outside instruments. For example, to provide internet roaming on or data retrieving, seamless wireless network connectivity should be guaranteed. And if GPS and mobile TV are wanted, information delivery from dedicated server is necessary. However, such capability is not so easy to be achieved as mobile users change their locations among buildings and streets, or stand at shadowed places. Under those conditions, maintaining the wireless connection via a specific radio access technology (RAT) may not be possible due to its limited coverage. Therefore, cognitive radio which lets devices dynamically re-configure themselves to connect to varying RATs or transmit over unlicensed bands [3][20], and cooperative relay which allow devices relay data of other devices [21] are both considered as expecting technologies to achieve anywhere wireless connections. Under this scenario, all users communicate with each other via cognitive radio forming a cognitive relay network to realize the ubiquitous computing. However, there are some technical challenges before we can buildup such systems. Firstly, in initialization phase the device should aware the environment that it is operating and takes corresponding actions. It is critically depending on the capability of the devices to sense existing and available RATs, and to judge the network condition accordingly. To complete this work, the general sensing and tomography are included in our discussion. Secondly, all the decisions about utilizing available frequency bands is depending on the results of sensing and tomography. However, due to the heterogeneity of the network, fluctuant of wireless channel and mobility of relay nodes. This results is varying with time, to utilize such all the available resource in an optimal way, we then study the MAC and spectrum sharing in the following. Thirdly, the ultimate goal of the system is networking to provide anytime/anywhere services. Therefore, based on the completion of resource management, routing and QoS control become the next issues. Furthermore, in such a dynamic network, any erroneous transmission may not be recovery by traditional ARQ/HARQ because the original path may become unavailable. To deal with all the challenges as a whole, both routing and HARQ in this scenario are considered. Finally, as we said, one of the most important feature of this systems is, it can leverage different RATs to complete its transmission. However, such mechanism needed be designed carefully since each RAT provides different quality of links, and it should be considered jointly with the requirements of application. To finalize the target, we integrate network selection into this paper in the last part. Cognitive Ubiquitous Computing Kwang-Cheng Chen, Fellow, IEEE, Feng-Seng Chu, Shin-Ming Cheng, ShengYuan Tu, Shih-Chun Lin,Yu-Yu Lin, Po-Yao Huang, Ao Weng Chon Institute of Communication Engineering National Taiwan University No. 1, Sec. 4, Roosevelt Road. chenkc@cc.ee.ntu.edu.tw Abstract 1. Introduction Accessing information services anytime/anywhere is a beautiful scenario of human technology [16] while it is still a dream until now. One of the main challenges prevents us from it is how to make the pocket computing devices adapting to environments. In general, such adaptation means connection with 1/15 spectrum sensing and further impacts on network operation, we represent the spectrum availability at CR-Rx by an another indicator function. 2. CRN General Sensing and Tomography [ๆๅๅ ] A. General Spectrum Sensing Traditional spectrum sensing mechanisms, focusing on physical layer detection or estimation at CR transmitter (i.e. CR-Tx), ignore the spectrum availability at CR receiver. Due to existence of fading channels and noise uncertainty along with limited sensing duration, even when there is no detectable transmission of PS during this venerable period, the receiver of this opportunistic transmission (i.e. CR-Rx) may still suffer from collisions from simultaneous transmission(s), as Fig. 1 shows. The CR-Rx locates in the middle of CR-Tx and PS-Tx and PS activities are hidden to CR-Tx, which induces a challenge to spectrum sensing. We can either develop more powerful sensing techniques such as cooperative sensing to alleviate hidden terminal problem, or a more realistic mathematical model. Traditional spectrum sensing mechanisms could be explained by a mathematical structure of defining link availability. Definition 1: CR link availability, between CR-Tx and CR-Rx, is specified by an indicator function 1 CR link is available for opportunistic transmission ๐link = { (1) 0 otherwise Definition 2: CR-Tx senses the spectrum and determines link availability based on its observation as 1 CR link is available for transmission at CR − Tx ๐Tx = { (2) 0 otherwise link Tx Lemma 1: Traditional spectrum sensing for CR link suggests ๐ =๐ As we explain in Figure 1 and/or take interference into testing scenario, we may note that Lemma 1 is not generally true. To generally model spectrum sensing, including hidden terminal scenarios, we have to reach two simultaneous conditions: (1) CR-Tx senses the link available to transmit (2) CR-Rx can successfully receive packets, which means no PS signal at CR-Rx side, nor significant interference to prohibit successful CR packet reception (i.e. beyond a target SINR). Therefore, CR link availability should be composed of localized spectrum availability at CR-Tx and CR-Rx, which may not be identical in general and is rarely noted in current literatures. [23] developed a brilliant two-switch model to capture distributed and dynamic spectrum availability. However, [23] focused on capacity from information theory and it is hard to directly extend the model in studying network operation of CRN. Actually, two switching functions can be generalized as indicator functions to indicate the activities of PS based on the sensing by CR-Tx and CR-Rx respectively [11]. Generalizing the concept of [23] to facilitate our study in PS-Rx Collisions at CR-Rx! PS-Tx PS-Tx Range CR-Rx CR-Tx CR-Tx Range Fig 1. Hidden terminal problem. CR-Rx lies in the middle of CR-Tx and PS-Tx and PS-Tx is hidden to CR-Tx. Definition 3: The true availability for CR-Rx can be indicated by 1 CR link is available for reception at CR − Rx ๐Rx = { (3) 0 otherwise To satisfy two simultaneous conditions for CR link availability, CR link availability can be represented as multiplication (i.e. AND operation) of the indicator functions of spectrum availability at CR-Tx and CR-Rx. Proposition 1: ๐link = ๐Tx ๐Rx The next challenge would be that ๐Rx cannot be known a priori at CR-Tx, due to no centralized coordination nor information exchange in advance among CRs when CR-Tx wants to transmit. As a result, general spectrum sensing turns out to be a composite hypothesis testing. In this paper, we introduce statistical inference that is seldom applied in traditional spectrum sensing to predict/estimate spectrum availability at CR-Rx. Further examining Proposition 1, we see that prediction of ๐Rx is necessary when ๐Tx = 1, which is equivalent to prediction of ๐link . In this paper, we model ๐Rx when ๐Tx = 1 as a Bernoulli process with the probability of spectrum availability at CR-Rx Pr(๐Rx = 1|๐Tx = 1) = ๐ผ . The value of α exhibits spatial behavior of CR-Tx and CR-Rx and thus impacts of hidden 2/15 Pr(๐Co = 0|๐Rx = 0, ๐Tx = 1) = ๐พ Thus the correlation between ๐Co and ๐Rx , ๐ , and corresponding properties become √๐ผ(๐ผ + 1)(๐ฝ + ๐พ − 1) ๐= (7) √(๐ผ๐ฝ + (1 − ๐ผ)(1 − ๐พ))(๐ผ(1 − ๐ฝ) + (1 − ๐ผ)๐พ) terminal problem. If α is large, CR-Rx is expected to be close to CR-Tx and hidden terminal problem rarely occurs (and vise versa). The prediction of ๐Rx at CR-Tx can be modeled as a hypothesis testing, that is, detecting ๐Rx with a priori probability α but no observation. To design optimum detection, we consider minimum Bayesian risk criterion, where Bayesian risk is defined by (4) ๐ = ๐คPr(๐link = 0|๐Tx = 1)PF + Pr(๐link = 1|๐Tx = 1)PM ฬlink = 1|๐link = 0, ๐Tx = 1) , PM = Pr(๐ ฬlink = 0|๐link = In (4), PF = Pr(๐ 1, ๐Tx = 1), and ๐ค ≥ 0 denotes the normalized weighting factor to evaluate ฬlink represents prediction of ๐link = 0. costs of PF and PM , where ๐ Rx Since ๐ is unavailable at CR-Tx, we have to develop techniques to "obtain" some information of spectrum availability at CR-Rx. Inspired by the CRN tomography [4], we may want to derive the statistical inference of ๐Rx based on earlier observation. It is reasonable to assume that CR-Tx can learn the status of ๐Rx at previous times when ๐Tx = 1, which is indexed by n. That is, at time n , CR-Tx can learn the value of ๐Rx [๐ − 1], ๐Rx [๐ − 2], โฏ . In other words, we can statistically infer ๐Rx [๐] from ๐Rx [๐ − 1], ๐Rx [๐ − 2], โฏ , ๐Rx [๐ − ๐ฟ], where ๐ฟ is the observation depth. This leads to a classical problem from Bayesian inference. Lemma 2: Through the Laplace formula, the estimated probability of spectrum availability at CR-Rx is ๐+1 (5) ๐ผฬ = ๐ฟ+2 where ๐ = ∑๐ฟ๐=1 ๐Rx [๐ − ๐]. Proposition 2: Inference-based spectrum sensing at CR-Tx thus becomes Tx ฬlink = {๐ ๐ผฬ ≥ ๐ค/(๐ค + 1) ๐ (6) 0 otherwise Remark: CR-Tx believes CR link is available and forwards packets to CR-Rx if the probability of spectrum available at CR-Rx α is high enough. Otherwise, CR-Tx is prohibited from using the link even when CR-Tx feels free for transmission because it can generate unaffordable cost, that is, intolerable interference to PS or collisions at CR-Rx. B. General Cooperative Spectrum Sensing Lemma 3: ๐ is a strictly concave function with respect to ๐ผ ∈ (0,1) if 1 < ๐ฝ + ๐พ < 2 but a strictly convex function if 0 < ๐ฝ + ๐พ < 1. In addition, ๐Co and ๐Rx are independent if and only if ๐ = 0, i.e, ๐ฝ + ๐พ = 1. By statistical inference, CR-Tx can learn statistical characteristic of ๐Rx and Co ๐ , i.e., {๐ผ, ๐ฝ, ๐พ}, by previous observations. From a viewpoint of hypothesis testing, we would like to detect ๐Rx with a priori probability α and one observation ๐Co , which is the detection result at the cooperative node. Proposition 3: Spectrum sensing with one cooperative node becomes ๐Tx ๐ผ ≥ max{๐ผ1 , ๐ผ2 } Tx Co ฬlink = ๐ ๐ ๐ผ2 < ๐ผ < ๐ผ1 ๐ (8) ฬ Co ๐ผ1 < ๐ผ < ๐ผ2 ๐Tx ๐ {0 otherwise ฬ Co is the complement of ๐Co , ๐ผ1 = ๐ค๐พ/(1 − ๐ฝ + ๐ค๐พ) and ๐ผ1 = ๐ค(1 − where ๐ ๐พ)/(๐ฝ + ๐ค(1 − ๐พ)). It is interesting to note that cooperative spectrum sensing is not always helpful. In the following, we adopt minimum error probability criterion (i.e., ๐ค = 1 ) and give an insight into the condition that cooperative sensing is helpful. Applying Lemma 3, we can reach the following corollary. Corollary 1: If we adopt minimum error probability criterion, cooperative spectrum sensing becomes ๐ ๐Tx if |๐| ≤ ๐น ฬlink = { [๐ผ≥1/2] ๐ (9) ฬ Co )๐Tx if |๐| > ๐น (๐[๐>0] ๐Co + ๐[๐<0] ๐ where ๐[๐ ] is an indicator function, which is equal to 1 if the statement s is true else equal to 0, and ๐ฝ+๐พ−1 ๐น=| | √2(๐ฝ๐พ + (1 − ๐ฝ)(1 − ๐พ)) Spectrum sensing at cooperative node, which can be represented ๐Co , is to explore more information about ๐Rx and therefore alleviates hidden terminal problem. From above observation, we only care about correlation of ๐Rx and ๐Co when ๐Tx = 1 and assume Pr(๐Co = 1|๐Rx = 1, ๐Tx = 1) = ๐ฝ Remark: The effectiveness of a cooperative node only depends on the correlation of spectrum availability at CR-Rx and the cooperative node. If the correlation is low, information provided by the cooperative node is irrelevant to the spectrum sensing which degenerates to (5). 3/15 We present an example of existence of unidirectional link in CRN. In Fig. 2(b), assume one CR is located at (1,0). Obviously, the CR-Tx is not connective to the CR and therefore is prohibited from forwarding packets to the CR. However, by Fig. 2(a), the CR is connective to CR-Tx, which makes the link unidirectional (only from the CR to CR-Tx). With the aid of a cooperative node located at (0.4,0.3), the link returns to a bidirectional link. C. Link property in CRN If we consider a path loss model between CR-TX and CR-Rx, transmission region of CR-Tx should be a circularly shaped region without the existence of PS. We call this region coverage of CR-Tx. However, due to hidden terminal problem as in Fig. 1, where PS is either apart from CR-Tx or is blocked by obstacles, the probability of collision at CR-Rx could increase and CR-Tx may be prohibited from forwarding packets to CR-Rx. Therefore, CR-Tx may be prohibited from using the link even when CR-Tx feels free for transmission. Therefore, allowable transmission region of CR-Tx, defined as neighborhood of CR-Tx, shrinks from its coverage and is no longer circular shape. In addition, hidden terminal problem is location dependent, that is, PS is hidden to CR-Tx but not to CR-Rx in Fig. 1. Thus, CR-Rx is possibly allowed forwarding packets to CR-Tx. From such observations, links in CRN are generally asymmetric and even unidirectional as the argument in [13]. Therefore, traditional feedback mechanism such as acknowledgement and automatic repeat request (ARQ) in data link layer may not be supported in general. This challenge can be alleviated via cooperative schemes. Roles of a cooperative node in CR network operation thus include ๏ฌ Extend neighborhood of CR-Tx to its coverage ๏ฌ Ensure bidirectional links in CRN (i.e. enhance probability to maintain bidirectional) ๏ฌ Enable feedback mechanism for the purpose of upper layers Therefore, spectrum sensing capability mathematically determines CRN topology. It also suggests the functionality of cooperative nodes in topology control and network routing, which is critical in CRN due to asymmetric links and heterogeneous network architecture [13]. We illustrate a numerical example in Fig. 2, where neighborhood of CR-Tx ("+" in the figure) with/without a cooperative node ("o" in the figure) is depicted by a thick and a thin line respectively. In Fig. 2(a), PS ("*" in the figure) is placed near to CR-Tx (0.7,0). We observe that CR-Tx almost perfectly detects the state of PS and neighborhood of CR-Tx approaches to its coverage and the cooperative node is not necessary in this case. However, when PS is apart from CR-Tx (1.7,0) as in Fig. 1, the neighborhood at PS side shrinks and is no longer circularly shaped because PS is hidden to CR-Tx and hence probability of collision at CR-Rx increases. Fig. 2(b)~(d) illustrate the neighborhood under different locations of the cooperative node. We observe that neighborhood area decreases when the cooperative node moves away from PS and there even exists a region where cooperative sensing can not help. Neighborhood of CR-Tx, Without Obstacles,w=4 (a) (b) 2 2 1 y-axis y-axis 1 0 -1 0 -1 -2 -2 -1 0 1 -2 -2 2 -1 x-axis (c) 2 1 2 1 2 (d) 2 1 y-axis 1 y-axis 0 x-axis 0 -1 0 -1 -2 -2 -1 0 1 -2 -2 2 x-axis Without Cooperation -1 0 x-axis With Cooperation CR-Tx Primary System Cooperative Node Fig. 2 Neighborhood of CR-Tx without obstacles. CR-Tx can only be allowed forwarding to CR-Rx located within the bounded region. D. Network Level Tomography in CRN Successful CRN operations generally relies on cooperative and opportunistic relays through neighboring (CR) nodes, which always requires a prior knowledge of such cooperative relay node-to-node availability to implement routing and flow control [12], etc. Such node-to-node availability on top of the link availability among one-hop neighboring nodes relates to radio resource, CR mechanism, and trust [13]. Due to the opportunistic transmission nature of CRN, 4/15 the guaranteed quality of service (QoS) control provides an intellectual challenge. Provided the statistics of the node-to-node availability, the statistical quality of service (QoS) control is a practical alternative way for end-to-end services in CRN operations. To infer such a prior knowledge or estimation of node-to-node availability associated with cooperative relay(s), we may observe the history and statistics of successful packet transportation over a specific cooperative relay path. Since there involves packet transmissions (either implicit traffic packets or explicit probing packets) over multiple links, we consider this challenge as active CRN tomography at network level. Considering a scenario with a set of possible cooperative relay paths among coexisting systems, the source node estimates the success probability of packet transmission according to the historical record from the reception of destination node. Both traffic types of the deterministic packet arrival and the Poisson packet arrival from the source node will be studied. In Figure 3, a source node ๐๐ transmits packets to a destination node ๐๐ท through K possible relay paths ๐บ๐ , j = 1, … ๐พ . Let the successful packet ๐ ๐ transmission probability of the routing path ๐บ๐ be ๐S . Suppose that ๐๐ , ๐ = 1, . . . , ๐พ are selected beforehand independently from the uniform distribution on the interval [0,1] and unchanged in thereafter packets transmissions. Assume that the packets are slotted transmitted and received by the source node and the destination node, respectively, with time interval โ๐ก๐ in one time slot for the relay path ๐บ๐ , and the propagation delay of ๐บ๐ , denoted as ๐ท๐ , is constant. The destination node observes the packet reception in M time slots (and thus ๐โ๐ก๐ observation time for the relay paths ๐บ๐ ) and feedbacks this historical information to the source node in a reliable way (or the existence of reliable observation with delay). As the destination node knows the relay path(s) of the ๐ received packets, we may suppose the probabilities ๐S , j = 1, . . . , K to be independently determined for all ๐. 1) Deterministic Packet Arrival: Within each time slot, the source node transmits one packet by the routing path ๐บ๐ to the destination node (and thus the packet rate is fixed in 1⁄โ๐ก๐ ). We use an indicator function to represent the transmission result of the i-th transmission by the relay path ๐บ๐ 1, ๐-th transmission is successful ๐๐ [๐] = { ๐ = 1, … , ๐ (10) 0, ๐-th transmission is failed ๐ and ๐๐ [๐] is thus Bernoulli-distributed with expected value ๐S , i.e. with probability ๐ ๐S equal to 1 and probability (1 − probability density function of ๐ ๐S , ๐ ๐(๐S ), ๐ ๐S ) ๐ ๐(๐S ) = (๐ + 1)! ๐ ๐๐ ๐๐ ! (๐ − ๐๐ )! ๐ ๐−๐๐ (๐S ) (1 − ๐S ) (11) where ๐๐ = ∑๐ ๐=1 ๐๐ [๐]. Proposition 4: With mean-square error cost function, the Bayes estimator ๐ becomes ๐ฬS,MS = (๐๐ + 1)/(๐ + 2) . On the other hand, with uniform cost ๐ function, the Bayes estimator becomes ๐ฬS,UNF = ๐๐ /M. 2) Poisson Packet Arrival: We now consider that the packets arrive on ๐บ๐ as a Poisson process having rate ๐๐ . Consequently, in each time slot, the probability ๐ of no packet to be transmitted is ๐๐ = ๐ −๐๐ โ๐ก๐ . Assuming that ๐๐ โ๐ก๐ is small enough, it results in negligible probability for more than one packet arrive within one time slot. Hence we can only consider the probability that one packet ๐ ๐ arrives as ๐๐ ≅ 1 − ๐ −๐๐ โ๐ก๐ and no packet arrives as ๐๐ . We define an indicator function to represent the reception result of the i-th observation by ๐บ๐ at the destination node ๐๐๐ [๐] 1, successful reception from ๐-th relay path in ๐-th observation (12) ={ 0, no reception from ๐-th relay path in ๐-th observation ๐ = 1, … , ๐ ๐ ๐ [๐] Let ๐ ๐ = ∑๐=1 ๐๐ . Proposition 5: If the propagation delay ๐ท๐ is known, which means the source node can know whether no reception is due to no transmission from the source node or transmission but failed, according to the historical observations of the ๐ destination node, ๐ฬS,MS becomes (๐ ๐ + 1)/(๐๐ + 2) where ๐๐ is the number of ๐ actual transmissions and ๐ฬS,UNF = ๐ ๐ /๐๐ . Proposition 6: If the propagation delay is unknown, which means the source node can only know the statistics in certain M observations of the destination node, ๐ ๐ฬS,MS becomes ๐ ๐ + 1 1 ๐ผ๐๐๐ (๐ ๐ + 2, ๐ − ๐ ๐ + 1) ๐ ๐ฬS,MS = (13) ๐ + 2 ๐ ๐ ๐ผ๐๐ (๐ ๐ + 1, ๐ − ๐ ๐ + 1) ๐ ๐ ๐ where ๐๐ = 1 − ๐ −๐๐ โ๐ก๐ and ๐ผ๐ฅ (๐, ๐) is the regularized incomplete beta function, and ๐ ๐ ๐ฬS,UNF = ๐ ๐ ⁄(๐๐๐ ) (14) equal to 0. The a posteriori can be straightforward derived as 5/15 ๐ When ๐๐ = 1, (13) and (14) are degenerated to the results of Proposition 4. Proposition 6 also suggests the estimators according to the traffic mode of the source node with the parameter ๐๐ of the Poisson process. 3) Applications: Propositions 4 and 5 offer simple estimators for the inference ฬ ๐ = [๐ฬS1 , ๐ฬS2 , … , ๐ฬS๐พ ]๐ in different traffic modes of success probability ๐ท (deterministic and Poisson packet arrival) of the source node, which are accomplished according to the historical observations of receptions at the destination node. They can be easily extended to many tomography cases for upper-layer CRN functions. For example: Corollary 2: (Opportunistic Routing) In the traditional reactive routing protocols such as AODV or DSR, the source node spreads packets containing routing information to get feedback from other nodes and so as to determine a reliable routing path to the destination node. In CRN, the opportunistic routing becomes a promising routing concept for the unreliably links with general none zero packet-loss probability, in which all nodes involving in the route discovery phase may be applied the proposed model to determine the best one of neighboring nodes for data forwarding. Suppose that the source node has to select one relay node from a set of $K$ candidate numbered neighboring relay nodes to route packets. A straightforward selection with high reliability is to ๐ select the ๐-th relay path where ๐ = arg ๐ max ๐ฬ๐ for ๐ = 1 to ๐พ. A. Multichannel MAC Cognitive Radio (CR) has been considered as a promising technology to enhance spectrum/channel efficiency while primary systems (PSs) are with relatively low utilization. It is feasible to allow CR (i.e. unlicensed users) to exploit the spectrum/channels when PS is idle. Theoretically speaking, the overall spectrum utilization will be improved by the media access of CRs. From CR’s point of view, the inherent characteristic of CR media access control (MAC) is a multichannel environment where channels are preoccupied some primary system with no precaution of CRs. The MAC under CR paradigm is depicted as Fig. 4. For reliable CR media access, CR must properly select an accessing channel, avoid interference with PS transmission, and resolve contention between CRs. As a result, the multichannel MAC problem under CR paradigm can further been divided into the two components 1) Channel Selection and 2) Contention Avoidance/Resolution. Channel 1 Channel 2 … ... Path G1 ... PS1 Path G2 PS2 PSX CR1 CR2 ... ... Channel Selection CRY Fig. 4 Multichannel Media Access Problem under CR Paradigm Collision avoidance/resolution [14] is inherited from the conventional MAC. However, CR, categorized as secondary users, must perform spectrum sensing before accessing the channel in avoidance of interference with PS. Moreover, the potential CR competitor for channel access is no more static in consideration of dynamic CR access. On the other hand, channel selection which considers distributed selection of communication channel is now a new challenging issue of multichannel MAC for CR which recently attracts most research efforts [22], [9], [10]. The design goal of multichannel MAC aims at distributedly ignition of parallel transmission over multichannel [10]. ... Destination node nD . . . … Channel X ... ... Source node nS Contention Avoidance/Resolution … … … Path GK ... Fig 3. Cooperative opportunistic relay network. 3. Multi-channel MAC [้ปๆๅ ฏ] 6/15 of two parts: spectrum sensing for inter system (CR-PS) contention avoidance/ resolution, and intra system (CR-CR) contention avoidance/resolution mechanism. In this paper, we give and analyze a protocol with a slotted nonpersistent CSMA. C. Performance Evaluation We analyze the general multichannel MAC using a discrete time Markov chain (DTMC) model. CR is assumed to have single buffer and a traffic pattern follows a Poisson arrival with parameter ๐ . The retransmission policy is geometric with parameter ๐๐ . Let ๐๐ก denotes the number of backlogged CRs at the beginning of a given frame ๐ก. Then {๐๐ก } forms a DTMC. The state space of ๐๐ก is defined as: ๐ฎ = {0,1, … , ๐} . Let ๐๐ด (๐, ๐) be the probability that ๐ unbacklogged CRs attempt to transmit packets in a given frame, and that ๐๐ (๐, ๐)be the probability that ๐ backlogged node attempt to retransmit. We have: ๐๐ด (๐, ๐) = (๐−๐ )(1 − ๐๐ด )๐−๐−๐ ๐๐ด๐ ; ๐๐ (๐, ๐) = (๐๐ )(1 − ๐๐ )๐−๐ ๐๐ ๐ (15) ๐ Where ๐๐ด = 1 − ๐ −๐๐ is the probability of packet arrival for un-backlogged CR within a frame with duration ๐ . The number of CR attempting channel access is therefore ๐ + ๐ with probability ๐๐ด (๐, ๐)๐๐ (๐, ๐) . Define a multichannel contention resolution/avoidance function Ω(๐ , ๐, ๐ฅ) where its value represents the probability that there are ๐ successful transmission CRs out of ๐ attempting CRs over channel 1, 2, …, ๐ฅ . For contention avoidance/resolution on a specific channel ๐ฅ, define ๐๐ฅ (๐) as the probability that the channel is successfully utilized by CR when there is ๐ CR attempters. We have: Fig. 5 General multichannel MAC under CR paradigm and a CSMA-based multichannel MAC for CRs B. General MAC Protocol Framework The multichannel MAC of CR is characterized by: {๐, ๐, ๐ถ, ๐๐ฅ }. ๐ is the number of channels and channel ๐ฅ is supposed to be independently occupied by some PS with probability ๐๐ . Let Y and denote the number of CRs and let ๐ถ denote the average channel capacity. For multichannel under CR paradigm, we evaluate 1) the aggregated throughput ๐ defined as the aggregated physical layer throughput over all channels, and the 2) average channel utilization ๐, defined as the average number of channels being successfully utilized for data transmission, normalized by the number of channel. Note that ๐ is equivalent to traditional MAC ‘’throughput” defined as the number of successful transmission per channel per slot. Consider a slotted and synchronous MAC with a perfect physical layer, the generalized multichannel MAC problem is depicted in Fig. 5. Multiple CRs seek channel opportunity to access. After selecting channel at the beginning of a frame, the operation frame is further divided into three phases: 1) Spectrum sensing, 2) (CSMA) Contention 3) Data Transmission. The generalized channel selection algorithm is defined as ๐ค = {๐1 , ๐2 , … , ๐๐ } = {๐๐ฅ }, where ๐๐ฅ is the probability of selecting channel ๐ฅ The contention avoidance/resolution consists ๐ Ω(๐ , ๐, ๐ฅ) = ∑ ๐=0 Ω(๐ , ๐ − ๐, ๐ฅ − 1)๐๐ฅ๐ [1 − ๐๐ฅ (๐)] + Ω(๐ − 1, ๐ − ๐, ๐ฅ − 1)๐๐ฅ๐ ๐๐ฅ (๐) (16) Note that Ω(1, ๐, 0) = ๐0 (๐) and Ω(0, ๐, 0) = 1 − ๐0 (๐) ; Ω(๐ , ๐, ๐ฅ) is recursively solved where ๐๐ฅ is related to the channel selection algorithm ๐ค and ๐๐ฅ (๐), take non-persistent CSMA random back-off and with perfect spectrum sensing as an example: ๐๐๐ค −1 ๐ 1 ๐ + 1 ๐−1 ๐๐ฅ (๐) = ๐๐ฅ ∑ ( )( ) (1 − ) (17) 1 ๐๐๐ค ๐๐๐ค ๐=0 where ๐๐๐ค is the contention window size; ๐๐ฅ is the channel availability estimated by physical layer, note ๐๐ฅ = 1 − ๐๐ฅ with perfect spectrum sensing. The transition probability of such Markov Chain can further be derived as: 7/15 ๐๐๐ = ๐บ(๐ , ๐ + ๐, ๐)๐๐ด (๐, ๐)๐๐ (๐, ๐) (18) ∑ ๐+๐−๐ =๐ 0≤๐≤๐−๐;0≤๐≤๐;๐ ≤๐+๐ With the transition probability matrix P = {๐๐๐ }, we can solve the limiting probability ๐ = {๐๐ } of the Markov chain. With the limiting probability, the CR normalized (๐) /aggregated (๐) throughput can further be derived. Define the protocol efficiency ๐ as the portion that a multichannel MAC protocol utilizes channel capacity in a frame. The throughput can be derived as: ๐ ๐= 1 ∑ ๐ ๐ ๐=∑ ๐=0 ๐ ๐บ(๐ , ๐ + ๐, ๐)๐๐ด (๐, ๐)๐๐ (๐, ๐)๐๐ (19) ∑ ๐ ,๐,๐ ๐=0 0≤๐≤๐−๐;0≤๐≤๐;๐ ≤๐+๐ ∑ ๐ถ๐ โ ๐ ๐บ(๐ , ๐ + ๐, ๐)๐๐ด (๐, ๐)๐๐ (๐, ๐)๐๐ (20) ๐ ,๐,๐ 0≤๐≤๐−๐;0≤๐≤๐;๐ ≤๐+๐ D. Simulation Results With the general multichannel MAC framework, Fig. 6 illustrates the analytic and the simulation results of multichannel MAC for CR. The simulation 1 parameters are with ๐ = {10,20,30}; ๐๐ = ; ๐๐๐ค = 5; ๐๐ = 0.2; ๐๐ฅ = 0.05. ๐ The simulation results validate the Markov Chain based analytic model, providing a basic understanding and parameter dependence about the performance of multichannel MAC. With the parameter setting, the optimal normalized throughput of the multichannel MAC is about 0.7 in the presence of PSs. From the simulation results, with higher arrival rate ๐, CRs approach to the maximum throughput provided by the multichannel faster, then, it saturates and drops quickly and vice versa. Further stabilization mechanisms are promising approaches to improve the multichannel MAC performance. Fig. 6 Normalized Throughput U via attempt rate G with different number of channels 4. Distributed Spectrum Sharing [ๆ็ฅ็] Since distributed spectrum sharing fully exploits the autonomic property of CR nodes, the distributed scenario, which is classified by cooperative and noncooperative spectrum access, has received considerable research interests. In cooperative distributed spectrum sharing, coalitions consist of several CR nodes are formed in which spectrum sharing is performed via information exchange or bargaining among the group [15]. On the other hand, in the non-cooperative scheme, CRs make decision individually based on locally defined payoff function and are thus considered selfish. When we consider a set of selfishly behaved users embedded with cognition capability that results in the increment of a priori knowledge and rationality, game theory provides a well-suited model that describes the behavior of such intelligent nodes. Several spectrum sharing mechanisms based on game theoretical view have been developed. In [2], power allocation over shared bands is considered. A game theoretical version of waterfilling algorithm is proposed for both static and repeated games. An economic 8/15 view of spectrum sharing is modeled as a market competition process developed in [5]. However, in most cases, only partial spectrum information is obtainable due to limited sensing capability of CRs. The available channels are assumed to be known for all CRs in [2][5], which is hard to achieve in practical operation. In [7], a mixed strategy equilibrium that solely depends on the probability of spectrum availability for spectrum access is derived. Nevertheless, since CRs are able to fetch spectrum information in sensing period, the sensing result can be regarded as side information in decision making of spectrum access, and is not considered in spectrum access strategy [7]. In the distributed spectrum sharing scenario to be introduced, we practically deal with the case in which only partial spectrum information is available for individual CR and the spectrum sensing result as side information is utilized to design the spectrum access strategy. This is a joint consideration of the scenarios of previous efforts in [2][5][7]. The model also includes the individual sensing capability of CRs by which CRs capture spectrum information in absence of public spectrum information. Maximin criterion is applied to design with respect to the worst channel access strategy of the opponents. We propose algorithms to determine spectrum access strategy and demonstrate that the algorithms prevent the system from collision in large network. Numerical results are presented in comparison with random and proportional channel selection and the proposed algorithms show superiority in system throughput over the other strategies in both scenarios. CR-MS-Tx in which the decision on the channel to be used is carried. This way, the agreement on the channel usage between CR-MS-Tx and CR-MS-Rx is accomplished and the link between CR-MS pairs is established for data transmission with period t sac . treq PR Request t t sac s CR sensing CR Access PR Access td t pac td ๏ซ1 Fig. 7. Superframe structure of slotted operation for spectrum access The wireless network is composed of ๐ PR-MSs, each of which corresponding to a licensed band, forming a set of numbered licensed channels {1 … ๐}. A number of ๐ unlicensed CR-MSs coexist in the cell and are allowed to access the channel based on their spectrum sensing result. Here we use ๐ฆ as the CR-MS index and ๐ฅ as the channel index. The spectrum information obtained by the ๐ฆ๐กโ CR-MS in [๐ก๐ , ๐ก๐+1 ] is denoted by the indicator function ๐ ๐ฆ (d) = {๐ผ๐ฆ,๐ฅ (d)}, where 1 if channel x is available if channel x is occupied ๐ผ๐ฆ,๐ฅ (d) = { 0 ๐ข๐ฆ,๐ฅ for unknown channel state Due to limited sensing capability, the uncertainty of channel availability is modeled as a Bernoulli random variable ๐ข๐ฆ,๐ฅ with the sensing result for each CR-MS pair is correct. A further assumption is that the belief of the traffic loads of PR-MSs,which is associated with ๐๐ฆ,๐ฅ , is the same among those CRMSs with uncertainty in the channel availability and we can therefore denote the parameter of Bernoulli random variable ๐ข๐ฆ,๐ฅ , ๐๐ฆ,๐ฅ , as ๐๐ฅ , which is independent of the CR-MS index. A CR-MS ends up in one of the three possible outcomes at the end of the spectrum access phase: (i) the CR-MS successfully transmits ๐๐ฅ bits via channel ๐ฅ when it is the only user accessing the band (ii) collision occurs if either any other CR-MS transmits on the same band simultaneously or the band is occupied by the licensed PR-MS, leading to a collision cost denoted by ๐, where ๐ < 0 (iii) the CR-MS does not transmit in the period, resulting in the payoff 0. We assume additive white Gaussian noise (AWGN) time invariant channel and the received power for CR-MSs are the same. Also, two CR-MSs do not interfere with each other as long as they operate in different channels. In this A. System Model We consider a wireless network consisting of Primary Mobile Stations (PRMSs), Cognitive Radio Mobile Stations (CR-MSs), and Spectrum Agent (SA) : โง PR-MSs is a set of licensed users each of which transmits on a fixed licensed band. โง Spectrum agent accumulates spectrum access requests from PR-MSs. โงCR-MSs is a set of unlicensed users. A CR-MS is composed of a CR-MS transmitter (CR-MS-Tx) and a CR-MS receiver (CR-MS-Rx). PR-MSs and CR-MSs follow a perfectly synchronized time-slotted mechanism defined by the superframe as shown Fig. 7. A superframe is defined in time interval [๐ก๐ , ๐ก๐+1 ], where ๐ ∈ ๐ + is the discrete time index. The superframe begins with the time slot in which SA gathers spectrum access requests from PR-MSs for t req . The spectrum requisition period is followed by the PR-MS data transmission slot lasting for t pac . At the time PR-MS transmission is activated, CR-MS-Txs listen for the spectrum information via CR-MS-Tx sensing. Spectrum sensing period takes tme t s . As the spectrum access strategy is determined by the CR-MS-Tx, CR-MS-Rx listens for the preamble from the 9/15 case the allowable transmission rate on a given band is constant regardless which CR-MS uses it. Each CR-MS determines a set of strategy profile, ๐๐ฆ = {๐๐ฆ,0 , ๐๐ฆ,1 . . . , ๐๐ฆ,๐ } , indicating that the ๐ฆ๐กโ CR-MS accesses channel ๐ฅ with probability ๐๐ฆ,๐ฅ for x= 1 … ๐ and does not access any channel with probability ๐๐ฆ,0 . The decision is only applicable in a superframe and must be re-determined based on the spectrum information derived in other superframes. The expected payoff ๐๐ฆ (๐) over the strategy profile of the ๐ฆ๐กโ CR-MS in [๐ก๐ , ๐ก๐+1 ] is ๐๐ฆ (๐) = ∑๐ ๐๐ฆ,๐ฅ ๐ฅ=1 ๐ผ๐ฆ,๐ฅ (๐)=1 + ∑๐ ๐๐ฆ,๐ฅ ๐ฅ=1 ๐ผ๐ฆ,๐ฅ (๐)=๐ข๐ฆ,๐ฅ makes CR1 be indifferent to the strategy chosen by its opponents. That is, the expected payoff of CR1 under maximin criterion shall be equalized regardless of the strategy, access or wait, taken by CR2. The strategy named in equalizer rule can be explicitly found by solving the set of equations, ๐๐1,1 + ๐2 ๐1,2 = ๐1 ๐1,1 + ๐๐1,2 (231) ๐1,1 + ๐1,2 = 1 (232) we have the maximin strategy profile for CR1: {๐ [1 − ∏๐๐=1(1 − ๐๐,๐ฅ )] + ๐๐ฅ ∏๐๐=1(1 − ๐๐,๐ฅ )} ๐≠๐ฆ ๐≠๐ฆ ๐1 = {0, , ๐1 −๐ } (24) Note that the strategy profile in (24) is feasible if and only if it brings positive payoff function. Otherwise, CR1 shall choose not to access any channel with probability 1. To generalize for a scenario with ๐ users and ๐ channels, we begin with the following lemmas: Lemma 4: A CR-MS assigns probability 0 on those channel with ๐ผ๐ฆ,๐ฅ (๐) = 0 ๐๐ (๐ผ๐ฆ,๐ฅ (๐) = ๐ข๐ฆ,๐ฅ ๐๐๐ (๐๐ฅ + ๐)๐๐ฅ − ๐ < 0) โก Lemma 4 is a procedure of eliminating dominated strategy: Accessing channels occupied by PR-MSs and unknown channels bringing negative payoff even when no other CR-MSs access the channel is dominated by not accessing any channel. Thus in the following, when referring to “๐ channels,” we excludes those satisfying conditions in Lemma 4. Lemma 5: In the scenario with ๐ users and ๐ channels, if the number of channel assigned with positive probability ๐ ≤ ๐ − 1 for the CR-MS, the maximin strategy for the CR is not to access any channel with probability 1. Proof: It is obvious since the worst profile is that all the channels are occupied by at least one CR-MS. โก Inspired by Lemma 5, we can think of the other ๐ − 1 CRs as a single opponent-“environment.” The worst that the environment can harm the CR is to occupy at most ๐ − 1 bands, which we term as “worst case combination” in the following. Therefore, any strategy of the environment that occupies less than ๐ − 1 bands is not of our concern in finding maximin strategy. The following Lemma is another example: Lemma 6: In the scenario with ๐ users and ๐ channels with ๐ = ๐ . The equalizer rule is maximin if the expected payoff is greater than 0. The maximin strategy is {๐๐ฅ [๐ (1 − ∏๐๐=1 (1 − ๐๐,๐ฅ )) + ๐๐ฅ ∏๐๐=1(1 − ๐๐,๐ฅ )] + ๐≠๐ฆ ๐2 −๐ ๐1 +๐2 −2๐ ๐1 +๐2 −2๐ ๐≠๐ฆ (1 − ๐๐ฅ )๐} (21) To highlight, the expected payoff depends on not only the strategy profile of the ๐ฆ๐กโ CR-MS but also that of other CRs, indicating that for a CR-MS intending to maximize its payoff, it should not be ignorant of other users’ strategy profiles. Thus, we are motivated to use game theoretical model to deal with the distributed spectrum access problem. In the following section, we derive different approaches to find out the equilibrium solution for both public and private spectrum information. B. Spectrum Access Strategy Since it is not always the case that there’s an SA broadcasting the information to CR-MSs, individual CR-MS makes decision solely depending on the private spectrum sensing information. In absence of the spectrum sensing results of the other CR-MSs, a CR-MS is not able to find a global equilibrium solution without the knowledge of its opponents’ channel access strategies. The design philosophy for each CR turns out to be the maximin criterion, i.e. A CRMS determines the strategy profile such that ∗ ∗ ∗ ๐๐ฆ = {๐๐ฆ,0 , ๐๐ฆ,1 . . . , ๐๐ฆ,๐ } = argmax๐๐ฆ (๐๐๐๐−๐ฆ ๐๐ฆ (๐๐ฆ , ๐−๐ฆ ) (22) where ๐−๐ฆ is the strategy profile for all CR-MSs other than CR ๐ฆ . We start by exploring the two-user and two-channel case. Let the spectrum information obtained by CR1 be ๐1 (๐) = {1,1}. Assume the strategy profile of ∗ ∗ CR1 is ๐1 = {0, ๐1,1 , ๐1,2 }. The maximin strategy is the strategy profile that 10/15 ∗ ๐๐ฆ,๐ฅ = 0 ๐ ๐ Proof: It can be easily checked that ๐ถ๐−1 − ๐ out of ๐ถ๐−1 equations are redundant. By eliminating the equivalent equations, we get only ๐ equations as described above. โก In summary, to find out the maximin strategy profile in the scenario with ๐ users and ๐ channels, a CR-MSs should refer to the equalizer rule; nevertheless, it might be too pessimistic to equalize over all the ๐ channels especially when the cost of collision is low. Certain degree of persistency is allowed in this case. Based on the above Lemmas, we propose the following algorithm to find out the maximin strategy profile. Proposition 7: In the scenario with ๐ users and ๐ channels, where ๐ < ๐, we find the maximin strategy profile following the procedures below: (i) Select ๐ฅ = ๐ channels with the largest benefits (ii) Find equalizer strategy profile over the channels selected in (i), and assign probability 0 on those not selected. (iii) Calculate the equalized payoff in (ii) (iv) Set ๐ฅ = ๐ + 1 and repeat (i)-(iv) till ๐ฅ = ๐ + 1 The maximin strategy profile is determined by choosing the profile bringing the largest equalized payoff calculated in (iii). If the largest payoff is smaller than โก 0, choose not to access with probability 1. ๐๐ ๐ผ๐ฆ,๐ฅ (๐) = 0 ๐๐ (๐ผ๐ฆ,๐ฅ (๐) = ๐ข๐ฆ,๐ฅ ๐๐๐ (๐๐ฅ + ๐)๐๐ฅ − ๐ < 0) ๐ ∏๐ ๐=1,๐≠๐ฆ(๐๐ −๐)๐๐ ๐ ๐ ∏ ๐=1,๐≠๐ฅ(๐๐ −๐)๐๐ ∑๐ ๐ ๐=1 (๐๐ −๐)๐ ๐ ๐๐กโ๐๐๐ค๐๐ ๐ (25) { ๐ ๐ where ๐๐ = ๐๐ if channel ๐ is in unknown status and ๐๐ = 1 if channel ๐ is not occupied. ∗ ∗ Proof: For the equalizer rule {๐1,1 . . . , ๐1,๐ }, the deviation version can be ∗ ∗ written as {๐๐ฆ,1 + ๐1 , . . . , ๐๐ฆ,๐ + ๐๐ } with ∑๐๐ฅ=1 ๐๐ฅ = 0 . The strategy profile achieves smaller payoff than the equalized one under the case that the channels with ๐๐ฅ > 0 are occupied. The result in (25) is simply an extended version of (24) . โก The next Lemma shows the role of the equalizer rule in finding the maximin strategy. Lemma 7: In the scenario with ๐ users and ๐ channels, a profile that does not equalize the opponents’ pure strategy worst case combination cannot be a maximin strategy. ∗ ∗ Proof: Consider a small deviation from the equalizer rule, say{๐๐ฆ,1 , … , ๐๐ฆ,๐ − ∗ ∗ ๐, . . . , ๐๐ฆ,๐ + ๐, … , ๐๐ฆ,๐ }, where channel ๐ is the one that the opponents access in the profile that brings least payoff, and the channel ๐ is the one that is not occupied by other CR-MSs. It is clear that the payoff is improved under the pure strategy profile. We can find ๐ > 0 which is small enough such that the order of the payoff for the pure strategy profile of the opponents remains. Thus, the worst case pure strategy is improved. In that case, the deviation from equalizer rule cannot be maximin strategy. โก From Lemma 7, we see that an unequalized payoff can always be improved via an equalizer rule. In the scenario described in Lemma 6, it is proved that the maximin strategy is uniquely determined by solving ๐ equations (worst combination of opponents) with ๐ variables (strategy profile). However, in the case with ๐ ≤ ๐ − 1, we have more equations than variables. The following Lemma shows how we find the equalizer rule. Lemma 8: In the scenario with ๐ users and ๐ channels, to find the equalizer rule that equalizes all channels, we formulate ๐ equations, which are the expected payoff under ๐ different worst case combination of opponents with any two of the combinations differ in only one channel assignments. For example, for ๐ = 4 and ๐ = 3 , a user should equalize the environment’s strategy that channel {1,2}, {2,3}, {3,4}, {1,4} are occupied. C. Simulation Result We assume that there are 10 unoccupied channels. The benefits for successful transmission are: 9.17, 2.69, 7.65, 1.89, 2.88, 0.91, 5.76, 6.83, 5.46, and 4.26. Also, we have one more channel with benefit 2.51 in unknown status with available probability 0.3. Collision payoff is assumed to be -1. The total benefit is defined as the summation of the channel benefit for successful transmission plus the cost for collision. Simulation results are averaged over 10000 times iteration. The result is compared with random channel assignment and proportional mixed strategy assignment. For the random assignment, CRs access each channel with equal probability; whereas for the proportional assignment, CRs access channel ๐ฅ with probability ๐๐ฅ / ∑๐๐ฅ=1 ๐๐ฅ demonstrate the performance of maximin strategy in Proposition 7 as shown in Fig. 8. It can be seen that the maximin strategy outperforms the other two strategy profiles at the worst case channel assignment of the opponents at any number of CR-MSs in the network due to the fact that the proposed algorithm is optimal in the sense of maximin criterion. The individual worst case benefit of the proposed algorithm is more than that of random access by 0.5 and than that of proportional assignment by 1. In large network, due to the conservation property under maximin criterion, CR-MSs choose not to transmit 11/15 when the number of opponents is more than the number of channels bringing positive benefit and thus keep the worst case of benefit at 0. To conclude, when considering distributed spectrum sharing, the total number of CRs accessing the channels is not limited in absence of a centralized controller. In this case, despite the improvement in spectrum utilization, frequent packet collisions among CRs result in degradation in system throughput. We proposed distributed mechanisms to ensure system throughput even in large network from the game theoretical view. A non-cooperative game model is applied in describing the spectrum access competition among CRs. We also pioneered utilize the most realistic spectrum sensing result in which imperfectness due to limited sensing capability of CRs was taken into consideration. The spectrum information with imperfection was used as side information to aid individual CR in determining the optimal spectrum access strategy. Numerical results showed that for the scenario with only private spectrum information obtainable, the proposed algorithm designed under maximin strategy profile assured the optimal benefit achievable under worst case condition. CRs are prohibited from activating transmission under selfenforcing mechanism, preventing the system from collision as well. 5. Routing and Control of CRN A. Opportunistic Routing [ๆๅฃซ้] When facing the increasing demand o the spectrum, the concept of the CR comes up for the underutilized spectrum. Dynamic spectrum access (DSA) helps the CRs to fulfill the sufficient spectrum usage by using the spectrum hole provided by the licensed PS. CRs can share the spectrum with PSs as long as PS’s Qos is guaranteed, i.e. CRs is the link level technology requiring to sense the spectrum of PSs being ”available”, then transmits packets to the receiving node. In order to avoid the interference to the PS, the CRs share the medium in an opportunistic way, i.e. establishing the opportunistic links between the CRs and between the CR and the PS. Here comes quite a lot difference in such a cognitive radio network with the wireless ad hoc (or sensor) networks. However, operations of CRs shall not be limited to the link level. The dynamically available of the CR links makes a new challenge when considering the routing of the networking mechanism. Since each link is opportunistic available for CRs, providing a workable and reliable route seems be a difficult task. The concept of user cooperation which allows a source assisted by the intermediate nodes explores the cooperative diversity and offers a significant performance gain advantage. Although most existed routing protocols still think the overhearing by the broadcast nature of the wireless environments which be used for the cooperation purpose is the typical drawback that should be conquer, the new coming opportunistic routing make cooperative diversity efficient and practical on commodity hardware with the better throughput performance. As being suitable for the routing of the wireless ad hoc (multi-hop) network, Opportunistic routing considers the broadcast nature of the wireless environment. When a node sends a packet through the air, all of the nodes in the network may hear the packet. There is a link between each pair of the nodes in the network. Opportunistic routing also considers the lossy nature of the wireless environment. Due to the layer abstraction of data-link layer and network layer, wireless networks suffer the unsuccessful transmission mainly from the packet loss. Each link between two nodes owns a delivery probability, which decreased with the distance increased. Since the delivery probability is equal to one minus loss probability, i.e. the packet sends from the one side node won’t be received by the other node with the probability in ergodic sense, each attempt to transmit a packet can be considered as a Bernoulli trial. We formulate 6 Maximin Random Proportional Individual CR Benefit (Worst Case) 5 4 3 2 1 0 -1 2 3 4 5 6 7 Number of CRs 8 9 10 11 Fig. 8. Individual CR-MS benefit under worst case 12/15 the delivery ratio of the jth link in the nth time interval [tn,tn+1) is d nj . With the 1 ๏ญ Pj 01 n consideration of the above points, the wireless network can be modeled as all pairs of the nodes are linked with a delivery probability assigned. In order to avoid the interference to the PS, CRN links are available under idle duration of PS that DSA can effectively fetch such opportunities, after successful spectrum sensing. Link available period in CRN is in the range of mil-seconds which gives CRN topology to be random even under all nodes being static. We model the system according to the time slotted perspective. In each time slot, PS would appear for the transmission with a probability. Once the action is happened, it would hold until the end of the slot. It means if the action taken by PS is not showing up, the whole slot is available for CR’s use without being interrupted from PS’s traffic. An embedded continuous-time Markov chain with the rates obtained from the statistics of spectrum measurement is considered. The state transition diagram of the jth link in the nth time interval [tn,tn+1) is shown in Fig. 10. We formulate the available probability of the jth link in the nth time interval [tn,tn+1) following a Bernoulli process as ๏ฐ nj ๏ฝ Pjn10 1 (Available) R1 B. HARQ [ๆญๆฐธไฟ] In [1][18][24], coded cooperation HARQ scheme is introduced. It integrates the idea of cooperative communication and HARQ. Incremental redundancy is generated through cooperative relay in order to exploit spatial diversity. Bidirectional link is assumed in the above scheme. In cognitive radio network, however, there exist a lot of unidirectional links due to avoiding interference with primary users. Link level HARQ based on feedback channel is frustrated. We now introduce the new idea of session level HARQ. Error control is performed at session level (end-to-end) between the source and the destination. We generate a coded packet from a message packet at the source and divide the coded packet into many coded sub-packets. Then, they are sent over different paths. Decoding is only performed at destination by combining coded sub-packets that it has received. Link level error control (acknowledgement between each link) is avoided. Each intermediate node amplifies and forwards packets to next hop along its predetermined routing path. A session level ACK (NACK) is only generated by the destination provided that the origin message is (isn't) successfully recovered. In the following subsections, link/path model and performance analysis are provided. 30% 85% 10% Source 70% 30% Destination 30% 0 (Unavailable) Fig. 10. State transition diagram of opportunistic link. 90% 30% n n R2 90% 1 ๏ญ P j1 0 P j1 0 (26) Pjn01 ๏ซ Pjn10 n Pj 01 70% (1). Link and path model We assume that there exist K link-disjoint paths between the source and the destination. Each path i, 1 ≤ ๐ ≤ ๐พ, has ๐๐ − 1 intermediate nodes. Each link between a pair of node is modeled as an independent slow flat Rayleigh fading channel. The received signal at node ๐ ๐,๐ is ๐ฆ๐,๐ = โ๐,๐ ๐ฅ๐,๐−1 + ๐ง๐,๐. Channel gain โ๐,๐ is Rayleigh distributed. ๐ฅ๐,๐−1 is the signal generated from the previous hop ๐ ๐,๐−1 . ๐ง๐,๐ is independent zero-mean additive white Gaussian noise with variance ๐0 /2 . Each intermittent node amplifies and forwards the received R3 Fig. 9. Network model of the wireless ad hoc network for opportunistic routing. 13/15 signal subject to the same signal power constraint ๐ธ๐ . So, the signal generated ๐ธ 2 by node ๐ ๐,๐ will be ๐ฅ๐,๐ = ๐ผ๐,๐ ๐ฆ๐,๐ , ๐ผ๐,๐ = 2 ๐ , ๐ผ๐,๐ is the amplifying โ๐,๐ ๐ธ๐ +๐0 /2 2 coefficient. The per hop received SNR is defined as ๐พ๐,๐ = โ๐,๐ ๐ธ๐ /๐0 . It is exponential distributed with mean ฬ ฬ ฬ ฬ ๐พ๐,๐ . The equivalent end-to-end SNR ๐พ๐๐ ๐ of path i is [19], ๐ ๐ ๐พ๐๐๐ = [∏๐=1 (1 + 1 ๐พ๐,๐ −1 ) − 1] ,1 ≤ ๐ ≤ ๐พ (27) The probability density function of ๐พ๐๐ ๐ is difficult to evaluate and we use the bound ๐พ๐๐๐ < ๐พ๐ ๐ = min(๐พ๐,1 , ๐พ๐,2 , … , ๐พ๐,๐๐ ). ๐พ๐ ๐ is exponential distributed with mean 1 ๐พ๐ ๐ = 1 1 ฬ ฬ ฬ ฬ ,1 ≤ ๐ ≤ ๐พ (28) 1 + +โฏ+ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ฬ ๐พ๐,1 ฬ ฬ ฬ ฬ ฬ ฬ ๐พ๐,2 ๐พ๐,๐๐ Fig. 11. Packet error rate with K = 2; 4; 6; 8; 10 corresponds to different degree of path diversity. (2) Coding scheme We assume the rate of the code is ๐ ๐ . Message packet size is ๐ bits. Coded packet size is B = W/๐ ๐ bits. We divide the coded packet into K coded subpackets and they are transmitted over K different paths. The coded sub-packets are received, combined and decoded at the destination. The pairwise error probability between two codewords can be evaluated as ๐(๐|๐พ๐1 , ๐พ๐2 , … , ๐พ๐๐พ ) = ๐(√2๐1 ๐พ๐1 + 2๐2 ๐พ๐2 + โฏ + 2๐๐พ ๐พ๐๐พ ). d is the Hamming distance between the transmitted codeword and the codeword obtained after decoding. ๐๐ is the portion of Hamming distance contributed from the i’th part of the codeword transmitted through path i, 1 ≤ ๐ ≤ ๐พ, and ๐ = ๐1 + ๐2 + โฏ + ๐๐พ . The unconditional pairwise error probability can be evaluated as ๐ −1 −1 ๐1 ฬ ฬ ฬ ฬ ๐พ๐ ๐๐พ ฬ ฬ ฬ ฬ ฬ ๐พ๐ ๐พ 1 2 ๐(๐) = ∫ (1 + 2 1 ) … (1 + ) ๐๐ ๐ 0 sin ๐ sin2 ๐ 1 1 1 ≤ ( )…( ) (29) 2 1 + ๐1 ฬ ฬ ฬ ฬ ๐พ๐ 1 1 + ๐๐พ ฬ ฬ ฬ ฬ ฬ ๐พ๐ ๐พ 6. Cognitive Network Selection [้ญๆฌฃๆ] The concept of cooperative relay can be applied to heterogeneous radio access technologies (RATs)/networks to generally network cognitive radios and nodes in coexisting primary networks. Under this generalization, cognitive radio faces a new challenge to select an appropriate radio access network among heterogeneous RATs, to form cooperative relay. In other words, a cognitive radio has to select an appropriate channel, among multiple access points of multiple radio access networks, rather than opportunistic access a traditionally specific link in a specific primary system. To achieve the above goals, the network selection among various radio access technologies/networks must provide service continuity and Quality of Service (QoS) guarantees. The existing solutions [17][25] suggest mobile user to gain knowledge about all heterogeneous RATs in the area of interest through the negotiation to facilitate the selection. Specifically, mobile user should know the available bandwidth of surrounding access points to prevent the connection after selection being dropped due to resource deficiency. With distributed spectrum sensing among multiple systems and cooperation, cognitive radios can detect the availability of channels of different RATs and select the most appropriate We can see that diversity gain of order K is achieved. In figure 11, the message packet is coded with convolutional code with rate 1/2 and the performance with different number of paths is shown. 14/15 one according to the gathering information without negotiation between access points and thus performance of selection is enhanced. delay. After CR periodically makes a network selection decision, CR updates location information or establishes security associations with a target access point in the execution phase. Fig.12 clearly represents a mobile-initiated cognitive network selection by utilizing messages and protocols defined in 802.21[8]. In this figure, the operation is divided into four phases: initiation [6], sensing and reasoning, decision, and execution phases. In the initiation phase, the CR subscribes two MIH events for the link parameters report on the serving access point (1). In particular, CR configures threshold on the serving access point to report radio measurement when specific thresholds are crossed (2). The type of this measurement report may indicate an urgent request or just a periodic informational message. Then CR may detect one of surrounding access points through (3) and adds it into selection candidates. MIH user Mobile User MIHF Serving RAT Non-serving RAT Serving Access Point Remarks: It is obvious that the proposed cognitive network selection in CR outperforms the existing ones without spectrum sensing capability in terms of signaling delay and overhead. As shown in Fig. 10, the explicit negotiations between access point and user are omitted and thus signaling delay and overhead can be minimized. 7. Conclusion Non-serving Access Point Initial Phase 1. MIH_Event_Subscribe Confirm 2. MIH_Link_Configure_Thresholds Confirm 3. MIH_Link_Detected Reference [1] A. Nosratinia, T.E. Hunter, A. Hedayat, “Cooperative communication in wireless networks,” Communications Magazine, IEEE , Volume 42, No.10, October 2004, Page(s): 74-80. [2] B. Etkin, A. Parekh, and D. Tse, “Spectrum Sharing for Unlicensed Bands,” Proc. IEEE DySPAN, May, 2005. [3] Cheng-xiang Wang, Hsiao-hwa Chen, Xuemin Hong, M. Guizani, “Cognitive radio network management,” Vehicular Technology Magazine, IEEE, Volume 3, Issue 1, March 2008, Page(s):28 – 35. [4] C. K. Yu and K. C. Chen, "Radio resource tomography of cognitive radio networks," IEEE Proc. VTC, April 2009. [5] D. Niyato and E. Hossain, “Competitive Spectrum Sharing in Cognitive Radio Networks: A Dynamic Game Approach,” IEEE Transactions on Wireless Communications, Volume 7, No. 7, July 2008, Page(s):2651-2660. [6] G. Lampropoulos, A. K. Salkintzis, and N. Passas, “Media-independent handover for seamless service provision in heterogeneous networks,” Communication Magazine, IEEE, Volume 46, No. 1, January 2008, Page(s): 64–71. [7] H. E. Lai, H. Gamal, Jiang, and H.V. Poor, “Cognitive Medium Access: Exploration, Exploitation and Competition,” arXiv, October 2007. 4. MIH_Link_Parameters_Report 5. MIH_Link_Get_Parameters.request CR 5. MIH_Link_Get_Parameters.respond 5. MIH_Link_Get_Parameters.respond Sensing and Reasoning Phase MIH_MN_HO_Candidate_Query.request Traditional User MIH_MN_HO_Candidate_Query.request MIH_MN_HO_Candidate_Query.respond MIH_MN_HO_Candidate_Query.confirm Decision Phase Execution Phase Fig. 12. Message flow of cognitive network selection. When CR receives the first link indication (4) reporting that the RSS of serving access point is below thresholds setting in (2), it enters the sensing and reasoning phase to obtain and estimate the system parameters through every access point (5). On the other hand, legacy user only obtains the information by querying serving and candidate access points, which introduces significant 15/15 [8] IEEE, “IEEE Standard for Local and Metropolitan Area Networks Part 21: Media Independent Handover Services,” IEEE Std 802.21-2008, Jan. 2009. [9] I. Akyildiz, W. Lee, M. Vuran, and S. Mohanty, “Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Network, Volume 50, No. 13, September 2006, Page(s):2127-2159. [10] Jeonghoon Mo, H.-S.W. So, J. Walrand, “Comparison of Multichannel MAC Protocols,” Mobile Computing, IEEE Transactions on, Volume 7, No.1, January 2008, Page(s):50-65. [11] K.C. Chen, R. Prasad, Cognitive Radio Networks, Wiley, 2009. [12] K. C. Chen, Y. C. Peng, B. K. Centin, N. Prasad, J. Wang, and S. Y. Lee, "Routing of opportunistic links in cognitive radio networks," to appear in the Wireless Communication and Mobile Computing. [22] Q. Zhao and B.M. Sadler, “A Survey of dynamic spectrum access: A medium access control approach,” Signal Processing Magazine, IEEE , Volume 24, No. 3, May 2007, Page(s):79-89. [23] S. A. Jafar and S. Srinivasa, "Capacity limits of cognitive radio with distributed and dynamics spectral activity," IEEE Journal on Selected Areas in Communications, volume 25, No. 3, April 2007, Page(s):529-537. [24] T.E. Hunter, A. Nosratinia, “Diversity through coded cooperation,” Wireless Communications, IEEE Transactions on, Volume 5, No.2, February 2006, Page(s):283-289. [25] X. Gelabert, J. P´erez-Romero, O. Sallent, and R. Agust´ฤฑ, “A markovian approach to radio access technology seection in heterogeneous multiaccess/multiservice wireless networks,” Mobile Computing, IEEE Transaction on, Volume 7, No. 10, October 2008, Page(s): 1257–1270. [13] K. C. Chen, P. Y. Chen, N. Prasad, Y. C. Liang, and S. Sun, "Trusted cognitive radio networking," to appear in the Wireless Communications and Mobile Computing. [14] K.-C. Chen, “Medium access control of wireless LANs for mobile computing,” Network, IEEE, volume 8, No. 5, Sep/Oct 1994, Page(s): 50-63. [15] L. Cao, H. Zheng, “Distributed spectrum allocation via local bargaining,” SECON, September 2005, Page(s):475-486. [16] M. Weiser, The computer for the 21st century. Scientific American, September 1991, Page(s): 94–104. [17] M. Liu, Z. Li, X. Guo, and E. Dutkiewicz, “Performance analysis and optimization of handoff algorithms in heterogeneous wireless networks,” Mobile Computing, IEEE Transaction on, Volume 7, No. 7, July 2008, Page(s): 846–857. [18] M. Janani, A. Hedayat, T.E. Hunter, A. Nosratinia, “Coded cooperation in wireless communications: space-time transmission and iterative decoding,” Signal Processing, IEEE Transactions on, Volume 52, No.2, February 2004, Page(s): 362-371. [19] M.O Hasna, M.S. Alouini, “End-to-end performance of transmission systems with relays over Rayleigh-fading channels,” Wireless Communications, IEEE Transactions on, Volume 2, No.6, November 2003, Page(s):1126-1131. [20] N. Devroye, M. Vu, V. Tarokh, “Cognitive radio networks,” Signal Processing Magazine, IEEE, Volume 25, Issue 6, November 2008, Page(s):12 – 23. [21] Qian Zhang, Juncheng Jia, Jin Zhang, “Cooperative relay to improve diversity in cognitive radio networks,” Communications Magazine, IEEE, Volume 47, Issue 2, February 2009, Page(s):111 – 117. 16/15