Optimized_MAC_Protocol_Using_Fuzzy-Based_Framework_for_Cognitive_Radio_AdHoc_Networks
Optimized_MAC_Protocol_Using_Fuzzy-Based_Framework_for_Cognitive_Radio_AdHoc_Networks
ABSTRACT Cognitive radio networks (CRNs) have been widely used in various applications for effective
radio spectrum utilization in recent years. It is essential to fend off the growing demand for this finite
natural resource for next-generation communications. In CRNs, detecting the activity of the primary user
requires opportunistic spectrum sensing for efficient usage of the available radio spectrum, which is a limited
and exquisite resource. Thus, CRNs are the key component in solving the spectrum scarcity issue in the
presence of primary user bands through secondary users. Cognitive radio AdHoc networks (CRAHNs) are
a unique kind of CRNs where infrastructures less cognitive radio (CR) nodes are furnished. In CRAHN,
the CR-MAC protocol works slightly differently from the traditional wireless network MAC protocols.
Particularly, the proposed method includes a high traffic scenario under contention-based IEEE 802.11 DCF
MAC protocol. Accordingly, it can be observed that both, throughput and delay, increase as the CW size
and packet length of the 802.11 (DCF) MAC protocol for CRAHN varies. Therefore, this paper proposed
a fuzzy-based optimization framework for the 802.11 (DCF) MAC protocol in CRAHNs. Furthermore,
it optimized throughput and delay by training a database of input parameters, contention window, and
packet length for the Mamdani and Sugeno fuzzy inference system (FIS) models of the 802.11 (DCF)
protocol simultaneously. The experimental result of the proposed framework for CRAHN with FIS shows
that altering the contention window increases throughput by 25% and reduces the delay by 38% compared to
the IEEE802.11 (DCF) protocol for CRAHNs without FIS. Moreover, it is also revealed that the throughput
is increased by and 7% and the delay is reduced by 40% to 50% due to altering the packet length.
INDEX TERMS Cognitive radio AdHoc networks (CRAHNs), MAC protocol, 802.11 (DCF), FIS-based
optimization.
DIFS Distributed interframe spacing. based 802.11 (DCF) random access protocol for CRAHNs;
SIFS Kth Short Interframe Space. Its background and related studies are presented in the next
PL Packet length. section. The correlations of various MAC protocols for mul-
CW Contention window. tichannel AdHoc CRNs are presented in [6], [14], and [15].
These studies indicate that no single MAC protocol always
continues to perform well because it mainly depends on the
I. INTRODUCTION number of channels, the number of nodes, the characteristics
The potential technique known as Cognitive Radio (CR) of the data traffic in the network, etc. Article [16] uses
addresses the spectrum scarcity issue by opportunistically the Markov chain model to examine the effectiveness of
utilizing vacant spectrum bands for transmission while safe- multi-channel access protocols for CR-WLAN in terms of
guarding the licensed bands or primary users (PUs). There delay and throughput while altering the number of CR users,
are two categories of spectrum users in these networks viz., channels, and spectrum availability. It is essential to develop
primary users, who have more priority to access the spectrum, the MAC protocols adapted to the characteristics of given
and secondary users (SUs), who find and exploit ‘spectrum network circumstances. In other words, any wireless network
gaps’ of the spectrum that the PUs are not using actively must operate with high throughput and little access lag to per-
[1], [2], [3]. An excellent wireless MAC protocol must offer form at its optimum. Accordingly, our work proposes a fuzzy
a simple method for wireless channel sharing, high band- inference system (FIS) optimization-based strategy to address
width usage, and network fairness (i.e., parity in channel these issues for CRAHNs. The proposed method analyzes
access). Subsequently, [4] mention that the main challenges the network for different data traffic conditions and varying
to an ideal wireless network are low mean packet latency CSMA/CA wait for state parameters. The contribution and
(minimum delay), high throughput, low packet drop ratio, novelty of the present work can be described as follows:
and good fairness under heavy traffic loads. In this scenario,
• Analysis of an efficient sensing scheme for the proposed
cognitive radio MAC protocol may be an efficient solution for
CRAHN in which periodic sensing and continuous sens-
the maximum utility of the radio spectrum. Since cognitive
ing are used to PU ON and PU OFF states, respectively.
radio users utilize the PU user spectrum opportunistically
• Contention-based 802.11 DCF MAC protocol is adopted
by adding spectrum sensing techniques, the MAC protocol
to proposed CRAHN, and delineated a flowchart with
for the CR-AdHoc network (CRAHNs) is slightly different
respect to its working procedure for the proposed frame-
from conventional wireless AdHoc Networks [5]. Therefore,
work.
developing a successful medium access control (MAC) pro-
• A FIS-based optimization framework is proposed for
tocol is crucial for CRAHN i.e., SU must exploit the spectrum
802.11 DCF CSMA/CA MAC protocol in CRAHNs,
available from PU while ensuring good quality of service
outlining it for Mamdani and Sugeno FIS models.
(QoS) (e.g., throughput, delay) [6].
• Analyze and optimize the throughput and delay simul-
Several ongoing standardization initiatives by the
taneously to improve the performance of the 802.11 for
IEEE 802 community, including IEEE 802.22 [7], IEEE
CRAHNs.
802.11af [8], and IEEE 1900 [9], are focused on CRNs.
The infrastructure-based CR network and CRAHNs are two The rest of the paper is organized as follows. The related
categories into which CRNs can be subdivided based on the work of the proposed work is described in Section II. The pro-
network architecture [10]. In the first type, the network is posed network access model and mac protocol for CRAHNs
managed and supervised by a central body, such as an access are presented in section III. The results are analyzed in
point (identical to a cellular network) [11], [12]. Although Section IV and finally, the final findings are concluded in
the CRAHNs network does not have the backbone of any Section V.
established infrastructure, it does have AdHoc communica-
tion amongst CR users [13]. Compared to infrastructure- II. BACKGROUND AND RELATED WORKS
based CRN, the CRAHNs are a better solution because of For the particular application of the CR, pre-defined
their reduced implementation costs, more straightforward well-performing architectures of CR should be required. Sub-
system, and quicker alignment positioning. Due to the dis- sequently, extensive analysis and recently proposed architec-
tributed nature of CRAHNs, these networks frequently use tures for cognitive radio AdHoc networks with their strengths
the distributed coordination function (DCF) as stated in IEEE and limitations are described in [10]. The authors surveyed
802.11. It is easier to combine IEEE 802.11 (DCF) with the spectrum management architecture for CRAHNs and
a cognitive radio network to develop a CR-MAC protocol highlighted the differences between CRAHNs and tradi-
because IEEE 802.11 (DCF) can use unlicensed CR spectrum tional AdHoc networks [17]. MAC protocols for the central-
bands, such as the 2.4 ISM band and TV whitespace band. ized network topology of CRNs are specified by the IEEE
Mainly, CR MAC protocols are divided into three categories 802.22 [18], and IEEE 802.11af [8] standards. The IEEE
such as random access (e.g., Aloha, CSMA/CA), Controlled 802.11 DCF protocol is a random-access protocol based on
access (e.g., Reservation, Poling), and channel access (e.g., contention and is better suited for CRAHNs. In [19], [20],
FDMA, TDMA, CDMA). Our paper presents a CSMA/CA 2D DTMC is used to control the contention window of
load and the design of the MAC protocol. Note that, the IEEE
802.11 DCF protocol is being used in the presented work,
therefore, these parameters depend on factors associated with
this protocol. The contention window size and packet length
are two factors that this study takes into account to opti-
mize throughput and access delay. The mathematical analysis
for IEEE 802.11 (DCF) in detail is reported in [19], [20],
and [21], [36] presented the detailed analysis of throughput
and delay for both two-way (acknowledgment) and four-way
access (RTS-CTS) methods of this MAC protocol at high
traffic condition using a renewal process.
Algorithm 1 Pseudo Code for Mamdani Fuzzy- TABLE 1. Fuzzy sets for Mamdani FIS.
[45] E. H. Mamdani, ‘‘Application of fuzzy logic to approximate reasoning DMITRII KAPLUN (Member, IEEE) received
using linguistic synthesis,’’ IEEE Trans. Comput., vol. C-26, no. 12, the Ph.D. degree in digital signal processing
pp. 1182–1191, Dec. 1977. from Saint Petersburg Electrotechnical University
[46] E. H. Mamdani and S. Assilian, ‘‘An experiment in linguistic synthesis ‘‘LETI,’’ Saint Petersburg, Russia, in 2009. He was
with a fuzzy logic controller,’’ Int. J. Hum.-Comput. Stud., vol. 51, no. 2, an Associate Professor with Saint Petersburg Elec-
pp. 135–147, 1999. trotechnical University ‘‘LETI,’’ in 2015, where
[47] M. Sugeno and G. T. Kang, ‘‘Structure identification of fuzzy model,’’ he is currently a Lead Researcher. His current
Fuzzy Sets Syst., vol. 28, no. 1, pp. 15–33, Oct. 1988.
research and academic work are related to digital
[48] T. Takagi and M. Sugeno, ‘‘Fuzzy identification of systems and its
signal and image processing, radio monitoring and
applications to modeling and control,’’ IEEE Trans. Syst., Man, Cybern.,
hydroacoustic monitoring applications, embedded
vol. SMC-15, no. 1, pp. 116–132, Jan. 1985.
[49] J. S. R. Jang, C. T. Sun, and E. Mizutani, ‘‘Neuro-fuzzy and soft and reconfigurable systems, computer vision, and machine learning. He reg-
computing—A computational approach to learning and machine intel- ularly takes part in different collaborative projects related to signal pro-
ligence,’’ IEEE Trans. Autom. Control, vol. 42, no. 10, pp. 1482–1484, cessing, machine learning, and embedded computing. The most substantial
Oct. 1997. results are in the fields of digital signal and image processing, embedded
[50] V. Adriaenssens, P. L. M. Goethals, and N. De Pauw, ‘‘Fuzzy knowledge- systems, computer vision, and machine learning. He is the author of more
based models for prediction of Asellus and Gammarus in watercourses in than 100 papers in journals and conference proceedings.
flanders (Belgium),’’ Ecol. Model., vol. 195, nos. 1–2, pp. 3–10, May 2006.