking rate of CR requests by up to 30%,
which consequently improves the network throughput.
Index Terms— Cognitive radio networks, spectrum access,
distance-awareness, traffic-awareness, MAC protocols.
I. I NTRODUCTION
Spectrum measurements by FCC and other organizations
(e.g., XG DARPA initiative) indicate significant temporal and
geographical variations in the utilization of the licensed spectrum, ranging from 15% to 85% [1]. These measurements
motivated the need for a new technology that improves spectrum utilization without degrading the performance of licensed
primary radio networks (PRNs). To cope with the rising demand
in unlicensed wireless services, cognitive radio (CR) technology
has been proposed. This technology allows an open access to
the spectrum subject to a predetermined etiquette. In a cognitive
radio network (CRN), users are aware of the radio frequencies
used by existing legacy networks, and they opportunistically
adapt their communication parameters to be able to communicate without affecting active PR users.
A CRN has unique characteristics that distinguish it from
traditional multi-channel wireless networks. Unlike traditional wireless networks, which typically occupy contiguous
bands [2]–[4], a CRN is expected to operate over a set of
widely-separated non-contiguous frequency bands. Communication on such bands exhibits different RF attenuation and
interference behaviors. It is well known that signal attenuation
An abridged version of this paper was presented at the IEEE SECON’08 Conference, June 2008. This research was supported in part by NSF (under grants
CNS-0721935, CNS-0627118, CNS-0325979, and CNS-0313234), Raytheon,
and Connection One (an I/UCRC NSF/industry/university consortium).
Ossama Younis
Applied Research, Telcordia Techn., Inc.
Piscataway, NJ
Email: oyounis@research.telcordia.com
increases with the distance between the two communicating
users and also with the carrier frequency used for communication [5]. Therefore, when assigning transmission channels in a
CRN, it is necessary to consider the signal attenuation model
and the interference conditions to improve spectrum utilization.
Another characteristic of a CRN is that users must operate using
a relatively low transmission power (i.e., abide by a power
mask) to avoid degrading the performance of the PR users [4].
These peculiar characteristics call for new MAC protocols that
efficiently utilize the available spectrum while improving the
overall network throughput.
A. Motivation
Channel assignment mechanisms in traditional multi-channel
wireless networks typically select the “best” channel, or set
of channels, for a given transmission (e.g., [3], [6], [7]). In
these mechanisms, the best channel is often defined as the
one that supports the highest rate. We refer to this approach
as the best multi-channel (BMC) approach. When the BMC
approach is employed in a CRN, the blocking probability for
CR transmissions, defined as the percentage of CR packet
requests that are blocked due to the unavailability of a feasible
channel assignment, can increase, leading to a reduction in the
network throughput. To illustrate, consider an environment in
which two PRNs and one CRN coexist. PRN 1 operates over
a low-frequency band (CH1), while PRN 2 operates over a
high-frequency band (CH2). Suppose that PRN 2 introduces
a higher average PR-to-CR interference. Consequently, a CR
receiver experiences a higher average signal-to-interferenceplus-noise ratio (SINR) over CH1 than over CH2. Assume
that two CR users A and C need to send data to CR users B and
D, respectively (see Figure 1). Also assume that the distance
between A and B (dAB ) is less than that between C and D
(dCD ). Figure 1(a) shows that when the CR users employ the
BMC approach, the transmission A → B uses CH1, whereas
the transmission C → D uses CH2. A → B is allowed
to proceed because it operates over a low carrier-frequency
channel with low PR-to-CR interference for a short transmission distance. On the other hand, C → D requires relatively
higher transmission power to overcome the high attenuation
associated with the high-frequency/high-interference channel
and the long transmission distance. If the required transmission
power exceeds the specified power mask, C → D cannot
proceed. However, both A → B and C → D have much better
chances of proceeding simultaneously if each CR transmitter
selects channels while keeping in mind the constraining power
mask of the other transmitter (Figure 1(b)).
As a numerical example, assume that PRN 1 and PRN 2
operate in the 900 MHz and 2.4 GHz bands, respectively.
Assume that dAB = 10 meters and dCD = 50 meters. Also
assume that a CR transmission is successful if the received
SINR over the selected channel is greater than the SINR
threshold. For both channels, we set the SINR threshold and the
interference mask to 5 dB and 60 mW, respectively. Assume
that CR receivers B and D experience the same level of total
interference over both channels (0.05 µW). Given the above
parameters and using the propagation model in [8] with path
loss exponent of 2, the required transmit powers over CH1
and CH2 for A → B are 2.2 mW and 16 mW, respectively.
For C → D, these powers are 56.18 mW and 399.5 mW.
According to the BMC scheme (Figure 1(a)), A → B can
proceed over CH1 (the power mask is not violated), whereas
C → D cannot proceed over CH2 (the required transmit power
exceeds the power mask). On the other hand, if A → B uses
CH2 and C → D uses CH1, both transmissions can proceed
simultaneously (Figure 1(b)).
C
CH 2
D
C
CH 1
D
X
A
B
CH 1
(a) BMC channel assignment
A
B
CH 2
(b) Distance-dependent channel assignment
Fig. 1.
Scenarios in which two CR transmissions can/cannot proceed
simultaneously.
It is worth mentioning that in a given (one-hop) neighborhood, the optimal channel assignment that maximizes the
number of simultaneous CR transmissions can be formulated
as an integer linear programming (ILP) problem [9], [10].
Since computing the optimal solution for the ILP problem
grows exponentially with the size of the network [9], heuristic
algorithms with suboptimal performance are needed. Such
algorithms should attempt to compute channel assignment with
reasonable computational/communication overhead.
B. Contributions
In this work, we develop a novel CSMA-based MAC protocol
that aims at enhancing the throughput of the CRN subject to
a power mask constraint. The proposed protocol (DDMAC)
employs an intelligent stochastic channel assignment scheme
that exploits the dependence between the RF signal attenuation
model and the transmission distance while taking into consideration the local traffic conditions. The channel assignment
scheme accounts for the interference conditions and the power
constraints at different bands. In particular, the scheme assigns
channels with lower average SINR to shorter transmission
distances, and vice versa. In addition, our scheme associates
more preferable channels to the most frequent transmission
distances and less preferable channels to the less frequent
distances. In other words, the assignment process identifies
a “preferable” channel list for each CR user. Such a list
indicates which channels are preferable to use depending on the
estimated distance between the transmitter and the receiver. We
propose two variants for the channel assignment scheme. The
first variant is suitable for offline planning of spectrum sharing
2
in networks with known deployment and traffic patterns. In this
case, there is no need for distance-traffic pattern prediction. The
second variant is suitable for online dynamic network operation
with unknown traffic patterns. To estimate the distance-traffic
pattern in a given neighborhood, the second variant employs a
stochastic learning technique that adapts to network dynamics
(i.e., mobility, interference conditions, and traffic conditions).
The primary advantage of our assignment scheme is that it is
based on passive learning. This is because in DDMAC, CR
users always listen to the control channel in order to overhear
control-packet exchanges, including those not destined to them.
CR users use the control information to identify the preferable
channels.
DDMAC has the following attractive features:
• It does not make any assumptions about the activity patterns of the underlying networks or about user distribution.
• It is easy to implement in practical settings and its processing overhead is small.
• It is transparent to PR users, i.e., does not require coordination with them.
• It inherently improves the fairness among CR users, compared to typical multi-channel CSMA-based protocols.
• Under low load and several available channels, DDMAC
gracefully degrades to the BMC approach.
To evaluate the performance of DDMAC, we conduct simulations over a dynamic CRN with mobile users. Our simulation
results show that by being distance- and traffic-aware, DDMAC
significantly improves network throughput while preserving
fairness. The results also indicate that compared with typical
multi-channel CSMA-based protocols, DDMAC decreases the
connection blocking rate in a CRN by up to 30%. By injecting
artificial errors into the estimated distances, our evaluation
reveals that DDMAC is robust against estimation errors.
It should be noted that selecting a preferable channel list was
also proposed in the MMAC protocol [11]. However, MMAC
does not support multiple-channel assignment (it is limited
to one channel per user). Specifically, the channel selection
criterion in MMAC is to use a channel with the lowest count
of source-destination pairs that have selected the channel. In
DDMAC, the preferable channel list per node is constructed
by accounting for the challenges associated with CRs (i.e., low
transmit power, presence of PR users, widely-separated noncontiguous available bands). Unlike DDMAC, the objective in
MMAC was not to address spectrum sharing while improving
the overall throughput, but rather to handle multi-channel
hidden terminals using a single transceiver and to balance
the channel usage over all available channels. In addition,
MMAC requires global network synchronization, which is not
a requirement in DDMAC.
C. Organization
The rest of this paper is organized as follows. Section II
gives an overview of related work. In Section III-A, we
introduce our system model and state the main assumptions.
The SINR analysis is presented in Section III-B. Section III-C
illustrates the effect of the carrier frequency and transmission
distance on the path loss. In Section IV, we formulate the
optimal channel assignment problem. Section V introduces
our proposed distance- and traffic-aware channel assignment
algorithm. Section VI describes the proposed DDMAC protocol
and outlines its benefits and associated overhead. We evaluate
DDMAC in Section VII. Finally, Section VIII gives concluding
remarks.
II. R ELATED W ORK
Recently, several attempts were made to develop MAC
protocols for CRNs (e.g., [6], [12]–[16]). In [6], the authors
developed a CRN MAC protocol with a common control channel. This protocol jointly optimizes the channel/power/rate assignment, assuming a given power mask on CR transmissions.
DC-MAC [12] is a cross-layer distributed scheme for spectrum
allocation/sensing. It provides an optimization framework based
on partially observable Markov decision processes, assuming
that PR and CR users share the same slotted transmission
structure. In [13], the authors investigated continuous-time
Markov models for dynamic spectrum access in open spectrum
wireless networks. Using such models, a distributed random
access protocol is proposed to achieve airtime fairness between
dissimilar unlicensed users.
The FCC defined the interference temperature model [17],
which provides a metric for measuring the interference experienced by licensed receivers. In [14], the authors studied
the issue of spectrum sharing among a group of spreadspectrum users subject to constrains on the SINR and on the
interference temperature. In [18], the interference temperature
model was used for optimal selection of spectrum and transmission powers for CR users. In [16], the authors proposed
a decentralized channel-sharing mechanism for CRNs based
on a game-theoretic approach for both cooperative and noncooperative scenarios. In [19], the concept of a time-spectrum
block is introduced to model spectrum reservation in a CRN.
Based on this concept, the authors presented centralized and
distributed CRN protocols with a common control channel for
spectrum allocation.
The above protocols were designed without exploiting the
dependence of the number of allowable CR transmissions on
the carrier frequency and the transmission distance. They are
limited to the analytical aspects of MAC design, with no
complete operational details. To the best of our knowledge,
DDMAC is the first CRN MAC protocol that aims at improving
the CRN throughput by exploiting the dependence on the RF
signal’s attenuation model and the transmission distance while
considering the prevailing traffic and interference conditions.
III. P RELIMINARIES
Users in PRN1
CR
CR
Fig. 2.
Users in PRN2
CR
Example of an opportunistic CRN that coexists with two PRNs.
A. Network Model
We consider a CRN with decentralized control (i.e., an ad hoc
network). This CRN coexists geographically with M different
PRNs. PR users are legacy radios that cannot be controlled by
the CRN. Figure 2 shows a conceptual view of the scenario
under consideration with M = 2. The PRNs are licensed to
3
Fig. 3.
Operating spectrum in the hybrid network.
operate over non-overlapping frequency bands. We assume that
all the PRN bands have the same bandwidth (BW ). In reality,
a PRN may occupy multiple, non-contiguous, frequency bands.
Such a PRN can be easily represented in our setup by using
multiple equal-bandwidth virtual PRNs, each operating over its
own carrier frequency. For the ith PRN, we denote its carrier
frequency by fi . As shown in Figure 3, the available bandwidth
(BW ) of a PRN is divided into L adjacent but non-overlapping
frequency channels each of Fourier bandwidth W (in Hz). Such
L channels are collectively referred to as a band. Let N denote
the total number of channels in all bands; N = LM .
Without loss of generality, we assume that BW is sufficient
to support at least one CR transmission. This is an acceptable
assumption in many wireless systems that are built to operate
in the unlicensed bands, including IEEE 802.11/a/b/g-compliant
devices. Each CR user is equipped with nt radio transceivers,
1 ≤ nt ≤ L, that can be used simultaneously. In theory, a CR
user can transmit over an arbitrary segment of the available
bandwidth by using tunable filters. In practice, however, a CR
typically implements a bank of fixed filters, each tuned to a
given carrier frequency with fixed bandwidth, allowing the CR
user to choose from a fixed number of channels. In our setup,
we assume the latter (more practical) capability, which can be
used to approximate the tunable filter scenario.
To avoid corrupting the transmissions of licensed users, a
mask is enforced on the transmission power of a CR user
(i)
(i)
over each band, i.e, Pt ≤ Pmask , i = 1, 2, . . . , M . The
determination of an appropriate power mask is an important
topic, which has been investigated under certain simplifying
assumptions (e.g., [18], [20]). The spectrum sharing protocols in [18] and [20] were designed such that the maximum
transmission powers of CR users over various bands are dynamically computed based on the PR’s interference margins
(set by the FCC) and local traffic conditions. In [20], the
authors provided a neighborhood-dependent adaptive power
mask on CR transmissions that ensures a statistical (soft)
guarantee of the outage probability of PRNs (the probability
that the total interference power at a PR receiver exceeds
the maximum tolerable interference). The authors provided
closed-form expressions for the resulting power mask. For our
purposes, we assume that a similar mechanism for determining
the power mask is in place. A CR user transmits data to
other CR users using the maximum allowable power vector
Pmask . When not transmitting, a CR user is capable of
measuring the total noise-plus-interference I (i) over all bands
i = 1, 2, . . . , M 1 . This requires a wideband sensing capability
with a narrowband resolution. The technology to support such
1 The quantity I (i) includes the PR-to-CR interference as well as the thermal
noise.
M
L
N, N
BW , W
nt
Pt (i)
(i)
Pmask
I (i)
(i)
SINRj
PL (fi )
Pr (fi )
d
J
(i)
cj
Cj
µ∗
i
mj
Mj
R
Rc , rc
Ri
ri , ri−1
Di
di , di−1
m
Twin
pi (t)
p
ei (t)
α
Ωi (A), K
CCL(A, B)
Φ(A, B)
Number of PRNs
Number of channels in a PRN
N is the total number of channels, N = {1, . . . , N }
Bandwidth of a band and a channel, respectively
Number of transceivers per CR user
CR transmit power
Interference power mask on channel i
Noise-plus-interference over channel i
Measured SINR over band i at receiver j
Path loss associated with band i
Received power at a CR receiver over band i
Transmitter-receiver distance
Set of all CR transmission requests in a locality
ith selected channel’s data rate for transmission j
Rate demand of the jth CR transmission
SINR threshold over channel i
Number of selected channels for the jth transmission
Mj is the set of mj selected channels for the jth transmission
Random variable represents the distance to the intended receiver
RC is the transmission region, Rc = πrc2
ith ring around a CR in static channel assignment
Radii that define Ri , i = 1, . . . M
ith ring around a CR in dynamic channel assignment
Radii that define Di
Number of non-overlapping Di rings
Observation window time
Probability of Di at time t
Weighted average of pi (t)
Forgetting factor
CR A’s preferable channel list for region i, i = 1, ..., K
Common channel list available for A → B transmission
Preferable available channels for A → B transmission
TABLE I
S UMMARY O F N OTATIONS U SED I N T HE PAPER .
capability is readily available through a wideband antenna, a
power amplifier, adaptive filters, and a DSP technique called
cyclostationary feature detection [21], [22]. Thus, a CR user can
simultaneously sense several GHz-wide bands and estimate the
instantaneous interference over each band [22]. Alternatively, a
sequential partial sensing approach can be employed at the cost
of negligible switching/sensing overhead [21], [23]. It is worth
mentioning that off-the-shelf wireless cards can readily serve as
a fully functional wideband multi-channel CR interface. Such
an interface enables a CR user to perform analysis of the RF
spectrum (i.e., sensing) in real time.
C. Carrier Frequency and Distance Effects on Path Loss
In this section, we discuss the effect of the carrier frequency
and transmission distance on the path loss. For a given carrier
frequency f , let do (f ) be the close-in distance, i.e., the distance
from the transmitter after which the RF channel can be approximated by the free-space model; do (f ) can be determined from
measurements or can be estimated by [8]:
2
2Da f
c
do (f ) = max
(2)
, Da ,
c
f
where Da is the antenna length of the transmitter and c is the
speed of light. Let Po (f ) and Pt (f ) respectively denote the
received power at the close-in distance and the CR transmit
power. Then, Po (f ) can be estimated as follows [8]:
Po (f ) =
c2 Gt (f )Gr (f )
Pt (f )
(4πdo (f ))2 f 2
where n is the path loss exponent (typically, 2 ≤ n ≤ 6).
Note that, in practice, do (f ) is of the same order of magnitude
as the node’s dimensions. For example, for a mobile phone
operating in the 900 MHz band with Da = 5 cm, do (f ) = 33
cm. For an 802.11 WLAN card operating in the 2.4 GHz band
and the same antenna size, do (f ) = 12 cm. Accordingly, it is
reasonable to assume that the probability that d is less than
do (f ) is very small (i.e., Pr(d < do (f )) ≈ 0).
Using (2), (3), and (4), the path loss PL (f ) can be expressed
as:
Pt (f )
PL (f ) = 10 log
= −10 ×
Pr (f )
o
n
2
n−2
c2 γDa
c 2Da f
,
,
∀
f
s.t.
D
≥
max
log
2
n
a
f d
c o
n f
n
2D2 f
∀ f s.t. fc ≥ max Da , ca
log fcn dγn ,
(5)
o
n
n−2
4−n
2
2
c
γ(2Da )
2D f
log
, ∀ f s.t. ca ≥ max Da , fc
f 4−n dn
def
γ=
Based on the aforementioned characteristics of the CRN, the
average measured SINR (SINR) at a CR receiver at a given time
over band i is mainly determined by: (1) the path loss associated
with that band (PL (fi )); (2) the average interference over that
(i)
band (I ), which can be estimated based on the sensing history
and the spectrum occupancy statistics (e.g., using the techniques
(i)
in [12], [24]; and (3) the enforced power mask Pmask . Formally,
(i)
SINR (dB) is given by:
(i)
(i)
SINR (dB) = Pmask (dB) − PL (fi )(dB) − I
(i)
(dB). (1)
Note that in [25] and [26], it was shown that for a given CRN
and due to PRN’s activity, CR users that are far away from each
(i)
other can experience different average interference I , which
may vary with time. On the other hand, CR users in close
proximity typically share the same view of the surrounding RF
environment.
Table I summarizes the main notation used in the paper.
(3)
where Gt (f ) and Gr (f ) are the transmit and receive antenna
gains, respectively. Let Pr (f ) denote the received power at
distance d from the transmitter, d ≥ do (f ). Then,
n
do (f )
(4)
Pr (f ) = Po (f )
d
where
B. Analysis of the Average SINR
4
Gt (f )Gr (f )
.
(4π)2
(6)
Note that the dependence of PL (f ) on d (i.e., d1n ) is the same
for any given carrier frequency.
Figure 4 depicts the path loss for a wide range of carrier
frequencies and two values of n at a distance d = 1 meter.
This figure and equation (5) reveal that the signal attenuation
increases as the distance between the two communicating
users increases, and as the frequency used for communication
increases. These observations provide the motivation for our
distance-dependant channel assignment, discussed in Section V.
IV. O PTIMAL C HANNEL A SSIGNMENT P ROBLEM
Our objective is to maximize the number of simultaneous CR
transmissions, and consequently the overall network throughput. Toward this end, we define the term local spectrum utilization as the total number of simultaneous CR transmissions that
can be supported in a given (one-hop) locality while meeting
a predefined power mask. Before formulating the problem, we
discuss the requirements for a successful CR transmission.
5
demands are available, the above ILP problem belongs to the
class of NP-hard problems [9]. In this paper, we develop a
heuristic channel assignment scheme that provides a suboptimal
solution with low complexity and good spectrum utilization.
Our heuristic exploits distance and traffic awareness. The key
idea behind it is to assign channels with low SINR to shortdistance transmissions. Also, local traffic information is used
to assign more channels to more likely transmission distances.
70
Path Loss (dB)
60
50
40
30
n=4
n=2
20
0
1
2
3
f (Hz)
4
5
6
9
x 10
Fig. 4. Path loss vs. carrier frequency for two path loss exponents (Da = 5
cm, Gt (f ) = Gr (f ) = 1).
A. CRN Transmission Requirements
Within a given neighborhood, multiple CR users may contend for access to one or more of the available channels. Let N
and J denote the set of all N channels and the set of all CR
transmission requests in the local neighborhood at a given time,
respectively. We assume that the jth CR transmission (j ∈ J )
is successful if both of the following two conditions are met:
• It is possible to find mj available channels from the set
Pmj (i)
(i)
cj ≥ Cj , where cj is the data rate of
N such that i=1
the ith selected channel and Cj is the total rate demand
for the jth CR transmission.
• Let Mj be the set of mj selected channels. Then, the
(i)
received SINR of every i ∈ Mj (SINRj ) must be greater
∗
than the SINR threshold (µi ) that is required at the CR
receiver to achieve a target bit error rate over channel i.
B. Maximizing the Utilization of Local Spectrum
(i)
Let δj be a binary variable denoting whether or not channel
i is assigned for transmission j. Formally,
1, if channel i is assigned for transmission j
(i)
δj =
(7)
0, otherwise.
Similar to [10], [27], the problem of maximizing the total
number of simultaneous CR transmissions in a given neighborhood can be formally stated as follows:
hP
i
P
(i) (i)
maxδ(i) ∈{0,1} j∈J 1
(8)
≥
C
c
δ
j
j
i∈N j
j
P
(i)
(9)
j∈J δj ≤ 1, ∀i ∈ N
P
(i)
(10)
i∈N δj ≤ nt , ∀j ∈ J
(i)
(i)
SINRj ≥ µ∗i , ∀j ∈ J , s.t. δj = 1
(11)
where 1[.] is the indicator function. The constraint in (9)
ensures that a channel cannot be assigned to more than one CR
transmission in the same vicinity. The constraint in (10) ensures
that at most nt channels can be assigned to a CR transmission.
For an ad hoc CRN, the above optimization problem must
run in a distributed manner at each CR user in the network.
This implies that each CR user must exchange instantaneous
SINR and rate demand information with neighboring CR users
before selecting channels, which incurs high control overhead
and delay (i.e., information may not be up-to-date). Even if
perfect knowledge of the SINR of each link and the rate
V. D ISTANCE -D EPENDENT C HANNEL A SSIGNMENT
A LGORITHM
In this section, we describe our proposed channel assignment
mechanism. The assignment process identifies a “preferable”
channel list for each CR user. Such a list indicates which
channels are preferable to use depending on the estimated
distance between the transmitter and the receiver. It is worth
mentioning that many techniques for estimating the transmitterreceiver distance in wireless networks have been proposed in
the literature, including the Received Signal Strength Indicator
(RSSI), the Time of Arrival (ToA), and the Time Difference of
Arrival (TDoA) [28]. For our purposes, any of these schemes
can be used. In Section VII, we investigate the robustness
of our scheme under inaccurate distance estimation, which is
mainly caused by mobility, multi-path propagation, reflection,
and fading effects.
Two variants of the channel assignment mechanism are
proposed. The first variant is suitable for offline planning
of spectrum sharing in networks with known traffic patterns,
whereas the second variant is for online spectrum allocation in
dynamic (mobile) networks with unknown traffic patterns.
A. Spectrum Assignment for Known Traffic Profiles
Given a CR user with a packet to transmit, let r be the
estimated distance to the intended receiver; r ≤ rc , where rc
is the maximum transmission range. rc represents the largest
distance from a CR transmitter over which the transmission
at maximum power can be correctly decoded over all selected
channels in the absence of interference from other terminals
def
(CR or PR users). Let FR (r) = Pr{R ≤ r}. The functional
form of FR depends on both node distribution as well as the
distance traffic profile, which for now we assume to be given.
Given FR , the channel assignment process is conducted as
follows:
• The available bands are divided according to their measured SINR (given in (1))2 into M sets S1 , S2 , . . . , SM ,
where each band consists of multiple channels. The set S1
contains the frequency channels of the band that has the
highest SINR, S2 contains the next highest SINR, and so
on.
• A CR user, say A, divides its maximum transmission
def
region Rc = πrc2 into M non-overlapping “rings”
R1 , . . . , RM . The ith ring contains the CR users whose
distances to A fall in (ri−1 , ri ], where i = 1, . . . , M and
0 = r0 ≤ r1 ≤ r2 ≤ . . . ≤ rM = rc . The rings are
divided such that the probability of communicating with
a CR receiver that falls within any of the M rings is the
same, i.e.,
1
FR (ri ) − FR (ri−1 ) =
,
i = 1, . . . , M.
(12)
M
2 Note that P ’s dependence on d is the same for all bands. Thus, for the
L
purpose of SINR comparison, we set d = 1 meter.
User A computes the radii ri , i = 1, . . . M , by substituting
for FR (ri ) in (12) and solving for ri .
• Finally, A constructs a preferable channel list for each
ring by assigning channels with lower SINR to shorter
transmission distances and channels with higher SINR
to longer transmission distances, i.e., assign SM to R1 ,
SM−1 to R2 , . . ., and S1 to RM .
To illustrate the idea, we consider a uniformly distributed
CRN and assume that a CR transmitter randomly chooses a
destination for its data from within Rc . Therefore, FR (r) is
given by:
( 2
r
rc2 , r ≤ rc .
FR (r) =
(13)
1,
r ≥ rc
Using (12) and (13), and noting that r0 = 0, we arrive at the
following expression for ri :
s
r
2
ri−1
i
1
ri =
rc =
+ 2
rc .
(14)
M
rc
M
Figure 5 illustrates the non-overlapping rings around a CR
transmitter when M = 4. Within these rings, other CR and PR
users may exist. Assume rc = 100 meters. Then, r1 , . . . , r4 are
given by 50, 70.71, 86.6, 100 meters, respectively.
6
distances fall in the range (di−1 , di ] (how to convey transmitterreceiver distance information will be discussed later). Note that
the proper setting of Twin depends on the dynamics of the
network. The effect of Twin is studied in Section VII.
Fig. 6.
Time diagram of pmf’s updating process.
To initialize the assignment algorithm, all CR users employ
the BMC scheme discussed in Section I. At any time t, CR user
A constructs its transmission distance table based on control
packets it overheard during the observation window [t−Twin , t].
Using the transmission distance table, A estimates the current
probability mass function pi (t) of the distance r at time t (see
Figure 6). It then computes an exponentially weighted average
of pi (t) :
pei (t) = αpi (t) + (1 − α)pei (t − Twin ),
Fig. 5.
Four regions around a CR transmitter for assigning channels.
B. Spectrum Assignment for Unknown Traffic Profiles
For offline spectrum planning, we assumed in the previous
section a fixed network and prior knowledge of the distancetraffic pattern (i.e., the form of FR ). During network operation,
however, the distance-traffic pattern may change with time,
depending on network dynamics and user mobility. Because
users only possess local knowledge of their neighborhoods, it
is difficult to maintain the optimal network performance. Nevertheless, we can develop a stochastic learning algorithm that
performs well and uses only localized information. Stochastic
learning techniques have been widely used in wireless networks
for online traffic prediction, tracking, and power control [29],
[30]. Our proposed learning approach is a distributed algorithm
that runs at each CR user in the network. A CR user, say A,
evenly divides its maximum transmission region Rc into m nonoverlapping regions, where m ≫ M . The ith region, Di , forms
a ring, defined by the area {(x, y) : d2i−1 < x2 + y 2 ≤ d2i },
where di = i rmc , and di−1 < di i = 1, . . . , m. CR user A
maintains an m-entry transmission distance table. The ith entry
in that table corresponds to the region Di , and contains the
number of overheard CR packet requests during the recent
observation window Twin for which the transmitter-receiver
(15)
where α is a forgetting factor, 0 < α ≤ 1. Once pei (t) is
computed, A computes the preferable channel list for each ring.
Let Ωi (A) denote the preferable channel list for ring Di at CR
user A (how to construct Ωi (A) will be given later). The new
preferable channel lists will be used during the next observation
window time. The proposed channel assignment process merges
the Di ’s into K regions according to pi (t), where K ≤ M . It
then assigns preferable channels for each region. The process
is now described in detail:
Pk−1
1) User
Pm A determines the integer k such that | i=0 pei (t)−
ei (t)| is minimized, i.e., it divides the regions
i=k p
into two groups; short-distance and long-distance groups.
The probabilities of the short-distance and long-distance
groups are given by:
Pshort =
k−1
X
pei (t)
(16)
pei (t).
(17)
i=0
and
Plong =
m
X
i=k
2) User A divides the M bands into two frequency sets:
low SINR frequency set and high SINR frequency set. It
assigns the low SINR frequency set to the short-distance
group and the high SINR frequency set to the longdistance group. The numbers of bands in the high (nH )
and low (nL ) frequency sets depend on Pshort and Plong ,
as follows:
Pshort
nH =
M
Pshort + Plong
nL = M − nH
(18)
where ⌈.⌉ is the ceiling function.
3) Step 1 and 2 are repeated for every group until either
only one band is assigned to that group or the group
contains only one region. Note that when repeating the
above process for a group, m in (17) and M in (18) are
replaced by the number of regions in that group and the
number of channels assigned to that group, respectively.
Using this recursive procedure, the preferable channel list
Ωi (A), for all i, is computed for one observation window.
C. Complexity
Claim 1: The worst-case complexity for selecting the preferable
channel list Ωi (A), for all i, may be obtained using the above
recursive procedure in O(mK) time, where K ≈ min[N, m].
Proof: In the worst case, our proposed algorithm requires
O(m) comparisons to perform one iteration (steps 1 and 2). In
addition, it requires at most K = min[N −1, m−1] iterations to
obtain Ωi (A), for all i. Hence, Ωi (A), for all i, may be obtained
using the proposed algorithm with a complexity of O(mK),
where K ≈ (m min[N, m]). For N ≥ m, K ∼ O(m). On the
other hand, for N < m, K ∼ O(N ).
D. Illustrative Examples
We illustrate the previously discussed channel assignment
process using the following examples.
1) Example 1: Consider four PRNs and one CRN. Each
PRN occupies two adjacent non-overlapping channels. The
PRNs are labeled such that f1 < f2 < f3 < f4 . Consider
(1)
(2)
(3)
a CR user A with SINR
> SINR
> SINR
>
(4)
SINR . Suppose that A divides its transmission region Rc
into 8 rings, D1 , D2 , . . . , D8 . At a given time t, assume that
the weighted average pmf {pei (t) : i = 1, . . . , 8} is given
by {0.25, 0.1, 0.15, 0.05, 0.05, 0.15, 0.05, 0.2}. Figure 7 shows
how the proposed channel assignment process is conducted.
The outcome of this process is as follows:
• Band 4, which includes two channels, is assigned to all CR
transmissions whose distances are in D1 (i.e., Ω1 (A) =
{4}).
• Band 3, which includes two channels, is assigned to all
CR transmissions whose distances are in D2 and D3 (i.e.,
Ω2 (A) = Ω3 (A) = {3}).
• Band 2, which includes two channels, is assigned to all
CR transmissions whose distances are in D4 , D5 , and D6
(i.e., Ω4 (A) = Ω5 (A) = Ω6 (A) = {2}).
• Band 1, which includes two channels, is assigned to all
CR transmissions whose distances are in D7 and D8 (i.e.,
Ω7 (A) = Ω8 (A) = {1}).
Di
1
2
3
4
5
6
7
8
p~ i
0.25
0.1
0.15
0.05
0.05
0.15
0.05
0.2
{f4, f3}
0.5
{f4}
{f3}
{f2}
{f2, f1}
0.5
{f1}
0.25
0.25
0.25
0.25
Fig. 7. Example that illustrates the channel assignment process in a dynamic
CRN.
7
2) Example 2: Consider 8 PRNs and one CRN. The PRNs
are labeled such that f1 < f2 < . . . < f8 . Suppose that A
divides its transmission region into 2 rings. At a given time
t, assume that the weighted average pmf {pei (t) : i = 1, 2}
is given by {0.25, 0.75}. Then, the outcome of our preferable
channel assignment is as follows:
• Channels 1 and 2 (total of 2 channels are assigned to all
CR transmissions whose distances are in D1 ).
• Channels 3, . . . , 8 (total of 6 channels are assigned to all
CR transmissions whose distances are in D2 ).
The above example reveals that our algorithm assigns more
preferable channels (total of 6 channels) to the more frequently
used transmission distances (D2 , pe2 (t) = 0.75).
VI. DDMAC P ROTOCOL
Based on the channel assignment process presented in Section V, we now propose a distributed, asynchronous MAC
protocol for CRNs. The proposed DDMAC is a CSMA/CAbased scheme that uses contention-based handshaking for exchanging control information. It is worth mentioning that the
most common configuration for upcoming CRNs is to use
CSMA/CA-like MAC access [6], [19], [20], [23], [25], [26],
[31]. Thus, in designing the channel access in DDMAC, we
focus on extending the CSMA/CA scheme due to its maturity
and wide deployment in many wireless packet networks. Note
that the handshaking procedure is essential in multi-channel
systems. Besides mitigating the hidden-terminal problems, there
are two other main objectives for the use of RTS/CTS: (1)
conducting and announcing the channel assignment, and (2)
prompting both the transmitter and the receiver to tune to the
agreed on channels before transmission commences. Before
describing our protocol in detail, we first state our main
assumptions.
A. Assumptions
In designing DDMAC, we make the following assumptions:
• For each frequency channel, the channel gain is stationary
for the duration of three control packets and one data and
ACK packet transmission periods. As explained in [32],
this assumption holds for typical mobility patterns and
transmission rates.
• Channel gains between two CR users are symmetric. This
is a typical assumption in any RTS/CTS-based protocol,
including the IEEE 802.11 scheme.
• CR transmissions use the maximum allowable power
vector (Pmask ). The key idea behind this choice is as
follows. It is well-known that using as many channels as
possible for a transmission reduces the CR-to-PR interference [6] due to the reduction in transmission power.
However, because DDMAC enforces an exclusive channel
occupancy, which prevents two neighboring CR users from
using common channels3, such a channel assignment policy may lead to channel over-assignment, which reduces
the opportunity for finding available channels by other
neighboring CR transmitters (thus reducing the CRN’s
throughput). Therefore, in DDMAC, we tackled the CR-toPR interference problem by assuming a given power mask
to protect PR users while trying to use the least possible
number of selected channels per transmission. This can be
3 The exclusive channel occupancy excludes CR-to-CR interference although
it still allows for the typical co-channel PR-to-CR interference, thus largely
simplifying the CR-to-PR interference management process.
•
•
•
done by transmitting at the highest possible transmission
power over each selected channel, which results in less
number of assigned channels per CR transmission. This
increases the opportunity for finding available channels
by other neighboring CR transmitters.
The total rate demand of a CR user A (denoted by CA )
is met by aggregating the transmission rates of several
selected channels. Note that CA can vary from one packet
to another.
A prespecified control channel with Fourier bandwidth Bc
is available, where Bc ≪ B. This channel does not need
to be reserved for the CRN. It can, for example, be one
of the subchannels in an ISM band.
Contending CR users follow similar interframe spacings
and collision avoidance strategies of the 802.11 protocol
(over the control channel) by using physical-carrier sensing and backoff before initiating control packet exchanges.
We also assume that data packet sizes are significantly
larger than control packets, and therefore, the use of the
RTS/CTS handshake is justified.
B. Channel Access in DDMAC
The channel access mechanism allows the CR transmitter
and receiver to agree on the set of channels to use for
communication and to allocate their rates. Rate is allocated
in a manner that ensures that the power mask and the rate
demands are met. A CR user A views its transmission region
as K non-overlapping regions, where each region is associated
with a preferable channel list Ωi (A), i = 1, . . . , K, determined
according to Section V. This user maintains an N -entry channel
list and an m-entry transmission distance table (as described
in Section V). The jth entry of the channel list indicates
the status of the jth channel; 1 if the channel is available
and 0 if the channel is occupied or reserved by any of A’s
CR neighbors. Recall that each CR user is equipped with nt
transceivers. One of these transceivers is tuned to the control
channel, while the other nt − 1 transceivers can be tuned to any
data channels. As a result, CR users can always hear control
messages over the common control channel even when they
are transmitting/receiving data over other data channels. Thus,
every CR user listens to the control channel, and accordingly
updates its channel list and transmission distance table.
Suppose that CR user A has data to transmit to another CR
user B at an aggregate rate demand CA . Then, A reacts as
follows:
• If user A does not sense a carrier over the control channel
for a random duration of time, it sends an RTS message
at the maximum (known) power Pmax . This Pmax is constrained by the power mask imposed on the prespecified
control channel. The RTS includes CA , the packet size
(in bytes), and the list of all available channels at A (see
Figure 8).
• The neighbors of A (other than B) that can correctly
decode the RTS refrain from accessing the control channel
until they receive one of two possible control packets,
denoted by EPCA and ENCA (explained below).
• Upon receiving the RTS packet, B estimates the distance
between A and B (dAB ) (using one of the techniques
described in Section V). It identifies the preferable channel
list Ωi (B) that corresponds to dAB . Based on the available
channels at A and B, and the instantaneous interference
level over these channels as measured at B, user B
removes any channel that has a received SINR less than
its threshold SINR and determines the common channel
8
RTS
Transmitter Receiver
ID
ID
Packet
size
Rate
demand
(CA)
Available
channel
list
PCA/
EPCA
Transmitter Receiver
ID
ID
TX
duration
Distance
(d)
Assigned
channel
list
NCA/
ENCA
Transmitter Receiver
ID
ID
Distance
(d)
Fig. 8.
•
•
•
Formats of DDMAC control packets.
list that is potentially available for A → B transmission, denoted by CCL(A, B). User B then computes the
intersection between Ωi (B) and CCL(A, B) to identify
a preferable set of channels for A → B (Φ(A, B)). To
achieve good throughput, B sorts the channels in Φ(A, B)
in a descending order of their maximum possible data rate
(calculated according to Shannon’s formula4). Then, user
B appends the rest ofthe common available channels
that
T
are not in Φ(A, B) i.e., CCL(A, B) Φ(A, B) , also
listed in a descending order of their maximum possible
data rate, to the bottom of the sorted preferable channels.
User B cumulatively adds channels from the top of the
new sorted list until either the aggregate rate CA is
satisfied or the list is exhausted, i.e., no feasible channel
assignment is found.
If there is no feasible channel assignment, then B responds
by sending a Negative-Channel-Assignment (NCA) message that includes the distance dAB (see Figure 8). The
purpose of this packet is to help B’s neighbors estimate
the network distance-traffic pattern and prompt A to back
off and retransmit later. If B can find a set of available
channels that can support a total demand CA , it sends a
Positive-Channel-Assignment (PCA) message to A, which
contains the assigned channels for the transmission A →
B, the distance dAB , and the duration needed to hold the
assigned channels for the ensuing data transmission and
corresponding ACK packet. The PCA packet implicitly
instructs B’s CR neighbors to mark the set of assigned
channels as unavailable for the indicated transmission
duration. It also helps these neighbors estimate the network
distance-traffic pattern.
Depending on which control message is received, user A
reacts as follows:
– If A receives an NCA message, it responds by sending
an Echo-NCA (ENCA) message, which includes the
distance dAB . The purpose of this packet is to help
A’s neighbors estimate the network distance-traffic
pattern.
– If A receives a PCA message, it replies back with an
Echo-PCA (EPCA) message, informing its neighbors
of the selected channel list, the distance dAB , and the
transmission duration. This EPCA also announces the
success of the control packet exchange between A and
B to A’s neighbors, which may not have heard B’s
PCA.
Once the RTS-PCA-EPCA exchange is completed, the
data transmission A → B proceeds. Once completed, B
4 Other rate-vs-SINR relationships, such as a staircase function, can be used
for calculating the achievable data rates.
9
sends back an ACK packet to A over the best assigned
channel, i.e., the channel that has the highest rate. A time
diagram of the RTS-PCA-EPCA-DATA-ACK exchange is
depicted in Figure 9.
*
*
CR user
*
*
*
*
Users in PRN 1
Users in PRN 2
C
A BA
R P
T C
S A
CD C
E
P
C
A
R P
T C
S A
E
P
C
A
*
*
*
*
………..
*
*
C
+
*
*
*
D
A
ACK
Data TX 1
D
*
A
DATA A->B
B
*
B
*
*
*
ACK
DATA C->D
Data TX 2
*
*
.
.
.
Fig. 9.
RTS-PCA-EPCA-DATA-ACK packet exchange.
It is worth mentioning that there is no interference between
data and control packet transmissions because the two are
separated in frequency. Therefore, a CR user that hears the RTS
packet from A defers its attempt to access the control channel
until it receives an EPCA or an ENCA packet from A. In
addition, a CR user that receives only a PCA or an NCA should
defer its attempt to access the control channel for the expected
time of the EPCA/ENCA packet (to avoid a collision between
control packets). This allows for more parallel transmissions to
take place in the same neighborhood (see Figure 9).
Remark: DDMAC’s channel assignment is performed on a
per-packet basis, with the channels assigned to different interfaces dynamically changing. This type of channel assignment
requires channel switching to occur at a very small time scale,
which is in the range of micro-seconds5.
(a) Allowed channel reuse
Fig. 10. Scenarios in which a CR transmitter C can/cannot reuse the channels
assigned to A. Solid circles indicate data-transmission ranges, whereas dashed
circles indicate control-transmission ranges.
•
radio technology allows channel switching to be done in a few
microseconds (i.e., < 10 µs [23], [33])
= φ : i = 1, . . . , m − 1.
= N : i = m.
Recall that N denotes the set of available channels. In
other words, no channels will be assigned to ring, i, i =
1, 2, . . . , m − 1, and all channels will be assigned to the
mth ring.
rc
A d1
rc
d m-1
A d1
d m-1
(a) Scenario I
Fig. 11.
•
5 Current
Scenario I: At a given time t, assume that the weighted
average pmf {pei (t) : i = 1, . . . , m} has a value of 1
at i = m and 0 otherwise (i.e., most likely, transmission
distances are within Dm ). This scenario represents the case
when all of A’s neighbors are located near the border of
A’s transmission range (Figure 11(a)). According to the
channel assignment algorithm, the preferable channel list
is identified as follows:
Ωi (A)
Ωi (A)
C. Spatial Reuse and DDMAC
We consider a CSMA/CA-based multi-hop CRN environment, which consists of multiple contention regions (neighborhoods) that permit spatial reuse. Specifically, non-neighboring
CR users may access the same channel on different contention
domains. To illustrate the idea of spatial reuse, Figure 10
depicts two scenarios for the operation of DDMAC. In the
first scenario (Figure 10(a)), the two transmitters A and C
cannot hear each other’s control packets. So, according to
CSMA/CA, the transmissions A → B and C → D can
overlap in their data channels, i.e., the assigned channels for
A → B transmission are reserved only within the area of A’s
and B’s control range (spatial reuse case). In Figure 10(b),
node C falls in the control region of node A (and vice versa).
The exclusive channel occupancy policy prevents A and C
from using common channels. However, the two transmissions
can proceed simultaneously if A and C can find two nonintersecting sets of channels to support their rates.
D. Worst-Case Scenarios for DDMAC
We illustrate two extreme scenarios under which the
DDMAC protocol gracefully degrades into the BMC scheme.
Recall that a CR receiver A divides its transmission range into
m regions.
(b) Unallowed channel reuse
(b) Scenario II
Illustration of two worst-case scenarios in DDMAC.
Scenario II: At a given time t, assume that the weighted
average pmf {pei (t) : i = 1, . . . , m} has a value of 1 at i =
1 and 0 otherwise (i.e., most likely, transmission distances
are within D1 ). This scenario represents the case where
all A’s neighbors are located close to A (Figure 11(b)).
According to the proposed channel assignment algorithm,
the preferable channel list is identified as follows:
Ωi (A)
Ωi (A)
=
=
N : i = 1.
φ : i = 2, . . . , m.
According to DDMAC, the sorted channel list from which a
CR user assigns channels to its transmission is constructed by
appending the common sorted available channels that are not
in the sorted preferable channels to the bottom of the sorted
preferable channels list. Thus, for the above two scenarios
and depending on the transmitter-receiver distance, the sorted
channel list of DDMAC is as follows:
•
•
If the distance falls in the range (dm−1 , dm = rc ] or
(0, d1 ], the preferable channel list is the set of all available
channels. Therefore, the sorted channel list of DDMAC
is the same as that of the BMC scheme. Consequently,
DDMAC gracefully degrades into the BMC scheme.
If the distance falls within the transmission range Rc but
not in the range (dm−1 , dm ] or (0, d1 ], the preferable
channel list is empty whereas the available channel list
contains all the available common channels. Therefore, the
sorted channel list of DDMAC is the same as that of BMC.
Consequently, DDMAC gracefully degrades into the BMC
scheme.
Protocol Overhead
Claim 2: DDMAC and BMC have comparable overheads.
Proof: Both DDMAC and BMC use a three-way handshake to
send one data packet. Thus, DDMAC does not introduce any
additional control message overhead.
VII. P ROTOCOL E VALUATION
We now evaluate the performance of the DDMAC via
simulations and compare it with CSMA/CA variants. Our
results are based on simulation experiments conducted using
CSIM (a C-based, process-oriented, discrete-event simulation
package [34]). Each CR user generates packets according to
a Poisson process with rate λ (in packet/time slot), which is
the same for all users. For simplicity, data packets are assumed
to be of a fixed size (2 Kbytes). Each CR user requires an
aggregate transmission rate of 5 Mbps. We divide time into
slots, each of length 3.3 ms. A time slot corresponds to the
transmission of one CR packet at a rate of 5 Mbps. We set
the CRN SINR threshold to 5 dB and the thermal noise to
(i)
Pth = 10−21 Watt/Hz for all channels. Because DDMAC
and the compared with CSMA/CA-based protocols have the
same maximum transmission ranges and use the same channel
access mechanism, it is reasonable to assume that all protocols
achieve the same forward progress per hop. Consequently,
our performance metrics are: (1) one-hop throughput, i.e., the
destination of a packet is restricted to one hop from the source,
(2) connection blocking rate, and (3) the fairness index [35].
The connection blocking rate is defined as the percentage of CR
packet requests that are blocked due to the unavailability of a
feasible channel assignment. We use Jain’s fairness index [35]
to quantify the throughput fairness of a scheme6 . Fairness
index values closer to 1 indicate better fairness. The signal
propagation model in (4) is used with n = 4, the antenna
length (D) is 5 cm, and Gt (f ) = Gr (f ) = 1 for every carrier
frequency f .
A. Single-hop Scenarios
10
1) Simulation Setup: We first simulate a small-scale network
for the purpose of highlighting the advantages and operational
details of DDMAC. DDMAC is compared with three multichannel CSMA-based protocols that use different channel selection schemes: an optimal scheme (which uses exhaustive
search), the BMC scheme [3] (which is based on a greedy
strategy that selects the best available channels for a given
transmission), and a naive scheme (which always tries to select
high-frequency channels if available for a given transmission,
while leaving low-frequency channels for other users). Specifically, we consider a single-hop CRN, where all users can hear
each other. This CRN coexists with two PRNs in a 100 meter
× 100 meter field. The PRNs operate in the 600 MHz and
2.4 GHz bands. Each PRN band consists of one channel of
bandwidth 1.5-MHz. The number of PR users in each PRN is
50. Each user in the ith PRN acts as an ON/OFF source, where
it is ON while transmitting and OFF otherwise. We define the
“activity factor” αi as the fraction of time in which the ith
type PR user is ON (i.e., the probability that the source is
in the ON state). The source is further characterized by the
distribution of its ON and OFF periods, which are both taken
to be exponential. We set the average ON period to be the
duration of one time slot. In other words, traffic correlations are
captured using a two-state Markov model. The appropriateness
of the 2-state ON/OFF model has been demonstrated in several
previous works, e.g., [6], [13], [20], [36], [37]. In essence, the
ON/OFF behavior is attributed to the bursty nature of many
types of network traffic, including voice traffic and VBR video
streaming. Note that one potential PRN is a cellular network
that transports voice traffic. We set the αi probabilities for the
two PRNs to 0.5 and 0.3, respectively. The transmission power
for each PR user is 0.5 Watt.
For the CRN, we consider 40 mobile users. The random
waypoint model is used for mobility, with the speed of a CR
user uniformly distributed between 0 and 2 meters/sec. This
results in dynamic, time-varying topologies. We assume that a
CR user can use up to two data channels simultaneously. We
(1)
(2)
set the interference mask to Pmask = Pmask = 50 mW. We
also set the forgetting factor α to 0.6, the observation window
Twin = 0.5 second, and the number of rings around a CR user
m = 12. For a fair comparison, we let all schemes use the
maximum allowable power vector Pmask .
2) Results: Under the above setup, Figure 12 shows that
DDMAC improves the one-hop throughput by up to 25%
(compared to BMC) and 34% (compared to the naive approach). More importantly, its throughput is within 7% of
the optimal throughput, obtained via exhaustive search. Note
that the exhaustive search implies that the instantaneous SINR
values, location information, and rate demands are known to
the decision-making entity that assigns channels to CR users
(i.e., such search requires global information). Even if perfect
knowledge of the SINR of each link and the rate demands are
available, for large-scale networks, finding the optimal solution
requires exhaustive search over a large state space, which grows
exponentially with the number of CR users and the available
channels.
B. Multi-hop Scenarios
6 For our simulation setup, CR user demands are uniform. The destination CR
user is uniformly selected from the one-hop neighbors and the packet generation
rate are the same for all CR users. Thus Jain’s fairness index provides a
meaningful metric for comparing the fairness of DDMAC and BMC.
1) Simulation Setup: We now evaluate the performance of
DDMAC in more realistic (large-scale) network scenarios and
contrast it with a typical multi-channel CSMA-based protocol
that uses BMC for channel selection [3]. We consider four
11
0.45
1.25
1
0.75
Blocking rate (%)
Throughput (Packet/time slot)
1.5
Optimal
DDMAC
BMC
Naive approach
0.5
0.25
0
0
10
20
30
λ (Packet/sec)
40
BMC
DDMAC
0.4
0.35
0.3
0
0.1
Fig. 12. Throughput vs. λ for a small-scale network (comparison with the
optimal scheme).
7 Random-grid is a realistic topology that models constrained scenarios. For
example, a building could have various offices, where each office may contain
several wireless devices.
0.5
(a) Blocking rate vs. λ.
Single hop througput (Packet/time slot)
PRNs and one CRN. Users in each PRN are uniformly distributed over a 500 meter × 500 meter area. The PRNs operate
in the 600 MHz, 900 MHz, 2.4 GHz, and 5.7 GHz bands,
respectively. Each PRN band consists of three non-overlapping
1-MHz channels. The number of PR users in each PRN is 300.
The αi probabilities for the four PRNs are 0.5, 0.3, 0.3, 0.1,
respectively. The transmission power for each PR user is 0.5
Watt.
For the CRN, we consider a random-grid topology7, where
225 mobile CR users are placed within the 500 meter × 500
meter field. The field is split into 225 smaller squares, one for
each CR user. The location of a mobile user within the small
square is selected randomly. For each generated packet, the
destination is selected randomly from the one-hop neighbors.
Within each small square, the random waypoint model is used
for CR mobility, with the speed of a CR user uniformly
distributed between 0 and 2 meters/sec. We assume that a CR
user can use up to three data channels simultaneously. We set
(1)
(2)
(12)
the interference mask to Pmask = Pmask = . . . = Pmask = 50
mW. The reported results are the average of 100 experiments. In
our design, we assume an exclusive channel occupancy policy
on CR transmissions (i.e., no CR-CR interference). However,
hidden-terminal problem can still occur in this scenario due to
imperfect control. Our simulations relax these assumptions and
account for all sources of interference, including those that are
far away from a receiver and use common channels.
Remark: Our simulations only address the MAC layer
aspects and assume that route computations have already been
carried out. Taking the destination from a node’s one-hop
neighbors is intended only to convey the need for channel
access. A “destination” in this context could be the next hop
where a packet is to be forwarded to or the final packet
destination. Randomly selecting a neighbor as a destination
is realistic in terms of packet forwarding, especially when
multiple flows (like file transfers, messaging, or VoIP) pass
through a node.
2) Results: We first compare the performance of DDMAC
to that of the BMC scheme. For a fair comparison, we let both
schemes use the maximum allowable power vector Pmask .
We set α to 0.6, Twin to 0.5 second, and m to 12. Figures
13(a) and (b) show that under moderate and high traffic loads,
DDMAC significantly reduces the connection blocking rate and
improves the overall one-hop throughput by up to 30%. This
0.2
0.3
0.4
Packet genaration rate
40
35
30
25
20
BMC
DDMAC
BMC−Raleigh
DDMAC−Raleigh
15
10
5
0
0
0.1
0.2
0.3
0.4
Packet generation rate (Packet/sec)
0.5
(b) Throughput vs. λ (with and without a
Raleigh fading component).
Fig. 13.
Performance of a CRN.
improvement is attributed to the increase in the number of
simultaneous transmissions in DDMAC. Note that under low
traffic load, the throughput of DDMAC gracefully degrades to
that of BMC due to the availability of a sufficient number
of channels. The system performance under Raleigh channel
model (i.e., varying channel conditions) is also investigated
in Figure 13(b). We consider normalized random variables to
capture the fading processes [8]. The results show that, under
such varying channel conditions, the same trends that were
noticed for the AWGN channel are observed here. Figure 13(b)
shows that the impact on throughput is almost the same under
AWGN and Raleigh channel models. Similar observations have
also been reported in an experimental study in [38] for IEEE
802.11b wireless LAN. In [38], the authors showed that the
impact on throughput and packet error rate were virtually
identical under AWGN and Raleigh channel models.
In Figure 14(a), we focus on the per-user throughput performance under DDMAC8 . As shown in this figure, although
DDMAC requires a pair of CR users to communicate over a
set of channels that may not be optimal from one user’s perspective, the per-user throughput of DDMAC under moderate
and high traffic loads is still greater than that of the BMC
scheme. This is because DDMAC attempts to serve a given CR
transmission first using the preferable channel list and preserves
8 This figure shows the average worst-case throughput performance among
all CR users.
0.1
0.08
0.06
0.04
BMC
DDMAC
0.02
0
0
0.1
0.2
0.3
Packet generation rate
0.4
0.5
(a) Per-user single-hop throughput.
Single−hop throuhput (Packet/time slot)
Single−hop throughput (packet/ time slot)
12
0.12
40
λ = 0.2
λ = 0.25
λ = 0.3
35
30
25
20
5
10
m
15
(a) Throughput vs. number of rings (m)
around a CR user.
Fairness Index
0.9
0.8
BMC
DDMAC
0.7
0.6
0.5
0
0.1
0.2
0.3
0.4
Packet generation rate
0.5
Single−hop throuput (Packet/time slot)
1
38
T
36
Twin = 0.3 s
34
Twin = 1 s
32
win
= 0.03 s
λ = 0.3
Twin = 4 s
30
28
26
24
22
0.1
0.2
0.3
0.4 0.5 0.6 0.7
Forgitting factor α
0.8
0.9
1
(b) Fairness index vs. λ.
Fig. 14.
Per-user throughput and fairness Performance.
(b) Throughput vs. α for different Twin
values.
Fig. 15.
the “better” channels for other transmissions. However, if the
aggregate rate of this transmission cannot be satisfied using
the preferable list, DDMAC attempts to serve this transmission
using the remaining available channels.
Next, we compare the fairness index of DDMAC to that of
BMC. Compared to BMC, Figure 14(b) shows that DDMAC
slightly improves the network fairness and preserves longterm fairness properties. This improvement occurs because
DDMAC motivates cooperation among neighbors to maximize
their network-wide benefit.
The effect of dividing the transmission range of a CR user
is depicted in Figure 15(a) for different values of λ. As m
increases, the throughput increases up to a certain point. For
m ≥ 12, no significant improvement is observed in the network
throughput. This is because the preferable-channel assignment
mechanism merges the m regions into K ≤ m regions, i.e.,
over-splitting Rc is not useful.
In Figure 15(b), we study the impact of α and Twin on the
performance of DDMAC. We set λ = 0.3 packet/slot. The
network throughput versus α for different values of Twin is
shown in the figure. It is clear that the throughput depends on
the choice of α and Twin . As Twin increases, α should increase
to give much more importance to recent observations without
entirely discarding older observations. Table II shows the best
throughput performance and the associated optimal value of α
(α∗ ), obtained from simulation, for different values of Twin . It
is clear that if Twin is too small or too large, the throughput
reduces significantly.
Scheme
BMC
DDMAC(Twin
DDMAC(Twin
DDMAC(Twin
DDMAC(Twin
DDMAC(Twin
Performance of DDMAC.
= 0.03 s)
= 0.3 s)
= 0.4 s)
= 1 s)
= 4 s)
α∗
0.1
0.6
0.6
0.8
1.0
Best throughput (packet/slot)
25
26
33.6
33.85
33.89
28
TABLE II
P ERFORMANCE OF DDMAC AT THE OPTIMAL α AS A FUNCTION OF Twin .
We also investigate the robustness of DDMAC under inaccurate distance estimation, which is mainly caused by mobility,
multi-path propagation, reflection, and fading effects. The estimated distance de is given by (1 + ξ) d, where ξ is a uniform
estimation error (ξ ∼ Uniform[−ǫ, ǫ]). Figure 16(a) shows the
effect of inaccurate distance estimation on throughput as a
function of ǫ under different traffic loads. It can be observed that
there are no significant changes in the throughput for different
values of ǫ. Figure 16(b) gives the percentage reduction in
throughput due to inaccurate d as a function of λ for different
values of ǫ. This figure shows that the maximum percentage
of reduction in throughput due to inaccurate estimation of d is
less than 6%.
The results in Figure 16 indicate that channel assignment
40
35
8
6
BMC
DDMAC
4
2
30
0
0
25
20
Fig. 17.
0.1
0.2
0.3
0.4
Packet generation rate
0.5
End-to-end throughput vs. λ
15
Low load
10
Moderate load
5
0
0.05
High load
0.1
0.15
ε
0.2
0.25
Percentage of reduction in throughput
(a) Throughput vs. ǫ.
6
ε = 5%
5
ε = 15%
ε = 25%
4
3
2
1
0
0
0.1
0.2
0.3
0.4
Packet generation rate
channel assignment process in the design of DDMAC. We
compared the performance of DDMAC with that of a reference
multi-channel MAC protocol that is designed for typical multichannel systems (BMC). We showed that, under moderate and
high traffic loads, DDMAC achieves about 30% increase in
throughput over the BMC scheme, with manageable processing
overhead. Although DDMAC requires a pair of CR users to
communicate on a channel that may not be optimal from
a user’s perspective, we showed that the average per-user
throughput of DDMAC under moderate and high traffic loads
is greater than that of the BMC scheme. Furthermore, DDMAC
preserves (even slightly improves) throughput fairness relative
to BMC. In summary, DDMAC provides better spectrum utilization by reducing the connection blocking probability and
increasing the system throughput. To the best of our knowledge,
DDMAC is the first CRN MAC protocol that utilizes the
radio propagation characteristics to improve the overall network
throughput.
0.5
(b) Percentage of reduction in throughput
vs. λ.
Fig. 16.
13
10
End−2−end Throughput
(Packet/time slot)
Single−hop throughput (Packet/time slot)
in DDMAC is quite robust to distance estimation errors. This
is because DDMAC requires only rough estimates of user
distribution, distances among users, and local traffic conditions
in order to dynamically adapt channel assignments to current
network traffic.
Impact of inaccurate distance estimation in DDMAC.
Finally, we study the end-to-end throughput for both BMC
and DDMAC. Specifically, for each generated packet, the destination node is randomly selected to be any node in the network.
We use a min-hop routing policy, but we ignore the routing
overhead. For both schemes, the next-hop candidates are nodes
that are within the transmission range of the transmitter. Figure
17 shows that under moderate and high traffic loads, DDMAC
significantly improves the overall network throughput (inline
with the results in Figure 13(b)).
VIII. C ONCLUSIONS
In this paper, we proposed an opportunistic distancedependent MAC protocol for CRNs (DDMAC). DDMAC
improves the CRN throughput through cooperative channel
assignment, taking into consideration the non-adjacency of
frequency channels and the imposed power masks. We presented a heuristic stochastic channel assignment scheme that
dynamically exploits the dependence between the signal attenuation model and the transmission distance. Our scheme
accounts for traffic dynamics. It assigns channels with lower
average SINR to shorter transmission distances to increase
the number of simultaneous transmissions. We integrated the
R EFERENCES
[1] “FCC, spectrum policy task force report, ET docket no. 02-155,” Nov.
2002.
[2] H. Bany Salameh, T. Shu, and M. Krunz, “Adaptive cross-layer MAC
design for improved energy efficiency in multi-channel wireless sensor
networks,” Ad Hoc Networks, vol. 5, no. 6, pp. 844–854, 2007.
[3] N. Jain, S. Das, and A. Nasipuri, “A multichannel CSMA MAC protocol
with receiver-based channel selection for multihop wireless networks,”
in Proceedings of the 9th Int. Conf. on Computer Communications and
Networks (IC3N), Oct. 2001, pp. 432–439.
[4] H. Bany Salameh and M. Krunz, “Channel Access Protocols for Multihop
Opportunistic Networks: Challenges and Recent Developments,” IEEE
Network-Special Issue on Networking over Multi-hop Cognitive Networks,
July 2009.
[5] M. Riback, J. Medbo, J. Berg, F. Harrysson, and H. Asplund, “Carrier
frequency effects on path loss,” in Proceedings of Vehicular Technology
Conference (VTC), May 2006, pp. 2717–2721.
[6] T. Shu, S. Cui, and M. Krunz, “Medium access control for multi-channel
parallel transmission in cognitive radio networks,” in Proceedings of the
IEEE GLOBECOM Conference, Nov. 2006.
[7] A. Nasipuri and S. Das, “Performance of multi-channel ad hoc networks,”
International Journal of Wireless and Mobile Computing, vol. 1, no. 3/4,
pp. 191–203, 2006.
[8] T. S. Rappaport, Wireless Communications-Principles and Practice,
Prentice-Hall Press, 2001, 2nd edition.
[9] E. Arikan, “Some complexity results about packet radio networks,” IEEE
Transactions on Information Theory, vol. 30, no. 4, pp. 681–685, 1984.
[10] A. Behzad and I. Rubin, “Multiple access protocol for power-controlled
wireless access nets,” IEEE Transactions on Mobile Computing, vol. 3,
no. 4, pp. 307–316, 2004.
[11] J. So and N. Vaidya, “Multi-channel MAC for ad hoc networks: Handling
multi-channel hidden terminals using a single transceiver,” in Proceedings
of the ACM International Symposium on Mobile and Ad-Hoc Networking
and Computing (MobiHoc), Tokyo, Japan, May 2004, pp. 222 – 233.
[12] Q. Zhao, L. Tong, and A. Swami, “Decentralized cognitive MAC
for dynamic spectrum access,” in Proceedings of the IEEE DySPAN
Conference, Nov. 2005, pp. 224–232.
14
[13] Y. Xing, R. Chandramouli, S. Mangold, and S. Shankar, “Dynamic
spectrum access in open spectrum wireless networks,” IEEE Journal
on Selected Areas in Communications, vol. 24, no. 3, pp. 626–637, 2006.
[14] Y. Xing, C. Mathur, M. Haleem, R. Chandramouli, and K. Subbalakshmi,
“Dynamic spectrum access with QoS and interference temperature constraints,” IEEE Transactions on Mobile Computing, vol. 6, no. 4, pp.
423–433, 2007.
[15] R. Menon, R. Buehrer, and J. Reed, “Outage probability based comparison of underlay and overlay spectrum sharing techniques,” in Proceedings
of the IEEE DySPAN Conference, Nov. 2005, pp. 101–109.
[16] N. Nie and C. Comaniciu, “Adaptive channel allocation spectrum etiquette
for cognitive radio networks,” in Proceedings of the IEEE DySPAN
Conference, Nov. 2005, pp. 269–278.
[17] S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23,
no. 2, pp. 201–220, 2005.
[18] T. C. Clancy, “Achievable capacity under the interference temperature
model,” in Proceedings of the IEEE INFOCOM Conference, May 2007,
pp. 794–802.
[19] Y. Yuan, P. Bahl, R. Chandra, T. Moscibroda, and Y. Wu., “Allocating dynamic time-spectrum blocks in cognitive radio networks,” in Proceedings
of the ACM International Symposium on Mobile and Ad-Hoc Networking
and Computing (MobiHoc), Sept. 2007.
[20] H. Bany Salameh, M. Krunz, and O. Younis, “MAC protocol for
opportunistic cognitive radio networks with soft guarantees,” IEEE
Transactions on Mobile Computing, vol. 8, no. 10, pp. 1339–1352, Oct.
2009.
[21] D. Cabric, S. Mishra, and R. Brodersen, “Implementation issues in
spectrum sensing for cognitive radios,” in Proceedings of the 38th
Asilomar Conference on Signals, Systems and Computers, Nov. 2004,
pp. 772–776.
[22] D. Cabric and R. Brodersen, “Physical layer design issues unique to
cognitive radio systems,” in Proceedings of the IEEE International
Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC), Sept. 2005, pp. 759–763.
[23] A. Sabharwal, A. Khoshnevis, and E. Knightly, “Opportunistic spectral
usage: Bounds and a multi-band CSMA/CA protocol,” IEEE/ACM
Transactions on Networking, vol. 15, no. 3, pp. 533–545, 2007.
[24] S. Jones, N. Merheb, and I. Wang, “A cognitive MAC protocol using
statistical channel allocation for wireless ad-hoc networks,” in Proceedings of Wireless Communications and Networking Conference (WCNC),
March 2007, pp. 105–110.
[25] J. Zhao, H. Zheng, and G.-H. Yang, “Distributed coordination in dynamic
spectrum allocation networks,” in Proceedings of the IEEE DySPAN
Conference, Nov. 2005, pp. 259–268.
[26] I. Akyildiz, W.-Y. Lee, M.C. Vuran, and S. Mohanty, “Next generation
dynamic spectrum access cognitive radio wireless networks: A survey,”
Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.
[27] A. Hoang and Y. Liang, “Maximizing spectrum utilization of cognitive
radio networks using channel allocation and power control,” in Proceedings of Vehicular Technology Conference (VTC), Sept. 2006, pp. 1–5.
[28] M. Youssef and A. Agrawala, “The Horus WLAN location determination
system,” in MobiSys’05: Proceedings of the 3rd International Conference
on Mobile Systems, Applications, and Services, 2005, pp. 205–218.
[29] S. Kiran and R. Chandramouli, “An adaptive energy-efficient link layer
protocol using stochastic learning control,” in Proceedings of the IEEE
ICC Conference, May 2003, pp. 1114–1118.
[30] Y. Chang, T. Ho, and L. Kaelbling, “Mobilized ad-hoc networks: A
reinforcement learning approach,” in Proceedings of the International
Conference on Autonomic Computing, May 2004, pp. 240–247.
[31] H. Khalife, S. Ahuja, N. Malouch, and M. Krunz, “Probabilistic path
selection in opportunistic cognitive radio networks,” in Proceedings of
the IEEE GLOBECOM Conference, Nov. 2008.
[32] A. Muqattash and M. Krunz, “POWMAC: A single-channel power control
protocol for throughput enhancement in wireless ad hoc networks,” IEEE
Journal on Selected Areas in Communications, vol. 23, no. 5, pp. 1067–
1084, May 2005.
[33] R. Garces and J. Garcia-Luna-Aceves, “Collision avoidance and resolution multiple access for multichannel wireless networks,” in Proceedings
of the IEEE INFOCOM Conference, March 2000, pp. 595–602.
[34] “Mesquite Software Incorporation,” www.mesquite.com.
[35] R. Jain, The Art of Computer System Performance Analysis, New York:
John Wiley & Sons, 1991.
[36] E. Sousa, “Performance of a spread spectrum packet radio network link in
a poisson field of interferers,” IEEE Transactions on Information Theory,
vol. 38, pp. 1743–1754, Nov. 1992.
[37] E. Sousa and J. Silvester, “Optimum transmission ranges in a directsequence spread-spectrum multihop packet radio network,” IEEE Journal
on Selected Areas in Communications, vol. 8, no. 5, pp. 762–771, June
1990.
[38] C. Steger, P. Radosavljevic, and J. Patrick Frantz, “Performance of IEEE
802.11b wireless LAN in an emulated mobile channel,” in Proceedings
of IEEE Fall Vehicular Technology Conference (VTC), April 2003.
Haythem A. Bany Salameh received the Ph.D.
degree in electrical and computer engineering from
the University of Arizona, Tucson, in 2009. He is currently an Assistant Professor of electrical engineering
with the Hijawi Faculty for Engineering Technology,
Yarmouk University (YU), Irbid, Jordan. He joined
YU in August 2009, after a brief postdoctoral position
with the University of Arizona. His current research
interests are in system architecture and communication protocol designs for cognitive radio networks
with emphasis on spectrum access and channel/power
assignment. In Summer 2008, he was a member of the R&D LTE (Long Term
Evolution) Development Group, QUALCOMM, Inc., San Diego. He serves as
a reviewer for many IEEE conferences and journals.
Marwan Krunz is a professor of electrical and
computer engineering at the University of Arizona.
He directs the wireless and networking group and is
also the UA site director for Connection One, a joint
NSF/state/industry IUCRC cooperative center that
focuses on RF and wireless communication systems
and networks. Dr. Krunz received his Ph.D. degree in
electrical engineering from Michigan State University
in 1995. He joined the University of Arizona in
January 1997, after a brief postdoctoral stint at the
University of Maryland, College Park. He previously
held visiting research positions at INRIA, HP Labs, University of Paris VI,
and US West (now Qwest) Advanced Technologies. His research interests
lie in the fields of computer networking and wireless communications. His
current research is focused on cognitive radios and SDRs; distributed radio
resource management in wireless networks; channel access and protocol design;
MIMO and smart-antenna systems; UWB-based personal area networks; energy
management and clustering in sensor networks; media streaming; QoS routing;
and fault monitoring/detection in optical networks. He has published more than
150 journal articles and refereed conference papers, and is a co-inventor on
three US patents. M. Krunz is a recipient of the National Science Foundation
CAREER Award (1998). He currently serves on the editorial boards for the
IEEE Transactions on Mobile Computing and the Computer Communications
Journal. He previously served on the editorial board for the IEEE/ACM
Transactions on Networking (2001-2008). He was a guest co-editor for special
issues in IEEE Micro and IEEE Communications magazines. He served as
a technical program chair for various international conferences, including
the IEEE WoWMoM 2006, the IEEE SECON 2005, the IEEE INFOCOM
2004, and the 9th Hot Interconnects Symposium (2001). He has served and
continues to serve on the executive and technical program committees of many
international conferences and on the panels of several NSF directorates. He gave
keynotes and tutorials, and participated in various panels at premier wireless
networking conferences. He is a consultant for a number of companies in the
telecommunications sector.
Ossama Younis is a senior research scientist in
Applied Research at Telcordia Technologies, Inc. He
received his B.S. and M.S. degrees in computer
science from Alexandria University, Egypt. Then, he
received his Ph.D. degree in computer science from
Purdue University, USA in August 2005. He has
served as the web chair of IEEE ICNP 2008 and on
the Technical Program Committee of several international conferences. His research interests are in the
architecture and experimentation of network protocols
and applications, especially wireless sensor networks,
cognitive-radio networks, and Internet tomography. distributed systems, secure
protocol design, and cross-layer optimization. He is a member of the ACM and
the IEEE.