Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol

Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol

Abhijit Biswas, Dushyanta Dutta
Copyright: © 2022 |Pages: 18
DOI: 10.4018/IJISP.308311
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

It is projected that communication among cognitive machine-to-machine (M2M) in smart grid networks is necessary and vital in forthcoming years. The objective of this paper is to bring out the significance of cognitive medium access control (MAC) protocol focusing on the distinctive characteristics of the devices in M2M and requirements of the smart grid communication. Therefore, developing a cognitive radio system which supports dynamic access to the spectrum available that is recently considered as a novel solution for extending wireless systems. In this paper, MAC layer sensing approaches in cognitive radio networks are investigated by considering both proactive and reactive sensing. To evaluate the performance, analytical modeling and simulation studies are carried out by comparing with state of art methods. As a result, the proposed HCM2M-MACachieves 687.3 kbps of blocking probability, 368.6kbps of dropping probability, 96.4% bandwidth utilization, 67.3% end to end delay and 89.3% of throughput.
Article Preview
Top

Introduction

Machine-to-machine (M2M) devices can transmit data perfectly with absolutely no or minimal human intervention and is really considered as the support for Internet of things (Chen, et al., 2012). M2M networks are involved in small-scale private domain like smart healthcare and smart homes, intermediate-scale public domain like smart cities and smart power grids and large-scale industrial domain namely smart industrial automations (Chen et al., 2014). It is simple to deploy as well as operate, and it functions with both wired and wireless networks indoors and out. It has a larger variety, lower latency, faster bandwidth, and requires less energy. It allows smart gadgets to communicate without the need for human interaction. The machine-to-machine technique's primary goal is to collect sensing information and transmit it to a system. M2M technologies, including SCADA or other telemonitoring programs, frequently employ wireless internet as well as networking protocols. With wide-spread applications, distinct characteristics of the networks can be easily distinguished and projected for M2M communication such as different traffic types; frequent variations of traffic loads; numerous connected devices and so on. When these characteristics are combined, M2M network is probably considered as ‘heterogeneous’ (Rajandekar et al., 2015). For example, coexistence of non-critical as well as time-critical traffic or spontaneous and burst traffics arise at once. Such heterogeneity network face new set of challenges and are also complex, particularly when the channel resources are shared in an orderly and effective way (Alonso-Zarate et al., 2008). Thus, when the density of the given node in an M2M heterogeneous network is high, it is appropriate to develop and implement an effective channel sharing approach. Traditional standalone MAC protocols like carrier sensing multiple access (CSMA) and time division multiple access (TDMA), are not applied in M2M networks directly as they have no ability to deal with heterogeneity (Antonopoulos et al., 2013; Alvi et al., 2016; Ramasamy et al., 2017). While transferring any information, Carrier Sense Multiple Access (CSMA) responds to or detects network transmissions on the carrier/medium. CSMA is used in Network switches that have several computers or wireless routers connected to them. Whereas digital modulation is a mechanism for allocating a specified amount of wideband to every customer in order to allow for several concurrent talks. Every user is given a designated broadcast time slot. TDMA outperforms analog devices in terms of spectrum efficiency. CSMA produces high collision and comparatively high overhead (e.g., CSMA/CA) when traffic loads are high and when low, low channel usage as well as low scalability are offered by TDMA (Liao et al., 2015). When the benefits of these protocols, their weaknesses are reduced and leads to investigate the hybrid MAC protocol (Teng et al., 2017; Alvi et al., 2015).

Figure 1.

Generic Machine to Machine architecture

IJISP.308311.f01

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing