Internati
o
nal
Journal of Ele
c
trical
and Computer
Engineering
(IJE
CE)
Vol.
5, No. 6, Decem
ber
2015, pp. 1446~
1
451
I
S
SN
: 208
8-8
7
0
8
1
446
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJECE
Transmi
ssion P
r
ot
ocols i
n
Cognit
ive Radio M
e
sh Net
w
ork
s
Anus
ha M, Sr
ikanth
Vemur
u
, T
Gun
a
sek
h
ar
Department o
f
C
o
mputer scien
c
e
and
E
n
gi
ne
eri
n
g,
K
L
Uni
v
ersi
ty
, Indi
a
Article Info
A
B
STRAC
T
Article histo
r
y:
Received
Mar 13, 2015
Rev
i
sed
Jun
30,
201
5
Accepte
d
J
u
l 17, 2015
A Cognitiv
e Rad
i
o (CR)
is a
radi
o tha
t
c
a
n
adjust
its
transm
ission lim
it b
a
se
d
on available sp
ectrum in
its o
p
erat
ional surroundings. Cognitive Rad
i
o
Network (CRN) is made up of
both th
e licensed users and unlicensed users
with CR en
able and dis
a
bled
r
a
di
os. CR’S su
pports to access d
y
namic
spectrum
and supports secondar
y
us
er to access underutilized
spectrum
effic
i
ent
l
y
, whic
h was
allocated
to prim
ar
y
us
ers
.
In CRN’S
m
o
s
t
of the
research was done on spectrum
allo
cat
ion, spectrum sensing an
d spectrum
sharing. In this
liter
a
ture
, we
present variou
s Medium
Acc
e
ss (MAC)
protocols of
CRN’S. This stud
y would
provid
e
an ex
cellent stu
d
y
of
MAC
stra
te
gie
s
.
Keyword:
Co
gn
itiv
e Rad
i
o
s
Licensed users
MA
C
Spectrum
Unlicensed use
r
s
Copyright ©
201
5 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
A
nnu
sh
a M,
Research Sc
holar,
Depa
rt
m
e
nt
of
C
o
m
put
er Sci
e
nce a
n
d
E
ngi
neeri
n
g
,
K L
U
n
i
v
e
r
si
t
y
,
Gree
nfi
e
l
d
s,
V
a
dde
swa
r
am
, Gu
nt
u
r
Di
st
ri
ct
, A
n
dh
ra P
r
a
d
e
s
h
52
2
5
0
2
.
Em
a
il: an
u
s
h
a
aa9
@
g
m
ail.co
m
1.
INTRODUCTION
A C
o
gn
itiv
e
Rad
i
o
(CR)
h
a
s t
h
e cap
a
b
ility to
sen
s
e and
co
llect d
a
ta, (for ex
am
p
l
e, th
e
co
mm
u
n
i
catio
n
frequ
en
cy,
tran
sfer sp
eed
,
an
d
so
o
n
) fro
m
th
e adj
acen
t
en
v
i
ron
m
en
t [1
]
and
h
a
s th
e abilit
y to
ad
ju
st rap
i
d
l
y th
e op
erati
o
n
a
l
li
mit,
for ideal
execution, a
s
indicated
by th
e dat
a
sense
d
[
2
]
.
So C
R
i
s
d
e
fi
ne
d
as a radi
o that
can cha
n
ge its tran
sm
itter limit accordi
ng t
o
the comm
unica
tion with t
h
e e
nvi
ronm
ent in whic
h
it works
[3].
By using t
h
es
e features
we
can say t
h
at
C
R
tech
no
log
y
is th
e
b
e
st tech
no
log
y
for accessin
g
sp
ectru
m
d
y
n
a
micall
y
an
d to effectiv
ely u
t
i
lize u
n
d
e
ru
tilized
sp
ectru
m
wh
ich
was
assig
n
e
d
b
y
th
e fed
e
ral
com
m
uni
cat
i
ons c
o
m
m
i
ssi
on
(FC
C
)
t
o
a
u
t
h
o
r
i
zed
use
r
s,
cal
l
e
d as P
r
i
m
ary
o
r
l
i
cense
d
use
r
. C
R
’
S
pr
ovi
de
m
o
re ad
ap
tab
l
e and
to u
tilize
wid
e
sp
ectru
m
o
f
restrict
ed and
u
n
d
e
ru
tilized sp
ectru
m
[4
] fo
r un
licen
sed
users.
CR’S em
powe
r
s the utilizati
on
of
unuse
d
spectrum
transiently which is known as white space or
sp
ectru
m
h
o
l
e
[3
], and
if licen
sed
u
s
er propo
ses t
o
u
tilize th
e sam
e
b
a
nd, th
en
t
h
e
u
n
l
i
cen
sed
u
s
er sho
u
l
d
m
o
v
e
h
a
rm
les
s
ly to
altern
ativ
e av
ailab
l
e sp
ectru
m
o
r
stay in
th
e sam
e
b
a
n
d
b
y
adj
u
stin
g
its tran
smissio
n
fre
que
ncy
or
b
y
m
odul
at
i
o
n
app
r
oach
wi
t
h
out
i
n
t
e
rfe
ri
n
g
t
h
e l
i
cense
d
u
s
er.
Wh
en
l
i
cense
d an
d
u
n
l
i
cense
d
users e
x
ist together,
protoc
ol
spectrum
allocation appr
oac
h
es [5] and
protoc
ols for spe
c
trum
access a
r
e not
su
fficien
t
.
If in case, th
e
un
licen
sed
u
s
ers are p
e
rm
itted
to
tran
sm
it
in
form
a
tio
n
along
sid
e
with
licen
sed
user,
th
e tran
sm
issi
o
n
ou
gh
t no
t to
in
terfere wi
th
on
e ano
t
h
e
r b
y
cro
s
sing
th
e edg
e
.
In
the o
t
h
e
r case, if the
u
n
licensed
u
s
er tran
sm
itt
in
g
th
e in
fo
rm
atio
n with
ou
t th
e license
d use
r
, the unlicense
d user should ha
ve the
ab
ility to
id
en
t
i
fy th
e reapp
e
aran
ce
of licensed
u
s
er and
l
eav
e th
e
b
a
nd
. Th
ere is a lo
t
o
f
exp
l
oration as of
no
w bei
ng
di
r
ect
ed and m
o
re need t
o
be
perf
orm
e
d t
o
creat
e new s
p
ect
r
u
m
m
a
nagi
n
g
m
e
t
hod
ol
ogi
es
id
en
tified with
co
gn
itiv
e
rad
i
o fo
r
bo
th
d
y
n
a
mic sp
ectru
m
sen
s
ing
and
sh
aring
[6-21
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
Tran
sm
ission
Pro
t
o
c
o
l
s i
n
C
o
gn
itive Rad
i
o
Mesh
Networks (Anu
sha
M)
1
447
Figure
1. Opportunistic spectrum
wh
ite spac
e access
by unl
i
censed use
r
Fi
gu
re 2 e
xpl
a
i
ns t
h
e C
R
N
archi
t
ect
u
r
e of
bot
h l
i
censed
users
(l
i
cense
d
net
w
o
r
k) an
d
unl
i
cense
d
users (u
nl
i
cens
e
d
net
w
or
k
)
. The
un
licen
sed
n
e
two
r
k
is a co
llectio
n
o
f
u
n
licensed
u
s
ers with
or with
ou
t a
u
n
licensed b
a
se statio
n
,
all of
wh
ich
are
o
u
tfitted
w
ith CR cap
acities.
An un
licen
sed n
e
twork with a
b
a
se
st
at
i
on i
s
kn
o
w
n as I
n
frast
r
u
ct
u
r
e base
d
C
R
Net
w
o
r
k;
t
h
e base station acts as a center point to gat
h
er the
perce
p
t
i
o
ns a
n
d c
onse
q
ue
nce
s
o
f
s
p
ect
r
u
m
inve
st
i
g
at
i
o
n
pe
rf
orm
e
d by
e
v
ery
C
R
u
n
l
i
cen
sed
user
an
d m
a
ke a
d
ecision
how to
redu
ce in
terferen
ce
with
licen
sed
u
s
er
.
Ac
cording to t
h
e
choice, eve
r
y
CR unlicense
d user
reco
nfi
g
u
r
es
hi
s t
r
ansm
i
ssi
on l
i
m
i
t
.
A unl
i
c
e
n
se
d use
r
wi
t
h
out
a
base st
at
i
on i
s
kn
o
w
n a
s
i
n
fra
st
ru
ct
ure
l
e
s
s
Co
gn
itiv
e Radio
W
i
reless M
e
sh
Netwo
r
k‘s (CR
W
M
N
’S).
In
a CR
WM
N’S, t
h
e
u
n
licen
sed
u
s
ers
u
tilize co
-
ope
rat
i
v
e a
p
pr
oach
t
o
i
n
t
e
rc
han
g
e
gat
h
ere
d
dat
a
am
ong
t
h
e de
vi
ces t
o
ex
pan
d
t
h
ei
r
i
n
si
g
h
t
o
n
t
h
e
w
hol
e
n
e
two
r
k
,
and
d
ecid
e
s t
h
eir ev
en
ts. Licen
sed
Net
w
ork
in
clu
d
e
s licensed
u
s
ers and
single o
r
ad
d
ition
a
l b
a
se
statio
n
s
, and
are no
t eq
u
i
p
p
e
d
wit
h
CR cap
a
b
ilities. Th
erefo
r
e, if
u
n
licen
sed
n
e
t
w
ork i
m
p
a
rts a licen
sed
sp
ectru
m
b
a
n
d
with
licen
sed n
e
twork, th
e u
n
licen
sed
network
is licen
sed
to
b
e
cap
ab
le to
id
en
tify th
e
existence of a licensed
user a
nd
dir
ects the
unlicensed tra
n
smission to an
alternative acc
essible ba
nd that will
n
o
t
i
n
terfere
with
licen
sed tran
sm
issio
n
.
Figure 1 e
x
plains the
opport
unistic spectrum wh
ite space a
ccess and exc
h
angi
ng
of
fre
quency
bands
b
y
un
licen
sed
u
s
er at t
h
e o
c
cu
rren
ce
of u
tilizatio
n
o
f
li
cen
sed
user.
Figu
re 2
exp
l
ain
s
t
h
e
CRN arch
itectu
r
e
of
bot
h l
i
censed
net
w
or
k an
d
unl
i
cen
sed
net
w
o
r
k
,
wi
t
h
a
n
d wi
t
h
o
u
t
i
n
fr
ast
r
uct
u
re. T
h
e exi
s
t
i
ng s
p
e
c
t
r
um
sh
ari
n
g
an
d
spectru
m
al
lo
cati
o
n
ap
pro
a
ch
es as p
e
r th
ree co
nd
itio
ns [21
]
: (a) Sp
ectru
m
b
a
nd
s b
e
i
n
g
u
s
ed
b
y
unlicensed use
r
s; (b) net
w
ork arc
h
itecture a
n
d (c
) access
behavi
or of
unli
cense
d
users
.
Fi
gu
re 2.
C
R
N
arc
h
i
t
ect
ure of
b
o
t
h
l
i
cen
sed
net
w
or
k
a
n
d u
n
l
i
cense
d net
w
or
k [2
1]
1.
1.
Utility of
Spectrum B
a
nd
s
by
Unlicensed User
According to
the spect
rum
bands
use
d
by the unlicens
e
d
user, th
e a
p
proaches
on
shari
n
g of
spectrum
can be
divide
d as
ope
n s
p
ectrum shari
n
g and
a
p
proaches
for
spectrum
acce
ss hiera
r
c
h
ical. In
t
h
e
approach ope
n
spectrum
shar
i
ng, t
h
e u
n
l
i
c
e
n
se
d user
s get
t
o
t
h
e unl
i
cens
e
d spect
r
u
m
and
no u
s
er p
o
s
s
esses
any
spectrum
perm
it;
subsequently, all the
users
have
the
sa
m
e
rights to access
for utilizing the unlicense
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJECE
Vol. 5, No. 6, D
ecem
ber
2015 :
1446 –
1451
1
448
spectrum
.
In the approac
h
es
for s
p
ectrum
access hiera
r
c
h
ical [6], t
h
e
unlicensed
use
r
s s
h
are t
h
e license
d
spectrum
with licensed
users. Since
license
d users
does
not re
qui
re adop
ting t
h
e CR because they
ha
ve the
p
r
i
o
rity to
u
tilize th
e sp
ectrum b
a
n
d
s
. Su
bsequ
e
n
tly, when
a licen
sed
u
s
er
recov
e
rs
a sp
ectru
m
b
a
n
d
for
utilization, the
unlicense
d
user ri
ght
now utilizing spectrum
band a
n
d ad
j
acent
spect
rum
bands
will need t
o
ch
ang
e
th
ei
r op
eration
a
l li
m
i
ts fo
r avo
i
d
i
ng
in
terfer
e
n
ce
with license
d users
.
T
h
e hi
erarc
h
ical spe
c
trum
access approac
h
ca
n
furthe
r
divide
d in
t
o
two
classifications, accordi
n
g to
t
h
e limitation of
unlicense
d
us
ers:
1)
Unde
rlay of s
p
ectrum
2)
O
v
er
lay of
sp
ectr
u
m
1.
2.
Network Architecture
Accord
ing
to
t
h
e
n
e
two
r
k
arch
itectu
r
e, th
e sp
ectru
m
can
b
e
p
a
rtition
e
d in
to
t
w
o app
r
o
ach
es
–
as
centralized arc
h
itecture appr
oach a
nd di
st
r
i
but
ed ar
chi
t
e
c
t
ure ap
pr
oa
c
h
. In centralized approac
h
, a central
entity
m
a
nage
s and c
o
ordinates the alloca
tion
of spect
rum
and access
of unlicense
d
users. In distribute
d
approach, the
users take their own
decisions acc
or
ding to the spec
trum
acce
ss b
a
sed on their local
exam
i
n
at
i
on of
dy
nam
i
c spect
rum
.
Th
e centralized approa
ch is
m
o
re e
xpen
s
i
v
e an
d fu
rt
her
not
ap
pr
o
p
ri
at
e
for m
e
sh e
m
er
gency, a
r
m
y
se
rvices etc., com
p
aratively
the distribute
d
approach is less expe
nsive a
n
d can
be
u
tilized
in
i
n
frastru
cture less
ap
pro
ach
.
1.
3.
Access Be
havi
our
of Unlicensed Users
According to t
h
e access
behavior of unlicense
d use
r
s, t
h
e s
p
ectrum
shari
ng ca
n
be
classified as
ei
t
h
er co
-
ope
r
a
t
i
v
e or
n
o
n
co-
o
perat
i
v
e
.
I
n
co
-
ope
rat
i
v
e
app
r
oach
, t
h
e
unl
i
c
e
n
sed
us
ers o
f
t
e
n
bel
o
ng t
o
i
d
ent
i
cal
servi
c
e pr
ovi
der a
n
d
co-
o
r
d
i
n
ate among them
selves to enhanc
e th
e p
r
o
f
it to
th
e
w
h
o
l
e gr
oup
.
In
Non
Co-Ope
rative approach,
the
unlicensed use
r
s acces
s the
open s
p
ectrum
to
e
n
hance
the
bene
fits
of thei
r
own
spectrum
resources.
2.
CO
GNITI
V
E
R
ADI
O
MA
C P
R
OTO
C
O
L
S
In this se
gm
ent, we
are c
o
nc
entrating
on the
spectrum
access issue
in which
va
rious C
R
use
r
s a
r
e
distributing the spectrum
and
decide
when and
who
gets
the access
to
th
e
cha
n
nel. Here, we
a
r
e disusi
ng
vari
ous M
A
C protoc
ols that have
be
e
n
propos
ed for both the infrast
ru
ct
ure a
nd
decent
r
alized CRN’S. The
MAC protoc
ols for both clas
ses can
be either Rando
m
a
ccess/Tim
e
Division Medi
um
Access (T
DMA)
or
bot
h. T
h
e T
D
M
A
-
b
ased
M
A
C
p
r
ot
ocol
s
need
s net
w
o
r
k
wi
de sy
nch
r
o
n
i
zat
i
on a
n
d
wo
rk
s by
i
n
t
o
vari
ous
tim
e
-slots for
bot
h t
h
e c
ont
rol c
h
annel a
n
d data t
r
ansm
ission. In additional,
the
Random
access protocols
d
o
e
s no
t requ
ire tim
e-syn
c
h
r
on
izatio
n
,
an
d are
b
a
sed
o
n
t
h
e
p
r
in
cip
l
e Carrier Sen
s
e M
u
ltip
le
Access/Co
llisio
n
Av
o
i
d
a
n
ce (CSMA/CA) in
wh
ich
t
h
e secon
d
a
ry u
s
er ex
am
in
e the sp
ectru
m
b
a
n
d
s
to
id
en
tify th
e existen
ce o
f
an
y
o
t
h
e
r tran
sm
is
sio
n
an
d
if so
, tran
sm
i
t
s later
b
ack
ing
off
fo
r a ran
d
o
m
s
p
an
for
redu
cing
co
llisio
n
s
du
e t
o
simu
ltan
e
ou
s tran
smissio
n
s
.
2.
1.
Cent
raliz
ed MA
C
Pro
t
oc
o
l
s for
C
o
gniti
v
e R
a
dio
Me
sh
Netw
o
r
ks
2.1.1.
Random Acces
s
MAC Pr
otoc
ols
CSMA ba
sed
random
access
MAC prot
ocol [7] was
propose
d for a
n
i
n
frastructure
ba
sed CRN’S
unde
r the s
upposition
of
ut
ilization of
one tra
n
sm
it
ter-receive
r a
n
d in-band si
gnaling. T
h
e
protoc
ol
encourages the co-e
xistence
of th
e l
i
cens
e
d use
r
an
d unl
i
cen
sed
use
r
s by
ad
just
i
n
g t
h
ei
r t
r
ansm
i
ssi
on
fre
que
ncy to
preserve the i
n
terfe
rence t
o
the license
d
use
r
s i
n
si
de a p
r
e
d
eci
de
d l
i
m
i
t
.
The l
i
cense
d
user
s
coo
r
di
nat
e
wi
t
h
a p
r
i
m
ary
user base st
at
i
o
n
and t
h
e u
n
l
i
cense
d use
r
s c
o
o
r
di
nat
e
wi
t
h
a
seco
nda
ry
use
r
base
st
at
i
on, a
n
d se
cure
a
di
rect
si
ngl
e
h
o
p
ass
o
c
i
at
i
on wi
t
h
t
h
ei
r
ow
n
base
st
at
i
ons
. T
h
e l
i
cen
sed
use
r’s
t
a
ke
s aft
e
r
t
h
e exi
s
t
i
n
g C
S
M
A
p
r
ot
oc
ol
as i
ndi
cat
ed
by
whi
c
h a l
i
cens
e
d users se
nse
s
the cha
n
nel for a tim
e period (t
p)
bef
o
re
se
ndi
ng
t
h
e R
e
que
st
-T
o-S
e
n
d
(R
-T
-S
)
dat
a
pac
k
et
t
o
i
t
s
base st
at
i
o
n
f
o
r
w
h
i
c
h t
h
e l
a
t
e
r m
a
y
resp
on
d
with a Clear-T
o-Send (C-T-S) signal
if acce
ssible for the inform
ation ex
change. T
h
e unlicense
d use
r
s have
lot of CS tim
e
peri
od
(ts, whe
r
e ts >>tp) so t
h
at the
license
d use
r
s ha
ve the priority to access the pre
d
e
c
ided
spect
r
u
m
.
The
u
n
l
i
cense
d
us
er’s
base
st
at
i
o
n
m
a
kes a
de
ci
si
on
o
n
t
h
e
t
r
ansm
i
ssi
on
p
o
we
r a
n
d i
n
f
o
r
m
at
i
o
n
rat
e
fo
r exc
h
a
n
gi
n
g
base
d o
n
t
h
e spect
rum
from
it
sel
f
and u
n
l
i
cense
d use
r
s
.
Unl
i
c
e
n
sed
u
s
ers are
perm
i
t
t
e
d t
o
send
on
ly on
e d
a
ta
p
ack
et
fo
r ev
ery transmissio
n
to
m
i
n
i
mize o
r
av
oid
in
terfer
en
ce and
co
llisio
ns with
licensed use
r
s. The random
access protoc
ols need an
appropriate connection betwee
n the licensed and
unl
i
cen
sed
net
w
o
r
k
s
;
gene
ra
l
l
y
, t
h
e unl
i
cense
d use
r
s are
una
ware
of
any
un
succes
s
f
ul
t
r
an
sm
i
ssions
of
licen
sed
u
s
ers. Ad
d
ition
a
lly,
th
e tran
sm
issi
o
n
power of
t
h
e u
n
licen
sed u
s
ers n
eed
s
to
b
e
sep
a
rate discrete
lev
e
ls to
d
e
p
e
nd
ab
ly
p
r
o
t
ect th
e licen
sed
u
s
ers fro
m
in
terferen
ce an
d to
exp
l
o
it throug
hpu
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
Tran
sm
ission
Pro
t
o
c
o
l
s i
n
C
o
gn
itive Rad
i
o
Mesh
Networks (Anu
sha
M)
1
449
2.
1.
2. T
i
me
Di
vi
si
on
M
A
C P
r
ot
oc
ol
s
In [8], the Tim
e
Division
MAC Prot
ocol
s follows
the IEEE 802.22 c
e
ntra
lized MAC standard for
C
R
N
’S. T
h
e 8
0
2
.
2
2
st
an
dar
d
uses basi
c t
i
m
e
sl
ot
t
e
d
m
u
l
t
i
pl
exi
n
g i
n
t
h
e
di
rect
i
o
n of
do
wnst
ream
(DS), an
d
requires TDM
A
(Tim
e Division Multiple
Access) in the direction of upst
ream (US). The base station deals
with
all th
e
unlicen
sed
u
s
ers
in
its cell. Time is d
i
v
i
de
d int
o
diffe
re
nt su
p
e
r-
fra
m
e
s;
A S
upe
r
fram
e
C
ont
r
o
l
Heade
r
(
S
C
H
)
i
s
posi
t
i
one
d
at
t
h
e begi
n
n
i
ng
of e
v
ery
f
r
a
m
e
t
o
i
l
l
u
m
i
nat
e
t
h
e unl
i
cen
sed use
r
s a
b
o
u
t
t
h
e
current ac
cessi
ble cha
n
nels,
various s
p
ectrum
bandwi
d
th
s
,
future
s
p
ectrum
bands acces
s tim
e
, and so
forth.
The MAC fra
m
e is
made of a DS sub-fra
m
e
and
a US sub-fram
e
. The DS sub-fram
e
takes care of
sy
nch
r
o
n
i
zat
i
o
n an
d c
h
a
nnel
est
i
m
a
ti
on a
n
d a c
ont
rol
he
ader c
o
nt
ai
ns
t
h
e si
zes o
f
D
S
-M
ap a
n
d
U
S
-M
ap
fi
el
ds.
The
D
S
&
US
M
a
p
fi
el
ds
ha
ve t
h
e i
n
f
o
rm
at
i
on a
b
o
u
t
t
h
e
s
c
hed
u
l
i
n
g
of
t
h
e c
h
an
nel
s
f
o
r
use
r
conve
n
ience
.
The US sub-fram
e co
m
p
rises of a Urge
n
t
Co
ex
isten
c
e Situ
atio
n
(UCS)
n
o
tice field
th
at
illu
m
i
nates about the licens
e
d use
r
s licensees that have
recently been distinguis
h
e
d
; alternate fields are
u
tilized
to
g
e
t t
h
e sep
a
ration
fro
m
th
e b
a
se st
atio
n
and
th
e i
n
d
i
v
i
du
al d
a
ta
tran
sm
issio
n
de
m
a
n
d
s
. Th
e
prim
ar
y
d
o
wn
sid
e
with th
e ti
m
e
d
i
v
i
si
o
n
M
A
C p
r
o
t
oco
l
is th
e u
tilizatio
n
of ov
erwh
elmin
g
h
e
ad
ers as a co
m
p
o
n
en
t of
t
h
e f
r
am
es, pr
o
m
pti
ng a
dec
r
e
a
sed t
h
r
o
u
g
h
p
u
t
.
2.
2.
Decentraliz
ed MAC
Protoc
ols for
Cogniti
v
e Radio Me
sh
Networks
2.2.1. Random
A
cces
s MAC
Pr
otoc
ols
B
a
sed o
n
M
A
C
pr
ot
oc
ol
aut
h
o
r
s
pr
op
ose
d
[9]
a Di
st
ri
but
ed C
h
a
n
nel
As
si
gnm
ent
(DC
A
)
whi
c
h u
s
es
sev
e
ral tran
sceiv
e
rs, for sign
alin
g
wh
ich
is co
mm
itted
Ou
t
-
Of-Ban
d
co
n
t
ro
l ch
annel an
d
ad
d
ition
a
lly
spect
r
u
m
pool
i
ng t
o
de
pen
d
a
b
l
y
reco
gni
ze t
h
e act
i
on
of t
h
e l
i
censed net
w
o
r
k
.
E
v
ery
n
ode
pre
s
er
ves
a l
i
s
t
of
ch
ann
e
ls
u
tilized
at t
h
at tim
e
of its
n
e
igh
bor
n
o
d
e
s an
d
list o
f
free ch
an
nels go
t fro
m
th
e
p
r
ev
iou
s
and
the
spect
r
u
m
pool
.
At
t
h
e peri
od
of R
-
T
-
S &
C
-
T-S
han
d
s
h
a
k
e, t
h
e se
nde
r
and
reci
pi
ent
c
o
o
r
di
nat
e
wi
t
h
t
h
ei
r
free ch
ann
e
ls an
d
co
ncur on
a sa
m
e
ch
an
n
e
l
to
u
tili
ze. Th
e R-T-S & C
-
T-S
m
e
ssag
e
s lik
ewise en
co
urag
e th
e
n
e
igh
boring
un
licen
sed
u
s
ers to
up
grad
e th
eir u
tili
zed ch
ann
e
l and free ch
ann
e
l
record
s. Th
e
m
a
j
o
r
di
sad
v
a
n
t
a
ge
o
f
t
h
e
DC
A
pr
o
t
ocol
i
s
t
h
e
ne
cessi
t
y
for a
di
ffe
rent
c
ont
rol
chan
nel
t
o
s
u
p
p
o
r
t
t
h
e R
-
T-S
& C
-
T-S
op
eration
,
furth
e
rm
o
r
e th
ere is no
licen
sed
u
s
er
re
lated
ad
ju
stm
e
n
t
for ch
ann
e
l
u
tilizatio
n
.
In
[1
0], the
Sin
g
l
e Rad
i
o
Ad
ap
tiv
e Ch
ann
e
l (SRAC) al
g
o
rith
m
p
r
o
posed
t
o
u
tilize a FDM
m
o
d
e
l wh
erein a
u
n
l
i
cen
sed
u
s
er tran
sm
its
d
a
ta
p
a
ck
ets
o
n
a
b
i
gg
er sp
ectru
m
h
o
w
ev
er g
e
ts ret
u
rn
affirm
atio
n
s
ov
er
littler
sp
ectru
m
groups
for e
ffi
cient utilization of spectrum
.
A CR node
keeps list of
received spectrum
groups
of
all it
s
n
e
igh
bor no
des. At th
e
p
o
i
n
t
wh
en
a CR nod
e facu
lties its
p
r
esen
t tran
smissio
n
ch
ann
e
l
to
b
e
invo
lv
ed
b
y
an
licensed
user, i
t
sends a
notice data packet i
n
the
r
eceived
spectrum
bands of its
neighbor
nodes, and changes
t
o
t
h
e ban
d
t
h
at
i
s
affi
r
m
ed
t
o
by
al
l
t
h
e nei
g
h
b
o
r
n
ode
s.
In t
h
e m
eant
i
m
e
, t
h
e C
R
node t
r
a
n
sm
i
t
s
on t
h
e
receive
d s
p
ectrum
band
of
a neighboring node
that is
yet to rec
o
gni
ze for t
h
e
not
ice data pac
k
e
t
. The
downside is that signaling the traffi
c overhead connecte
d
with kee
p
ing up
the upgrade
d
received
bands of all
t
h
e nei
g
h
b
o
r
n
ode
s. Li
kewi
se
, co
nt
r
o
l
m
e
ssages t
h
at
a
r
e
no
t sen
t
o
n
th
e
receiv
e sp
ectrum
groups
of a
node are
n
o
t
listen
e
d
to
, p
r
o
m
p
tin
g
long
er
Deaf
p
e
riod
s.
In
[11
]
& [1
2
]
, t
h
e CREAM-MAC (C
o
g
n
itiv
e Rad
i
o
En
ab
led
Mu
ltich
a
nn
el MAC) and
SCA-M
A
C (Statistical Ch
an
n
e
l
Allo
catio
n
MAC) p
r
o
t
o
c
o
l
are th
e
m
o
d
e
ls o
f
MAC
p
r
o
t
o
c
o
l
s t
h
at
ex
p
ect
th
e
presen
ce
o
f
a
wo
rld
w
id
e CCC th
at is ap
pro
v
e
d
u
pon
b
y
all t
h
e CR
no
d
e
s i
n
th
ei
r
n
e
igh
borhoo
d.
Und
e
r th
is state
m
en
t, th
e wo
rk
ing
of th
is
cl
a
ss of M
A
C
p
r
o
t
ocol
s em
ul
at
es t
h
at
of t
h
e C
S
M
A
-
st
anda
rd
f
o
r i
n
frast
r
u
ct
u
r
e
ne
t
w
o
r
ks
.
Whi
l
e
C
R
E
AM
-M
A
C
i
s
com
posed
i
n
vi
e
w
o
f
a
fo
ur
way
han
d
s
ha
ke
p
r
o
cess(R-T-S, C-T-S,
C-S-T & C
-
S-R
d
a
ta p
a
ck
ets) on
t
h
e G
CCC, t
h
e
SCA-MAC
u
tilizes ju
st a two
-
rou
t
e
d
i
alo
g
pro
cess
o
f
th
e con
t
ro
l fram
es (C- R-
S & C- C-
S)
on
th
e GCCC t
o
su
ppo
rt t
h
e send
er and
recip
i
en
t to
t
une t
h
ei
r t
r
an
scei
vers t
o
a c
o
m
m
onl
y
sett
led u
p
on i
n
f
o
r
m
at
i
on chan
ne
l
.
In [
1
3]
& [1
4]
, t
h
e O
p
po
rt
uni
st
i
c
Cognitive-M
A
C (OC-MAC
)
a
nd the latest Decent
r
alized Non-Glob
al MAC (DNG-M
AC) prot
ocols
are the
sam
p
les of M
A
C protoc
ols that don't requi
re the e
x
istence
of a
worldwide CCC
for c
h
oosing spectrum access
am
ong
nei
g
h
b
o
ri
ng u
n
l
i
cens
e
d users
.
OC
-
M
AC
ex
pect
t
h
at th
e CR
N
ex
ists tog
e
th
er with
a
WLAN an
d
utilization of t
h
e IE
EE 802.11DCF
(Dis
tributed
C
o
ordi
nation function) m
e
thod at the
CR nodes to
rival eac
h
o
t
h
e
r fo
r info
rmatio
n
ch
ann
e
l
reserv
ation
.
Th
e DNG-MAC
p
r
o
t
o
c
o
l
u
tilizes th
e TDM
A
to
allo
cate th
e co
n
t
ro
l
channel to all the accessi
ble
CR nodes; t
h
e
CCC is one
of
the be
st accessible cha
n
nels c
hose
by the
first CR
n
o
d
e
t
h
at starts th
e i
n
fo
rm
atio
n
co
rresp
ond
en
ce.
Th
e CCC
is p
a
rtition
e
d in
to
tim
e-slo
t
s
o
f
static len
g
t
h; ev
ery
t
i
m
e
-sl
o
t
cont
a
i
ni
ng
a l
i
s
t
e
ni
n
g
peri
od
an
d
a
t
r
ansc
ei
vi
n
g
p
e
ri
o
d
.
The
reas
on
o
f
D
N
G
-
M
A
C
i
s
t
h
at
si
nc
e al
l
CR n
o
d
e
s starv
e
fo
r a
d
a
ta ch
ann
e
l to
u
tilize, th
ere
wo
n
'
t b
e
wastag
e
o
f
th
e assets wit
h
th
e task
of a p
e
ri
o
d
space of the control channe
l for each CR node. In spite of this a
ssum
p
tion im
proves the
m
odel of DNG-MAC
and
stays awa
y
from
the com
p
lex sy
nchr
o
n
i
zat
i
on
o
v
er
h
ead n
o
r
m
a
ll
y
seen wi
t
h
t
i
m
e
-ope
ni
n
g
base
d
M
A
C
protoc
ols, it is
com
p
lex to s
uppos
e th
e
information cha
n
ne
ls to be accessi
ble
for the
same tim
e
span as
that of
t
h
e t
i
m
e
-sl
o
t
s
of t
h
e c
ont
r
o
l
chan
nel
and
t
h
e t
i
m
e
-sl
o
t every
C
R
no
de m
u
st
be re-com
put
ed
up
on t
h
e
con
s
i
d
erat
i
o
n/
r
e
ject
i
o
n o
f
a
C
R
no
de i
n
t
h
e net
w
or
k.
Th
i
s
lik
ewise su
gg
ests th
at th
e
MAC p
r
o
t
o
c
o
l
to
b
e
ad
d
ition
a
lly not ad
ap
tab
l
e for
ch
ang
e
s in
t
h
e
n
e
two
r
k
t
o
po
log
y
b
ecau
s
e of
n
o
d
e
v
e
rsatilit
y.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJECE
Vol. 5, No. 6, D
ecem
ber
2015 :
1446 –
1451
1
450
2.
2.
2. T
i
me
Di
vi
si
on
M
A
C P
r
ot
oc
ol
s
We ex
am
in
e th
e C-MAC [1
5
]
su
ppo
rts syn
c
h
r
on
ized
tim
e
d
i
v
i
sion
s
b
y
inclu
d
i
ng
th
e
u
tilizatio
n
of a
Ren
d
e
zvo
u
s
ch
ann
e
l (Rc) an
d
a Backu
p
ch
ann
e
l (Bc).
Th
e Rc ex
ists
m
a
x
i
m
u
m
ti
me fo
r
u
tilizat
io
n
for
u
n
licensed u
s
ers all ov
er th
e
n
e
two
r
k
an
d is u
tilized
fo
r
nod
e co
ord
i
n
a
tion
,
licen
sed
u
s
er id
en
tificatio
n, and
also
m
u
lti ch
a
n
n
e
l asset
reserv
ation
.
Th
e B
c
is
m
a
in
ly
d
ecid
e
d
at ev
ery un
licen
sed
u
s
ers, all th
roug
h
of-b
and
esti
m
a
t
i
ons, a
n
d is utilized as alternative spectrum
on
account of appea
r
ance of an
unlicensed users. In
C-
M
A
C
pr
ot
oc
ol
, every
s
p
ect
r
u
m
i
n
cl
udes r
ecur
r
i
n
g o
f
su
per
-
f
r
am
es. Every
s
upe
r-
fra
m
e
i
s
m
a
de u
p
o
f
a
B
eacon P
e
ri
o
d
(B
P) a
nd a
Dat
a
Tra
n
sm
i
s
si
on Pe
ri
o
d
(
D
-T
-P
). E
v
ery
B
P
i
s
a t
i
m
e
di
vi
si
o
n
s
o
t
h
at
t
h
e
in
d
i
v
i
d
u
a
l
u
n
l
i
cen
sed
u
s
er can
transm
i
t
th
ei
r sign
als wit
hou
t in
terferen
ce. Th
e Rc is u
tilized
to
switch
th
e BP
sche
dul
es
of n
ode
s t
o
p
r
eve
n
t
conc
ur
re
nt
t
r
ansm
i
ssi
on ove
r
al
l
t
h
e spect
ru
m
.
An U
n
l
i
cen
sed use
r
decl
a
r
es t
h
e
requirem
ent for any
ne
w spe
c
trum
inform
ation thr
ough the
beacons, a
n
d likew
ise illum
i
nates about any
spectrum
change over the Rc. Occasio
nal
tuning to the
Rc perm
its unli
censed user t
o
re-sync
h
ronize and
acq
u
i
re th
e latest n
e
igh
b
o
r
ho
od
top
o
l
o
g
y
d
a
ta. Th
e tim
e d
i
v
i
sio
n
natu
re
of C-MAC en
courag
es t
h
e u
tilization
of a
n
o
n
ove
rl
appi
ng
Q
u
i
e
t
P
e
ri
o
d
(
Q
P
)
fo
r
every
s
p
ect
r
u
m
,
t
h
rou
g
h
w
h
i
c
h o
n
e c
o
ul
d
separat
e
l
i
c
e
n
s
e
d
user
fr
om
unl
i
cense
d
user
. T
h
e m
a
jo
r
di
sad
v
a
n
t
a
ges
of t
h
e C
-
M
A
C
are t
h
at
i
t
requi
res t
h
e
R
c
t
o
be
a co
m
m
i
t
t
e
d
spectrum
that is not utilize
d
by an
y pri
m
ary user, which is hard to
ensure in
decentr
alized networks.
Additionally,
because of the requir
em
ent to incorporate th
e beac
on
signals
with the loa
d
and c
h
annel
u
tilizatio
n
d
a
ta in
t
h
e BP of
a sup
e
r-fram
e
, th
e
pro
t
o
c
o
l
i
s
no
t ad
ap
tab
l
e fo
r a larg
e nu
m
b
er of
un
licen
sed
users
.
It
i
s
com
p
l
e
x t
o
supp
ort
t
h
e n
o
n
-
ov
erl
a
p
p
i
n
g na
ture o
f
th
e BP’s an
d
th
e qu
iet p
e
riod
s,
witho
u
t
the
ex
isten
ce
o
f
a
cen
tral elem
en
t. A
d
i
stribu
ted ti
m
e
d
i
v
i
sio
n
p
r
o
t
o
c
o
l
[16
]
was
p
r
o
p
o
s
ed
t
o
avo
i
d th
e
u
tilizatio
n
o
f
Rc b
y
g
i
v
i
ng
in
-b
an
d
si
g
n
alin
g
th
rou
g
h
a co
mmit
t
ed
co
n
t
ro
l wi
n
dow in
ad
d
ition
to
th
e b
eaco
n
si
gn
al and
inform
ation
exchange pe
riods
.
3.
CO
NCL
USI
O
N
In
t
h
is stud
y,
we
h
a
v
e
presen
ted
an
ex
tensiv
e
st
u
d
y
and
an
alysis of co
gn
itiv
e rad
i
o n
e
twork
s
MAC
protoc
ols
base
c on ce
ntralize
d
a
n
d
decentra
lized net
w
or
ks
and e
x
isting s
o
lutions. From
this
poi
nt
of
view,
p
r
im
ary
u
s
er need
n
o
t
b
e
aware o
f
t
h
e second
ary
u
s
ers, and th
er
e shou
ld
be no
si
g
n
i
ficant stag
e in th
e
qu
ality
of
service for
the license
d users.
Wh
ile t
h
e resu
lts p
r
opo
sed
fo
r cen
tra
lized and
dec
e
ntralized CR
Ns a
r
e
regu
larly in
terp
reted
to
g
i
v
e
ex
ecu
tion
b
e
n
c
h
m
ark
s
to
th
e su
itab
l
e m
o
d
e
l, th
e resu
lts pro
p
o
s
ed
fo
r d
i
st
ribu
ted
o
r
co
-op
e
rativ
e an
d
d
ecen
t
ralized
m
e
sh
CRN’S an
d
ex
ecu
t
e b
o
ttlen
e
ck
s in real ti
m
e
ex
ecu
tio
ns. Maj
o
rity
of
researc
h
done in the area of
CRN’S
foc
u
se
d on spectrum
sensing, s
p
ect
rum
a
llocation and s
p
ectrum
s
h
ari
n
g
and MAC.
REFERE
NC
ES
[1]
FCC, ET Docket No 02-135, Spectr
um Policy
Taskforce Repo
rt,
2002.
[2]
S. Ha
ykin,
“
C
ognitive
rad
i
o: B
r
ain-em
powered
wirel
e
ss com
m
unica
tions”,
IEEE Journal
of Selected
Areas in
Communications,
Vol. 23
, No. 2,
pp. 201–220
, 20
05.
[3]
FCC, ET Docket No 03-222, Notice of
Proposed
Rule Mak
i
ng
an
d Order, 2003.
[4]
I
.
F
.
A
k
y
i
l
d
i
z
,
W
.
Y
.
L
e
e
,
M
.
C
.
V
u
r
a
n
,
a
n
d
S
.
M
ohanty
,
“Next Generation/D
y
na
m
i
c
S
p
ectru
m
Acces
s
/
Cogniti
v
e
Radio Wireless
Networks: A Survey
”,
Computer Networks,
Vol. 5
0
, pp
. 2127-215
9, 2006
.
[5]
Z. Han,
and K. J. R. Liu
,
“Resour
ce Alloc
a
tio
n for W
i
reless Networks: Basi
cs”, Techniqu
es and Application
s
,
Cambridge Univ
ersity
Press, Cambridge, UK, 20
08.
[6]
Q. Zhao
, and B
.
Sadler, “A surv
ey
of Dy
na
mi
c Spe
c
t
rum Ac
ce
ss”
,
IEEE S
i
gnal
Processing Mag
a
zine,
Vol.
24,
No.
3, pp
. 79-89
, 20
07.
[7]
S. Y. Li
en, C
.
C. Tseng
,
and
K. C. Chen
, “
C
arrier
Sensing
b
a
sed Multip
le A
ccess Protocols
for Cognitiv
e R
a
dio
Networks”,
Proceedings o
f
I
EEE
International
Co
nference on
Co
mmunications,
p
p
. 3208-3214
, 2
008.
[8]
C. Cordeiro
, K. Challap
a
l
i
, and
M. Ghosh, “
C
ognitiv
e PHY and MAC La
y
e
rs
for D
y
nam
i
c Spectrum
Acess and
Sharing of TV
Bands”,
Proce
e
d
ings of IEEE I
n
ternational Wo
rkshop on Tech
nology and Poli
cy for Acc
e
ssing
Spectr
u
m,
p
p
. 22
2, 2006
.
[9]
P. Pawelczak, R
.
Venkatesha Prasad,
L. Xia,
and
I. G. M. M. Niemegeer
s, “Cognitive Rad
i
o Emer
gency
Networks
-
Requirements an
d
Design”,
Proceedings o
f
th
e I
E
EE Dynamic
Sp
ectrum Access Networks,
pp. 601-
606, 2005
.
[10]
L. Ma, C
.
C. Sh
en, and B
.
R
y
u,
“Single Radio A
d
aptiv
e Channel Algorithm for Spectrum Agile
|Wireless Ad hoc
Networks”,
Proceedings o
f
th
e I
E
EE Dynam
ic Sp
ectrum Access Networks
, pp. 547-
558, 2007
.
[11]
H. Su, “CREAM-MAC: An Efficient Cognitive R
a
dio
enabled Multi-Channel MA
C Protocol fo
r wireless
Networks”,
Pro
ceed
ings of th
e
International
Sy
mposium on Worl
d of Wire
less,
Mobile and
Mul
i
media Ne
twork
s
,
2008.
[12]
Y. R. Kondar
e
d
d
y
, and P. Agrawal, “S
y
n
chro
nized
MAC Protocol for
Multi-
hop Cognitiv
e
Radio Networks
”,
Proceed
ings of
t
h
e IE
EE
Interna
tional Con
f
eren
c
e
on Communi
ca
tions,
pp
. 3198-3
202, 2008
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
Tran
sm
ission
Pro
t
o
c
o
l
s i
n
C
o
gn
itive Rad
i
o
Mesh
Networks (Anu
sha
M)
1
451
[13]
S. Y. Hung, E. H. K. Wu
, and G. H. Chen, “An Opportunistic Cogn
itiv
e MAC Protocol for Coexistence with
WLAN”,
Proceedings of
the IEEE Interna
tional
Conference on
C
o
mmunication,
p
p
. 4059-4063
, 2
008.
[14]
M. A. Shah, S.
Zhang,
and C.
Mapl
e, “
A
n Ana
l
y
s
is on De
cent
r
ali
zed Adapt
i
ve
MAC Protocols for Cognitiv
e Ra
dio
Networks”,
Proceedings o
f
th
e 18
th
International
Conference on
Automation and
C
o
mputing,
2012
.
[15]
C. Cordeiro
an
d K. Chall
a
pa
li
, “
C
-MAC: A Cognitive
MAC
Protocol for
Multichann
el W
i
rel
e
ss Networks”,
Proceed
ings of
t
h
e IE
EE
Dynami
c
Spe
ctrum and
Acc
e
ss Networks
,
pp
. 147-157
, 2
007.
[16]
J. Zhao, H. Zheng, and G. H.
Ya
ng, “Spectrum
Sharing through Distribut
ed Coordination in
D
y
namic Spectr
u
m
Acces
s
Network
s
”,
Wireless Co
mmunications a
nd Mobile Comp
uting,
Vol. 7, No. 9
,
pp
. 1061-10
75, 2007
.
[17]
Z. Htike, J.
Lee, and C
.
S. Hong
, ”A MAC Proto
c
ol for
Cognitiv
e
Rad
i
o Networ
ks with Reliab
le Control Ch
annels
Assignme
n
t”
,
Pr
oceed
ings of
the
International
Co
nferenc
e
on
Info
rmation Network
i
ng,
pp
. 81-85
, 2
012.
[18]
L. Dasilva and I. Guerreiro, “
S
equence ba
sed Ren
d
ezvous for Dy
n
a
m
i
c Spectrum
Access”,
Proceedings of the IEEE
Conference on
Dynamic Spectr
u
m Access Netw
orks,
2008.
[19]
K. Bian, J. M
.
Park, and R. Ch
en, ”A Quorum based
Framework for establishing C
ontrol Channels in D
y
n
a
mic
S
p
ectrum
Acces
s
Networks
”,
Pr
oceed
ings
of the
ACM Inter
natio
nal Confer
enc
e
on Mobile Computing (
M
obiCom)
,
pp. 25-36
, 2009
.
[20]
Y. H.
Lee and
D. Kim,
“A Slow Hopping MAC Protocol fo
r Coordi
nator b
a
sed Cognitive
Radio Network”,
Proceed
ings of
t
h
e IE
EE
Consumer Co
mmunications and N
e
two
r
king Conf
erenc
e
,
pp
. 854-8
58, 2
012.
[21]
Natarajan Megh
ananth
an, “A survey
on
the Co
mmunication Pr
otocols and Security
in C
ognitiv
e
Radio Networ
ks”,
International Jo
urnal of Commu
nication
Netw
orks and Information Security (
I
JCNIS)
,
Vol. 5
,
pp
. 19-38, 2013.
Evaluation Warning : The document was created with Spire.PDF for Python.