A Backbone Formation Protocol Using Minimum Spanning Tree in Cognitive Radio Networks

A Backbone Formation Protocol Using Minimum Spanning Tree in Cognitive Radio Networks

Santosh Kumar, Awadhesh Kumar Singh
DOI: 10.4018/978-1-7998-2491-6.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Numerous research articles exist for backbone formation in wireless networks; however, they cannot be applied straightforward in cognitive radio networks (CRN) due to its peculiar characteristics. Since virtual backbone has many advantages such as reduced routing overhead, dynamic maintenance, and fast convergence speed, the authors propose a backbone formation protocol in CRN. In this chapter, a backbone formation protocol is proposed using the concept of minimum spanning tree. The protocol is based on non-iterative approach, thus leading towards limited message overhead. The proposed algorithm first forms the minimum spanning tree, and second, the nodes having more than one neighbor are connected together to form the backbone.
Chapter Preview
Top

Introduction

Recently, due to advent of new application areas and tremendous popularity of social networks, the number of network devices has proliferated creating huge demand for wireless spectrum. Thus, the spectrum scarcity has become problem of central interest to industry as well as research community. Moreover, the unlicensed spectrum band, ISM band (2.4GHz range) have been exhausted due to escalated use by the ad hoc networks, e.g. Wi-fi hotspots, wireless mesh networks, and mobile ad hoc networks in various applications, such as environmental monitoring, battlefields surveillance, and commercial usage. Furthermore, the ISM band is affected by the interference created by household appliances and electro-mechanical infrastructure. On the other hand, it has also been observed that licensed (reserved) spectrum such as TV white spaces are not being used effectively. As per Federal Communications Commission (FCC) estimate, the licensed spectrum utilization varies between 15% to 85% (Akyildiz, Lee, Vuran, & Mohanty, 2006). Note that the utilization of licensed spectrum is low also due to current spectrum allocation policies (Li, Liu, Li, Liu, & Li, 2013). The huge demand for the spectrum and inefficient spectrum usage has motivated FCC to approve the opportunistic use of licensed spectrum such as TV white spaces (Nekovee, 2009). Consequently, a new network paradigm has emerged, called cognitive radio network.

The CRN is a promising technique to boost spectrum utilization in wireless networks. The spectrum holder node is called primary user (PU). However, PU may not constantly occupy the entire owned (licensed) spectrum. Thus, the nodes that do not own any spectrum get opportunity to use the part of spectrum (channels) unused by PU. Such opportunistic user node is called secondary user (SU). However, SU node must vacate the channel on detecting PU appearance in that channel. In fact, CRN is the network of SU nodes only. The concept of CRN was first introduced by J. Mitola (Mitola & Maguire, 1999) in 1999 to utilize the radio spectrum in opportunistic manner. In article (Akyildiz et al., 2006), two architecture of CRN is discussed: 1) cognitive radio ad hoc network (CRAHN), and 2) infrastructure based CRN. In infrastructure based CRN, a base station exists which controls SU communication and manages the spectrums. Further, CRAHN has two types of network: 1) cognitive radio sensor network, and 2) cognitive radio mobile ad hoc networks. In CRAHN, SU node senses the available channel without interfering to PUs; however, it switches to another channel in case PU appears. Thus, CRAHN is quite challenging environment as compared to mobile ad hoc networks.

Complete Chapter List

Search this Book:
Reset