<<

Cognitive Frequency Hopping Based on Interference Prediction: Theory and Experimental Results ∗

Stefan Geirhofera John Z. Sunb Lang Tonga Brian M. Sadlerc [email protected] [email protected] [email protected] [email protected] aSchool of Electrical and Computer Engineering, Cornell University, Ithaca, NY 14853 bResearch Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, MA 02139 cU.S. Army Research Laboratory, Adelphi, MD 20783

Wireless services in the unlicensed bands are proliferating but frequently face high interfer- ence from other devices due to a lack of coordination among heterogeneous technologies. In this paper we study how cognitive concepts enable systems to sense and predict interference patterns and adapt their spectrum access accordingly. This leads to a new cognitive coexistence paradigm, in which cognitive radio implicitly coordinates the spec- trum access of heterogeneous systems. Within this framework, we investigate coexistence with a set of parallel WLAN bands: based on predicting WLAN activity, the cognitive radio dynamically hops between the bands to avoid collisions and reduce interference. The de- velopment of a real-time test bed is presented, and used to corroborate theoretical results and model assumptions. Numerical results show a good fit between theory and experiment and demonstrate that sensing and prediction can mitigate interference effectively.

I. Introduction direct information exchange among interfering sys- tems. Instead we study how a cognitive radio may devices and services are growing rapidly and reduce collisions by predicting the WLAN’s activ- are becoming ubiquitous. The unlicensed bands have ity and adapting its medium access accordingly. The played a fundamental role in this trend as illustrated cognitive concept of sensing and adaptation conse- by the rapid proliferation of WiFi and de- quently serves as an implicit means for coordinating vices. As new technologies gain momentum, how- the medium access of the interfering systems. Ul- ever, the unlicensed bands are becoming increasingly timately, this leads to a new coexistence framework crowded, and consequently interference management which we refer to as cognitive coexistence. needs to be addressed. Cognitive coexistence is based on the same prin- The lack of coordination in the unlicensed bands ciples as dynamic spectrum access (DSA) but faces may lead to high interference among heterogeneous different challenges and tradeoffs in typical deploy- technologies that operate in close proximity. At the ments (see [1] for a review of DSA). In many coex- same time, however, average spectrum utilization is istence scenarios are collocated and separating typically low because of traffic burstiness and the inef- transmissions in the temporal domain therefore seems ficiencies associated with distributed medium access a natural design choice. Compared to DSA, sensing is protocols. This contrast motivates a study on how bet- much easier accomplished in such setups since radios ter coordination may improve spectral efficiency and are in close proximity of each other. Furthermore, in lead to reduced interference. unlicensed bands CR concepts can be used in a sim- Throughout this paper we assume that there is no ilar fashion to orthogonalize interfering systems dy- namically. While the notion of primary and secondary ∗Manuscript submitted October 31, 2008; accepted March 17, 2009. This work is supported in part by the U.S. Army Re- users does not arise in this scenario because all sys- search Laboratory under the Collaborative Technology Alliance tems have equal access rights to the medium, a hierar- Program, Cooperative Agreement DAAD19-01-2-0011. The U.S. chical setup is typically a natural design approach. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. This work has been presented in part at the Asilomar I.A. Main Contribution Conference on Signals, Systems and Computers, Monterey, CA, November 2007 and the IEEE Military Communications Confer- This paper presents an experimental study of coexis- ence, Orlando, FL, October 2007. The present manuscript extends previous work by including new results on the open- and closed- tence between a cognitive radio (CR) and a set of par- loop behavior of the test bed. allel WLAN channels; see Fig. 1. Assuming that the

Mobile Computing and Communications Review, Volume 13, Number 2 49 Ch. 1 complexity constraints. First, the test bed only supports a single WLAN channel due to bandwidth limitations of the down- Ch. i conversion module. Consequently, the test bed’s medium access reduces to transmitting or not trans- mitting at the beginning of each slot. Nevertheless, Ch. M even though no frequency hopping takes place, the ex- 1 2 3 4 5 6 7 8 91011121314 perimental results for the single-channel case can be time slots generalized to multi-channel setups. Specifically, we WLAN Cognitive radio will demonstrate that by characterizing the behavior of a single WLAN channel for arbitrary traffic inten- Figure 1: System setup. A frequency hopping cogni- sities, it is possible to extrapolate performance metrics tive radio coexists with a set of parallel WLAN chan- to multi-channel scenarios as long as the behavior of nels. parallel channels is statistically independent. The test bed is further limited to a single cognitive CR operates in a frequency range that overlaps with ; no receiver has been implemented. This a set of WLAN channels, we study a cognitive fre- removes the need to maintain slot synchronization but quency hopping (CFH) protocol, which avoids packet does not limit our ability to measure CFH’s through- collisions by periodic spectrum sensing and predicting put and interference through monitoring channel ac- temporal WLAN activity. By hopping to temporarily tivity. While methods such as collaborative sensing inactive channels, packet collisions are reduced and [5] or acknowledgement feedback [6] may be used for coexistence improved. Theoretically, CFH is based on synchronization, their implementation in real-time is an ON/OFF continuous-time Markov chain (CTMC) difficult and goes beyond the scope of this work. Sim- model, which approximates WLAN’s decentralized ilarly, multi-user aspects of the cognitive system are medium access while being tractable enough to derive not addressed. However, well-studied concepts could the optimal hopping pattern. be applied, such as Bluetooth’s piconet structure [7], where a master node acts as a central controller. This paper focuses on comparing theoretical and Finally, mutual interference among collocated ra- experimental performance results. The previous work dio systems crucially depends on the underlying prop- [2] is taken as a basis for CFH but the protocol is agation conditions. In this paper, we focus on the closely related to other contributions on time domain worst-case collision model in which any overlap in OSA [3, 4]. Theoretical assumptions are corroborated frequency and time results in a packet drop. This ap- by a real-time test bed, which is used for validating proximates a setup in which WLAN devices and CR model assumptions and evaluating the dynamic inter- nodes operate in close proximity. action between the CR and WLAN. For example, our Organization and notation. The paper is struc- theoretical analysis is based on assuming that colli- tured as follows. Sec. II introduces CFH analytically, sions do not impact the validity of the temporal pre- and Sec. III describes the test bed implementation. diction model as long as the collision rate is kept be- The measurement methodology and performance re- low some interference constraint. In an actual system, sults are presented in Sec. IV and Sec. V, respec- however, does the CTMC prediction model remain tively. Performance trends and tradeoffs are discussed approximately valid or are there significant changes in Sec. V.C. in the WLAN’s temporal activity? Similarly, is the WLAN’s sensing-based medium access affected? The experimental approach helps quantifying the impact I.B. Related Work of retransmissions, a result that would be hard to ob- While there is a growing body of literature on cog- tain analytically. Our findings show a good match nitive radio and dynamic spectrum access, see, e.g., between theory and practice and demonstrate that the [1,8], reports on experimental and implementation as- CR can reduce interference effectively. To the best of pects of CR and DSA have been limited. This work our knowledge this paper presents the first test bed to is most closely related to contributions on temporal validate the above model assumptions experimentally. DSA. Among the first to address this problem, Zhao et Limitations. The experimental test bed has been al. investigate the problem of accessing slots that are tailored to the above objectives. As such, it is neces- left idle by primary users [9]. The optimal medium ac- sary to clarify some limitations due to hardware and cess is derived within a Markovian decision-theoretic

50 Mobile Computing and Communications Review, Volume 13, Number 2 framework and a separation principle between sens- nels is detected and prediction is based on a two-state ing and medium access is shown [10]. Similar setups continuous-time Markov chain model. We assume have recently received increasing interest [4, 11, 12]. perfect sensing in our theoretical work. An experimental test bed which heuristically accesses white space in WLAN is presented in [13]. Recent ex- II.A. Modeling Spectrum Opportunities perimental studies and related work include [14–17]. Since the WLAN channels do not overlap in fre- Coexistence between WLAN and Bluetooth de- quency it is reasonable to assume that they evolve in- vices has conceptual similarities with our contribution dependently in time. Hence, we can focus on a single because of a similar physical-layer setup. Different channel, and deal with N independent models (pos- coexistence methods have been proposed for this sce- sibly with different parameters) rather than a single nario and range from interference cancelation at the model encompassing all channels. physical layer [18] to changes in MAC layer schedul- The activity of each WLAN band is modeled by ing at the WLAN stations [19] and adaptive frequency a two-state CTMC {X(t), t ≥ 0} with idle state hopping (AFH) [20]. X(t) = 0 and busy state X(t) = 1. The sojourn AFH techniques are most closely related to CFH: times are exponentially distributed with parameter λ both schemes adapt their hopping sequence to reduce in the idle state and µ in the busy state. interference. The major difference lies in how inter- This simple model approximates the statistics of the ference is detected and modeled. AFH typically clas- idle periods of real WLAN systems. As shown in sifies channels as being either “good” or “bad” ac- Fig. 2, by comparing with empirical data gathered by cording to the empirical error rates of its own trans- measurement, we see that the overall behavior of the mission attempts. However, the WLAN’s tempo- empirical cumulative distribution function is approxi- ral activity is not modeled explicitly and no spec- mated by this exponential fit. The measurement setup trum sensing is performed. Bad channels are simply and assumptions will be described in more detail in avoided by reducing the hopping set to good chan- Sec. III. nels, if possible. Naturally, this approach is well We have shown in previous work [2] that a semi- suited to suppress interference that is static or slowly Markov model (SMM) is able to achieve a better fit time varying with respect to the Bluetooth slot length. with the empirical data by approximating idle peri- In many cases, however, WLAN packets are only ods based on a mixture of two generalized Pareto slightly longer than the slot length, reducing the ben- distributions (one corresponding to the WLAN con- efit of this modeling technique. In contrast, CFH’s tention behavior, the other modeling random packet sensing and prediction framework is well suited to ac- arrivals). This leads to the cumulative distribution count for the time variant behavior of WLAN traffic. function (CDF) Some aspects of CFH have been investigated in prior work by the authors of this paper. The model- Fm(=t) p1F1(t; k1, σ1)+(1−p1)F2(t; k2, σ2 ), (1) ing of WLAN traffic has been proposed in [21], and where p1 denotes the mixture coefficient and medium access schemes based on these models were −1 introduced in [2]. This paper goes beyond these con- t k / Fi(t; ki, σi)+ = 1 − 1 ki (2) tributions in presenting an experimental test bed and  σi  comparing theoretical with experimental results. Our represents the CDF of the generalized Pareto distribu- findings give rise to system-level insights on the per- tion with shape parameter (measuring the deviation formance of this method. ki from an exponential distribution) and scale parameter σi (quantifying the decay rate). This model shows an II. CFH Protocol Design excellent fit with the empirical data as can be seen in Fig. 2 and has also been validated statistically through To improve coexistence between the WLAN channels the Kolmogorov-Smirnov test [21]. and the frequency-hopping CR, CFH adapts the CR’s While a mixture distribution leads to an accurate fit, hopping sequence such that it preferably transmits in it is less tractable analytically. Our theoretical anal- bands that will likely remain idle for the duration of ysis is therefore based on the more tractable CTMC the transmission. model. While its deviation from the empirical data is As depicted in Fig. 1, the CR transmission is slot- significant in Fig. 2, our results will show that the ex- ted in time with duration T . At the beginning of each ponential model predicts overall system performance slot the activity (idle or busy) of the WLAN chan- quite accurately and is a useful theoretical tool.

Mobile Computing and Communications Review, Volume 13, Number 2 51 Ft(t) intensity and ensures that no more than a certain frac- tion of packets gets dropped. trans- idle In the single channel case, the optimal medium ac- mit cess reduces to finding transmission probabilities for Fi(t) idle and busy sensing outcomes, respectively. When- (a) State transition model ever the channel is observed idle, we transmit with a probability p, which is designed such that the interfer- 1 ence constraint is met with equality [2]. Whenever a σ = 0.6 busy sensing outcome is observed, it is optimal not to transmit because this would only cause higher inter- 0.8 σ = 0.2 ference while not increasing throughput. In the multi-channel case we need to select one out 0.6 of M bands for transmission. This case can be ad- dressed through decision-theoretic analysis by formu- 0.4 lating the problem as a constrained Markov decision process. Due to space limitations and because our ex- Empirical CDF 0.2 perimental work focuses on the single channel case, Exponential model we refer to [2] for details.

cumulative distribution function SMM model 0 0 5 10 15 20 III. Test Bed and Experiment Design idle period [ms] (b) Sojourn time distribution in the idle state Having introduced CFH, we describe the test bed im- plementation, compare the experimental design with Figure 2: Temporary prediction model of WLAN ac- our analytical setup, and discuss fundamental design tivity. The semi-Markov model approximates the em- objectives. pirical sojourn time in the idle state with good accu- The test bed has been developed with the objective racy (shown for two WLAN traffic intensities σ). of validating some of the implicit assumptions made in our analytical work. This specifically includes dy- The busy periods are directly related to the packet namic effects between both systems that are difficult length and transmission rate chosen by the scheduler to characterize analytically. Our analytical work fo- of each WLAN station. In our work, we focus on cused on designing transmission probabilities, given traffic scenarios with constant payload packets and a stochastic model for the WLAN, such that interfer- transmission rate, and can therefore treat the sojourn ence constraints remained met. The idea behind this time as deterministic. For the CTMC approximation, modeling approach is that as long as the interference which requires exponential sojourn times, we choose constraints are sufficiently tight, the residual interfer- the distribution’s mean to equal the deterministic so- ence caused to the WLAN will not impact its temporal journ time. behavior. While analytical approaches for justifying this assumption are difficult, our experimental results enable us to confirm its validity. II.B. Designing the Optimal Control A block diagram of the test bed is shown in Fig. 3. Based on the CTMC model we discuss the optimal The implementation is based on a Sundance soft- CFH behavior for a single WLAN channel (due to sin- ware defined radio (SDR) development kit, consisting gle channel operation of the test bed). The general of processing and data acquisition modules. Radio- case of M channels has been addressed in [2]. frequency (RF) signals are down-converted using a The objective of CFH is to maximize CR through- commercial WLAN transceiver and up-converted us- put while constraining the rate of packet collisions. ing an Agilent vector signal generator. The baseband The CR throughput is measured in terms of successful processing is done entirely on the SDR board. The packet transmissions per unit time and the interference CR’s slot structure is implemented using an accurate constraint is characterized by the WLAN packet error timer, which triggers periodic interrupts with a period rate (that is, the number of dropped divided by the of T = 625µs. The analog-digital converter (ADC) number of transmitted WLAN packets). This normal- is triggered at the beginning of each slot. A 1 µs izes the interference constraint by the WLAN’s traffic block at a rate of 72 MHz is captured and passed on

52 Mobile Computing and Communications Review, Volume 13, Number 2 Spectrum Sensing CFH Control Energy Down- CR Transmission detection converter

Est. RF Input ), ( Find thres. Find Prob. p( , Tx < =) Ta Tb Tc Td

Sensing time: Ta C 10)s

Transmit Generate Up- Processing time: Tb C 100)s Data waveform converter Retuning time: Tc C 100)s RF Output Transmission time Td C 500)s

Figure 3: Block diagram of the cognitive radio (left). The slot operation and timing is shown on the right. Pictures of the cognitive radio test bed are available online at http://acsp.ece.cornell.edu/mc2r.pdf. to the energy detector, which computes the signal’s ity to detect weak primary signals), typical SNR val- energy and compares it with a threshold. This results ues faced in this cognitive coexistence setup will be in a binary sensing result (idle/busy), which is used substantially larger as both systems operate in close by the CFH controller to determine the CR’s medium proximity of each other. access. Depending on the outcome of the stochastic Thanks to the fairly high SNR conditions, energy control a transmission may be initiated by using a pro- detection can be used efficiently with very little com- grammable signal generator. Upon digital-to-analog plexity. Energy detection is mathematically formu- (DAC) conversion, the signal is up-converted by the lated as a binary hypothesis testing problem on a set RF front-end. of N samples that either represent just noise, or a sig- The above operations introduce processing delays nal in noise, respectively. This leads to that reduce the actual transmission time per slot. Typ- ical values for these delays are shown in Fig. 3. Spec- H0 : Yi = Vi1, i = ,...,N (3) trum sensing relies on blocks of less than 10 µs, and is H1 : Yi = Si + Vi1, i = ,...,N, almost negligible compared to T . The processing time where Yi denotes the complex baseband samples, Vi for the sensing result and the CFH controller together 2 amount to roughly 100 µs in our implementation. The are noise samples, Vi ∼0 CN ( , σ0 ) , and Si denotes the signal samples drawn from a complex Gaussian, time it takes to re-tune the transmitter to a different 2 channel amounts to approximately 100 µs (this delay Si ∼0 CN ( , σ1 ). This hypothesis testing problem is does not occur in our setup, however, as we only deal standard [22]. The optimal Neyman-Pearson detector with a single WLAN channel). The remainder of the is given by slot can be used for the CR’s transmission. N H1 The baseband processing can be categorized into 2 T (y) = |yi| ≷ γ, (4) H three parts, namely (i) the spectrum sensor, (ii) the X1i= 0 CFH controller, and (iii) the CFH transmitter. In the following each component is discussed in more detail. where the threshold γ needs to be chosen such that the probability of false alarm (i.e., erroneously declar- ing a busy channel) is no larger than a specific value. III.A. Spectrum Sensor The Neyman-Pearson detector then yields the optimal Spectrum sensing plays a key role in CR systems and probability of detection. the challenges associated with reliably detecting sig- In theory, when (3) holds exactly, the threshold γ nals at very low SNR have been the subject of much can be determined analytically by finding closed-form investigation. Compared to some DSA setups, how- expressions for the probability of false-alarm and de- ever, the burden of reliable spectrum sensing is re- tection. In the experimental domain, however, numer- duced in this cognitive coexistence setup. In contrast ous other factors need to be taken into account. A to DSA schemes that orthogonalize systems by suffi- fundamental problem in this work is the fact that hy- cient spatial separation (and therefore require the abil- potheses H0 and H1 cannot be observed isolated from

Mobile Computing and Communications Review, Volume 13, Number 2 53 each other because the test bed and the WLAN packet 1 transmission are not synchronized. Therefore it is not possible to sample exclusively during idle periods or exclusively during busy periods. This results in a mix- 0.8 ture of the distributions under either hypothesis where the mixture parameter depends on the long term prob- 0.6 ability of observing idle and busy slots. The hypothe- ses can however be separated by statistical analysis. 0.4 Empirical observations of the sufficient statistic (4) are plotted in Fig. 4. We expect to observe a mixture 0.2 of chi-square distributions because both T (y|H0) and Empirical CDF

T (y|H1) are chi-square distributed. More than two cumulative distribution function Gamma mixture mixture components may be necessary, however, due 0 0 0.1 0.2 0.3 0.4 0.5 to slightly different power levels of the WLAN termi- signal power (normalized) nals. Indeed, the empirical CDF can be well approxi- mated by a mixture of three chi-square distributions, Figure 4: Decision-statistic for the energy detector. 3 A mixture of three gamma distributed components is observed. f(x) = pifi(x; αi, βi), (5) X1i=

3 variations and estimation of the CTMC model param- where pi ≥ 0 for all i, i=1 pi = 1, and eters λ and µ, the computation of the optimal trans- P mission probabilities p(λ, µ), and the randomized se- αi −βix αi−1 βi e lection of the control action based on these probabil- fi(x; αi, βi) = x (6) Γ(αi) ities. Due to the complexity associated with estimat- ing λ and µ, the experimental test bed uses a fixed represents the PDF of a Gamma distribution with transmission probability p. Despite this limitation, it shape parameter αi and rate parameter βi. An is possible to infer the throughput and collision rate Expectation-Maximization algorithm [23] is used to for the case in which the transmission probability is find the model parameters of (5) and the fitting result adjusted with the traffic intensity. Since transmissions is shown in Fig. 4. A good match with the empirical are never initiated in busy slots, any choice of p corre- data is observed. We also found that busy and idle sponds to a certain throughput and collision rate. Fur- mixture components have very different rate parame- thermore, increasing p leads to an increased through- ters. This illustrates the very different energy levels put but also to a larger collision rate. For the single- present in idle and busy sensing slots. channel case in which the medium access is described Numerical performance analysis demonstrates that by a single parameter it is therefore possible to mea- the test bed’s spectrum sensor works reliably. By sure throughput and collision rate experimentally and choosing the decision threshold appropriately a de- then normalize accordingly such that the interference tection probability of 98.5% can be realized with less constraint is met. Thus, the performance of CFH can than 1% false alarms. The good performance of en- be evaluated without much loss of generality. ergy detection is, of course, due to the moderate to high SNR conditions, which make spectrum sensing III.C. Cognitive Transmitter similar to the carrier-sensing employed in systems such as IEEE 802.11. If a CR transmission is initiated, it lasts for the remain- der of the slot duration. For the CFH operation it is not III.B. Cognitive Controller relevant what specific transmission scheme is used. For optimal usage of the white space between con- The role of the cognitive controller is to initiate a secutive packets the CR could use the same frequency transmission probabilistically, whenever an idle sens- bands as the WLAN. For simplicity and motivated by ing result is observed. Transmissions are never ini- the conceptual similarity with Bluetooth/WLAN co- tiated after a busy sensing result because this would existence, however, we designed the transmitter to re- lead to a collision with high probability. A full imple- semble that of Bluetooth. It therefore transmits in mentation of CFH encompasses the tracking of traffic narrowband channels of 1 MHz and similar modula-

54 Mobile Computing and Communications Review, Volume 13, Number 2 tion parameters [7]. Gaussian Frequency Shift Key- reduces interference that could otherwise result from ing (GFSK) with a time-bandwidth product of 0.3 was unrelated transmissions in the unlicensed bands (mea- used at a symbol rate of 1 MSps. We should note surements were taken in an office building with a that the bandwidth of the sensing frontend, however, number of unrelated WLAN access points). In addi- amounted to 36 MHz as discussed before. tion, this configuration removed any propagation ef- The test bed’s transmitter is implemented based on fects and allowed for repeatable results. While the a programmable signal generator which is integrated propagation conditions encountered in practice will into the acquisition module, and can be triggered in deviate from this idealized setup, our results corre- software. Data contained in an internal buffer is then spond to a worst-case scenario in which packet over- transferred to the DAC and played back in an infinite laps inevitably result in collisions. loop (for further implementation details we refer to [24] due to space limitations). Open-loop setup. The open-loop configuration is shown in Fig. 5(a). While the combined WLAN sig- nals serve as the input to the CR, its output is not fed IV. Measurement Methodology back to the WLAN system. Instead it is combined The previous section described the test bed’s imple- with the WLAN signal and detected by a separate mentation. As CFH relies on sensing and predicting workstation computer with a WLAN adapter card. packet collisions, its performance naturally depends The two circulators isolate the output of the test bed on the specifics of the coexistence setup, such as prop- and prevent it from impacting the WLAN. agation conditions, traffic intensity, system parame- The workstation capturing the combined signal of ters, etc. This section is devoted to describing the the WLAN and the test bed uses an adapter card in measurement methodology that underlies the perfor- promiscuous mode together with commercial WLAN mance assessment. analysis software to detect WLAN packets. The out- put power level of the CR is set large enough such IV.A. Hardware Setup that a collision between both systems will prevent the The experimental coexistence setup is depicted in adapter card from successfully receiving the packet Fig. 5 and consists of the WLAN system (composed (either a packet error will be displayed or the packet of an access point and three workstations), the CR, will be missed altogether, depending on whether the as well as a vector signal analyzer which was used to synchronization preamble or only the payload is af- monitor the operation of the system. fected). The rate of successful packet reception is thus Two fundamentally different configurations were measured and, by comparison with settings of the traf- considered. In the open-loop setup the CR’s output fic generators, the rate of packet losses can be inferred. is not fed back to the WLAN system but only used to Closed-loop setup. The closed-loop setup is de- determine the packet error rate. While this does not re- picted in Fig. 5(b). The test bed again receives the flect what would occur in practice, this setup enables combined WLAN signal, but its output is now con- us to draw a direct comparison with our analytical re- nected to the same power-divider as the WLAN de- sults. In the closed-loop setup, on the other hand, in- vices. Therefore, packet collisions lead to packet terference impacts the WLAN and leads to frequent drops at the WLAN devices themselves (and not at a retransmissions. We analyze the CR’s impact and re- reference station as in the open-loop setup). Packet late the results to the open-loop setup. loss will therefore initiate WLAN retransmission, WLAN configuration. The WLAN consists of which may in turn affect the test bed’s performance. commercial off-the-shelf IEEE 802.11 devices and in- The closed-loop setup therefore allows for dynamic cludes an access point and three workstations with interaction between both devices. adapter cards. The access point is connected to a fourth workstation using a wired ethernet connection. In the closed-loop setup, PC1, which is connected All wireless devices are configured identically to op- to the WLAN access point by ethernet, runs traffic erate in channel 6 (corresponding to a center fre- analysis software. The traffic generators are config- quency of 2.437 GHz) and use a transmission rate of ured such that PC1 is the intended receiver, and hence 5.5 Mbps. the successful portion of the WLAN traffic (including The wireless devices’ RF outputs are all connected any retransmissions that may occur) is measured. By to a resistive power divider using coaxial cables. This comparing with the case of no interference, the packet isolates the transmissions from the environment and loss rate is inferred.

Mobile Computing and Communications Review, Volume 13, Number 2 55 RT...Router VSA...Vector Signal Analyzer PC3 PC4 PC3 PC4 Agilent 89640A Agilent 89640A

VSA VSA PC2 Power Divider PC2 Power Divider

CMAP CMAP RT PC1 RT PC1

Primary system Cognitive System Primary system Cognitive System (a) Open-loop setup (b) Closed-loop setup

Figure 5: Measurement methodology. In the open-loop setup (left) the CR’s transmission are not fed back to the WLAN. The closed-loop setup (right) is used to quantify the impact of retransmissions.

IV.B. Traffic Characteristics IV.C. Measurement Process The measurements are performed in the following WLAN transmissions are generated by using a traf- manner. First, with the CR portion of the test bed fic generator on each workstation. The Distributed turned off, the WLAN traffic generators are adjusted Internet Traffic Generator (D-ITG) [25] is used and such that a specific traffic load σ is realized. The CR allows to specify packet lengths, the distribution of is then enabled and the successfully received WLAN inter-arrival times, and transmission rates. The traffic packets are counted. By comparing with the nominal properties form an important component of the mea- packet rate in the interference-free case, the packet er- surement methodology. ror rate can be obtained. At the same time, the CR This work focuses on UDP traffic with constant keeps statistics of the number of initiated and suc- payload of 1024 bytes and plots performance with re- cessful slot transmissions. Lacking a CFH receiver, spect to traffic intensity. Specifically, we define the a successful CFH slot transmission is defined by initi- WLAN traffic load σ, which is normalized such that ating slot transmission and observing an idle channel σ = 0 corresponds to an inactive WLAN and σ = 1 at the beginning of the next slot. Due to the reliable represents a WLAN operating at full capacity. spectrum sensing performance and the fact that, in our setup, WLAN packets are always longer than the slot Experimentally, the WLAN traffic load σ is mea- duration T , this is a valid metric. sured as follows. First, the rates of all traffic genera- tors are set to a value that is too large to be supported V. Performance Results by the WLAN (even in the case of no interference) and by measuring the actual rate, the WLAN capac- This section presents experimental performance re- ity is found. Then, the settings of the traffic gener- sults and compares them to simulation results ob- ator are normalized by this value, leading to values tained using the SMM and CTMC models discussed 0 ≤ σ ≤ 1. For example, given the traffic and prop- in Sec. II. For the open-loop setup, where theoreti- agation settings in our setup, a maximum of approxi- cal and experimental results should coincide, we ob- mately 450 packets per second could be supported by serve an excellent match. In the closed-loop setup, the WLAN. Configuring each of the traffic generators where mandatory re-transmissions affect the exper- to transmit at a rate of 50 packets per second therefore imental performance results, we introduce a simple corresponds to σ = 1/3. heuristic formulation that allows us to approximate The measurements focus on the average throughput the WLAN’s behavior based on open-loop results. and interference for stationary traffic scenarios with The performance assessment in this section focuses different intensities σ. Measurement results are com- on the CR’s throughput and the interference it causes pared with simulations using the model parameters in (in terms of WLAN packet errors induced by the in- Tab. 1. These parameters were obtained based on sta- terference). Clearly, both performance metrics are in- tistical analysis, as discussed in Sec. II. The results terrelated: by increasing the CR’s transmission prob- can be extended to non-stationary traffic setups, pro- ability p we can increase throughput at the expense of vided that parameters of the traffic model are tracked a larger number of collisions and vice versa. By mea- over time [21]. suring both metrics, we can get a better insight on how

56 Mobile Computing and Communications Review, Volume 13, Number 2 aggressive the CR transmission policy can be without mission attempt is ultimately successful, the packet is significantly affecting WLAN performance. counted as successfully received (the retransmission We compare the performance of CFH with a blind packets themselves are not counted toward the WLAN reference scheme that neither detects nor predicts traffic load). WLAN activity but obliviously initiates transmissions Compared to the open-loop setup, the throughput with probability pr regardless of the state of the of the cognitive system stays approximately the same, medium. Our results demonstrate that CFH intro- but the interference to the WLAN changes drastically duces a significant performance gain and increases CR due to the retransmission behavior. Up to approx- throughput while reducing WLAN interference. imately σ = 0.8, no packet loss is observed. At σ = 1.0, it increases to roughly 5%. V.A. Open-Loop Measurement Result The non-cognitive reference scheme exhibits a sim- ilar behavior. No packet errors occur for σ = 0.5 The open-loop measurement result is shown in Fig. 6. or below, and an approximately linear increase is ob- The left panel shows the CR throughput in terms of served for higher values of σ. The packet error rate the expected number of successful slot transmissions reaches a maximum of roughly 35% at σ = 1.0. per unit time and the right panel shows the packet er- The reason for the reduced packet errors lies in the ror rate of the WLAN. We stress that the experimental WLAN’s retransmission behavior. If a packet trans- curves have been obtained by counting the rate of suc- mission fails, the standard mandates that a retransmis- cessfully received WLAN packets and the packet error sion be initiated. At low WLAN rates, it is likely that rate is computed by comparing with the average num- these retransmissions will be successful because the ber of packets that should have been received during medium is predominantly idle. At high rates, how- that time period. The results are compared with sim- ever, it may no longer be possible to accommodate ulations based on the SMM and CTMC model. The such retransmissions, leading to an increasing packet SMM-based simulation also incorporates the fact that error rate. the CR does not use the entire slot for transmission In order to compare experimental and theoretical and should therefore approximate the measurement results, we consider a simple approximation that in- results with good accuracy. corporates the retransmission behavior. For simplic- The SMM-based simulation results indeed show an ity, we assume that packets are retransmitted indefi- excellent match with the experimental results. The nitely until they are received successfully. A traffic throughput curves shown in the left panel of Fig. 6 al- load σ encountering a collision probability q leads to most coincide (the largest aberration amounts to less the cumulative traffic load than two percentage points) and for the packet error 2 σ σ′ = σ(1+ q + q ··+ · ) = . (7) rate (shown on the right) we observe a maximum ab- 1 − q beration of two percentage points. By comparison, the ′ CTMC model is less accurate. While the throughput We assume that as long as the traffic load σ is be- results match fairly well, the predicted packet error low the capacity of the WLAN channel σ¯, no packet rate deviates significantly. From a modeling stand- loss occurs because retransmissions can be accommo- ′ point, this is not surprising because the exponential dated. However, for σ > σ¯ this is no longer possible approximation does not capture the WLAN’s con- and there will be a packet error rate of approximately tention behavior. σ′ − σ¯ Similar performance trends are observed for the ref- . (8) σ′ erence scheme without spectrum sensing. As shown in Fig. 6, measurement and SMM-based simulation This simple heuristic approximation is used to com- again match very well while the CTMC approxima- pare closed and open-loop results. Clearly, in or- tion shows noticeable deviation in terms of predicted der to compute (8) only open-loop performance result packet error rate. (obtained by measurement or simulation) are needed. Based on these it is possible to approximate the packet V.B. Closed-Loop Measurement Result error rate in the closed-loop setup. The performance curves gathered in this way are The results for the closed-loop setup are shown in shown in Fig. 7 and again show CR throughput (left) Fig. 7. Here, the WLAN terminals are strongly in- and packet error rate (right). The measurement curves terfered with by the CR and therefore initiate retrans- are obtained directly by measurement from the closed- missions whenever a packet is dropped. If a retrans- loop setup. The simulation curves are obtained based

Mobile Computing and Communications Review, Volume 13, Number 2 57 Cognitive Radio Throughput WLAN Packet Error Rate 0.35 0.5 Measurement Sim. (SMM) 0.45 0.3 Sim. (CTMC) 0.4 0.25 CFH 0.35 No-sensing 0.3 0.2 0.25 0.15 CFH 0.2

0.1 No-sensing 0.15 WLAN Packet Error Rate 0.1 0.05 0.05 Avg Rate of Successful Packet Transmissions

0 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 WLAN Traffic Load σ WLAN Traffic Load σ

Figure 6: Open-loop performance result. The CR throughput (left) and WLAN packet error rate (right) are shown. The measurement results match closely with SMM-based simulations. The results obtained under the CTMC model show a larger deviation. on open-loop simulations with the SMM and CTMC throughput versus interference is the transmission models and applying (8). We observe a good match probability p. Clearly, CR throughput increases with with the measurement results for the closed-loop case p, but so does the interference that is inflicted upon suggesting the simple heuristic predicts the closed- the WLAN. A natural design approach is to choose loop behavior quite accurately. p based on the traffic parameters such that a specific Lastly, the results show that even at high traffic constraint on the WLAN packet error rate is met with load, there exists a residual throughput of the CR sys- equality. In the multi-channel case the optimal vec- tem. This appears to be the result of WLAN’s re- tor of transmission probabilities can be found through transmission behavior, which due to frequent colli- decision-theoretic analysis, which leads to a linear sions enlarges some contention windows to accommo- programming solution with fairly low implementation date other stations. As can be seen in the left panel of complexity. Further, transmission probabilities only Fig. 7, this results in a residual throughput of approx- need to be recomputed whenever the prediction pa- imately 0.03 even when the WLAN is fully loaded. rameters change significantly; on a slot level, the ran- dom access can be implemented by storing the vector of transmission probability in a lookup table. V.C. Performance Trends A tradeoff arises in selecting the slot length. If Based on the performance results presented in the pre- there was no overhead associated with sensing and vious section, we discuss some tradeoffs and chal- re-tuning the CR, reducing the slot duration would lenges which may arise in a complete implementation enable us to more efficiently “fill up” the idle peri- of such a system. ods between packets. Due to this overhead, however, The choice of system parameters in this paper is choosing a small slot duration leads to small CR pay- motivated by facilitating a comparison between the- load and consequently reduced performance. Because ory and practice. Consequently, we focus on a worst- of conceptual similarity we have chosen a slot length case propagation scenario in which any time overlap of 625 µs, which equals the value used in Bluetooth. between transmissions results in packet errors. This Further, we have found that around this value, the approximates the case in which the devices are located throughput of the CR changes very little. in close proximity. Throughout this paper we have focused on station- An important design parameter in trading off ary traffic scenarios with varying WLAN traffic inten-

58 Mobile Computing and Communications Review, Volume 13, Number 2 Cognitive Radio Throughput WLAN Packet Error Rate 0.35 0.4 Measurement 0.35 Sim. (SMM) 0.3 Sim. (CTMC) 0.3 0.25

CFH 0.25 No-sensing 0.2 0.2 0.15 0.15 No-sensing CFH 0.1 WLAN Packet Error Rate 0.1

0.05 0.05 Avg Rate of Successful Packet Transmissions

0 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 WLAN Traffic Load σ WLAN Traffic Load σ

Figure 7: Closed-loop performance result. CR throughput (left) and WLAN packet error rate (right) are shown. The packet error rate includes retransmissions and is therefore smaller than in the open-loop case. sity. This enabled us to measure throughput and inter- diction to exploit temporal white space between pri- ference by recording long packet traces and comput- mary WLAN transmissions. By comparing measure- ing time averages. Nevertheless, we believe that our ment results with simulations based on an idealized results will extend to the non-stationary traffic sce- mathematical model, we were able to validate model narios observed in practice. In fact, the time scale assumptions that have frequently been used in other of our prediction model is in the order of tens of works. milliseconds, which is much smaller than the typical The experimental aspect of our work resulted in time scale associated with changes in usage patterns. some test bed limitations which were due to hard- Tracking non-stationarities by adapting model param- ware and complexity constraints. However, while the eters is therefore a viable approach. We have verified test bed is limited to single-channel operation, it cap- that this leads to an accurate fit in previous work [21]. tures fundamental deviations from the idealized math- While our comparison between theory and experi- ematical model and incorporates carrier sensing and ment shed some light on implementation aspects, our retransmission effects. We have further shown that work represents the first steps toward developing a generalizations to the multi-channel case are possible fully functional prototype. Synchronization is one as- by extrapolating performance measurements for the pect that goes beyond the scope of this paper. Due to single-channel case. the dependence on local sensing results, synchroniza- tion is more difficult to achieve than in related AFH References setups. Collaborative sensing concepts are a possi- ble solution approach. By exchanging sensing met- [1] Q. Zhao and B. M. Sadler, “Dynamic Spec- rics, the detection process could be coordinated, and trum Access: Signal Processing, Networking, the stochastic control actions can be synchronized by and Regulatory Policy,” IEEE Signal Process. using identical random seeds. Methods such as ac- Mag., vol. 55, no. 5, pp. 2294–2309, May 2007. knowledgement feedback are also applicable [6]. [2] S. Geirhofer, L. Tong, and B. M. Sadler, “Cogni- VI. Conclusion tive Medium Access: Constraining Interference Based on Experimental Models,” IEEE J. Sel. In conclusion, this paper presented an experimental Areas Commun., vol. 26, no. 1, pp. 95–105, Jan. cognitive radio test bed which uses sensing and pre- 2008.

Mobile Computing and Communications Review, Volume 13, Number 2 59 Table 1: Model parameters for SMM and CTMC formulations. The parameters were obtained by experiment (see [21] for details) and used to obtain the simulation results presented in the previous section. WLAN Traffic Load 0.05 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 λ [ms] 23.3 11.6 7.89 5.42 3.32 2.34 1.63 1.01 0.68 0.43 0.24 CTMC µ [ms] 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 p1 0.11 0.33 0.27 0.34 0.41 0.54 0.62 0.76 0.82 0.88 0.95 k1 0.75 -0.39 -0.33 -0.40 -0.52 -0.3 -0.09 0.02 0.12 0.14 0.07 SMM σ1 [ms] 29.6 18.6 10.7 8.14 5.48 4.81 3.43 3.63 2.59 2.42 2.17 k2 0.75 -0.39 -0.33 -0.40 -0.52 -0.3 -0.09 0.02 0.12 0.14 0.07 σ2 [ms] 0.07 0.34 0.32 0.34 0.41 0.29 0.22 0.18 0.15 0.12 0.11

[3] Q. Zhao, L. Tong, A. Swami, and Y. Chen, [11] A. N. Mody, S. R. Blatt, D. G. Mills, T. P. “Decentralized Cognitive MAC for Opportunis- McElwain, McElwain, N. B. Thammakhoune, tic Spectrum Access in Ad Hoc Networks: A J. D. Niedzwiecki, M. J. Sherman, C. S. My- POMDP Framework,” IEEE J. Sel. Areas Com- ers, and P. D. Fiore, “Recent Advances in Cog- mun., vol. 25, no. 3, pp. 589–600, Apr. 2007. nitive Communications,” IEEE Commun. Mag., vol. 45, no. 10, pp. 54–61, Oct. 2007. [4] S. Huang, X. Liu, and Z. Ding, “Opportunistic spectrum access in cognitive radio networks,” in [12] A. Motamedi and A. Bahai, “MAC Protocol Proc. IEEE INFOCOM, Apr. 2008, pp. 1427– Design for Spectrum-agile Wireless Networks: 1435. Stochastic Control Approach,” in Proc. IEEE International Symposium on New Frontiers in [5] A. Sahai, N. Hoven, S. Mishra, and R. Tandra, Dynamic Spectrum Access Networks (DySPAN), “Fundamental tradeoffs in robust spectrum sens- Apr. 2007, pp. 448–451. ing for opportunistic frequency reuse,” Univer- sity of California, Berkeley, Tech. Rep., 2006. [13] S. D. Jones, N. Merheb, and I.-J. Wang, “An ex- periment for sensing-based opportunistic spec- [6] Q. Zhao, S. Geirhofer, L. Tong, and B. M. trum access in CSMA/CA networks,” in First Sadler, “Opportunistic Spectrum Access via Pe- IEEE Internatial Symposium on New Frontiers riodic Channel Sensing,” IEEE Trans. Signal in Dynamic Spectrum Access Networks, Nov. Process., vol. 56, no. 2, pp. 785–796, Feb. 2008. 2005, pp. 593–596. [14] P. Bahl, R. Chandra, and J. Dunagan, “SSCH: [7] Bluetooth Special Interest Group, “Specification Slotted Seeded Channel Hopping for Capacity of the Bluetooth System,” Nov. 2004. Improvement in IEEE 802.11 Ad-Hoc Wireless [8] I. Akyildiz, W. Lee, M. Vuran, and S. Mo- Networks,” in Proc. ACM MobiCom, 2004. hanty, “NeXt generation/dynamic spectrum ac- [15] K. G. Shin, H. Kim, C. Cordeiro, and K. Chal- cess/cognitive radio wireless networks: A sur- lapali, “An Experimental Approach to Spec- vey,” Computer Networks, vol. 50, no. 13, pp. trum Sensing in Cognitive Radio Networks with 2127–2159, Sep. 2006. Off-the-Shelf IEEE 802.11 Devices,” in Proc. IEEE Consumer Communications and Network- [9] Q. Zhao, L. Tong, and A. Swami, “Decentral- ing Conference (CCNC), Jan. 2007, pp. 1154– ized Cognitive MAC for Dynamic Spectrum Ac- 1158. cess,” in Proc. First IEEE Internatial Symposium on New Frontiers in Dynamic Spectrum Access [16] H. Kim and K. G. Shin, “In-band spectrum sens- Networks, Nov. 2005, pp. 224–232. ing in cognitive radio networks: energy detec- tion or feature detection?” in Proc. ACM Mobi- [10] Y. Chen, Q. Zhao, and A. Swami, “Joint De- Com, 2008, pp. 14–25. sign and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Er- [17] F. Perich, R. Foster, P. Tenhula, and rors,” IEEE Trans. Inf. Theory, vol. 54, no. 5, pp. M. McHenry, “Experimental Field Test 2053–2071, May 2008. Results on Feasibility of Declarative Spectrum

60 Mobile Computing and Communications Review, Volume 13, Number 2 Management,” in Proc. IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Oct. 2008, pp. 1–10.

[18] M. Ghosh and V. Gaddam, “Bluetooth interfer- ence cancellation for 802.11g WLAN receivers,” in Proc. IEEE International Communications Conference (ICC), May 2003, pp. 1169–1173.

[19] N. Golmie, “Bluetooth Dynamic and Interference Mitigation,” Mobile Networks and Applications, vol. 9, pp. 21–31, 2004.

[20] N. Golmie, N. Chevrollier, and O. Rebala, “Bluetooth and WLAN Coexistence: Challenges and Solutions,” IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 22–29, Dec. 2003.

[21] S. Geirhofer, L. Tong, and B. M. Sadler, “Dy- namic Spectrum Access in the Time Domain: Modeling and Exploiting Whitespace,” IEEE Commun. Mag., vol. 45, no. 5, pp. 66–72, May 2007.

[22] H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. Springer-Verlag, 1994.

[23] Z. Liu, J. Almhana, V. Choulakian, and R. Mc- Gorman, “Traffic Modeling with Gamma Mix- tures and Dynamical Bandwidth Provisioning,” in Proc. IEEE Communication Networks and Services Research Conference (CNSR), May 2006.

[24] S. Geirhofer, J. Z. Sun, L. Tong, and B. M. Sadler, “CMAP: A Real-Time Prototype for Cognitive Medium Access,” in Proc. IEEE Mil- itary Communications Conference (MILCOM), Oct. 2007.

[25] S. Avallone, A. Botta, D. Emma, S. Guadagno, and A. Pescape, “D-ITG V.2.4 Manual,” Uni- versity of Napoli “Federio II”, Tech. Rep., Dec. 2004.

Mobile Computing and Communications Review, Volume 13, Number 2 61