A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

Similar documents
A Cluster-based TDMA System for Inter-Vehicle Communications *

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Multi-beam antennas in a broadband wireless access system

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Algorithms for Memory Hierarchies Lecture 14

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Adaptive Network Coding for Wireless Access Networks

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement

Solutions to exercise 1 in ETS052 Computer Communication

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

To provide data transmission in indoor

CHAPTER 2 LITERATURE STUDY

Understanding Basic Analog Ideal Op Amps

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

Information-Coupled Turbo Codes for LTE Systems

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

Synchronous Generator Line Synchronization

Improving synchronized transfers in public transit networks using real-time tactics

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Postprint. This is the accepted version of a paper presented at IEEE PES General Meeting.

Adaptive VoIP Smoothing of Pareto Traffic Based on Optimal E-Model Quality

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Discussion of this exercise covers the following points:

(CATALYST GROUP) B"sic Electric"l Engineering

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators

A Development of Earthing-Resistance-Estimation Instrument

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Mixed CMOS PTL Adders

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Study on SLT calibration method of 2-port waveguide DUT

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Distance dependent Call Blocking Probability, and Area Erlang Efficiency of Cellular Networks

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Eliminating Non-Determinism During Test of High-Speed Source Synchronous Differential Buses

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Temporal Secondary Access Opportunities for WLAN in Radar Bands

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks

Experiment 3: Non-Ideal Operational Amplifiers

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

On the Description of Communications Between Software Components with UML

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

First Round Solutions Grades 4, 5, and 6

Spiral Tilings with C-curves

Experiment 3: Non-Ideal Operational Amplifiers

Kyushu Institute of Technology

Engineer-to-Engineer Note

Math Circles Finite Automata Question Sheet 3 (Solutions)

Exponential-Hyperbolic Model for Actual Operating Conditions of Three Phase Arc Furnaces

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office

Application of Wavelet De-noising in Vibration Torque Measurement

Application Note. Differential Amplifier

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance

MATH 118 PROBLEM SET 6

High-speed Simulation of the GPRS Link Layer

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

RSS based Localization of Sensor Nodes by Learning Movement Model

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

Address for Correspondence

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

High Speed On-Chip Interconnects: Trade offs in Passive Termination

Geometric quantities for polar curves

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Design And Implementation Of Luo Converter For Electric Vehicle Applications

Genetic Representations for Evolutionary Minimization of Network Coding Resources

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Aggregate Interference from Secondary Users with Heterogeneous Density

Direct AC Generation from Solar Cell Arrays

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

An Analog Baseband Approach for Designing Full-Duplex Radios

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

CDMA One. International summer students courses: "Plugged In: Modern Networks and Services in Telecommunication"

System-Wide Harmonic Mitigation in a Diesel Electric Ship by Model Predictive Control

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

Electronic Circuits I - Tutorial 03 Diode Applications I

Engineer-to-Engineer Note

Foot-Pedal: Haptic Feedback Human Interface Bridging Sensational Gap between Remote Places

Example. Check that the Jacobian of the transformation to spherical coordinates is

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

Transcription:

Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering The University of North Crolin t Chrlotte Emil: {xliu33, Lind.Xie}@uncc.edu Abstrct In cognitive rdio networks (CRNs), two users hve to rendezvous on common vilble chnnel before communictions. Most existing rendezvous ppers focus on the chnnelhopping (CH) sequence design. However, rendezvous my suffer from the hndshke filure on the rendezvous chnnel, especilly in unsynchronized-slot scenrios. In this pper, the chllenge of slot-synchronous rendezvous in CRNs is ddressed for the first time. A protocol iming to improve the hndshke performnce during the CH process is proposed. By nlyzing the potentil fctors leding to the hndshke filure, we design novel MAC protocol with n optiml size of time slot which cn mitigte the effects of these fctors nd provide the shortest time for rendezvous. In ddition, we lso propose probbilistic model for estimting the verge rendezvous time under different CRNs. Simultion results vlidte our nlyticl model nd demonstrte tht our proposed protocol cn chieve the rendezvous time close to the theoreticl vlue under slot-synchronous scenrios. I. INTRODUCTION In order to solve the spectrum scrcity nd under-utiliztion problem, cognitive rdio emerges s promising technology which llows secondry user () to ccess the spectrum unoccupied by licensed users, or, primry users (PUs). It lso requires to vcte chnnels for the returning of PUs. In other words, the vilble chnnels for my chnge by time or its loction. Hence, unlike trditionl wireless networks, control chnnel tht is commonly vilble to ll s in cognitive rdio network (CRN) my not exist or cnnot lst for long time. It is lso imprcticl for to obtin other s chnnel informtion using such common control chnnel (CCC). Therefore, two s meeting ech other on common chnnel is bsic step before they cn estblish communictions in CRNs. This process is clled blind rendezvous. To chieve blind rendezvous, the sequence-bsed chnnelhopping (CH) technique cn be used. In this pproch, ech first senses the spectrum nd genertes set of vilble chnnels. Then, it hops onto these chnnels one by one following predefined sequence. Thus, two s cn rendezvous if they hop on sme chnnel t the sme time. The stte-of-thert CH [] cn gurntee the rendezvous between ny two s if they hve t lest one common vilble chnnel. It minly focuses on designing the CH sequence to chieve rendezvous in short time period which is clled time to rendezvous (TTR). TTR represents the number of chnnels needs to go through before hopping to sme chnnel with nother. However, in prcticl scenrios, successful hopping on sme chnnel does not necessrily led to successful hndshke which cn be ffected by mny fctors []. Only fter successful hndshke, cn two s truly estblish dt communictions. Thus, we define time to hndshke (TTH) s our performnce metric in this pper. In order to get shorter TTH, existing hopping lgorithms need to work under This work ws supported in prt by the US Ntionl Science Foundtion (NSF) under Grnt No. 0953644, 875, nd 343355. pproprite MAC protocols to gurntee successful hndshke in CRNs. In such MAC protocol, the key feture to support the CH is to mintin per-unit-length the sme in ll sequences, i.e., ech s sojourn durtion on ech chnnel should be the sme. This feture ccords with the time-slotted system where the stying time on ech chnnel cn be treted s one time slot. A time slot should be long enough for two s to complete hndshke process. It mens tht Requestto-Send (RTS) nd Cler-to-Send (CTS) cn be successfully exchnged by the sender nd the receiver, bsed on the Crrier Sense Multiple Access with Collision Avoidnce (CSMA/CA) mechnism in IEEE 80.. On the other hnd, the time slot of ech might need to be synchronized in order to ensure tht two s cn hop on the sme chnnel t the sme time. Although some CH ppers [], [3] clim tht their sequence design cn work under the synchronous scenrio, it differs from the synchronous cse in the protocol design. For exmple, Fig. () shows synchronous CH cse where nd strt to hop t the sme time; Fig. (b) shows the synchronous CH cse where two s strt to hop t different time slots; nd in Fig. (c), the slots re unsynchronized. We nme the ltter two cses s user-synchronous cse nd slotsynchronous cse, respectively. In this pper, we focus on the slot-synchronous cse. CH 3 CH 3 CH 3 CH 3 CH 3 () synchronous (b) user-synchronous (c) slot-synchronous Fig.. Synchronous cse nd synchronous cses in different designs. However, not ll MAC protocols in CRNs cn be used for blind rendezvous, such s the protocols under the single chnnel [4] nd the underly model [5], [6]. Other designs [7], [8] either directly use the synchronized time slot ssumption [9] [] or chieve synchroniztion by imprcticl methods, including employing CCC [3] [7], using multiple trnsceivers [], [3], [7] [9], or brodcsting becons on ll chnnels before rendezvous [0], which is less efficient due to high overhed nd collision. The protocol proposed in [] is climed to be robust enough under synchronous slots. However, it does not fully consider the potentil problems in such scenrio nd lcks detils. In summry, ll the existing MAC designs consider time synchroniztion s necessry condition for blind rendezvous nd chieve it in different imprcticl wys. In this pper, we consider chieving rendezvous from different perspective. We propose novel RTS/CTS hndshke mechnism to mitigte the effects cused by synchronous time slots. This mechnism cn chieve successful hndshke with high probbility when the sender nd the receiver rrive on sme chnnel t different moments due to their synchronous time slots. Menwhile, this mechnism cn lso solve the problems prohibiting successful hndshke in synchronous scenrios. The length of time slot plys crucil CH 3 978--4799-35-3/4/$3.00 04 IEEE 464

Globecom 04 - Wireless Networking Symposium role in this design. It is trdeoff prmeter. When time slot is long, the probbility of hving successful hndshke is high, but it tkes long time for two s to hop on sme chnnel. On the other hnd, if time slot is short, the hndshke process cnnot be gurnteed, which my cost more time to get successful rendezvous. Therefore, we lso obtin the optiml length of time slot for our design in terms of the shortest TTH. Simultion results vlidte the optimlity of the time slot nd indicte tht the synchronized slot ssumption is not necessry for our rendezvous protocol design in CRNs. To the best of our knowledge, this is the first work on MAC design for blind rendezvous in CRNs under the slot-synchronous scenrio. The rest of this pper is orgnized s follows. In Section II, we nlyze three problems tht my hppen during one time slot which cn potentilly ruin hndshke process. At the sme time, we design n pproprite protocol to mitigte the effect of these problems s much s possible. In Section III, we derive the expression of the optiml length of time slot which cn minimize the TTH. Simultion results re shown in Section IV, followed by the conclusions in Section V. II. PROBLEM ANALYSIS AND PROTOCOL DESIGN In this section, we first introduce the system model in our nlysis. Then, we nlyze three min problems tht my result in hndshke filure in one time slot nd t the sme time estblish our protocol design to solve these problems. A. System Model The system considered in this pper consists of finite number of rndomly distributed PUs nd s which cn operte over set of orthogonl chnnels. Pcket rrivls of both PUs nd s follow the Poisson distribution. Ech PU is rndomly ssigned chnnel when new pcket needs to be trnsmitted. Ech source rndomly chooses within its trnsmission rnge s its destintion when new pcket needs to be trnsmitted. Both the source s nd listening s sense ll chnnels to find their own vilble chnnels nd utilize CH lgorithm to hop mong them. This process should be done periodiclly to void chnnel sttus chnge due to PU ctivities. We ssume tht ech works in hlf-duplex mode. When source wnts to communicte with its destintion, the sender sends n RTS messge on ech chnnel it hops on during ech time slot until receiving the correct CTS. We cll the in this process n ctive. On the other hnd, since pssive who hs no pcket to send my become potentil destintion of its neighbor, it keeps listening on ech chnnel it hops on during ech time slot until receiving correct RTS. The hndshke in our model is ssumed to be free of propgtion-interference loss. Compred with trditionl hndshke filures, more possible reson for hndshke filure in CRNs is tht the destintion is not on the sme chnnel in the current time slot. Hence, for the ske of quick rendezvous, the source should leve its current chnnel nd keep hopping on to other chnnels if the corresponding CTS is not received t the end of time slot. Only fter successful hndshke, cn the dt trnsmission tke plce. The totl time source spends before dt pcket being trnsmitted is the TTH. Since this pper focuses on the hndshke process, we denote the TTH s our service time in the queuing system nlysis. Moreover, even the destintion is on the sme chnnel with the source, they my still fil to hndshke. The first reson is tht n RTS cnnot be received completely due to synchronous time slots. The second reson is neighbor s interference, including chnnel contention nd the hidden terminl collision. The lst reson is clled both-shouting problem cused when the destintion is lso in n ctive mode. The ltter two issues lso exist under synchronous scenrios. B. Anlysis of the Filure Receiving Problem Fig.. Chnnel j Chnnel k RTS RTS RTS Chnnel k Chnnel h The RTS filure receiving cses. In n synchronous CRN, s illustrted in Fig., pssive my not receive complete RTS due to hopping onto potentil rendezvous chnnel lter thn the strting time of n RTS sending (on chnnel i), or leving erlier before the sending finishes (on chnnel k). RTS RTS t t + t +- t + t t + t t + i) the cse of the erliest possible t ii) the cse of the ltest possible t Fig. 3. The cses tht t lest one RTS cn be completely received. Let nd rrive on sme chnnel t moments t nd t, respectively. We normlize the length of sending n RTS/CTS to. If the length of time slot is, should be longer thn so tht t lest one pir of RTS nd CTS exchnge cn be completed in time slot. In ddition, we hve the constrint t t to ensure tht nd hve overlpping time on the common chnnel. There re lso the following constrints (see Fig. 3) to help her t lest one complete RTS from.ift t ( hops on the chnnel lter thn ), the leving time of should be t lest lter thn the end time of the first RTS sent by on the common chnnel, i.e., t + t +.Ift t ( hops on the chnnel erlier thn ), the rriving time of should be t lest erlier thn the strt time of the lst possible RTS sent by on the common chnnel, i.e., t t +. Note tht fter ech RTS is sent out, must wit for while for the potentil CTS. Thus, the lst RTS in the current time slot must be sent before. To sum up, we hve the following equivlent inequlities nd their corresponding grphic illustrtion: 0 t 0 t t + t t t t t + - t 0 - The bove shdow re represents the fesible rnges of t nd t to ensure the receiving of t lest one complete RTS. Therefore, we cn derive the probbility tht pssive t 464

Globecom 04 - Wireless Networking Symposium receives complete RTS from nother on chnnel in the synchronous scenrio, P, size of the shdow re P = size of the squre =.5,. () In synchronous CRNs, it is nturl to define the size of one time slot to be the length of n RTS nd CTS exchnge for the ske of quick rendezvous, i.e., =. However, ccording to (), this design leds to probbility of 0.375 to hve successful RTS reception even fter two s hop on sme chnnel in the synchronous scenrio. Since P is monotoniclly incresing function of, from this point of view, we should design the length of time slot s long s possible nd let keep sending RTS until the current time slot ends. C. Anlysis of the Neighboring Interference Problem In CRNs, especilly in cognitive rdio d hoc networks (CRAHNs), severl other s my be within s sensing rnge. Hence, three or more s my hop on sme chnnel in one time slot during their rendezvous processes. They my interfere with ech other in two scenrios. One is the presence of RTS collisions in the hidden terminl cse. The other is the continuous contention for sending RTS between ctive neighboring s in one time slot. In trditionl wireless networks, one reson tht n ctive node cnnot receive the correct CTS is the RTS collision from hidden terminl. Thus, 80. CSMA/CA requests node to perform binry exponentil bckoff when experiencing the bsence of CTS. However, this mechnism my not increse the successful rte of hndshke when pplied to CRNs, since more possible reson for the bsence of CTS is tht the destintion node is not on the sme chnnel. In ddition, to support bckoff, the size of time slot needs to be uncceptble long. Moreover, the bckoff my still collide with new who just hops on this chnnel fter the bckoff under the synchronous scenrio. On the other hnd, ech time when resends n RTS, it is n dditionl contender for other s. If the destintion is not on the sme chnnel, the source keeps rejoining the contention, which ffects other s opportunities to send the RTS. For exmple, in Fig. 4, hs successfully sent n RTS severl times in time slot (gry RTS/CTS mens the supposed sending/receiving but not chieved). If is hidden terminl of, it will collide with s jth resend. If is neighbor of, it will lose the opportunity to send its RTS becuse of s kth resend. If s destintion is bsent on this chnnel during this time slot, this contention keeps hppening till leves the chnnel. Fig. 4. RTS CTS RTS CTS j th resend k th resend RTS RTS The neighboring interference cses. Therefore, the trditionl method for resolving the RTS collision is not desirble for synchronous rendezvous in CRNs. A better mechnism is required in our protocol. From Section II-B, note tht P is only ffected by three fctors: the sending moments of the first nd the lst RTS in time slot, nd the length of time slot. Bsed on this observtion, we redesign the protocol which cn solve the neighboring interference problem nd menwhile hs n equivlent effect s the design in Section II-B. We propose tht n ctive only sends n RTS twice in time slot: one t the beginning nd one t the end of time slot if chnnel is idle, nd listens to the chnnel during other periods, s the illustrted in Fig. 5. However, if the length of time slot,, is not long enough for sending the second RTS (with CTS receiving), gives up the resend nd listens to the chnnel until the current time slot ends. Thus, we design the length of time slot to be either >4 (neglect the lengths of DIFS, SIFS, nd the contention-window in 80.) or = (without resending nd contention mechnisms in time slot). On the other hnd, if senses chnnel busy, it wits to send the first RTS until the chnnel idle long enough for CTS time, s the in Fig. 5. The gp between the dshed line nd the solid line is the time for DIFS nd the bckoff time for contention. We neglect these obligtory frmes in our nlysis. RTSCTS listening period RTSCTS t t + t + - t + RTSCTS RTSCTS Fig. 5. t The revised resending mechnism. Let be source nd be its neighbor. Let t nd t be their rrivl times on sme chnnel. Assume tht their destintion s re not on the sme chnnel. If t <t, cn send its RTS in this time slot. If t t, in the = cse, cn send its RTS if rriving fter finishing its RTS sending, i.e., t t +. Using the sme constrint t t nd solving the inequlities the sme wy s P, the probbility tht cn successfully send n RTS with neighbor on the sme chnnel is 0.65 when =. In the >4 cse, even rrives during s first RTS sending time s in Fig. 5, cn still send its RTS s long s the moment it strts to send is erlier thn s second RTS sending, i.e., t +<t +, which lwys stnds since >4. Moreover, if rrives during s second RTS sending (t + <t <t + ), we hve t >t + when >4, or,t + (t +) >. In other words, hs enough time for sending its RTS fter leves the chnnel. Hence, the probbility tht cn successfully send n RTS, P, increses to 00% when >4. Therefore, { 0.65, = P =, > 4. () This design lso reduces the RTS collision rte due to the low RTS sending frequency. Compred with the trditionl design, the listening period in the middle of time slot provides the opportunity for nother to send n RTS without collision. Suppose tht is hidden terminl of. Then, the cse tht cn successfully send t lest one RTS without collision is when the RTS from hs no overlp with the RTS from, i.e., t + < t, or t + >t +. We nme this probbility P 3.We derive it in similr wy s P, ( ) P 3 =, =or >4. (3) It lso requires the to be s long s possible to chieve the collision-free sending. 4643

Globecom 04 - Wireless Networking Symposium D. Anlysis of the Both-Shouting Problem In Section II-B, we consider the filure receiving problem when the destintion is pssive. However, it my lso be nother ctive. Consequently, when is hopping nd serching for its destintion, the trget my lso be serching for nother. An extreme cse is tht they re serching for ech other, which is dedlock when =. RTS RTS dt t t + - Cse : RTS CTS dt t Cse : RTS CTS dt t t + t + Fig. 6. Two successful cses when t <t under the both-shouting scenrio. Let be source nd be the trget which is lso n ctive when it rrives on the sme chnnel. If t <t, there re two cses in which cn her complete RTS from. Cse is tht rrives during s sending its first RTS. As illustrted in Fig. 6, bsed on our designed protocol from Section II-C, fter witing for CTS-long idle period, strts to send its own RTS. If s trget is, replies CTS nd they begin to trnsmit dt. In other words, the dedlock cse cn be esily solved to hve successful hndshke when >4. If s trget is not, then wits until the moment t +. If the chnnel is idle, sends its lst RTS nd will her the lst RTS from. In this cse, it requires tht t +4 t + (enough time to send the lst RTS), or, 6. Cse is tht rrives fter s first RTS (t t +). senses the chnnel idle nd sends its first RTS fter rriving. Similrly, overhers this RTS nd wits until t + if it still hs time to send its lst RTS, i.e., t + t +. It requires tht 5 in this cse. RTSCTS RTSCTS t t + t + - t + Cse : RTS dt t Cse : t RTS dt Fig. 7. Two successful cses when t >t under the both-shouting scenrio. If t >t, we lso nlyze two cses, s illustrted in Fig. 7. In cse, t <t <t +, strts to send t t +, which should before s second RTS sending (t + t + ). Then, >4 is required for this cse to ensure successful RTS reception t. In cse, t + t, cn send its first RTS fter rriving. will her this RTS s long s it is sent before s lst RTS (t t + ). This cse requires tht 3. In both cses, s end their current time slot immeditely once the hndshke is finished. To sum up, we hve the following equivlent inequlities nd their corresponding grphic illustrtion: 0 t 0 t t t t + t + t t + 4 t t t + -4 t 4 0 - The bove shdow re represents the fesible rnges of t nd t under different vlues of. Therefore, we cn t derive the probbility tht s RTS cn be herd by its destintion ctive on the sme chnnel, P 4, which is lso monotoniclly incresing function of. 0, = ( P 4 = 4)/, 4 <<5 ( 9)/. (4), 5 <6 ( 0)/, 6 III. PROPOSED MAC PROTOCOL We elborte the complete protocol in detils nd derive n optiml in terms of the minimum TTH in this section. A. Protocol Detils The overll flow chrt for our proposed MAC protocol is presented in Fig. 8. In the initil period, senses ll chnnels nd collects its vilble chnnel set. Existing sequence/probbilistic-bsed CH designs cn be employed in this step to generte the CH sequence. Then, the tunes its rdio to the ordered chnnel nd begins new time slot. During time slot, ny cn become destintion node once it receives n RTS crrying its ID s the receiver. If the lso hs dt to send, it postpones its own dt in queue nd receives other s trnsmission first. On the other hnd, pssive cn become source node once it hs dt to send. In synchronous environments, it hs to wit till the next time slot to chnge its role. However, in our design, it sends n RTS immeditely if there is still time left in the current time slot since there is no need for slot-synchroniztion. Once pir of s completes the hndshke in time slot, they sty on the sme chnnel trnsmitting dt until they finish the communiction. When the pir detects PU presence on the chnnel, spectrum hndoff [] is performed for resuming the trnsmission on nother chnnel. Fig. 8. Initil Hndoff Interrupt Time up Listen Receive RTS ID mtch Send CTS Dt trnsmit Tune to next chnnel Dt to send Chnnel Busy Idle time> Left time= Left time> Sent RTS once Idle from rriving The flow chrt of the proposed MAC protocol. Send RTS Receive CTS 4644

Globecom 04 - Wireless Networking Symposium In the figure, Left time = refers to the moment pproching. The bckoff for the lst RTS sending is counted in reverse time from. For exmple, if rndom number 0. is generted for the bckoff time, the lst RTS will be sent from the moment 0.. The use of SIFS nd DIFS in our protocol is the sme s in 80. MAC. B. Optiml Time Slot When considering the whole rendezvous process, mny time slots re needed before pir of s hop on sme chnnel nd hve successful hndshke. We denote P s the probbility tht source successfully hndshkes with its destintion in the next time slot. Use X to represent the verge service time (TTH) of. Then, X = i( P ) i P = P. (5) i= From the nlysis in Section II, long time slot cn improve the successful hndshke rte in one time slot. Thus, nd P re positive correlted. Therefore, n optiml is needed for (5) in terms of the shortest X. We derive the optiml s follows. First, let ρ represent the ctive rte of, i.e., the probbility tht is in n ctive mode. Assume tht the dt trffic is homogeneous in the secondry network, i.e., the ctive rte of is the sme everywhere in the network. Let λ be the verge pcket rrivl rte of (in the unit of one RTS sending time). Then, ρ = λx. We further denote P 0 s the probbility tht source successfully hops on sme chnnel with its destintion in time slot. P 0 vries under different CH designs [3]. If we do not consider the neighboring interference problem, we cn derive P s P I (P in n idle environment): P I = P 0 ( ρ)p + P 0 ρp 4, (6) where P nd P 4 re the sme probbilities defined in Section II-B nd II-D when the destintion is pssive or ctive, respectively. However, the neighboring-inference problem cnnot be ignored when is in dense network where the number of its neighbors is lrge. Assume tht there re n verge of K neighbors of. Excluding the destintion, the number of the potentil contenders of source is K = K. We denote K s the verge number of its hidden terminl s. Then, P =Pr(K =0, K =0)P I + Pr(K =, K =0)P P I + Pr(K =0, K =)P 3P I +... where Pr(K = 0, K = 0) is the probbility tht no neighbor nd hidden terminl exists on the sme chnnel during the source s one time slot, i.e., ( P 0 ρ) K+K. We cn further derive other probbilities regrding different vlues of K nd K. In this wy, P cn be written s: P ( P 0ρ) K +K P I ( ) K + P 0ρ( P 0ρ) K +K P P I ( ) K + P 0ρ( P 0ρ) K +K P 3P I. We do not consider the cses when K + K > due to two resons. One is tht the probbilities of K + K > re (7) negligible due to the P 0 ρ prt. P 0 is usully on the order of M, where M is the totl number of chnnels in CRN [], [3], [3]. Menwhile, ρ should be smll enough in CRNs to void network congestion []. Then, P 0 ρ is quite smll vlue. Moreover, the probbility tht K + K involving (P 0 ρ) or higher power cn be neglected. The other reson is tht the probbilities of successful hndshke under K + K > re lso negligible, referring the derivtion prt of P nd P 3 in Section II-C. From (5)-(7), we cn get (8) XP I( P 0λX) K +K [ P 0λX( K P K P 3) ]. (8) It is trnscendentl eqution becuse of independent vribles K nd K. Once the network prmeters K, K, M, nd λ re given, the expression of X in terms of cn be derived nd the optiml tht minimizes X cn be obtined. Detiled exmples re given in Section IV. IV. PERFORMANCE EVALUATION In this section, we evlute the performnce of our proposed MAC protocol under different scenrios by compring simultion results with the nlyticl vlues. In our simultion, we ssume tht the pcket rrivl of ech follows the Poisson distribution. Moreover, since P 0 is vrible independent of our nlysis, we dopt the rndom CH lgorithm under which P 0 is exctly M in order to esily djust the vlue of P 0. Additionlly, we consider grid network where K =3nd K =3. More importntly, ech in the simultion hs its own clock nd is not required to be synchronized with others. Other prmeters used in our simultion re listed in Tble I. TABLE I. SIMULATION PARAMETERS Number of s 64 (8 8 grid) Chnnel dt rte Mbps The size of (RTS+CTS) 60 + bits (80.b/g) Simultion time 0000 Fig. 9 illustrtes the expected TTH (ETTH) of the whole network under different numbers of chnnels. The simultion results mtch the nlyticl results very well with mximum difference of 5%. Fig. 9() shows tht =4is the optiml size of time slot when the verge pcket rrivl rte is low, or, the ctive rte of is low (λ =50pkt/s, ρ 0. 0.). Since ρ is smll, there re more idle time slots during rendezvous. Consequently, the dvntges of lrge ( >4) when deling with complicted cses (P, P 3, nd P 4 ) cnnot be fully utilized. Therefore, the incresing rte of the ETTH fter =4is higher when there re more chnnels to hop (M =0). ETTH 40 0 00 80 60 40 Fig. 9. M=6, simultion M=6, nlyticl M=0, simultion M=0, nlyticl 0 4 6 8 () λ =50pkt/s. ETTH 0 00 ETTH vs. in different trffic conditions 80 60 40 0 4 5 6 7 8 (b) λ = 00 pkt/s. Fig. 9(b) shows the impct of different in nerly sturted network. When M is smll, =4still holds the 4645

Globecom 04 - Wireless Networking Symposium optiml size of time slot. However, note tht the ETTH when =6is lredy bit lower thn when =5. This mens tht the dvntges of lrge become dominnt in the results. In the M =0cse, the optiml size is when =6(even when =7hs the sme effect s when =4). Furthermore, the design of =cnnot stnd under this scenrio. This is becuse when =, the low probbility of the hndshke successful rte increses the TTH. Then, the long TTH leds to high ρ which further results in P 4 =0nd n infinite TTH. On the other hnd, from ()-(4), the improvement of ech probbility becomes less nd less when is lrger thn 6. It is lso shown in Fig. 9 nd 0 tht the ETTH monotoniclly increses fter =6. Fig. 0. ETTH 0 00 80 60 40 0 Asyn. (=) Proposed Syn. (=) 6 7 8 9 0 M Compre with the MAC without our design in different scenrios. Fig. 0 compres the performnce of different MAC protocols under the sme trffic condition (λ =50pkt/s). Since we lredy derive the optiml size of time slot under such scenrio, the proposed line is the performnce equipped with our MAC with =4over different M. The synchronous line belongs to the rndom CH protocol with the trditionl MAC under synchronous scenrios. The performnce of this trditionl MAC under the synchronous slot scenrio is shown s the squre-line. From Fig. 0 we cn see tht the proposed MAC performs much better thn trditionl MAC nd closer to the synchronous one (the idel cse). TABLE II. TTH VS. TTR M(λ) 6 (50) 6 (00) 0 (50) 0 (00) ETTH (in unit of slots) 7.75 8.95 4.3 3.50 ETTR (theoreticl) 6 6 0 0 To obtin the TTH in the unit of slots, we divide the minimum TTH using its corresponding. For exmple, the minimum TTH for the cse where M =0nd λ = 00, is 80.99/6 = 3.50 slots. Then, the verge numbers of time slots spent under different scenrios re shown in Tble II. It is shown tht our proposed MAC protocol under slot-synchronous scenrios cn mintin the ETTH with the theoreticl ETTR. Therefore, using our proposed protocol, it is not necessry to hve slots synchronized in CRNs. V. CONCLUSION In this pper, we developed probbilistic models for ech possible fctor which my influence the successful hndshke during blind rendezvous. Then, ccording to the nlysis of ech fctor, we proposed corresponding schemes nd integrted them into novel MAC protocol with the optiml size of time slot in terms of the shortest TTH. Simultion results verify the optimlity of the time slot nd show tht our design cn mintin the rendezvous performnce t the theoreticl level in different prcticl scenrios. REFERENCES [] Z. Lin, H. Liu, X. Chu, nd Y.-W. Leung, Jump-sty bsed chnnelhopping lgorithm with gurnteed rendezvous for cognitive rdio networks, in Proc. IEEE INFOCOM, 0. [] X. Liu nd J. Xie, A prcticl self-dptive rendezvous protocol in cognitive rdio d hoc networks, in Proc. IEEE INFOCOM, 04. [3] Z. Gu, Q.-S. Hu, Y. Wng, nd F. Lu, Nerly optiml synchronous blind rendezvous lgorithm for cognitive rdio networks, in Proc. IEEE SECON, 03, pp. 37 379. [4] Q. Chen, Y.-C. Ling, M. Motni, nd W.-C. Wong, A two-level MAC protocol strtegy for opportunistic spectrum ccess in cognitive rdio networks, IEEE Trnsctions on Vehiculr Techology, vol. 60, pp. 64 80, 0. [5] S.-Y. Lien, C.-C. Tseng, nd K.-C. Chen, Crrier sensing bsed multiple ccess protocols for cognitive rdio networks, in Proc. IEEE ICC, 008, pp. 308 34. [6] X. Zhng nd H. Su, Opportunistic spectrum shring schemes for CDMA-bsed uplink MAC in cognitive rdio networks, IEEE Journl on Selected Ares in Communictions, vol. 9, pp. 76 730, 0. [7] J. Xing, Y. Zhng, nd T. Skeie, Medium ccess control protocols in cognitive rdio networks, Wireless Communiction nd Mobile Computing, vol. 0, no., pp. 3 49, 00. [8] A. De Domenico, E. Strinti, nd M. Di Benedetto, A survey on MAC strtegies for cognitive rdio networks, IEEE Communictions Surveys nd Tutorils, vol. 4, pp. 44, 0. [9] Y. Zho, M. Song, nd C. Xin, FMAC: A fir MAC protocol for coexisting cognitive rdio networks, in Proc. IEEE INFOCOM, 03. [0] D. Hu nd S. Mo, Design nd nlysis of sensing error-wre MAC protocol for cognitive rdio networks, in Proc. IEEE GLOBECOM, 009. [] M. Felegyhzi, M. Cglj, nd J.-P. Hubux, Efficient MAC in cognitive rdio systems: A gme-theoretic pproch, IEEE Trnsctions on Wireless Communictions, vol. 8, pp. 984 995, 009. [] G. Joshi nd S. W. Kim, An enhnced synchronized MAC protocol for cognitive rdio networks, in Proc. IEEE WiCOM, 0. [3] M. Shh, S. Zhng, nd C. Mple, An nlysis on decentrlized dptive MAC protocols for cognitive rdio networks, in Proc. IEEE ICAC, 0. [4] L. T. Tn nd L. B. Le, Distributed MAC protocol for cognitive rdio networks: Design, nlysis, nd optimiztion, IEEE Trnsctions on Vehiculr Techology, vol. 60, pp. 3990 4003, 0. [5] M. Klil, A. Puschmnn, nd A. Mitschele-Thiel, SWITCH: A multichnnel MAC protocol for cognitive rdio d hoc networks, in Proc. IEEE Vehiculr Technology Conference (VTC), 0. [6] H. Hussein, H. Elsyed, nd S. Elrmly, Performnce evlution of cognitive rdio network predictive MAC (P-MAC) ccess lgorithm nd its enhncement, in Proc. IEEE ICOIN, 03. [7] S. Jh, U. Phuyl, M. Rshid, nd V. Bhrgv, Design of OMC- MAC: An opportunistic multi-chnnel MAC with QoS provisioning for distributed cognitive rdio networks, IEEE Trnsctions on Wireless Communictions, vol. 0, pp. 984 995, 0. [8] C.-F. Shih, T. Y. Wu, nd W. Lio, DH-MAC: A dynmic chnnel hopping MAC protocol for cognitive rdio networks, in Proc. IEEE ICC, 00. [9] L. Jio nd F. Li, A single rdio bsed chnnel dtrte-wre prllel rendezvous MAC protocol for cognitive rdio networks, in Proc. IEEE LCN, 009. [0] S. K. Timlsin, S. Moh, llyong Chung, nd M. Kng, A concurrent ccess MAC protocol for cognitive rdio d hoc networks without common control chnnel, EURASIP Journl on Advnces in Signl Processing, vol. 69, 03. [] M. Altmimi, K. Nik, nd X. Shen, Prllel link rendezvous in d hoc cognitive rdio networks, in Proc. IEEE GLOBECOM, 00. [] Y. Song nd J. Xie, ProSpect: A proctive spectrum hndoff frmework for cognitive rdio d hoc networks without common control chnnel, IEEE Trns. Mobile Computing, vol., no. 7, pp. 7 39, 0. [3] Y. Song, J. Xie, nd X. Wng, A novel unified nlyticl model for brodcst protocols in multi-hop cognitive rdio d hoc networks, IEEE Trns. on Mobile Computing, vol. 3, no. 8, pp. 653 667, August 04. 4646