Simulating the Cognitive Networks Using Cloud to Solve Hidden Terminal Problem Presented By: Stephen Ellis Advisor Dr. Yenumula B. Reddy Department of.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
By: Gamal El Din Fathy Amin Ahmed Ossama El Fiky Supervised By: Dr Tarek El Naffouri.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Cognitive Radio Networks
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
Cognitive Radio: Next Generation Communication System
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Static Spectrum Allocation
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Universität Karlsruhe Institut für Telematik ECE 591
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Medium Access Control in Wireless networks
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
MAC Protocols for Sensor Networks
A discussion on channel sensing techniques By James Xu.
The University of Adelaide, School of Computer Science
Communication Networks: Technology & Protocols
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Wireless LANs Wireless proliferating rapidly.
Cognitive Radio Based 5G Wireless Networks
Channel Allocation (MAC)
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Cognitive Radio Networks
Protocols.
Protocols.
Presentation transcript:

Simulating the Cognitive Networks Using Cloud to Solve Hidden Terminal Problem Presented By: Stephen Ellis Advisor Dr. Yenumula B. Reddy Department of Computer Science, Grambling State University

Overview Objectives and Requirements Introduction Statement of Problem (Eliminating Hidden Terminal Problem by introducing Cloud Application) Applications Simulation Results Future Work Department of Computer Science, Grambling State University

Objectives and System Requirements Objective Understand and model a Cognitive Radio Network in Cloud Application Requirements: Linux Ubuntu Operating System (12.04 – Precision) XAMP (including PHPAdmin) Eclipse (PyDev) Python Department of Computer science, Grambling State University

Introduction What is a Cognitive Radio? Cognitive Radio (CR) is an intelligent transceiver to detect the available channels in wireless spectrum. Cognitive Radio helps to improve the spectrum utilization to meet the needs of users. The detection of spectrum, adjusting its parameters, and efficient utilization, is also called dynamic spectrum management. This operation or process includes:  spectrum sensing  spectrum management  spectrum sharing  spectrum mobility Cognitive radio can sense and understand its environment and use that knowledge to serve users better. Department of Computer Science, Grambling State University

Introduction Cognitive Radio Network A Cognitive Radio Network (CRN) is a group of cognitive radios connected to verify the concepts, algorithms, and protocols. The CRN improves the performance ofspectrum utilization and helps smooth transmissiontransfer of packets. The tools for total functionality require a significant amount of computing resources in a real time environment. CRN uses knowledge representation, machine learning, genetic algorithms, and game theory techniques for efficient resource (spectrum) utilization. This is referred to as an existing network, where the primary users (PUs) have a license to operate in a certain spectrum band. This does not have a license to operate in a desired band. Hence, additional functionality is required for CR users to share the licensed spectrum band. Also, CR users are mobile, and can communicate with each other in a multi-hop manner on both licensed and unlicensed spectrum bands. Department of Computer Science, Grambling State University

Introduction Cognitive Radio Network with Cloud (CRNC) CRNC Model CR has limited storage capacity and computing capabilities. Connectivity The detection, of unused spectrum (spectrum holes) and efficient allocation, needs the support of machine learning algorithms, protocols, and security policies. Cloud application stores, processes, and makes decisions. These capabilities help the CR at node (mobile or fixed) level to overcome the basic needs (challenges) such as battery power. Department of Computer Science, Grambling State University

RTS/CTS IEEE RTS/CTS - Request to Send/Clear to Send is also known as “virtual carrier sensing” and is one of the two mechanisms used by the wireless networking protocol to reduce frame collisions or inference introduced by the hidden node problem. Drawbacks: The effectiveness of RTS/CTS handshake is based on the assumption that hidden nodes are within transmission range of receivers. The “virtual carrier sensing” implemented by RTS/CTS handshake cannot prevent all interferences. Department of Computer Science, Grambling State University

Hidden Terminal Problem The hidden terminal problem occurs when a node is visible from the access point but cannot communicate to the nodes within communication distance. For example, a user tries to transmit the information from node A to node C. The node A cannot hear the transmission from node C by sensing the medium. Similarly, node C cannot sense the transmission from node A; therefore, they try to communicate and collide at node B. Department of Computer Science, Grambling State University

Hidden Terminal Problem In the beginning, the node A assumes that channel 2 is free. Once the packet reaches node Bit understands that node C is in communication with node D for channel 2. That is node C sends the request for communication (RTS: request to send) to node B for channel 2. The node, B - waits to get the signal clear to send (CTS) from node C for channel 2. Both nodes are waiting for channel 2 at node B and cannot move further. The RTS/CTS mechanisms implemented in the MAC (medium access control) protocol helps to eliminate the hidden terminal problem with time overhead. If nodes C and B are synchronized with the same packet size and data rate, RTS/CTS can work. If the nodes are not synchronized, the neighboring node may not hear the CTS during transmission and exposed terminal problem may occur. Department of Computer Science, Grambling State University

Applications Application areas Multimedia, Military, Consumer cellular, Emergency and public safety networks Capabilities CR can sense its environment, and without the intervention of the user, can adapt to the user's communications needs while conforming to Federal Communications Commission (FCC) rules in the United States. CR has the ability to adapt to real-time spectrum conditions, offering regulators, licenses and the general public flexible, efficient and comprehensive use of the spectrum A CR can intelligently detect whether any portion of the spectrum is in use, and can temporarily use it without interfering with the transmissions of other users. Department of Computer Science, Grambling State University

Simulation Packet Transfer in Cloud Application Packet travelling to the cloud from node Packet travelling to the node from cloud Packet travelling from a node to another node Primary user packet Node Cloud Describes the system activity Graphical simulation of system activity Key Department of Computer Science, Grambling State University

Using IEEE RTS/CTS, if the channels are not available at the middle of the transfer or sudden entrance of the primary user, the packet loss may happen. The CRNC Interface tries to reassign the transmission of the packet to another channel if available. The CRNC Interface allows the packet to be buffered in the cloud until it is able to forward the packet to destination. Sudden Entry of Primary User No packet loss Problem of Sudden Entry of Primary User Department of Computer Science, Grambling State University

Packet travelling to the cloud from node Packet travelling to the node from cloud Packet travelling from a node to another node Primary user packet Node Cloud Key Primary User entered system Assumption: When Primary User enters, it occupies two channels to prevent inference or any disturbance to ensure successful communication and transmission The cloud allows for the packet that was originally scheduled for channel 2 on node 7 to be reassigned to channel 3 The Primary User, takes the channels it needs unconditionally because of its high priority Department of Computer Science, Grambling State University Simulation Sudden Entry of Primary user – Reassign Channel

Simulation Sudden Entry of Primary user - Cloud Buffering Packet travelling to the cloud from node Packet travelling to the node from cloud Packet travelling from a node to another node Primary user packet Node Cloud Key Packet being sent to cloud since there is no free channels for transmission Assumption: When Primary User enters, it occupies two channels to prevent inference or any disturbance to ensure successful communication and transmission Instances where there is no free channel, packets are sent to the cloud and forwarded to the destination when able The Primary User frees the channels it occupied after it is finished transmitting Packet being sent to node after being buffered till open channel is available Department of Computer Science, Grambling State University

Results & Future Work In the proposed CRNC structure, the interface is connected to CRN nodes and CRNC. This framework solves the issues affecting the original IEEE RTS/CTS as proven by the simulations conducted. The future research includes : Security issues of Cloud application Node failures that affect network reliability and robustness Steps to address cloud failure (level of backup requirements) Eliminate overheads of RTS/CTS in IEEE protocol using cloud application Real-time response for channel analysis using Graphics processing Unit (GPU) – a problem of High Performance Computing Department of Computer Science, Grambling State University

References and Acknowledgement Yenumula B. Reddy, “Solving Hidden Terminal Problem in Cognitive Networks Using Cloud Application,” SENSORCOMM 2012, August , Rome, Italy. Kaixin Xu, Mario Gerla, and Sang Bae., “How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks?,” Global Telecommunications Conference (GLOBECOM '02), November 2002, Los Angels, CA, USA. Acknowledgement Dr. Connie Walton, Provost & Vice President for Academic Affairs, Grambling State University for her continuous support. Questions?? Department of Computer Science, Grambling State University