A cognitive QoS management framework for WLANs
© Pakparvar et al.; licensee Springer. 2014
Received: 26 May 2014
Accepted: 29 October 2014
Published: 15 November 2014
Due to the precipitous growth of wireless networks and the paucity of spectrum, more interference is imposed to the wireless terminals which constraints their performance. In order to preserve such performance degradation, this paper proposes a framework which uses cognitive radio techniques for quality of service (QoS) management of wireless local area networks (LANs). The framework incorporates radio environment maps as input to a cognitive decision engine that steers the network to optimize its QoS parameters such as throughput. A novel experimentally verified heuristic physical model is developed to predict and optimize the throughput of wireless terminals. The framework was applied to realistic stationary and time-variant interference scenarios where an average throughput gain of 344% was achieved in the stationary interference scenario and 70% to 183% was gained in the time-variant interference scenario.
Large-scale growth of wireless networks and spectrum scarcity are introducing more interference than ever. Intensive interference degrades wireless links and may jeopardize continuous connectivity and hence quality of service (QoS) offered to the users.
Cognitive radios (CRs) are becoming a tempting solution to tackle this type of spectrum over-utilization by introducing opportunistic usage of frequency bands that are not heavily occupied by licensed users . The equal regulatory status of wireless terminals on the industrial scientific medical (ISM) band leaves no consideration of a primary user for various wireless networks. Therefore, interoperability of ISM band networks is becoming a key issue that must be solved.
Wireless networks are designed to tackle homogeneous intra/inter network interference by means of various medium access techniques. The efficiency of interference-tackling techniques of the present wireless technologies has been profoundly assessed in the literature. For instance in , a large number of experiments prove that the throughput of IEEE 802.11 wireless local area network (WLAN) is highly dependent on the traffic characteristics of other present Wi-Fi networks.
The objective of this paper is to validate a framework that uses cognitive radio techniques for QoS management of WLANs. Cognitive radio techniques are majorly studied and practiced for operation of secondary users in licensed bands while this framework focuses on deploying such techniques in the unlicensed ISM band. The framework builds on radio environment maps (REMs) that contain PHY spectrum information obtained from a set of environment sensing devices. An experimentally verified heuristic physical model is developed to predict and optimize the throughput of wireless terminals based on the information contained in the REMs. The model is used as the kernel of the cognitive decision engine (CDE).
The novelties presented in this paper are the following: (1) extendable real-time indoor radio environment maps: maps that can be redesigned for any indoor environment, and (2) an experimentally verified heuristic cognitive decision engine which is based on a physical model that predicts throughput as a function of measurable wireless LAN parameters.
The model is derived from a set of exploratory measurements and is validated with various practical measurements in a pseudo shielded experimental testbed building, w-iLab.t .
The rest of this paper is organized as follows. In Section 2, after reviewing the related works, the cognitive framework is outlined. Section 3 describes a set of exploratory measurements we performed to derive a heuristic physical model which servers as the kernel of the cognitive decision engine. In Section 4, the development of the heuristic model is elaborated, and in Section 5, we explain how this model is integrated to the cognitive decision engine. Section 6 presents two proof of concept scenarios for static and time variant interference. Section 7 demonstrates an application outlook of the framework. Section 8 presents the conclusions.
2 The cognitive framework
2.1 Related work
In the context of cognitive frameworks that address efficient interoperability of homo/heterogeneous wireless networks, spectrum monitoring and decision making are the central topics addressed by the authors in the current literature. REMs  play a key role for environment monitoring in many cognitive radio solutions. REMs represent an integrated database providing information such as spectrum availability, regulations, and also the degree of channel utilization . In terms of spectrum utilization, REMs have been proposed to measure power spectral density (PSD) in order to determine the degree of spectrum utilization in a certain geographical area. These models are produced from a set of measurements and the application of spatial interpolation techniques that provide an estimate at locations that lack dedicated measurements . In addition to PSD maps, other authors present channel gain maps that capture information about the propagation medium . In , the authors propose using medium utilization as a metric to be included in the REMs dedicated for wireless LANs. In , REMs have been used to intelligently guide spectrum access for deployment of a prototype of a long-term evolution (LTE) system that opportunistically exploits the spectral white spaces in the upper ultra high frequency (UHF) TV bands.
The decision making mechanisms in the present literature exploit a multitude of artificial intelligence (AI) algorithms to derive proper decisions for operation of the cognitive wireless network. artificial neural networks (ANN) have been used for radio parameter adaptation in CR [9, 10]. The ANN determines radio parameters for given channel states with three optimization goals, including meeting the bit error rate (BER), maximizing the throughput, and minimizing the transmit power. In , it is proposed that the use of ANN characterizes the real-time achievable communication performance in CR. Since the characterization is based on runtime measurements, it provides a certain learning capability that can be exploited by the cognitive engine. The simulation results demonstrate good modeling accuracy and flexibility in various applications and scenarios.
Metaheuristics  are used for combinatorial optimization in which an optimal solution is sought over a discrete search space. Evolutionary algorithms/genetic algorithms (GAs), simulated annealing (SA), tabu search (TS), and ant colony optimization (ACO) are examples of metaheuristic algorithms. Among the various metaheuristic algorithms, the GA has been widely adopted to solve multiobjective optimization problems and to dynamically configure the CR in response to the changing wireless environment [13, 14]. For instance in , a software testbed for CR with the spectrum-sensing capability is implemented and a GA-based cognitive engine to optimize radio parameters for dynamic spectrum access is validated.
Apart from all the aforementioned AI methods, there are also methods in the literature that are based upon ranking the channels in order of their capacity. The ranking is done by characterizing the channel activities and making estimations of the capacity accordingly. For instance, in , the authors derive a physical model for the throughput of WiMax networks based on monitoring physical layer parameter carrier to interference and noise ratio (CINR). In particular, the authors in  propose a spectrum decision framework for cognitive radio networks which addresses QoS management of the secondary users in response to certain events such as appearance of a primary user or degradation of the QoS. Thus, their proposed framework not only accounts for consideration of primary users but also maintains the QoS delivered to the secondary users by making spectrum decision according to the channel activities. The current paper is therefore a logical continuance and extension of  where we share a common architecture for tackling interference and optimizing the QoS. We extend the concept by bringing cognitive radio techniques for QoS management to the ISM band WLANs as well as incorporating radio environment maps to the framework. To this end, we have extended the framework by adding radio environment maps and a cognitive decision engine which utilizes a physical throughput model to estimate and optimize the throughput of the IEEE 802.11 network.
2.2 Setup architecture
The architecture of the cognitive framework is illustrated in Figure 1.
2.3 Construction of the radio environment map
REMs  in this framework (Figure 1) refer to real-time spatial maps of the spectrum. These maps display vital information on spectral utilization across the whole network. As such, they facilitate environment monitoring by presenting relevant parameters that will be elaborated in Section 2.5. REMs can also be used by authorities to monitor spectrum for either finding violations of regulations or finding the so-called white spaces of the spectrum. For instance, apart from the real-life implementation of REMs in , the IEEE 802.22 standard  recommends the authorities to prepare database services (similar to REMs) to provide public access to query for available TV channels. Indoor REMs give unprecedented insight on spectrum utilization in buildings with highly dense exploitation of wireless terminals.
Monitoring of spectrum in the wireless environment is a crucial part of any cognitive radio solution.
There are various solutions that enable wireless environment monitoring. Software-defined radios (SDRs) are advanced devices that are highly utilized within the cognitive radio networks for monitoring the intended bands . Packet sniffers are an alternative solution used for monitoring the activity of a certain wireless technology on a certain band. Combining several packet sniffers on the different intended channels will bring the same functionality of a single software-defined radio device. The low cost and simplicity of implementation in case of the Wi-Fi technology is our motivation to only consider Wi-Fi packet sniffers as sources providing information of the spectrum.
2.4 The cognitive decision engine
The CDE in this framework (see Figure 1) refers to the entity that reconfigures the network with informed decisions that are based on its observation and cognition of the REMs. The architecture of the CDE is illustrated in Figure 3. The decision maker, in general, could be replaced by a human network manager or an automatic cognitive algorithm. The resource manager steers the network in response to the following events:
Connection request: when a new connection is requested from the user.
QoS degradation: when the clients of network under test report degraded quality of service.
Sensing event: when the network under test is not active, this event keeps the decision maker informed of the channel quality on different bands.
The different parameters that affect the performance of the wireless system can be classified as follows:
Uncontrollable parameters: time-varying parameters that can be measured or monitored in the network but cannot be modified directly by the decision engine. They are further subdivided into two classes:
Target parameters (QoS/QoE): these are the parameters that the decision engine aims to optimize by taking corrective actions (e.g., throughput, latency, jitter, packet loss, mean opinion score (MOS)).
Measurable parameters (meters): these are the parameters that define the wireless environment and 'state’ of the wireless system. These parameters are mostly informative (e.g., received signal strength indicator (RSSI) values, channel occupancy).
Controllable parameters (knobs): configurable parameters that can be tuned or controlled by the cognitive decision engine (e.g., transmit power, packet size, location of the wireless entity).
Network under test
Data generation rate
Channel occupancy degree a
Interference TxRate a
Interference power level a
Interference channel a
Selection of the knobs in Table 1 is limited to the controllable parameters of IEEE 802.11g interfaces in the test environment which will be described in Section 3.1.1. Packet size is not considered since it is set primarily by the application and consequently controlled by the IP layer in a process called IP fragmentation to make sure it does not exceed the maximum transmission unit (MTU) . The 1470 UDP packet size is used to avoid fragmentation of the packets.
Considering the audiovisual application of the network, instead of a QoS parameter, one may target a quality of experience (QoE) metric like mean opinion score (MOS) for audio or video streams. The audio MOS depends on QoS parameters, namely latency, jitter, and packet loss . Finally, all meters are useful parameters to be represented on radio environment maps.
3 Exploratory measurements
After describing the network configuration and the experiment setup, we will explain the exploratory measurement campaigns we performed for deriving the physical model of the throughput. Each measurement campaign aims at studying the influence of measurable interference characteristics on the throughput of the network under study.
3.1 Experiment description
3.1.1 Network configuration
3.1.2 Experiment setup
For each of the interference measurement campaigns, a set of experiments is executed. Each experiment consists of two phases: a first phase where the QoS of the link under test is recorded without interference, and a second phase where interference is generated in the environment. Phase 2 of each experiment proceeds as follows: a. Start the interference transmission, b. wait 1 s to ensure interference is on the air, c. start the link-under-test transmission for n seconds, d. wait n seconds, and e. stop all data transmissions. The value of n specified for each measurement is mentioned at the corresponding measurement description. Data generation for the interference link and the link under test has been facilitated by the iperf traffic generator tool . Using a client-server configuration, iperf outputs periodic reports of the throughput. Reports are parsed and stored in a database on the experiment controller server of the testbed.
3.2 Measurement I: influence of the interference channel overlap, power level, and TxRate on the throughput
The first measurement studies the influence of channel overlap of the interference link on the throughput of the link under test. This measurement consists of 70 interference cases for every transmission rate of the interference link, each characterized by the interference channel (five channels) and by the generated interference transmission power (14 levels) as observed at node 19 (see link L1 in Figure 4) caused by interfering node 30 (see IL1 in Figure 4). The channel of the interfering link was varied from channel 6 (full overlap with link under test) to channel 10 (smallest overlap with link under test). For each channel overlap, 14 different interference power levels (dBm) were observed at node 19: [-51,-52,-53,-54,-56,-57,-59,-60,-62,-63,-66,-70,-71,-72].Translation of every specific transmission power of interfering node 30 into interference power levels at node 19 is done by averaging observations of the RSSI levels of packets transmitted from node 30 on the second Wi-Fi interface of the receiving node 19 which is operating on the monitor mode. This measurement was repeated for 2, 18, 36, and 54 Mbps interference transmission rates (TxRateintf)to investigate if the TxRateintf influences the throughput on non-overlapping channels. In all cases, the transmission rate of the LUT is set to the maximum 802.11g rate of 54 Mbps and the COD of the interference link is equal to 100% (see Equation 1). The value of n (duration of the assessment) was set to 150 s in this measurement. Note that interference TxRate of 2 Mbps was not assessed on interference channels of 6 and 7 since the heavy spectrum utilization at 2 Mbps objects data transmission to an extent that iperf does not report any throughput value.
Measurement results in Figure 5 show that the CMSA-CA mechanism of the IEEE 802.11g standard effectively tackles homogeneous interference present on the same channel. Despite the slight variations in the throughput values in Figure 5a, the order of the achieved throughput is preserved for increasing the interference power sensed at the receiver. The variations are the result of non-deterministic spectral competition between the interfering link and the link under test which is introduced by the random back-offs in the DCF algorithm of IEEE 802.11 standards . Figure 5a also shows the dependency of the throughput to the interference TxRate. At lower TxRates, transmission of a fixed length packet lasts longer, causing the spectrum to be shared inefficiently between the interference link and the LUT (also reported in ). This dependency will be more elaborately studied and modeled in Section 3.4.
When the interference channel starts separating from the channel of LUT (Figure 5b channel 7 to Figure 5e channel 10), the channel sensing would become less accurate since only the common portion of the interference channel and LUT channel is sensed by the transmitter of LUT. Hence, the LUT transmitter is likely to sense a busy channel as free which introduces collision and throughput loss. This phenomenon becomes dominant as the channel separation is increased from 1 to 3 (interference on channels 7 to 9, Figure 5b,c,d, respectively). In this case, interference power level plays a key role due to the fact that higher interference signal power increases the probability of collision. Moreover, at worst case interference power level (-52 dBm), the throughput of LUT is higher when the interference TxRate is higher. This is also due to the more efficient spectrum sharing at higher interference TxRates.
When interference operates on channel 7 (Figure 5b), the LUT may recover if the interference power level is above -55 dBm, where the excess interference signal power compensates the missing portion of channel 7 that does not overlap with channel 6. This is apparent in Figure 5a where, for instance, the average throughput of the LUT in the presence of interference with TxRate of 54 Mbps changes from 21 to 13 and 18 Mbps at interference power levels of -72,-60, and -52 dBm, respectively. The other observation is when the interference is on channel 8 or 9 (Figure 5c,d), increasing the interference power level will not recover the throughput; in both cases, the throughput is dropped more than 20 Mbps when the interference power level is 20 dB increased for the interference TxRate of 2 Mbps.In Figure 5e, the throughput is dropped by a factor of 10 Mbps only for the 2-Mbps interference TxRate and the interference power levels above -60 dBm. This behavior is due to the longer spectrum occupancy of low TxRate packets that increases the probability of collision specially at higher interference signal powers. Figure 5e reveals that four-channel separation would avoid throughput loss (caused by collision) only if the interference transmission rate is high, i.e., the spectrum is utilized shorter for packet transmission.
Therefore, channel overlap between the interference source and the network under study is an important parameter that affects the throughput of WLANs. The results of these measurements suggest that in such conditions, if the cognitive decision engine has to select an overlapping channel, it should select the channel which is at least four channels apart (also recommended by the IEEE 802.11 standard ), and if two channels happen to be chosen, the one with the lowest interference power level and the highest interference TxRate should be selected.
3.3 Measurement II: influence of the interference COD on the throughput
The second measurement studies the influence of channel occupancy degree of the interference link on the throughput of the link under test. This measurement consists of 140 interference cases each characterized by a varying COD (10 levels) and a varying generated interference level (14 levels) at node 19 (caused by interfering node 30). The COD was varied from 10% to 100% in 10% steps. For each channel occupancy degree, 14 different interference power levels (dBm) were observed at node 19: [-51,-52,-53,-54,-56,-57,-59,-60,-62,-63,-66,-70,-71,-72].The data generation rate and transmit rate of the LUT were both set to 54 Mbps (COD = 100%). The transmit rate of the interfering link was set to 2 Mbps and was operated on channel 6, the same channel as the LUT. The value of n was set to 500 s.
Channel occupancy degree indicates how the user is occupying the channel in time. Therefore, this metric can easily be calculated if the packet sniffer provides information on the transmission rate of the sniffed packets.
3.4 Measurement III: influence of the interference TxRate on the throughput
where c=9.001, d=0.004, f=-9.344, g=-0.083, and TxRateIntf. denote interference TxRate (see Figure 8). This fit has an R2 value of 0.9952 and an RMSE value of 0.3544 Mbps which is highly accurate.
3.5 Measurement IV: joint assessment of the interference TxRate and interference COD influence on the throughput
4 Development of the model
Data transmission rate of the Wi-Fi interface and the user activity are the key parameters that determine the spectrum utilization by any terminal. For a fixed amount of data transmission, higher transmission rate (TxRate) means less spectrum occupancy in time. Hence, an active user with low transmission rate occupies the spectrum to an extent that users of the other networks in the vicinity experience a much lower than expected throughput.
The model predicts the achievable throughput (T) based on the interference characteristics. The parameters that characterize the interference are the following: COD of the interference, interference TxRate, and interference frequency channel. All parameters are obtainable using the monitor mode of IEEE 802.11 interfaces  and packet tracing applications like libtrace  and tcpdump . Extension to all Wi-Fi channels is feasible by periodic monitoring of all channels or by exploiting more WLAN interfaces at different locations of the network each operating on a single channel.
Due to the dependency of the interference parameters, deriving a decent two-dimensional model to predict the throughput is crucial.
where u(t) is the unit step function, TxRateIntf. denotes interference TxRate, CODIntf. denotes interference COD, and the coefficient parameters should be optimized for the intended link and the intended channel. The nonlinear least square optimization results for measurements on link L3 assign an a0 value of 23.23, b=0.02 and r=0.5. These values are obtained by exploiting all the sample points of measurement IV. Figure 9 illustrates this realization of the model for sample points of link L3.The results of measurement IV show that the threshold of the aforementioned throughput exponential behavior decreases linearly from a COD of 90% for the TxRate of 2 Mbps up to the COD value of 60% for the TxRate of 54 Mbps. Inspired by this behavior, configuration of the step function arguments are optimized by a script that automatically investigates different combinations of the slope (r) and the intercept from a limited interval so that the least square error is achieved. The obtained R2 value is 0.9425 and the RMSE value is 1.34 which show the accuracy of the model when used for the same link it was designed for. In the next section, we will show how the model is used inside the CDE and present its validation measurements.
5 Validation and integration of the model to the framework
In this section, we will show how the model developed in Section 4 will be used as the kernel of the cognitive decision engine. We will first explain how the input arguments of the model are prepared by the REM and will then describe how the CDE steers the network to the optimal configuration set. We will also present the validation measurements configuration and results in this section.
5.1 Monitoring of wireless environment
Using these relations, we can characterize the interference originating from several sources and give final values to the CDE for decision making. We should note that the COD estimations are accurate only if the sniffer captures the whole present Wi-Fi traffic without dropping any packets which is the case in our measurements. For coping with high data rates, we ensured zero packet drop by optimizing the script that was handling the tcpdump. This is realized by enlarging the tcpdump input buffer and dedicating more computational power to the corresponding process.
5.2 Decision making
Whenever a decision is requested from the CDE, it queries the REM for values of CODIntf. and TxRateIntf. for each channel. Once the inputs are ready, the CDE invokes the model on the channels with available inputs. The result is a vector of throughput estimations for every channel. Choosing the channel with the highest throughput value ignores the interference of overlapping channels. Therefore, if interference channels overlap with the monitored channels, the CDE should follow a rule-of-thumb approach where it takes into account both estimated throughput and the least interference influence from neighboring channels. The influence of interference from neighboring channels can be formulated by the results of measurement I, i.e., the CDE selects the channel with the least interference power level and the highest interference TxRate.
5.3 Model validation measurements
The objective of these measurements is to verify the two-dimensional model of Equation 4 for different sender-receiver distances, different link locations, different interference power levels, and different number of interference links. To this end, different combinations of LUT terminals with various distances of sender-receiver were used in combination with various number of interference links. The links used as LUT are illustrated in Figure 4: links L2 and L4 are replications of L1 and L3, respectively, at other locations. L5 and L6 are other links used as LUT in these measurements. There are also three interference links IL1, Il2, and IL3 evenly spaced among the testbed (see Figure 4). When there is more than one interference link present, the sniffer derives the TxRateIntf.,eq. and CODIntf.,eq. by using Equations 5 and 6,respectively.
For each location of the LUT, we investigate three cases for validating the model by utilizing one, two, and three interference sources simultaneously operating on the same channel of LUT. Each case is repeated with an interference transmission power of [0,10,14,20] dBm where we measure the average achievable throughput in a 10-s interval with interference TxRates of [2, 11, 18, 24, 36, 48, 54] and interference COD values starting from 0% to 100% in steps of 6.25%. All links are set to channel 6 and the transmit power of all terminals is set to 20 dBm. The TxRate of the LUT is set to 54 Mbps and its COD is set to 100% such that the maximum achievable throughput is measured.
5.4 Validation results
The model obtained by using measurements at link L3 is assessed with measurements on links L1, L2, L4, L5, and L6.
The results of measurements with a single interference link are listed in Table 2.Table 2
Statistics of the verifying measurements with one interference link
The results of measurements with more than one interference link are listed in Table 3.Table 3
Statistics of the verifying measurements with more than one interference link
The maximum deviation values of 2.9 Mbps for single interference link (Table 2) and 4.3 Mbps for multiple interference link (Table 3) might seem not ideal but having all R2 values above 0.83 and the RMSEs not exceeding 1.9 Mbps. The CDE would safely use this model for comparing the performance of the link on different channels. One should be cautious that the objective of the CDE is to optimize the throughput rather than accurately estimating it. Hence, the model optimized for a single link location can serve to predict the throughput at other links. This measurement setup was limited to the line-of-sight node locations and open environment propagation characteristics of the testbed. The tolerance of the model to location variability of the interference within the line-of-sight environment is a good incentive to use it for similar environments like home and conference halls where the dominant propagation channel is line-of-sight. However, measurements to support this extension is the subject for future research. One the other hand, for environments with more diverse propagation characteristics and larger sender-receiver distances, the same methodology could be used to derive appropriate models for each type of environment.
6 Proof of concept
We investigate two scenarios in this proof of concept to show the relevance of integrating the physical throughput model into the CDE and also the efficiency of using the proposed framework to tackle interference and bring added value to the wireless network. In the first scenario, the CDE is used in a simplistic interference condition where interference characteristics are static, i.e., the CODIntf.,eq. and TxRateIntf.,eq. are stationary on every channel. In the second scenario, the interference characteristics on all channels are varied over time.
6.1 Static interference
Characteristics of the interference sources and the estimated and actual achieved throughputs ( T est. and T actual , respectively)
T e s t . (Mbps)
T actual (Mbps)
The LUT was initially operating on channel 1. The results show that if there was no CDE, the LUT had to survive with a throughput of 2.45 Mbps. This scenario shows that the CDE can steer the network to a better status by estimating the throughput on other channels. As such, by changing towards the channel proposed by the CDE (channel 11) the LUT can achieve a throughput of 10.9 Mbps which shows a 344% improvement. The results of this proof of concept also show the accuracy of the proposed model in estimating the throughput.
6.2 Time variant interference
In this section, we investigate a scenario with time variant interference profiles. The interference is varied over time by periodically changing the interference profile of each channel. At the beginning of each interval, the interference profile is varied by changing the number of interference links and their corresponding COD and TxRate on each channel and it is fixed until the end of the interval. We assume that only IEEE 802.11g channels 1 and 6 are available. The duration of the interval should be selected such that the sniffer would be capable of characterizing the interference on all the intended channels.
The duration of each interval in this scenario is set to 60 s firstly to ensure proper interference characterization and secondly to balance the interference dynamism. At the end of each interval, the CDE uses the collected information to steer the channel of LUT in order to optimize its throughput. The transition time depends majorly on the duration of the sniffing process. Lower sniffer intervals maintain smoother operation of the CDE. However, they are likely to lose interference profile changes if they are placed on the edge of profile change. We have used the CDE with two sniffer durations of 5 and 10 s. Table 5 shows the interference profile of each interval on each of the channels. In the first three intervals (0 to 180 s), there is a single interference link on any of the channels. During the intervals from 181 to 300 s, on one of the channels, there is interference from two links. In the last interval (301 to 360 s), channel 1 has interference from three interfering links and channel 6 has a single interfering link. For intervals in Table 5 where there is more than one interference link, the equivalent interference configuration is listed before individual link configurations in brackets. The LUT is located on L5 (see Figure 4). The second Wi-Fi interface of the LUT transmitter scans the channels 1 and 6 sequentially. The CDE has to find the channel with the highest throughput estimation (Test.) based on the proposed model. We also measured average throughput of LUT (Tactual) in a separate measurement with the same interference profiles but without using the CDE to switch the channel of the LUT.
Characteristics of the interference sources during each interval
C O D e q .
T x R a t e e q .
C O D e q .
T x R a t e e q .
0 to 60
61 to 120
121 to 180
181 to 240
20 [10, 10]
241 to 300
40 [20, 20]
18 [18, 18]
301 to 360
[IL1, IL2, IL3]
45 [15, 15, 15]
54 [54, 54, 54]
6.3 Discussion on the limitations
Firstly, the model is developed in a pseudo-shielded all line-of-sight single-hop environment where the measurements were performed. The hidden node problem is not taken into consideration since it is not an issue in this environment. More precisely, the model does not consider interference of nodes that are not in the radio range of the sniffers. The sniffers are assumed to capture all present traffic without dropping any packets. If for any reason (other ISM band interference such as Bluetooth, microwave ovens, and ZigBee) the interference is not perceived by the sniffers, the event detector of the CDE (see Figure 3) assists by detecting the unpredicted throughput degradation in the network.
Secondly, the physical model is developed for UDP traffic since its objective was to find the maximum capacity of the channel given a certain interference profile. If the application requires a reliable end-to-end connection, the same methodology we have incorporated in this paper shall be used to create a model which accounts for TCP traffic.
Thirdly, deploying both the CDE and the REM imposes data and processing overhead on the network. Spectrum monitoring data overhead could be formulated in two cases depending on the mobility of spectrum sensing devices. For a distributed spectrum sensing which collects information from fixed and mobile terminals, the data overhead to update the REM would scale with the number of mobile terminals and update the frequency of the REM. Excluding mobile devices from spectrum monitoring and only depending on the fixed Wi-Fi sniffers do not introduce any data overhead to the wireless network. Event detection also imposes data overhead to the wireless network which would be negligible short-length data packets in the order of a few bytes for each event.
7 Application outlook of the framework
The goal of this section is to showcase the usefulness of the REMs and the proposed methodology in this cognitive framework when it is used for optimizing either throughput or audio quality in a multicast scenario. Here, the network under test (NUT) comprises a number of clients that are spread evenly among the w-iLab.t testbed. Depending on the target QoS metric (throughput or audio quality), the clients will listen to the audio stream or iperf multicast stream that is generated by the stream server that is at the same time the access point of the NUT. Interference networks are fixed in location although the interference profile, i.e., traffic characteristic of the interference, is adjustable.
When the user initiates the scenario, the audio/iperf stream server starts to transmit multicast audio/iperf traffic with an initial set of traffic configurations. If the target QoS metric is audio quality, at the same time, all clients will translate their received network characteristics (throughput, delay, and jitter) into audio MOS scores (in a scale of 1 to 5, where 1 corresponds to the poorest quality and 5 to the highest) and store the result in the DB. The MOS value is calculated by the E Model proposed by the ITU G.107 recommendation . The REM will then illustrate the interpolated map of the MOS/throughput and other relevant parameters and feeds the necessary arguments to the CDE.
When the corrective actions have been implemented and the MOS/throughput have been illustrated by the REM, we need to assess the efficiency of corrective actions, i.e., how much the network is performing better in terms of the intended metric (MOS/throughput). To address this, we define the objective of the scenario in the next paragraph.
All clients are set to the default (initial) configuration set.
While there is no interference in the environment, the NUT starts the first round of audio/iperf stream and all the clients record their MOS/throughput.
Based on the results of the previous round, the REM represents the QoS values and the CDE will optimize the configuration set by means of the corrective actions.
The interference network is set to its default profile. The interference stream starts here.
While there is interference on the air, the NUT starts another round of audio/iperf streaming. As before, all clients keep track of the QoS values.
At this step, the REM and/or the CDE should quantify the added value of the corrective actions in terms of △MOS, throughput, energy, etc.
If the objective is achieved, the iteration will stop; otherwise, CDE implements corrective actions to the NUT and the iteration starts again from 4.
This is a very simple example of how the models can be used. Future research will comprise the development of physical models for audio/video QoS metrics and a CDE based on the corresponding models.
8 Conclusion and future work
A novel framework for cognitive wireless networking is proposed in this paper. The framework comprises different elements. REMs and the cognitive decision engine are the most integral parts of the framework to characterize the radio environment and make appropriate decisions reactively to the environment dynamism. Based upon numerous exploratory measurements, a novel physical throughput model accounting for interference channel occupancy degree and interference transmission rate was devised and verified in a pseudo-shielded testlab environment. The model was implemented within the CDE. The framework was applied to realistic stationary and time-variant interference scenarios where an average throughput gain of 344% was gained in the stationary interference scenario and 70% to 183% was gained in the time-variant interference scenario.
Future research on this framework includes comparison of the performance of the CDE based on the proposed model with smarter higher level algorithms and the integration of this type of physical modeling with other decision algorithms to achieve more efficient algorithms. The physical model was developed in a pseudo-shielded line-of-sight environment; therefore, on the one hand, extension to other line-of-sight environments like home or conference halls should be investigated, and on the other hand, incorporating the same methodology to develop similar models for other types of environments would be the topic of further research.
This work was supported by the iMinds-ICON QoCON project, co-funded by iMinds, a research institute founded by the Flemish Government in 2004, and the involved companies and institutions. DD is a Post-Doctoral Fellow of the FWO-V (Research Foundation - Flanders). The research is also partly funded by the Fund for Scientific Research - Flanders (FWO-V, Belgium) project G.0325.11N.
- Mitola IJ, Maguire JGQ: Cognitive radio: making software radios more personal. IEEE Pers. Commun 1999, 6(4):13-18. doi:10.1109/98.788210 10.1109/98.788210View ArticleGoogle Scholar
- Plets D, Pakparvar M, Joseph W, Martens L: Influence of intra-network interference on quality of service in wireless LANs. In Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). London, UK; 2013.Google Scholar
- Bouckaert S, Becue P, Vermeulen B, Jooris B, Moerman I, Demeester P: Federating wired and wireless test facilities through Emulab and OMF: the iLab.t use case. In Proceedings of TridentCom. Thessaloniki, Greece; 2012.Google Scholar
- Zhao Y: Enabling cognitive radios through radio environment maps. PhD thesis, Virginia Polytechnic Institute and State University, Blacksburg, Virginia. 2007.http://scholar.lib.vt.edu/theses/available/etd-05212007-162735/ . Accessed 28 June 2013Google Scholar
- Riihijarvi J, Mahonen P, Wellens M, Gordziel M: Characterization and modelling of spectrum for dynamic spectrum access with spatial statistics and random fields. In IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Cannes, France; 2008:1-6. doi:10.1109/PIMRC.2008.4699912Google Scholar
- Kim S-J, Dall’Anese E, Giannakis G: Cooperative spectrum sensing for cognitive radios using Kriged Kalman filtering. IEEE J. Selected Topics Signal Process 2011, 5: 24-36.View ArticleGoogle Scholar
- Portoles-Comeras M, Ibars C, Nunez-Martinez J, Mangues-Bafalluy J: Characterizing WLAN medium utilization for radio environment maps. In 2011 IEEE Vehicular Technology Conference (VTC Fall). San Francisco, CA, USA; 2011:1-5. doi:10.1109/VETECF.2011.6093284View ArticleGoogle Scholar
- van de Beek J, Lidstrom E, Cai T, Xie Y, Rakovic V, Atanasovski V, Gavrilovska L, Riihijarvi J, Mahonen P, Dejonghe A, Van Wesemael P, Desmet M: REM-enabled opportunistic, LTE in the TV band. In IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN). Bellevue, WA, USA; 2012:272-273. doi:10.1109/DYSPAN.2012.6478140Google Scholar
- Hasegawa M, Tran H-N, Miyamoto G, Murata Y, Kato S: Distributed optimization based on neurodynamics for cognitive wireless clouds. In IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Athens, Greece; 2007:1-5. doi:10.1109/PIMRC.2007.4394658Google Scholar
- Zhang Z, Xie X: Intelligent cognitive radio: research on learning and evaluation of CR based on neural network. In ITI 5th International Conference on Information and Communications Technology (ICICT). Cairo, Egypt; 2007:33-37. doi:10.1109/ITICT.2007.4475612Google Scholar
- Baldo N, Zorzi M: Learning and adaptation in cognitive radios using neural networks. In 5th IEEE Consumer Communications and Networking Conference (CCNC). Las Vegas, NV, USA; 2008:998-1003. doi:10.1109/ccnc08.2007.229Google Scholar
- Blum C, Roli A: Metaheuristics in combinatorial optimization: overview and conceptual comparison. ACM Comput. Surv 2003, 35(3):268-308. doi:10.1145/937503.937505 10.1145/937503.937505View ArticleGoogle Scholar
- Thilakawardana D, Moessner K: A genetic approach to cell-by-cell dynamic spectrum allocation for optimising spectral efficiency in wireless mobile systems. In 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom). Orlando, FL, USA; 2007:367-372. doi:10.1109/CROWNCOM.2007.4549825Google Scholar
- Kim JM, Sohn SH, Han N, Zheng G, Kim YM, Lee JK: Cognitive radio software testbed using dual optimization in genetic algorithm. In 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom). Singapore; 2008:1-6. doi:10.1109/CROWNCOM.2008.4562484Google Scholar
- De Bruyne J, Joseph W, Verloock L, Olivier C, De Ketelaere W, Martens L: Field measurements performance analysis of an 802.16 system in a suburban environment. Wireless Commun. IEEE Trans 2009, 8(3):1424-1434. doi:10.1109/TWC.2009.080085View ArticleGoogle Scholar
- Lee W-Y, Akyldiz IF: A spectrum decision framework for cognitive radio networks. Mobile Comput. IEEE Trans 2011, 10(2):161-174. doi:10.1109/TMC.2010.147View ArticleGoogle Scholar
- IEEE: IEEE Std 802.22-2012: IEEE Recommended Practice for Information Technology-Telecommunications and Information Exchange Between Systems Wireless Regional Area Networks (WRAN)—Specific Requirements Part 22.2: Installation and Deployment of IEEE 802.22 TM Systems. IEEE, Piscataway; 2012.Google Scholar
- Liu W, Pareit D, Poorter ED, Moerman I: Advanced spectrum sensing with parallel processing based on software-defined radio. EURASIP J. Wireless Commun. Netw 2013, 2013(1):228. doi:10.1186/1687-1499-2013-228. Accessed 26 May 2014 10.1186/1687-1499-2013-228View ArticleGoogle Scholar
- Shepard D: A two-dimensional interpolation function for irregularly-spaced data. In Proceedings of the 1968 23rd ACM National Conference. Las Vegas, NV, USA; 1968:517-524. doi:10.1145/800186.810616View ArticleGoogle Scholar
- Plets D, Joseph W, Vanhecke K, Tanghe E, Martens L: Coverage prediction and optimization algorithms for indoor environments. EURASIP J. Wireless Commun. Netw 2012, 2012(1):1-23. doi:10.1186/1687-1499-2012-123 10.1186/1687-1499-2012-1View ArticleGoogle Scholar
- Information Sciences Institute, University of Southern California: RFC 791: Internet Protocol. University of Southern California, Los Angeles; 1981.Google Scholar
- ITU-T Study Group 12: ITU-T Recommendation G.107. International Telephone Connection and Circuits. General Definitions, The E model, a Computational Model for Use in Transmission Planning. 2014. International Telecommunication Union. http://handle.itu.int/11.1002/1000/12120Google Scholar
- Iperf: The TCP/UDP bandwidth measurement tool. . Accessed 19 July 2013 http://iperf.fr/
- IEEE: IEEE Std 802.11-2012: IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks?Specific Requirements part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (Revision of IEEE Std 802.11-2007). 2012, 1-2793.Google Scholar
- Heusse M, Rousseau F, Berger-Sabbatel G, Duda A: Performance anomaly of 802.11b. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. San Francisco, CA, USA; 2003:836-8432. doi:10.1109/INFCOM.2003.1208921Google Scholar
- Alcock S, Lorier P, Nelson R: Libtrace: a packet capture and analysis library. ACM SIGCOMM Computer Communication Review 2012, 42-48. doi:10.1145/2185376.2185382Google Scholar
- Tcpdump/Libpcap: tcpdump: a powerful command-line packet analyzer. . Accessed 19 July 2013 http://www.tcpdump.org/
- Gamal AE, Mammen J, Prabhakar B, Shah D: Throughput-delay trade-off in wireless networks. INFOCOM 2004, 1: 475. doi:10.1109/INFCOM.2004.1354518Google Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.