A Location-Aided Routing Protocol for Cognitive Radio Networks

6 downloads 466 Views 387KB Size Report
link-state based routing protocol that floods the network with messages as in traditional ad hoc networks. Such solutions incur a high control overhead.
A Location-Aided Routing Protocol for Cognitive Radio Networks Karim Habak, Mohammed Abdelatif, Hazem Hagrass and Karim Rizc

Moustafa Youssef

Department of Computer Science and Engineering Egypt-Japan Univ. of Sc. and Tech. (E-JUST), Alexandria, Egypt Emails: {karim.habak,abdollatif,hazem.hagrass,karim.rizc}@ejust.edu.eg

Wireless Research Center Alexandria University and E-JUST, Egypt [email protected]

Abstract—Multi-hop cognitive radio networks (CRNs) are gaining interest recently in many practical applications. With location information becoming more available, designing location-aware routing protocols that fit the nature of CRNs becomes a necessity. We present LAUNCH as a location-aided routing protocol for CRNs that has a set of desirable properties: efficient use of the common control channel, has a minimal route setup delay, prefers stable routes, handles primary users heterogeneity, and handles secondary users mobility. LAUNCH is based on four main concepts: (1) a novel locationaware CRN routing metric that takes into account the PUs activity; (2) distributed calculations at the neighbors; (3) a channel locking mechanism to achieve the route stability and minimize channel switching time; (4) an efficient route maintenance strategy. Evaluation of LAUNCH on the NS2 simulator shows that its performance significantly outperforms the current state-of-the-art CRNs routing protocols in terms of end-to-end delay and packet loss rate. In addition, LAUNCH incurs a low control overhead with a fast route establishment delay.

I. I NTRODUCTION Cognitive Radio Networks (CRNs) have been proposed as a means for increasing the utilization of licensed spectrum and providing non-licensed users (i.e. secondary users (SUs)) with opportunities to have access to bandwidth that is otherwise unavailable. Recently, multi-hop CRNs have gained attention as a way for providing new services such as cognitive wireless mesh networks [1] and cognitive radio adhoc networks characterized by a completely self-configuring architecture [2]. Designing efficient routing solutions for such networks that minimize the control overhead on the common control channel (CCC) used for synchronization and maximize the network performance becomes a challenge. Current routing protocols for CRNs can be classified, based on their network state maintenance strategies, as limited scope or global [3]. The majority of protocols that maintain limited scope network state exchange state information with a limited set of nodes in an on-demand manner. These protocols usually employ a form of on-demand route discovery procedure commonly used in traditional adhoc networks. For example, [4], [5] are based on modifications to the AODV routing protocol. Consequently, the local state information is delivered to the destination node when there is a demand for establishing a new path. However, these systems usually require a large number of control packets to reach the destination, as the discovery packets are broadcast through the network, and incur some delay in route establishment. Global network state maintenance based protocols, e.g. [6], [7], propose to use a

link-state based routing protocol that floods the network with messages as in traditional ad hoc networks. Such solutions incur a high control overhead. In this paper, we propose LAUNCH as a location-aided routing protocol for CRNs where location information is used to guide route discovery, maintenance, and data forwarding. Packet forwarding decisions at a node are based on the geographical position of the packets destination as well as the positions of the nodes immediate neighbors. Therefore, there is no need for discovering and maintaining explicit routes, reducing communication overhead and state information at each node. Hence, location-aided routing protocols do scale well, especially when the network is highly dynamic. Moreover, many of todays wireless devices are location-enabled and this is expected to become more ubiquitous in the future. Adding to these advantages the fact that location information of CRN nodes can be obtained via FCC Geolocation-Databases [8] or estimated via measurements [9] accurately, these features make location-aided protocols attractive for CRNs. Although, location-aided routing has been previously investigated in the context of ad-hoc networks [10], applying it in the context of CRNs has its own challenges, particularly the heterogeneity of the network (having two classes of nodes: PUs and SUs) with preferential treatment to PUs, optimizing path selection based on the availability of multiple channels, and the tight coupling between the routing and the spectrum management functionalities at the PHY/MAC layers. The closest work to ours in literature is SEARCH [11]. However, it does not take the stochastic activity of PUs into account which makes it select unstable routes at some points. In addition, route selection is performed at the destination, which introduces initial delay at route establishment. Evaluation of LAUNCH on the NS2 simulator shows that in typical operation scenarios of heterogeneous PUs and high SUs mobility, its performance significantly outperforms the current state-of-the-art CRNs routing protocols in terms of end-to-end delay and packet loss rate. In addition, LAUNCH incurs a very low control overhead and provides fast route establishment. The remainder of this paper is organized as follows. Section II presents the details of LAUNCH. We evaluate LAUNCH in Section III. Finally, Section IV concludes the paper and provides directions for future work.

II. T HE LAUNCH P ROTOCOL Compared to the current CRN routing protocols, LAUNCH not only handles the PUs when they are active, but also selects routes that are expected to be more stable, i.e. with less PUs activity. This is inspired by the observation that a CR user usually establishes a connection to the destination and therefore, requires a stable route to this destination. So even though a route may be currently promising, it may be less attractive if it will be available for a short time due to the PUs activity. Therefore, LAUNCH prefers stable routes over short-lived ones. Similar to traditional location-aided routing protocols, it performs greedy routing to the destination based on its location. A node selects one of the direct neighbors that are closer to the destination than itself to forward the packet to. However, rather than selecting the node that is closest to the destination, it selects the node that has a more stable route to the destination, based on the PUs expected activity and the available channels. LAUNCH has four main salient features: (1) It uses a novel CRN and location-aware routing metric that take into account the PUs activity; (2) It performs distributed calculations at the neighbors, as compared to centralized computation at the source node; (3) It relies on a channel-locking mechanism to achieve the route stability and minimize channel switching time; (4) It has an efficient route maintenance strategy. We explain the details of the protocol in the next subsections. A. System Model We consider a cognitive radio network that consists of a set of static Primary Users (PUs), such as the case of white spacebased CRNs, that hold the right to use a licensed portion of the spectrum and a set of Secondary Users (SUs) that may access this licensed spectrum without affecting the operation of the PUs. Since PUs own the rights to use the spectrum, their operations must not be disturbed by the presence of SUs. Hence, we model the transmission ranges of SUs as circles and do not allow SUs in the “interference range” of a PU to operate when the PU is active (i.e., interweave model). For modeling the PUs’ activities, we adopt the commonly used two-state ON-OFF birth-death process model, where the PU can either be active (ON) or inactive (OFF). The length of the ON and OFF periods follows two independent exponential distributions with different parameters depending on the traffic of the PUs. We also assume that the secondary user (SU) uses a CCC to exchange routing parameters. The CCC can be implemented either via a dedicated hardware, time-shared over the main transceiver hardware, or through allocation of control time slots or other in-band techniques. Two radios are used as data transceivers (one for transmission and the other for reception) which can be tuned to any channel of the licensed bands (those on which PUs operate). In addition, each SU node is capable of adapting the signal strength of its transmission to the distance separating it and the receiver to further optimize energy consumption. All SUs are assumed to be mobile. Each SU knows its own location as well as the location of its direct neighbors. In addition, it can know the location of

the destination SU it wants to communicate with. This last information can be obtained through out-of-band means or disseminated through the network. Finally, the number of PUs in range can be estimated by a SU based on passive sensing. Also their distribution parameters are assumed to be known through estimation. Finally, We assume that PUs are stationary. B. Routing Metric and Forwarding Strategy Choosing a good routing metric is crucial for the performance of a routing protocol. The routing metric is used to select one of the neighbors in a greedy manner as a next hop for the packet. Standard routing metrics for location-aided routing, e.g. GPSR [12], use the distance between the neighbor and the destination as a metric and select the neighbor that is closest to the destination as a next hop. Although this reduces the instantaneous end-to-end delay, it fails to capture the stability of the route, which may introduce significant delays if a PU along the path becomes active and requires a rerouting event. Instead, LAUNCH uses a delay-based metric that selects the neighbor that satisfies two conditions: 1) It is closer to the destination than the current node (greedy forwarding criterion) and 2) It has the lowest expected delay from the current node based on route stability (minimum delay criterion). The greedy forwarding criterion guarantees that we are always getting closer to the destination. On the other hand, the minimum delay criterion takes into account the stability of the route by estimating the additional delay that will be encountered if a PU becomes active and rerouting is needed. More formally, consider two nodes Src and Dst. The proposed metric estimates the delay (T ) between the two nodes as: TP rop + TSwitchs T = 1 − PActive Where: • TP rop : is the propagation time between the two nodes which is calculated as the summation of the propagation time between the current node and its neighbor plus the propagation time between the neighbor and the destination. This can be calculated from the nodes coordinates and represents the greedy location based component of the routing decision, as it depends on the geographic location of the nodes. • TSwitch : is the channel switching time which is a function of the difference of frequencies between the channels the Src and Dst nodes are currently working on and the channel which they will use. This term reflects the first component of the CRNs nature which is the awareness of the presence of multiple channels, and the ability to choose from them. As we show later, the channel locking mechanism employed by LAUNCH make this term typically zero, except for rerouting events, reducing the switching time overhead significantly. • PActive : is the probability that at least one PU that affects the link between Src and Dst will become active during a predefined time period τ . Higher values of parameter τ represent higher path stability. Based on our system model, since the PU is modeled as a two-state ON-OFF birth-death process with parameters λi and µi representing the parameters of the exponential distributions P innthe ON and OFF periods respectively, PActive = 1 − e−τ i=1 µi

SU2

SU2

PU Src

SU2

PU

PU RREQ

PU

PU SU1

Dst

SU1 Src RCONF

Dst

Src SU4

SU3

PU

PU

PU

RREP SU1

PU

SU2

SU1 Src RACK

Dst

PU

PU

PU

SU4

SU4

SU4

SU3

SU3

Dst

SU3

(a) Node broadcasts RREQ to neigh- (b) Only neighbors closer to Dst reply (c) Node selects the best neighbor and (d) Selected neighbor locks channel bors with best/locked channel RREP) sends CONF and confirms RACK) Fig. 1. Operation of LAUNCH’s locally-distributed locking-based route setup.

1) Route Setup: A node using a traditional multi-channel routing protocol in CRNs selects the best outgoing route on a per packet basis. Accordingly, a channel switch can occur on a per packet basis which incurs channel switching delays and reduces the route stability. In addition, it has a high overhead over the CCC as nodes have to coordinate their channel switching. On contrast, LAUNCH makes each node work on only one channel for sending and another for receiving with the ability to change the channel as needed. This approach has the advantage of increasing the route stability, reducing computational power, and reducing the channel switching time. In addition, it reduces the overhead of route maintenance when rerouting is required, as explained in Section II-B2. For this method, route establishment can be locally distributed and follows the following steps (Figure 1). 1) When a node wants to select one of its neighbors for packet forwarding, it broadcasts to its first hop neighbors an RREQ packet containing its ID, location, timestamp, number of PUs that affect the communication of the requesting node, and their distribution parameters which are assumed to be known according the system model. 2) Each neighboring node, closer to the destination than the requesting node, upon receipt of an RREQ packet, calculates the routing metric, based on its local information including its own number of neighboring PUs, propagation delay and the minimum switching delay, and sends back to the requesting node an RREP packet containing the calculated metric and the preferred channel. 3) The requesting node waits for a certain time to collect RREP packets and selects the neighbor with the best metric as its next hop for this connection. 4) The requesting node sends a route confirm packet (RCONF) to the selected neighbor. 5) Upon receipt of the RCONF packet, the neighboring node locks the selected channel as its operating channel, if no other node is using it, or increases its lock count. It then transmits back a route acknowledgment packet (RACK) confirming the path. 6) If two or more nodes start this process at the same time on different channels, the node can send a negative acknowledgment packet (RNACK) to deny the request of some nodes. These nodes can select other nodes as their next hop.

Note that once locked on a channel, the node can include its transmission channel in the RREQ packet. Only neighbors operating on this channel reply, further reducing the overall consumed power in the network. Similarly, a locked neighbor always reply with its locked channel, but with its current calculated metric. Note that this makes the channel switching time typically zero for the locking-based method for the majority of packets. The node only needs to calculate the channel switching time on the event of re-routing. This leverages the fact that neighboring nodes has similar channel conditions and should operate on similar channels to minimize overhead. All routes establishment are treated as soft state: a route is allocated for a certain time parameter(δ). After this time, unless the route is refreshed, the route is considered invalid. This reduces the overhead in the route maintenance phase as described in Section II-B2. Upon route expiration, the node reduces the lock count for this channel, declaring that the route is no longer valid. When the lock count reaches zero, the node can change its allocated channel. Small values of the parameter δ allow for a shorter locking time and thus a node can change its channel more frequently but at the expense of reducing route stability and possibly increasing the CCC traffic. δ = 0 leads to the traditional routing per packet approach. routing minimum (routing holes), such as perimeter forwarding [12], when forwarding cannot be continued because there are no neighboring nodes that are closer to the destination than the sending node. 2) Route Maintenance: Route maintenance is initiated due to PUs activity, node mobility, and/or node failure. 3) PU Avoidance: LAUNCH reduces the frequency of route update events due to PUs activity by basing its routing metric on route stability as discussed in Section II-B. In addition, each node saves additional next hop information it receives in the RREP packets. However, PUs becoming active on an established route is inevitable due to the stochastic nature of the PUs activities. When a PU becomes active, all SUs within its transmission range and acting on the same channel become inactive. The following procedure is activated: • On such event, each affected node calculates the routing metric for the different available channels and selects a channel that has the best average metric for all connections passing through it (based on nodes locations, channel switching time, and current status of other PUs). • Since all of these connections were using the same channel,

Parameter Number of PUs PU interference range (m) µactive µnormal Number of SUs SU transumption range (m) Data rate (Kbps) Number of active connections Number of channels Channel switching time (ms) Frequency (GHz) Effective bandwidth (Mbps) Packet Size (KB) Area size τ (sec) Maximum SUs speed(m/s)

Value range 0, 2, 4, 16 300 ∈ Uniform[1, 3] ∈ Uniform([1, 3], [3, 5], [5, 7], [7, 9], [9, 11]) 100, 200, 300, 400 125 200 1, 2, 4, 8, 16 2 5 2.4 2 1.5 1000m×1000m 1 0, 2, 4, 6, 8

Nominal Value(s) 4 300 ∈ Uniform[1, 3] ∈ Uniform[7, 9] 200 125 200 2 2 5 2.4 2 1.5 1000m×1000m 1 4

the affected node needs only to broadcast one packet (RUPDATE) containing the new available channel on the CCC. Optionally, the affected node can include in the RUPDATE packet the metric value for all the nodes using it. • Upon reception of the RUPDATE packet, the sending node can switch its channel to the new channel. If the routing metric is not suitable for one node, it can start a new route discovery process. Note that the node does not need to release the old path as the soft state will expire in the forwarding node. Note that using the proposed approach, only one packet is needed to reestablish the new routes, reducing the overhead on the nodes and on the CCC. 4) Node Mobility and Failure: Mobility of SUs leads to breaking established routes. A node that becomes out of range of its neighbors will be detected, e.g. by the link layer. In this case, affected nodes can start a limited route discovery starting from the affected node. Mobility models can be used to estimate the movement of the node to start the rerouting request before the path is completely broken, thus reducing the disruption due to route breakage. Note that routes passing through the mobile node will expire by themselves and thus no actions need to be taken to remove them. Nodes failure can be handled in the same way as node mobility. III. P ERFORMANCE E VALUATION In this section we evaluate the performance of LAUNCH via NS2 simulations. We start by describing our experimental setup followed by the results. We evaluate the effect of changing the different parameters on LAUNCH and compare it to well known CRN routing protocols protocols. A. Experimental Setup Table I summarizes the experimental parameters. We use the multi-channel multi-radio extension to NS2 [13] and adopt the PU ON-OFF model described in Section II-A where the means of the exponentially distributed active and inactive periods are randomly chosen (according to a uniform distribution). We have two types of PUs that differ in the length of their activity period: highly active (µactive ) and normal (µnormal). Both have a 50% duty cycle. Primary users are distributed uniformally over the available channels. We model the transmission

Number Of routing packets

TABLE I E XPERIMENTS PARAMETERS .

6000

CLCR AODV SEARCH LAUNCH

5000 4000 3000 2000 1000 0 0

Fig. 2.

200

400

600

800

1000

1200

Number of SUs

Routing overhead of the different CRNs routing protocols.

range of SUs as circles of adaptive transmission power with a maximum possible value of 125m. The interference range of a PU is set to 300m. SUs in the interference range of a PU are not allowed to operate (i.e., interweave model). The nodes are initially placed uniformly at random then move according to the random way point model. Each SU node is equipped with three radio interfaces and have omni-directional antennas and runs the IEEE 802.11 MAC protocol. The source and destination of each connection are selected randomly. Throughout our evaluation, we use the end to end delay, loss ratio and control packet overhead as our main metrics. B. Results We compare LAUNCH to a reactive AODV-like algorithm [14], a link-state based algorithm (CLCR [15]), and a locationaware CRN protocol (SEARCH [11]). Note that all these protocols do not model the stochastic activity of the PUs into account. SEARCH, however, avoids the area around the active PUs. 1) Routing overhead: Figure 2 shows the effect of increasing the number of SUs on the routing overhead. The figure shows that LAUNCH and SEARCH, being location-based, have the minimum overhead. The CLCR protocol, being linkstate based, periodically disseminates information about the current routes throughout the network which incurs significant overhead. This overloads the limited CCC and cannot react quickly to PUs dynamics and SUs mobility. Therefore, for the rest of this section, we focus on comparison with the reactive based protocols (excluding CLCR). 2) Impact of SUs density: Figure 3 shows that with increasing the number of secondary users, the performance of all protocols enhances because they have more opportunities to select routes. The slight performance advantage of AODV at a low number of SUs can be explained by noting that there are two factors that affect the performance of the routing protocols: the optimality of the chosen routes and the reaction to the activity of the PUs. For a low number of SUs, the number of routes discovered by the greedy location- aided routing protocols are limited, leading to a suboptimal performance compared to the AODV protocol that selects the best routes. As the number of SUs increases, the effect of reaction to the PUs activity dominates and the relative advantage of AODV is reversed. 3) Impact of the number of PUs: Figure 4 shows that as the number of PUs increases, the available capacity for SUs de-

0.15 0.1 0.05

3 2.5 2 1.5 1 0.5

400

0.2 0.15 0.1 0.05 0 2

500

0

4

8

3

4

16

(a) End-to-end delay 20

SEARCH AODV LAUNCH

Loss ratio (%)

1.5

1

0.5

5

6

7

8

9

10

15

10

5

0.2 0.1

1

2

3

4

5

6

7

8

Maximum node speed (m/s)

(a) End-to-end delay 1.5

SEARCH AODV LAUNCH

0.8

0.3

0

(a) End-to-end delay 1

SEARCH AODV LAUNCH

SEARCH AODV LAUNCH

0.4

0

Average µNormal

Number of PUs

(a) End-to-end delay 2

2

0.5

SEARCH AODV LAUNCH

SEARCH AODV LAUNCH

1.25

Loss ratio (%)

300

Number Of SUs

Loss ratio(%)

0.3 0.25

0 200

Loss ratio (%)

0 100

SEARCH AODV LAUNCH

3.5

End-to-End delay (sec)

0.2

End-to-End delay (sec)

4

SEARCH AODV LAUNCH

End-to-End delay (sec)

End-to-End delay (sec)

0.3 0.25

0.6 0.4 0.2

1 0.75 0.5 0.25

0 0 100

0 200

300

400

500

2 0

Number of SUs

(b) Loss ratio Fig. 3. Impact of SUs density.

2

4

8

16

Number of PUs

3

4

5

6

7

8

9

10

IV. C ONCLUSION We presented LAUNCH as a routing solution for CRNs that uses the available location information and PUs’ stochastic activity to enhance the operation of CRNs. Similar to traditional location-aided routing algorithms, LAUNCH performs greedy routing to the destination based on its location. However, rather than selecting the node that is closest to the destination, it selects the node that has a more stable route to the destination, based on the PUs’ expected activity and the available channels. Compared to the current CRN routing protocols, LAUNCH not only handles the PUs when they are active, but also selects routes that are expected to be more stable. We presented the details of LAUNCH and showed that the developed routing metric provides a robust packet delivery system with a low computational and network overhead and small end-to-end delay. LAUNCH significantly outperforms both traditional location-aware protocols and CRNs protocols in typical network scenarios of heterogeneous PUs activity and SU mobility. Currently, we are expanding LAUNCH in multiple directions including investigating other metrics that take into account the

1

2

3

4

5

6

7

8

Maximum node speed (m/s)

(b) Loss ratio (b) Loss ratio Fig. 4. Impact of the number of PUs. Fig. 5. Impact of PUs heterogeneity.

creases leading to degraded performance in terms of significant delays and loss ratio. LAUNCH, modeling the PUs activities, can maintain significant advantage over other protocols. 4) Impact of PUs heterogeneity: Figure 5 shows the effect of PUs heterogeneity on performance. As µnormal increases, the routes become more stable which enhances the performance of all protocols. LAUNCH performance significantly increases as it models the PUs stochastic activity. Similar to the analysis of the SUs mobility effect, AODV has a slight advantage when the network is more homogeneous in terms of the PUs activity as route optimality dominates the performance in this case rather than handling PUs activity. 5) Impact of SUs mobility: Figure 6 shows that increasing the SUs mobility degrades the performance of all protocols. LAUNCH, since it employers a local repair procedure, is less affected by mobility compared to the other two protocols that repair the route by contacting the destination.

0 0

Average µNormal

(b) Loss ratio Fig. 6. Impact of SUs mobility.

channel and node load, and combining the ad-hoc and lockingbased techniques. ACKNOWLEDGMENT This work is supported in part by a grant from the Egyptian National Telecommunications Regulatory Authority (NTRA). R EFERENCES [1] K. Chowdhury and I. Akyildiz, “Cognitive Wireless Mesh Networks with Dynamic Spectrum Access,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 168–181, January 2008. [2] I. Akyildiz, W.-Y. Lee, and K. Chowdhury, “CRAHNs: cognitive radio ad hoc networks,” Ad Hoc Networks (Elsevier), 2009. [3] M. Cesana, F. Cuomo, and E. Ekici, “Routing in Cognitive Radio Networks: Challenges and Solutions,” Ad Hoc Networks (Elsevier), 2010, doi:10.1016/j.adhoc.2010.06.009 (Article in Press). [4] G. Cheng, W. Liu, Y. Li, and W. Cheng, “Joint On-Demand Routing and Spectrum Assignment in Cognitive Radio Networks,” Proceedings of IEEE ICC 2007, June 2007. [5] H. Ma, L. Zheng, X. Ma, and Y. luo, “Spectrum Aware Routing for Multi-Hop Cognitive Radio Networks with a Single Transceiver,” Proceedings of IEEE CrownCom 2008, 2008. [6] H. Khalife, S. Ahuja, N. Malouch, and M. Krunz, “Probabilistic Path Selection in Opportunistic Cognitive Radio Networks,” Proceedings of IEEE GLOBECOM 2008, 2008. [7] M. Pan, R. Huang, and Y. Fang, “Cost design for opportunistic multi-hop routing in cognitive radio networks,” IEEE MILCOM, 2008. [8] Federal Communications Commission, “FCC Adopted Rules for Unlicensed Use of Television White Spaces,” Tech. Rep. ET Docket No. 04-186, Second Report and Order and Memorandum Opinion and Order, 2004. [9] M. Ibrahim and M. Youssef, “CellSense: A Probabilistic RSSI-based GSM Positioning System,” Proceedings of IEEE Globecom, 2010. [10] M. Mauve, A. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc networks,” Network, IEEE, vol. 15, no. 6, pp. 30–39, 2001. [11] K. Chowdhury and M. Felice, “Search: A routing protocol for mobile cognitive radio ad-hoc networks,” Computer Communications, 2009. [12] B. Karp and H. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in ACM MobiCom, 2000. [13] “Cognitive radio extension.” [Online]. Available: http://stuweb.ee.mtu.edu/ ljialian/ [14] C. Perkins, E. Belding-Royer, S. Das et al., “Ad hoc on-demand distance vector (aodv) routing,” 2003. [15] C. Pyo and M. Hasegawa, “Minimum weight routing based on a common link control radio for cognitive wireless ad hoc networks,” in Proceedings of IWCMC. IEEE, 2007.