SlideShare una empresa de Scribd logo
1 de 43
Prepared by: Ameer Sameer Hamood
University of Babylon
Information technology - information networks
Cognitive Radio Networks
Overview
Brief history & Introduction
Characteristics of Cognitive Radio
Cognitive Radio Networks Architecture
Security Issues
Attacks on Cognitive Networks
Cognitive Radio Network Applications
Popular Cognition Techniques
future research direction
Conclusions
Brief history
The term cognitive radio was coined by Mitola in an article he wrote
with Maguire in 1999
and refers to a smart radio that has the ability to sense the external
environment, learn from the history and make intelligent decisions to
adjust its transmission parameters according
to the current state of the environment.
Introduction
The radio spectrum is divided into licensed and unlicensed
frequencies.
The licensed spectrum is for the exclusive use of designated users. For
instance, it includes the UHF/VHF TV frequency bands.
The unlicensed spectrum can be freely accessed by any user, following
certain rules (e.g., not exceeding a defined limit for transmission
power). It includes, for instance, the ISM (Industrial, Scientific and
Medical) and U-NII (Unlicensed National Information Infrastructure)
frequency bands. ISM is shared by technologies such as IEEE 802.11
for wireless local area networks (WLANs), Bluetooth .
The key enabling technology of dynamic spectrum access is
cognitive radio (CR) has emerged as one of the keys that
can help addressing the inefficient usage of the radio
spectrum. It exploits unused licensed radio frequencies,
often designated as spectrum holes see (Figure 1). or white
spaces. CR aims to enable secondary users to autonomously
access spectrum holes in the entire spectrum to increase
performance, as long as they do not harmfully interfere
with primary users. Basically, at a given time and location.
Introduction
(Figure 1) spectrum holes.
Introduction
In order to share the spectrum with licensed users without disturbing
them, and meet the diverse quality of service requirement of
applications, each CR user in a CRN must:
* Determine the portion of spectrum that is available, which is known
as Spectrum sensing.
* Select the best available channel, which is called Spectrum decision.
* Coordinate access to this channel with other users, which is known
as Spectrum sharing.
* Vacate the channel when a licensed user is detected, which is
referred as Spectrum mobility.
See figure (1) Cognitive Cycle .
Introduction
figure (1) Cognitive Cycle
Introduction
Characteristics of Cognitive Radio
cognitive Radio have main characteristics :
1- Cognitive capability
2- Reconfigurable Capability
3- self-organized capability
We can summarize 1- Cognitive capability as follows:
Spectrum sensing
Location identification
Network/system discovery
Service discovery
2- Reconfigurable Capability :
Frequency agility
Dynamic frequency selection
Adaptive modulation/coding (AMC)
Transmit power control (TPC)
Dynamic system/network access
Characteristics of Cognitive Radio
3- self-organized capability
With more intelligence to communication terminal devices, CRs
should be able to self-organize their communication based on sensing
and reconfigurable functions . see figure (3.S) below
Characteristics of Cognitive Radio
Cognitive Radio Networks Architecture
The basic components of CRNs are the mobile station (MS),
base station/access point (BSs/APs) and backbone/core
networks. These three basic components compose three kinds
of network architectures in CRNs:
1- Network architectures
2- Links in CRN
3- IP Mobility Management in CRN
Here only explain network architectures in CRNs:
1- Network architectures
A- Infrastructure-Based
B- Ad-hoc Architecture
C- Mesh Architecture
Cognitive Radio Networks Architecture
1- Infrastructure-Based
In the Infrastructure architecture (Figure 1.1), a MS can only access
a BS/AP in the one-hop manner. MSs under the transmission range of
the same BS/AP shall communicate with each other through the
BS/AP. Communications between different cells are routed through
backbone/core networks. The BS/ AP may be able to run one or
multiple communication standards/protocols to fulfil different
demands from MSs. A cognitive radio terminal can also access various
kinds of communication systems through their BS/AP.
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
Figure 1.1 Infrastructure architecture of a CRN
2- Ad-hoc Architecture
There is no infrastructure support in ad-hoc architecture (Figure 2.1).
The network is set up on the fly. If a MS recognizes that there are
some other MSs nearby and they are connectable through certain
communication standards/protocols, they can set up a link and thus
form an ad-hoc network. Note that these links between nodes may be
set up by different communication technologies. In addition, two
cognitive radio terminals can either communicate with each other by
using existing communication protocols (e.g., WiFi, Bluetooth) or
dynamically using spectrum holes .
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
Figure 2.1 Ad-hoc architecture of a CRN
3- Mesh Architecture
This architecture is a combination of the infrastructure and ad-hoc
architectures plus enabling the wireless connections between the BSs/APs
(Figure 3.1).
This network architecture is similar to the Hybrid Wireless Mesh Networks.
the BSs/APs work as wireless routers and form wireless backbones.
MSs can either access the BSs/APs directly or use other MSs as multi-hop
relay nodes.
Some BSs/APs may connect to the wired backbone/core networks and
function as gateways.
. If the BSs/APs have cognitive radio capabilities, they may use spectrum
holes to communicate with each other
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
Figure 3.1 Mesh architecture of a CRN
2- Links in CRN
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
3- IP Mobility Management in CRN
Security Issues
The question is how to protect the licensed spectrum and
users and also how to avoid unlicensed users from causing
interference with existing licensed users or use of special
reserved frequencies like, e.g., for emergency services.
Other possible security risks are involuntary downloading
of malicious software, licensed user emulation
Attacks on Cognitive Networks
We define an attack on cognitive networks as any activity that results
in :
(a) unacceptable interference to the licensed primary users
Or
(b) missed opportunities for secondary users.
An attack is considered strong if it involves a minimal number of
adversaries performing minimal operations but causing maximum
damage/loss to the primary and or secondary users in the network.
See figure (A.1) explain Layer Attacks :
figure (A.1)
Attacks on Cognitive Networks
Cognitive Radio Network Applications
Cognitive Radio Networking and Opportunistic Spectrum Access can
be used in different applications:
1- Cognitive Mesh Networks
2- Public Safety Networks
3- Disaster Relief and Emergency Networks
4- Battlefield Military Networks
5- Leased Networks
1- Cognitive Mesh Networks
Multi-hop wireless mesh networks have recently gained significant
popularity as a cost-effective solution for last-mile Internet access.
Traditional wireless mesh network are challenged by the scarcity of
the wireless bandwidth needed to meet the high-speed requirements of
existing wireless applications.
by allowing the mesh nodes to dynamically explore any available
spectral opportunities. Such cognitive mesh networks are meant be
used to provide broadband access to rural, tribal, and other under-
resourced regions.
See figure (1.C) explain Cognitive Mesh Networks
Cognitive Radio Network Applications
figure (1.C) Cognitive Mesh Networks
Cognitive Radio Network Applications
2- Public Safety Networks
Public safety networks are used for communications among police
officers and fire and paramedic personnel. Such networks are also
challenged by the limited amount of allocated spectrum. Even with
the recent extensions of the allocated public safety spectrum bands,
the public safety personnel do not have the technology to dynamically
operate across the different spectrum segments. Recall that public
safety licensees have a wide variety of bands available (VHF-Low,
VHFHi,220MHz, UHF below 800, UHF-800, etc.). The cognitive radio
technology can offer public safety networks more bandwidth through
Opportunistic Spectrum Access. Furthermore, a public safety CRN
can provide a substantial communication improvement by allowing
the interpretability across different public safety services while
smartly adapting to the high peak-to-average nature of the traffic
carried out by such networks. See figure (2.P)
Cognitive Radio Network Applications
Cognitive Radio Network Applications
figure (2.P) Public Safety Networks
3- Disaster Relief and Emergency Networks
Natural disasters such as hurricanes, earthquakes, wild fires, or other
unpredictable phenomena usually cause the communications infrastructure to
collapse. For example, some base stations of cellular networks can fall, the
connectivity between sensor nodes and the sink node in static wireless sensor
networks can be lost, existing Wireless Local Area Networks (WLANs) can be
damaged, etc. This results in a set of partially or fully damaged coexistent
networks that were previously deployed and then became disconnected.
Meanwhile, there is an urgent need for a means of communications to help
the rescue teams to facilitate organized help, rehabilitation efforts, and to
locate the disaster survivors. CRNs can be used for such emergency networks.
provide a significant amount of bandwidth that can handle the expected huge
amount of voice, video, and other critical and time-sensitive traffic
See figure (3.D)
Cognitive Radio Network Applications
figure (3.D) Disaster Relief and Emergency Networks
Cognitive Radio Network Applications
4- Battlefield Military Networks
Unfortunately, the recent advances in wireless technologies made the
job of communication jamming and/or hacking much easier.
Consequently, achieving reliable and secure communications in
modern battlefields has become a more challenging task. Recall that a
battlefield communication network provides the only means of
communications between soldiers, armed vehicles, and other units in
the battlefield amongst themselves as well as with the headquarters.
This implies that such networks do not only require significant
amount of bandwidth, but also mandate secure and reliable
communications to carry vital information. The cognitive radio is the
key enabling technology for realizing such densely deployed networks
which use distributed Opportunistic Spectrum Access strategies to
fulfill the bandwidth and reliability needs . see figure (4.B)
Cognitive Radio Network Applications
Cognitive Radio Network Applications
figure (4.B) Battlefield Military Networks
5- Leased Networks
All of the aforementioned CRN applications have the secondary users
exploiting the resources of the primary networks without being
beneficial to the primary networks in any way. However, a primary
network can benefit from leasing a fraction of its licensed spectrum to
secondary operators adopting cognitive radio technology to
opportunistically access the spectrum. The entrance of the secondary
operator to the market of the incumbent primary network can
increase the revenue of the primary licensed operator. See figure(5.L)
Cognitive Radio Network Applications
Cognitive Radio Network Applications
figure(5.L) Leased Networks
Cognitive Radio Network Applications
Popular Cognition Techniques
A list of popular cognition techniques that can be used in CF for the
control of CRNs :
Bayesian signal processing
Dynamic programming
Learning machines with feedback
Game theory
Dynamic frequency management
Software defined radio
Cross-layer protocol design
future research direction
A. Seamless spectrum handovers
B. Proactive spectrum selection and interference avoidance
C. Interdependency between the propagation characteristics of radio
signals and the frequency band in usage
D. Alternatives to the common channel
E. Energy efficiency
F. Validation of CR protocols
Conclusions
1- The radio spectrum is statically allocated and divided between
licensed and unlicensed frequencies.
2- Cognitive Radio is a recent network paradigm that enables a more
flexible and efficient usage of the radio spectrum.
3- The status of a wireless channel can change due to several reasons in
CR, such as node mobility, operating frequency, neighbor interference,
transmission power and primary user appearance.
4-The architecture of CR networks can either be centralized or
distributed.
5- The capabilities of cognitive radios as nodes of CRN can be classified
according to their functionalities based on the definition of cognitive
radio.
Reference
1- Cognitive Radio Networks Book by:
Professor Kwang-Cheng Chen
National Taiwan University, Taiwan
Professor Ramjee Prasad
Aalborg University, Denmark
2- COGNITIVE NETWORKS Towards Self-Aware Networks
Edited by
Qusay H. Mahmoud
University of Guelph, Canada
3- Cognitive Radio Networks
Edited by
Yang Xiao • Fei Hu
4- Cognitive Radio Networks Implementation and Application issues
in India By Lokesh Chouhan , Under the supervision of Prof. Aditya
Trivedi , ABV – Indian Institute of information , Technology &
Management, Gwalior
5- cognitive Radio Network
from Theory to Practice , Springer
Khattab ,A ;Perkins ,D;Bayoumi,M 2013,ISBN:978-1-4614-4032-1
6- Cognitive Radio Networks
Adrian Popescu Dept. of Communications and Computer Systems
School of Computing Blekinge Institute of Technology 371 79 Karlskrona,
Sweden
Reference
7- Cognitive Radio: Technology Survey and Future Research
Directions By : José Marinho , CISUC, University of Coimbra
ISEC, Polytechnic Institute of Coimbra , Coimbra, Portugal
Edmundo Monteiro , CISUC, University of Coimbra ,Coimbra,
Portugal
Reference
Cognitive radio networks

Más contenido relacionado

La actualidad más candente

Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)
asadkhan1327
 

La actualidad más candente (20)

Mm wave
Mm waveMm wave
Mm wave
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Introduction to Wireless Communication
Introduction to Wireless CommunicationIntroduction to Wireless Communication
Introduction to Wireless Communication
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Training on microwave communication
Training on microwave communicationTraining on microwave communication
Training on microwave communication
 
Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radios
 
Propagation Model
Propagation ModelPropagation Model
Propagation Model
 

Similar a Cognitive radio networks

A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
AAKASH S
 

Similar a Cognitive radio networks (20)

Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
CR (1)
CR (1)CR (1)
CR (1)
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
 
Generating Insights
Generating InsightsGenerating Insights
Generating Insights
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Chapter
ChapterChapter
Chapter
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
 
H017225058
H017225058H017225058
H017225058
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
H010524049
H010524049H010524049
H010524049
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 

Más de Ameer Sameer

Más de Ameer Sameer (7)

Web ontology language (owl)
Web ontology language (owl)Web ontology language (owl)
Web ontology language (owl)
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Common linux ubuntu commands overview
Common linux  ubuntu commands overviewCommon linux  ubuntu commands overview
Common linux ubuntu commands overview
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking players
 
Open network operating system (onos)
Open network operating system (onos)Open network operating system (onos)
Open network operating system (onos)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Cognitive radio networks

  • 1. Prepared by: Ameer Sameer Hamood University of Babylon Information technology - information networks Cognitive Radio Networks
  • 2. Overview Brief history & Introduction Characteristics of Cognitive Radio Cognitive Radio Networks Architecture Security Issues Attacks on Cognitive Networks Cognitive Radio Network Applications Popular Cognition Techniques future research direction Conclusions
  • 3. Brief history The term cognitive radio was coined by Mitola in an article he wrote with Maguire in 1999 and refers to a smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according to the current state of the environment.
  • 4. Introduction The radio spectrum is divided into licensed and unlicensed frequencies. The licensed spectrum is for the exclusive use of designated users. For instance, it includes the UHF/VHF TV frequency bands. The unlicensed spectrum can be freely accessed by any user, following certain rules (e.g., not exceeding a defined limit for transmission power). It includes, for instance, the ISM (Industrial, Scientific and Medical) and U-NII (Unlicensed National Information Infrastructure) frequency bands. ISM is shared by technologies such as IEEE 802.11 for wireless local area networks (WLANs), Bluetooth .
  • 5. The key enabling technology of dynamic spectrum access is cognitive radio (CR) has emerged as one of the keys that can help addressing the inefficient usage of the radio spectrum. It exploits unused licensed radio frequencies, often designated as spectrum holes see (Figure 1). or white spaces. CR aims to enable secondary users to autonomously access spectrum holes in the entire spectrum to increase performance, as long as they do not harmfully interfere with primary users. Basically, at a given time and location. Introduction
  • 6. (Figure 1) spectrum holes. Introduction
  • 7. In order to share the spectrum with licensed users without disturbing them, and meet the diverse quality of service requirement of applications, each CR user in a CRN must: * Determine the portion of spectrum that is available, which is known as Spectrum sensing. * Select the best available channel, which is called Spectrum decision. * Coordinate access to this channel with other users, which is known as Spectrum sharing. * Vacate the channel when a licensed user is detected, which is referred as Spectrum mobility. See figure (1) Cognitive Cycle . Introduction
  • 8. figure (1) Cognitive Cycle Introduction
  • 9. Characteristics of Cognitive Radio cognitive Radio have main characteristics : 1- Cognitive capability 2- Reconfigurable Capability 3- self-organized capability We can summarize 1- Cognitive capability as follows: Spectrum sensing Location identification Network/system discovery Service discovery
  • 10. 2- Reconfigurable Capability : Frequency agility Dynamic frequency selection Adaptive modulation/coding (AMC) Transmit power control (TPC) Dynamic system/network access Characteristics of Cognitive Radio
  • 11. 3- self-organized capability With more intelligence to communication terminal devices, CRs should be able to self-organize their communication based on sensing and reconfigurable functions . see figure (3.S) below Characteristics of Cognitive Radio
  • 12. Cognitive Radio Networks Architecture The basic components of CRNs are the mobile station (MS), base station/access point (BSs/APs) and backbone/core networks. These three basic components compose three kinds of network architectures in CRNs: 1- Network architectures 2- Links in CRN 3- IP Mobility Management in CRN
  • 13. Here only explain network architectures in CRNs: 1- Network architectures A- Infrastructure-Based B- Ad-hoc Architecture C- Mesh Architecture Cognitive Radio Networks Architecture
  • 14. 1- Infrastructure-Based In the Infrastructure architecture (Figure 1.1), a MS can only access a BS/AP in the one-hop manner. MSs under the transmission range of the same BS/AP shall communicate with each other through the BS/AP. Communications between different cells are routed through backbone/core networks. The BS/ AP may be able to run one or multiple communication standards/protocols to fulfil different demands from MSs. A cognitive radio terminal can also access various kinds of communication systems through their BS/AP. Cognitive Radio Networks Architecture
  • 15. Cognitive Radio Networks Architecture Figure 1.1 Infrastructure architecture of a CRN
  • 16. 2- Ad-hoc Architecture There is no infrastructure support in ad-hoc architecture (Figure 2.1). The network is set up on the fly. If a MS recognizes that there are some other MSs nearby and they are connectable through certain communication standards/protocols, they can set up a link and thus form an ad-hoc network. Note that these links between nodes may be set up by different communication technologies. In addition, two cognitive radio terminals can either communicate with each other by using existing communication protocols (e.g., WiFi, Bluetooth) or dynamically using spectrum holes . Cognitive Radio Networks Architecture
  • 17. Cognitive Radio Networks Architecture Figure 2.1 Ad-hoc architecture of a CRN
  • 18. 3- Mesh Architecture This architecture is a combination of the infrastructure and ad-hoc architectures plus enabling the wireless connections between the BSs/APs (Figure 3.1). This network architecture is similar to the Hybrid Wireless Mesh Networks. the BSs/APs work as wireless routers and form wireless backbones. MSs can either access the BSs/APs directly or use other MSs as multi-hop relay nodes. Some BSs/APs may connect to the wired backbone/core networks and function as gateways. . If the BSs/APs have cognitive radio capabilities, they may use spectrum holes to communicate with each other Cognitive Radio Networks Architecture
  • 19. Cognitive Radio Networks Architecture Figure 3.1 Mesh architecture of a CRN
  • 20. 2- Links in CRN Cognitive Radio Networks Architecture
  • 21. Cognitive Radio Networks Architecture 3- IP Mobility Management in CRN
  • 22. Security Issues The question is how to protect the licensed spectrum and users and also how to avoid unlicensed users from causing interference with existing licensed users or use of special reserved frequencies like, e.g., for emergency services. Other possible security risks are involuntary downloading of malicious software, licensed user emulation
  • 23. Attacks on Cognitive Networks We define an attack on cognitive networks as any activity that results in : (a) unacceptable interference to the licensed primary users Or (b) missed opportunities for secondary users. An attack is considered strong if it involves a minimal number of adversaries performing minimal operations but causing maximum damage/loss to the primary and or secondary users in the network. See figure (A.1) explain Layer Attacks :
  • 24. figure (A.1) Attacks on Cognitive Networks
  • 25. Cognitive Radio Network Applications Cognitive Radio Networking and Opportunistic Spectrum Access can be used in different applications: 1- Cognitive Mesh Networks 2- Public Safety Networks 3- Disaster Relief and Emergency Networks 4- Battlefield Military Networks 5- Leased Networks
  • 26. 1- Cognitive Mesh Networks Multi-hop wireless mesh networks have recently gained significant popularity as a cost-effective solution for last-mile Internet access. Traditional wireless mesh network are challenged by the scarcity of the wireless bandwidth needed to meet the high-speed requirements of existing wireless applications. by allowing the mesh nodes to dynamically explore any available spectral opportunities. Such cognitive mesh networks are meant be used to provide broadband access to rural, tribal, and other under- resourced regions. See figure (1.C) explain Cognitive Mesh Networks Cognitive Radio Network Applications
  • 27. figure (1.C) Cognitive Mesh Networks Cognitive Radio Network Applications
  • 28. 2- Public Safety Networks Public safety networks are used for communications among police officers and fire and paramedic personnel. Such networks are also challenged by the limited amount of allocated spectrum. Even with the recent extensions of the allocated public safety spectrum bands, the public safety personnel do not have the technology to dynamically operate across the different spectrum segments. Recall that public safety licensees have a wide variety of bands available (VHF-Low, VHFHi,220MHz, UHF below 800, UHF-800, etc.). The cognitive radio technology can offer public safety networks more bandwidth through Opportunistic Spectrum Access. Furthermore, a public safety CRN can provide a substantial communication improvement by allowing the interpretability across different public safety services while smartly adapting to the high peak-to-average nature of the traffic carried out by such networks. See figure (2.P) Cognitive Radio Network Applications
  • 29. Cognitive Radio Network Applications figure (2.P) Public Safety Networks
  • 30. 3- Disaster Relief and Emergency Networks Natural disasters such as hurricanes, earthquakes, wild fires, or other unpredictable phenomena usually cause the communications infrastructure to collapse. For example, some base stations of cellular networks can fall, the connectivity between sensor nodes and the sink node in static wireless sensor networks can be lost, existing Wireless Local Area Networks (WLANs) can be damaged, etc. This results in a set of partially or fully damaged coexistent networks that were previously deployed and then became disconnected. Meanwhile, there is an urgent need for a means of communications to help the rescue teams to facilitate organized help, rehabilitation efforts, and to locate the disaster survivors. CRNs can be used for such emergency networks. provide a significant amount of bandwidth that can handle the expected huge amount of voice, video, and other critical and time-sensitive traffic See figure (3.D) Cognitive Radio Network Applications
  • 31. figure (3.D) Disaster Relief and Emergency Networks Cognitive Radio Network Applications
  • 32. 4- Battlefield Military Networks Unfortunately, the recent advances in wireless technologies made the job of communication jamming and/or hacking much easier. Consequently, achieving reliable and secure communications in modern battlefields has become a more challenging task. Recall that a battlefield communication network provides the only means of communications between soldiers, armed vehicles, and other units in the battlefield amongst themselves as well as with the headquarters. This implies that such networks do not only require significant amount of bandwidth, but also mandate secure and reliable communications to carry vital information. The cognitive radio is the key enabling technology for realizing such densely deployed networks which use distributed Opportunistic Spectrum Access strategies to fulfill the bandwidth and reliability needs . see figure (4.B) Cognitive Radio Network Applications
  • 33. Cognitive Radio Network Applications figure (4.B) Battlefield Military Networks
  • 34. 5- Leased Networks All of the aforementioned CRN applications have the secondary users exploiting the resources of the primary networks without being beneficial to the primary networks in any way. However, a primary network can benefit from leasing a fraction of its licensed spectrum to secondary operators adopting cognitive radio technology to opportunistically access the spectrum. The entrance of the secondary operator to the market of the incumbent primary network can increase the revenue of the primary licensed operator. See figure(5.L) Cognitive Radio Network Applications
  • 35. Cognitive Radio Network Applications figure(5.L) Leased Networks
  • 36. Cognitive Radio Network Applications
  • 37. Popular Cognition Techniques A list of popular cognition techniques that can be used in CF for the control of CRNs : Bayesian signal processing Dynamic programming Learning machines with feedback Game theory Dynamic frequency management Software defined radio Cross-layer protocol design
  • 38. future research direction A. Seamless spectrum handovers B. Proactive spectrum selection and interference avoidance C. Interdependency between the propagation characteristics of radio signals and the frequency band in usage D. Alternatives to the common channel E. Energy efficiency F. Validation of CR protocols
  • 39. Conclusions 1- The radio spectrum is statically allocated and divided between licensed and unlicensed frequencies. 2- Cognitive Radio is a recent network paradigm that enables a more flexible and efficient usage of the radio spectrum. 3- The status of a wireless channel can change due to several reasons in CR, such as node mobility, operating frequency, neighbor interference, transmission power and primary user appearance. 4-The architecture of CR networks can either be centralized or distributed. 5- The capabilities of cognitive radios as nodes of CRN can be classified according to their functionalities based on the definition of cognitive radio.
  • 40. Reference 1- Cognitive Radio Networks Book by: Professor Kwang-Cheng Chen National Taiwan University, Taiwan Professor Ramjee Prasad Aalborg University, Denmark 2- COGNITIVE NETWORKS Towards Self-Aware Networks Edited by Qusay H. Mahmoud University of Guelph, Canada 3- Cognitive Radio Networks Edited by Yang Xiao • Fei Hu
  • 41. 4- Cognitive Radio Networks Implementation and Application issues in India By Lokesh Chouhan , Under the supervision of Prof. Aditya Trivedi , ABV – Indian Institute of information , Technology & Management, Gwalior 5- cognitive Radio Network from Theory to Practice , Springer Khattab ,A ;Perkins ,D;Bayoumi,M 2013,ISBN:978-1-4614-4032-1 6- Cognitive Radio Networks Adrian Popescu Dept. of Communications and Computer Systems School of Computing Blekinge Institute of Technology 371 79 Karlskrona, Sweden Reference
  • 42. 7- Cognitive Radio: Technology Survey and Future Research Directions By : José Marinho , CISUC, University of Coimbra ISEC, Polytechnic Institute of Coimbra , Coimbra, Portugal Edmundo Monteiro , CISUC, University of Coimbra ,Coimbra, Portugal Reference

Notas del editor

  1. usually the 2.4 GHz ISM band allocated in most countries for use by anyone, without a license. Another commonly-used unlicensed band is the 5 GHz UNII band.
  2. spectrum holes Spectrum hole (SH) is defined as a spectrum band that can be utilized by unlicensed users, which is a basic resource for cognitive radio (CR) systems. Most of existing contributions detect SHs by sensing whether a primary signal is present or absent and then try to access them so that the CR and primary users use the spectrum band either at different time slots or in different geographic regions
  3. When an IP mobile host moves to a Visited (or Foreign) Network, a new Care-of Address is assigned to it and notified to the Home Network. At this time, the Home Agent, a node which is in charge of managing the traffic of mobile nodes, creates a soft "binding" state  between the Home Address of the relevant mobile host and its current CoA. Each packet sent by Correspondent Nodes towards the Home Address (other end-systems are unaware of Mobile Host position or movements) is captured by the Home Agent, encapsulated with IP-in-IP technique and tunnelled to the Foreign Network (that is towards the CoA). Then, a suitable network node, the so called the Foreign Agent, is committed to intercept these packets, to de-capsulate them, and finally to send them to the Mobile Host (by means of its Layer 2/MAC address). Many considerations arise from this brief description. First of all it must be noticed that Mobile IP has been developed to provide the user with portability features, that is to allow the mobile host disconnecting from its Home Network and reconnecting to the Internet in any sub-network by adopting Mobile IP protocol, thus without loosing its identity profile. Seamless roaming in wireless environments is not the main goal of Mobile IP and handover procedures may considerably impact the performance of the perceived service. In fact, each handover implies a new CoA assignment and an end-to-end signalling procedure to notify the new position to the Home Agent. During the time interval elapsed from the new CoA assignment to the mobile node till the binding refresh in the Home Agent cache, some data losses may occur, since packets are still addressed to the old CoA. The enhanced Mobile IP version is Mobile IPv6 (not standardized yet) which is enriched by many new features, and a lot of problems of Mobile IPv4 are overcome. However, these new features do not solve the basic problem of Mobile IP when deployed over wireless cellular environments, especially when handover frequency increases (for example when cell dimension decreases or when mobile host mobility increases). The signalling burden, latency and losses implied by frequent end-to-end signalling lead to the conclusion that plain Mobile IPv4/6 are not suitable for this kind of environments.
  4. Note that, the dynamic nature of OSA makes the ability to track and jam a communication more difficult. Thus motivated, DARPA initiated the Wireless Network after Next (WNaN) program aiming at creating a flexible architecture for military communications The main goal of the WNaN program is to develop a low-cost handheld cognitive radio terminal that is capable of selecting its own frequencies and forming a dense network within a large battlefield area.
  5. The primary users treat the set of secondary users as a spectrum consumer. Each primary user sells an unused portion of its spectrum (e.g., time slots in TDMA based wireless system) to the market at price pi (i=1,2,…,N). In this market, the demand of secondary users depends on the prices of per-unit spectrum. Each primary user chooses its own strategy pi to induce the subscription of the secondary users.
  6. Cognitive Framework (CF) has been defined for the control of communication in a cognitive radio network . This is basically a software framework, which is used to map the high-level communication requirements to the underlying network, based on the particular cognitive process used for this.