Prioritized Medium Access Control in Cognitive Radio Ad Hoc Networks: Protocol and Analysis

被引:0
|
作者
Ridi Hossain
Rashedul Hasan Rijul
Md. Abdur Razzaque
A. M. Jehad Sarkar
机构
[1] Univeristy of Dhaka,Green Networking Research Group, Department of Computer Science and Engineering
[2] Hankuk University of Foreign Studies,Department of Digital Information Engineering, College of Engineering
来源
Wireless Personal Communications | 2014年 / 79卷
关键词
Cognitive radio ad hoc networks; Opportunistic spectrum access; White space utilization; Medium access control; Markov chain model; Throughput;
D O I
暂无
中图分类号
学科分类号
摘要
Cognitive radio (CR) technology enables opportunistic exploration of unused licensed channels. By giving secondary users (SUs) the capability to utilize the licensed channels (LCs) when there are no primary users (PUs) present, the CR increases spectrum utilization and ameliorates the problem of spectrum shortage. However, the absence of a central controller in CR ad hoc network (CRAHN) introduces many challenges in the efficient selection of appropriate data and backup channels. Maintenance of the backup channels as well as managing the sudden appearance of PUs are critical issues for effective operation of CR. In this paper, a prioritized medium access control protocol for CRAHN, PCR-MAC, is developed which opportunistically selects the optimal data and backup channels from a list of available channels. We also design a scheme for reliable switching of a SU from the data channel to the backup channel and vice-versa. Thus, PCR-MAC increases network throughput and decreases SUs’ blocking rate. We also develop a Markov chain-based performance analysis model for the proposed PCR-MAC protocol. Our simulations, carried out in NS-3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$NS-3$$\end{document}, show that the proposed PCR-MAC outperforms other state-of-the-art opportunistic medium access control protocols for CRAHNs.
引用
收藏
页码:2383 / 2408
页数:25
相关论文
共 50 条
  • [21] CRBP: A Broadcast Protocol for Cognitive Radio Ad Hoc Networks
    Al-Mathehaji, Yasir
    Boussakta, Said
    Johnston, Martin
    Fakhrey, Harith
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7540 - 7545
  • [22] RPCRAN: A ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS
    Siraj, Mohammad
    Alshebeili, Saleh
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4583 - 4594
  • [23] A MAC Protocol for Cognitive Radio Wireless Ad Hoc Networks
    Passiatore, Carla
    Camarda, Pietro
    MULTIPLE ACCESS COMMUNICATIONS, 2011, 6886 : 1 - 12
  • [24] CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
    Chowdhury, Kaushik R.
    Akyildiz, Ian F.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (04) : 794 - 804
  • [25] A Hybrid MAC Protocol for Cognitive Radio Ad Hoc Networks
    Htike, Zaw
    Lee, Jun
    Hong, Choong Seon
    Lee, Sungwon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (04) : 1135 - 1142
  • [26] Distributed Coordination Protocol for Ad Hoc Cognitive Radio Networks
    Kim, Mi-Ryeong
    Yoo, Sang-Jo
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (01) : 51 - 62
  • [27] Prioritized Secondary User Access Control in Cognitive Radio Networks
    Wang, Huaxia
    Yao, Yu-Dong
    Peng, Shengliang
    IEEE ACCESS, 2018, 6 : 11007 - 11016
  • [28] Directional medium access control for ad hoc networks
    Wang, Jianfeng
    Zhai, Hongqiang
    Li, Pan
    Fang, Yuguang
    Wu, Dapeng
    WIRELESS NETWORKS, 2009, 15 (08) : 1059 - 1073
  • [29] Directional medium access control for ad hoc networks
    Jianfeng Wang
    Hongqiang Zhai
    Pan Li
    Yuguang Fang
    Dapeng Wu
    Wireless Networks, 2009, 15 : 1059 - 1073
  • [30] Medium access control in vehicular ad hoc networks
    Leng, Supeng
    Fu, Huirong
    Wang, Qing
    Zhang, Yan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (07): : 796 - 812