A Hybrid MAC Protocol for Cognitive Radio Ad Hoc Networks
نویسندگان
چکیده
In cognitive radio networks, secondary users exchange control information to utilize the available channels efficiently, to maintain connectivity, to negotiate for data communication such as sender-receiver handshakes, for neighbor discovery etc. This task is not trivial in cognitive radio networks due to the dynamic nature of network environment. Generally, this problem is tackled by using two famous approaches. The first one is the use of common control channel (CCC) and the second one is using channel hopping (a.k.a sequence-based protocols). The use of CCC simplifies the processes of MAC protocols. However, it may not be feasible in cognitive radio networks as the available channels, including control channel, are dynamically changing according to primary user activities. Channel hopping approaches can tolerate the failure of network due to primary user activities. But it causes significant amount of channel access delay which is known as time to rendezvous (TTR). In this paper, we propose a hybrid protocol of these two mechanisms. This hybrid protocol can maintain connectivity and it can guarantee the secondary users to be able to exchange necessary control information in dynamic environment. In our hybrid protocol, we use multiple control channels. If some control channels are unavailable in case of primary user appearances, secondary users still can communicate on different control channels, so it can be more tolerable primary user activities than normal CCC approaches. Channel hopping is performed only for control channels, so it provides relatively small amount of channel access delay. key words: cognitive radio ad hoc networks, control channels, channel hopping
منابع مشابه
Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks
The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...
متن کاملMedium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for...
متن کاملA Throughput-Aimed MAC Protocol with QoS Provision for Cognitive Ad Hoc Networks
In this letter, we propose a Throughput-aimed MAC Protocol with Quality of Service (QoS) provision (T-MAC) for cognitive Ad Hoc networks. This protocol operates based on the Time Division Multiple Access (TDMA) slot assignments and the power control mechanism, which can improve the QoS provision and network throughput. Our simulation results show that the T-MAC protocol can efficiently increase...
متن کاملA survey on MAC protocols for cognitive radio networks
1570-8705/$ see front matter 2009 Elsevier B.V doi:10.1016/j.adhoc.2009.01.002 * Corresponding author. E-mail address: [email protected] (C. Corm 1 This work was conducted during her stay at BWN In cognitive radio (CR) networks, identifying the available spectrum resource through spectrum sensing, deciding on the optimal sensing and transmission times, and coordinating with the other users...
متن کاملPerformance Evaluation of Transport Layer in Cognitive Radio Ad-hoc Networks
In this paper, we have proposed some changes to MAC protocol for improving the performance of transport layer in cognitive radio ad-hoc networks. We have studied effects of different MAC and routing protocols on TCP in cognitive radio technology enabled environments. We have reviewed performance of TCP in two different situations. In first situation, all users are secondary users while in secon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 95-B شماره
صفحات -
تاریخ انتشار 2012