SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776
772 | P a g e
Prediction Based Channel Selection for Cognitive Radio
Networks
Poornima B V (M.Tech) 1
, Assoc. Prof. Padmanayana2
1, 2
(Department of Computer Science, Srinivas Institute of Technology, Mangalore, India
ABSTRACT
This paper proposes a novel prediction
based packet delivery combined with novel
medium access control (MAC) scheme for
multichannel cognitive radio (CR) ad hoc
networks, which achieves high throughput of CR
system while protecting primary users (PUs)
effectively. In designing the scheme, we consider
that the PU signal may cover only a part of the
network and the nodes can have the different
sensing result for the same PU even on the same
channel. By allowing the nodes to use the channel
on which the PU exists as long as their
transmissions do not disturb the PU, the
proposed MAC scheme fully utilizes the
spectrum access opportunity. In addition, based
on the past behavior we select the primary
channel to use. To mitigate the hidden PU
problem inherent to multichannel CR networks
where the PU signal is detectable only to some
nodes, the proposed MAC scheme adjusts the
sensing priorities of channels at each node with
the PU detection information of other nodes and
also limits the transmission power of a CR node
to the maximum allowable power for
guaranteeing the quality of service requirement
of PU. The performance of the scheme is
evaluated by using simulation. The simulation
results show that the CR system with the
proposed MAC accomplishes good performance
in throughput and packet delay, while protecting
PUs properly.
Keywords— Security, CR networks, denial of sleep
attack, ARIMA, SARIMA
I. INTRODUCTION
COGNITIVE radio (CR) has been
attracting great attention from researchers as one of
the most feasible solutions to the problem of
spectrum scarcity in wireless communications. In
CR systems, the nodes search spectrum band not
being used by the licensed primary user (PU), called
a spectrum hole, and use a part (or the whole) of the
spectrum hole as their communication channel [1].
Since a CR system should not interfere with the PU,
it has to release the channel as fast as possible when
the PU is activated. Therefore, the spectrum sensing
for finding empty channels and the channel
switching to another empty channel at the PU
appearance are the key operations of CR systems
that distinguish them from the conventional wireless
networks [2], [3].
Recently, a standard for wireless regional
area networks (WRANs) that adopt the CR
technology for providing internet access to sparsely
populated rural and remote areas has been
developed by IEEE 802.22 Working Group [4], and
IEEE 802.11h Task Group completed the
enhancement of IEEE 802.11 standard for operating
802.11 wireless local area networks (WLANs) on
the 5 GHz licensed band in Europe [5]. Also,
various wireless networks that utilize the CR
technology under ad hoc environment have been
proposed in the literature (e.g., [6]).
Most of the CR-based ad hoc networks
proposed up to recently operate on multiple
channels in order to fully utilize the spectrum access
opportunity without a centralized controller [7], [8],
[9], [10], [11], [12], [13], [14]. In these networks, a
CR node transmits data traffic using one or more
channels that are identified as empty at the time of
data transmission, and releases the channels
immediately after transmission. Therefore, the
design of the medium access control (MAC) scheme
for these multichannel CR ad hoc networks is
focused on the efficient sensing of multiple channels
rather than the channel switching.
Some multichannel CR ad hoc networks
(e.g., [8], [9]) adopt the policy to lower the
possibility to use the PU existence channels at the
cost of the increased data transmission delay of CR
nodes, by carrying out the channel sensing just
before the transmission of data traffic (just-before-
transmission sensing). In [8], when a CR node wants
to transmit traffic, it first reserves a data channel and
then checks whether the channel can be or not used
for traffic transmission, by sensing it. Since the CR
node repeats the work to reserve a channel and sense
it until an empty channel is got, the node may suffer
a long delay to obtain the channel for traffic
transmission. To reduce this delay, [9] has proposed
the scheme where the nodes having data traffic
contend for obtaining the right of using the entire
channel and the winner acquires all channels. Then,
the winner senses sequentially the channels until
finding as many empty channels as it needs, and
transmits its traffic over the found empty channels.
Since only the winner can use the data channels, the
concurrent transmission by several nodes is not
allowed even though there remain empty channels.
Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776
773 | P a g e
Under the environment that the PU signal covers
only a part of the network, since the nodes can have
different sensing outcomes, the channel state
information of a node may be worthless to other
nodes. Thus, each node should sense individually all
channels for getting more vacant channels.
However, since a CR node usually senses one
channel at a time, the channel state information may
be inaccurate due to the long sensing interval of
each channel.
As a result, there may be the channels
which are not actually empty but are regarded as
empty by the node, i.e., the channels with hidden
PU. The occurrence of hidden PU on a channel can
be reduced with the shorter sensing interval of the
channel. When a node should sense all channels one
at a time, it can shorten the sensing interval of a
channel by optimally setting the channel sensing
duration. Liang et al. [16] have designed the optimal
sensing duration for maximizing the achievable
throughput of CR system while protecting PU
sufficiently. On the other hand, a CR node may find
the hidden PUs by exploiting the channel state
information of other nodes. Nan et al. [10] have
partially solved the hidden PU problem, by letting
both the sender and receiver nodes inquire of their
neighbors about vacancy of candidate channels
before selecting a data channel. Although this
scheme decreases the occurrence rate of hidden
PUs, there may exist still the channels with hidden
PU. Therefore, the CR networks should provide the
mechanism for protecting the hidden PUs. Salameh
et al. [17] have designed a CR MAC protocol to
protect PUs, by limiting the transmission power of a
CR node so as that the total interference power at a
PU receiver does not exceed a threshold with given
probability.
Once the primary user becomes available, the
other users using the channel has to relinquish the
channel. The data transfer must be started once
again by acquiring the channel. This reduces the
throughput of the system & also increases the data
latency. In this paper, we study the above problem
in detail and propose a solution to prevent this
problem and increase the throughput & reduce the
latency.
II. Literature Survey
“A Novel MAC Scheme for Multichannel
cognitive radio adhoc networks” proposed by Wha
Sook Jenon is the most recent work on cognitive
work which is base on which our work is based.
They considered a CR-based ad hoc
network using multiple channels. There are one
control channel and N data channels within the
network. It is assumed that CR network will not be
disturbed by PUs in accessing the control channel.
The transmission power of a CR node on the control
channel is set to be high enough that the packets
transmitted through the control channel can be
decoded by all nodes within the CR network. In
other words, the transmission range of a CR node on
the control channel covers the whole network. The
data channels are licensed to PUs and can be
opportunistically used by the CR nodes. In the
environment under consideration, the PU signal can
have influence not on the whole CR network but on
only a part of the CR network. That is, there exist
the nodes that cannot detect the PU activation,
within the CR network.
On the other hand, a CR node should
transmit data traffic with the controlled power as
low as possible so as not to largely disturb PU even
when it does not know the existence of a PU by
failing to detect the PU. For example, in Fig. 1, the
node A which has detected the PU signal on the
channel i uses another channel (let’s say, the
channel k) to transmit its data traffic, whereas the
node B located out of the sensing range of the PU
signal cannot find the PU and may transmit data
traffic through the channel i. In this case, the
transmission power of the node B should be
controlled so that the signal from the node B does
not seriously interfere with the PU. We consider the
networks where the CR nodes transmit data traffic
with power lower than the maximum allowable
power, which is defined as the maximum
transmission power for guaranteeing the QoS
requirement of the PU. In Appendix, available in the
online supplemental material, we calculate the
maximum allowable transmission power of a CR
node for maintaining the outage probability of PU
transmission below the predefined value. When a
CR node does not detect the PU signal on a data
channel, the node is allowed to access the channel
with transmission power lower than the maximum
allowable power, irrespective of the sensing results
of other nodes. The maximum allowable power is
unlikely to be high enough that all nodes within the
network can overhear the packets on a data channel.
Thus, only some nodes adjacent to the sender node
can decode the data packets. We will call these
nodes one-hop neighbors of the sender. In Fig. 1, the
nodes C and D are one-hop neighbors of the node B.
Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776
774 | P a g e
In their proposed MAC, each CR node is
equipped with two transceivers: one is dedicated to
the control channel (the control transceiver) and the
other is used to sense data channels and
transmit/receive traffic on data channels (the data
transceiver). The CR node uses the control channel
to transmit channel management packets or to
reserve a data channel for traffic transmission. For
simple description, a data channel will be called
shortly a channel, if there is no confusion with the
control channel. In addition, we regard a data
channel not being used by all CR nodes within the
network as an idle channel. An empty channel
means a data channel where a PU is not activated.
Time for channel sensing is not regularly
arranged on a channel time. Thus, whenever its data
transceiver is not being used for data
transmission/reception, a CR node selects the idle
channel with highest sensing priority and carries out
sensing for the selected channel (opportunistic time
for channel sensing is not regularly arranged on a
channel time. Thus, whenever its data transceiver is
not being used for data transmission/reception, a CR
node selects the idle channel with highest sensing
priority and carries out sensing for the selected
channel (opportunistic sensing), independent of
other nodes. The sensing priority of a channel will
be explained in detail later. Since each CR node is
able to sense one data channel at a time, even
though the PU has appeared on a channel, the CR
node does not know the PU activation until the node
itself senses the channel. This detection delay can be
shortened if the nodes receive an explicit notice for
PU appearance. With the proposed scheme, a CR
node that has found earliest the PU appearance on a
channel within the network broadcasts an urgent
sensing request (US_REQ) packet so that the other
nodes carry out quiet sensing on the corresponding
channel as soon as possible. It is noted that all nodes
within the network can hear this packet since the
transmission range of the control channel covers the
whole network. The node that receives the US_REQ
packet senses the channel as soon as its data
transceiver becomes idle (urgent sensing).
III. Overview of Proposed Solution
The current solution in cognitive network
uses the primary channel till the time primary users
are available. Once the primary users are sensed,
then the channel must be released immediately. The
ongoing data transfer should be aborted. This will
reduce the overall throughput of the system and the
data transfer should be started again, it will increase
the packet delivery length. To solve this problem we
propose a mechanism based on the prediction of
availability of channel.
Once the channel availability time is
predicted, the time to occupy the channel can be
calculated. Based on this time, the data transfer can
be scheduled. This mechanism will improve the
throughput of the system & also effectively manage
data latency.
IV. DETAILS OF PROPOSED
METHOD
In the proposed solution secondary users
must sense the use of primary user channels. Based
on the monitoring of the primary user channels, it
constructs a time series model to predict the usage
trend of primary channel.
ARIMA is a popular family of time-series
models that are commonly used for studying
weather and stock market data. Seasonal ARIMA
models (also known as SARIMA) are a class of
ARIMA models that are suitable for data exhibiting
seasonal trends and are well-suited for sensor data.
Further they offer a way to deal with non-stationary
data i.e., whose statistical properties change over
time [1]. Last, as we demonstrate later, while
seasonal ARIMA models are computationally
expensive to construct, they are inexpensive to
check at the remote sensors—an important property
we seek from our system.
We model the time series of observations at
a node as an Autoregressive Integrated Moving
Average (ARIMA) process. In particular, the data is
assumed to conform to the Box-Jenkins SARIMA
model [1]. While a detailed discussion of SARIMA
models is outside the scope of this paper, we
provide the intuition behind these models for the
benefit of the reader. An SARIMA process has four
components: auto-regressive (AR), moving-average
(MA), one-step differencing, and seasonal
differencing. The AR component estimates the
current sample as a linear weighted sum of previous
samples; the MA component captures relationship
between prediction errors; the one-step differencing
component captures relationship between adjacent
samples; and the seasonal differencing component
captures the diurnal, monthly, or yearly patterns in
Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776
775 | P a g e
the data. In SARIMA, the MA component is
modeled as a zero-mean, uncorrelated Gaussian
random variable (also referred to as white noise).
The AR component captures the temporal
correlation in the time series by modeling a future
value as a function of a number of past values.
Each cognitive node applies SARIMA
method to learn the prediction model for the finding
the time at which the primary user is going to use
the channel. When the secondary node has some
data to be sent, it will use the model to find the time
when the channel will be free and duration till it will
get occupied once again. Accordingly it will
schedule the data transfer. Also in case of selecting
among multiple primary channels, it can build
multiple SARIMA model for each primary user
channel. It will then choose the primary user
channel which can transfer the data with no failures.
When a single channel usage is alone is not
sufficient to send the data, multiple channels can be
used or data transfer can be done in batches. This
way, delivery latency is also reduced.
V. PERFORMANCE ANALYSYS
We implemented the proposed solution in
NS2 and analyze the performance of the system in
terms of throughput & data delivery latency. We did
this for cognitive networks by varying the secondary
to primary user ratio. The rate of channel usage for
the primary user is uniform poison distribution. The
secondary user use the channel is random
distribution. At the end of simulation, we measure
the average data delivery latency & the throughput
of the system.
From it we found that by using prediction using
ARIMA, we are able to reduce the latency by 10%
and increase the throughput by around 20%.
VI. CONCLUSION
By introducing the prediction, we were
able to increase the throughput of the system. The
throughput increases because we have avoided the
number of aborted data flows. Also retransmissions
have been avoided which decreases the delay.
ARIMA is the prediction algorithm used. In future
we plan to add some other prediction mechanism
like neural network & SOM to further improve the
prediction accuracy. The improved prediction
accuracy will contribute to increased throughput.
.
REFERENCES
[1] S. Haykin, “Cognitive Radio: Brain-
Empowered Wireless Communications,”
IEEE J. Selected Areas Comm., vol. 23, no.
2, pp. 201 220, Feb. 2005.
[2] I.F. Akyildiz, W.Y. Lee, M.C. Vuran, and
S. Mohanty, “NeXt Generation/Dynamic
Spectrum Access/Cognitive Radio Wireless
Networks: A Survey,” Elsevier Computer
Networks, vol. 50, no. 13, pp. 2127-2159,
Sept. 2006.
[3] W.S. Jeon, D.G. Jeong, J.A. Han, G. Ko,
and M.S. Song, “An Efficient Quiet Period
Management Scheme for Cognitive Radio
Systems,” IEEE Trans. Wireless Comm.,
vol. 7, no. 2, pp. 505-509, Feb. 2008.
[4] IEEE P802.22/D0.3.7, Draft Standard for
Wireless Regional Area Networks Part 22:
Cognitive Wireless RAN Medium Access
Control (MAC) and Physical Layer (PHY)
Specifications: Policies and Procedures for
Operation in the TV Bands, IEEE, July
2007.
[5] IEEE 802.11h-2003, Spectrum and
Transmit Power Management Extensions
in the 5 GHz Band in Europe, IEEE, 2003.
[6] Standard ECMA-392, MAC and PHY for
Operation in TV White Space, ECMA,
Dec. 2009.
Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776
776 | P a g e
[7] C. Cordeiro and K. Challapali, “C-MAC: A
Cognitive MAC Protocol for Multi-
Channel Wireless Networks,” Proc. IEEE
Int’l Symp. New Frontiers in Dynamic
Spectrum Access Networks (DySPAN), pp.
147-157, Apr. 2007.
[8] Q. Zhao, L. Tong, A. Swami, and Y. Chen,
“Decentralized Cognitive MAC for
Opportunistic Spectrum Access in Ad Hoc
Networks: A POMDP Framework,” IEEE
J. Selected Areas Comm., vol. 25, no. 3,
pp. 106-117, Apr. 2007.
[9] J. Jia, Q. Zhang, and X. Shen, “HC-MAC:
A Hardware- Constrained Cognitive MAC
for Efficient Spectrum Management,”
IEEE J. Selected Areas Comm., vol. 26, no.
1, pp. 106-117, Jan. 2008.
[10] H. Nan, T. Hyon, and S. Yoo, “Distributed
Coordinated Spectrum Sharing MAC
Protocol for Cognitive Radio,” Proc. IEEE
Int’l Symp. New Frontiers in Dynamic
Spectrum Access Networks (DySpan), pp.
240-249, Apr. 2007.
[11] H. Su and X. Zhang, “Cross-Layer Based
Opportunistic MAC Protocols for QoS
Provisionings over Cognitive Radio
Wireless Networks,” IEEE J. Selected
Areas Comm., vol. 26, no. 1, pp. 118-129,
Jan. 2008.
[12] S.M. Mishra, A. Sahai, and R.W.
Brodersen, “Cooperative Sensing among
Cognitive Radios,” Proc. IEEE Int’l Conf.
Comm. (ICC ’06), pp. 1658-1663, June
2006.
[13] A. Ghasemi and E.S. Sousa, “Collaborative
Spectrum Sensing for Opportunistic Access
in Fading Environments,” Proc. IEEE First
Int’l Symp. New Frontiers in Dynamic
Spectrum Access Networks (DySPAN), pp.
131-136, Nov. 2005.
[14] E. Visotsky, S. Kuffner, and R. Peterson,
“On Collaborative Detection of TV
Transmissions in Support of Dynamic
Spectrum Sharing,” Proc. IEEE First Int’l
Symp. New Frontiers in Dynamic
Spectrum Access Networks (DySPAN), pp.
338-345, Nov. 2005.
[15] M. Timmers, A. Dejonghe, L.V. Perre, and
F. Catthoor, “A Distributed Multichannel
MAC Protocol for Cognitive Radio
Networks with Primary User Recognition,”
Proc. Second Int’l Conf. Cognitive Radio
Oriented Wireless Networks and Comm.,
pp. 216-223, Apr. 2007.
[16] Y.-C. Liang, Y. Zang, E. Peh, and A.T.
Hoang, “Sensing- Throughput Tradeoff for
Cognitive Radio Networks,” IEEE Trans.
Wireless Comm., vol. 7, no. 4, pp. 1326-
1337, Apr. 2008.
[17] H.A.B. Salameh, M.M. Krunz, and O.
Younis, “MAC Protocol for Opportunistic
Cognitive Radio Networks with Soft
Guarantees,” IEEE Trans. Mobile
Computing, vol. 8, no. 10, pp. 1339-1352,
Oct. 2009.
[18] W.C. Jakes, Microwave Mobile
Communications. IEEE, 1994.
[19] J. Polastre, R. Szewczyk, and D. Culler,
“Telos: Enabling Ultra- Low Power
Wireless Research,” Proc. Fourth Int’l
Symp. Information Processing in Sensor
Networks (IPSN ’05), Apr. 2005.
[20] S.S. Jeong, W.S. Jeon, and D.G. Jeong,
“Collaborative Spectrum Sensing for
Multiuser Cognitive Radio Systems,” IEEE
Trans. Vehicular Technology, vol. 58, no.
5, pp. 2564-2569, June 2009.
[21] Y. Zeng and Y.-C. Liang, “Spectrum-
Sensing Algorithms for Cognitive Radio
Based on Statistical Covariances,” IEEE
Trans. Vehicular Technology, vol. 58, no.
4, pp. 1804-1815, May 2009.
[22] Y. Zeng and Y.-C. Liang, “Eigenvalue-
Based Spectrum Sensing Algorithms for
Cognitive Radio,” IEEE Trans. Comm.,
vol. 57, no. 6, pp. 1784-1793, June 2009.

Más contenido relacionado

La actualidad más candente

Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Polytechnique Montreal
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
Shared Spectrum Throughput for Secondary Users
Shared Spectrum Throughput for Secondary UsersShared Spectrum Throughput for Secondary Users
Shared Spectrum Throughput for Secondary UsersCSCJournals
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...IJSRED
 
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Polytechnique Montreal
 
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELSPARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELScsandit
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 

La actualidad más candente (19)

Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Shared Spectrum Throughput for Secondary Users
Shared Spectrum Throughput for Secondary UsersShared Spectrum Throughput for Secondary Users
Shared Spectrum Throughput for Secondary Users
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
PhD dissertation presentation
PhD dissertation presentationPhD dissertation presentation
PhD dissertation presentation
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
10.1.1.1.4446
10.1.1.1.444610.1.1.1.4446
10.1.1.1.4446
 
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
 
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
 
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELSPARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
 
Paper 1 2019
Paper 1 2019Paper 1 2019
Paper 1 2019
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 

Destacado

Destacado (7)

HISTORIA DE LA COMPUTADORA
HISTORIA DE LA COMPUTADORA HISTORIA DE LA COMPUTADORA
HISTORIA DE LA COMPUTADORA
 
Capítulo 2
Capítulo 2Capítulo 2
Capítulo 2
 
perfiles de usuario
perfiles de usuarioperfiles de usuario
perfiles de usuario
 
Les glaceres
Les glaceres Les glaceres
Les glaceres
 
La empresa y las ti & si
La empresa y las ti & siLa empresa y las ti & si
La empresa y las ti & si
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar a Ea34772776

Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...IJSRD
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Polytechnique Montreal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
enhanced cognitive radio network in dynamic spectrum sensing
enhanced cognitive radio network in dynamic spectrum sensingenhanced cognitive radio network in dynamic spectrum sensing
enhanced cognitive radio network in dynamic spectrum sensingDinokongkham
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...IJECEIAES
 
Float-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkFloat-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkEditor IJCATR
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Journals
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd Iaetsd
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 
Cognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSimCognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSimSANJAY ANAND
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
 
Channel assignment for throughput maximization in cognitive radio networks
Channel assignment for throughput maximization in cognitive radio networks Channel assignment for throughput maximization in cognitive radio networks
Channel assignment for throughput maximization in cognitive radio networks Polytechnique Montreal
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 

Similar a Ea34772776 (20)

H010434655
H010434655H010434655
H010434655
 
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
Avoid Collision And Broadcasting Delay In Multi-Hop CR Ad Hoc Network Using S...
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
enhanced cognitive radio network in dynamic spectrum sensing
enhanced cognitive radio network in dynamic spectrum sensingenhanced cognitive radio network in dynamic spectrum sensing
enhanced cognitive radio network in dynamic spectrum sensing
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
 
Float-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkFloat-based Pipeline Monitoring Network
Float-based Pipeline Monitoring Network
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
J1102026164
J1102026164J1102026164
J1102026164
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and its
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
Cognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSimCognitive Radio 802.22 in NetSim
Cognitive Radio 802.22 in NetSim
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
 
Channel assignment for throughput maximization in cognitive radio networks
Channel assignment for throughput maximization in cognitive radio networks Channel assignment for throughput maximization in cognitive radio networks
Channel assignment for throughput maximization in cognitive radio networks
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 

Último

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Ea34772776

  • 1. Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776 772 | P a g e Prediction Based Channel Selection for Cognitive Radio Networks Poornima B V (M.Tech) 1 , Assoc. Prof. Padmanayana2 1, 2 (Department of Computer Science, Srinivas Institute of Technology, Mangalore, India ABSTRACT This paper proposes a novel prediction based packet delivery combined with novel medium access control (MAC) scheme for multichannel cognitive radio (CR) ad hoc networks, which achieves high throughput of CR system while protecting primary users (PUs) effectively. In designing the scheme, we consider that the PU signal may cover only a part of the network and the nodes can have the different sensing result for the same PU even on the same channel. By allowing the nodes to use the channel on which the PU exists as long as their transmissions do not disturb the PU, the proposed MAC scheme fully utilizes the spectrum access opportunity. In addition, based on the past behavior we select the primary channel to use. To mitigate the hidden PU problem inherent to multichannel CR networks where the PU signal is detectable only to some nodes, the proposed MAC scheme adjusts the sensing priorities of channels at each node with the PU detection information of other nodes and also limits the transmission power of a CR node to the maximum allowable power for guaranteeing the quality of service requirement of PU. The performance of the scheme is evaluated by using simulation. The simulation results show that the CR system with the proposed MAC accomplishes good performance in throughput and packet delay, while protecting PUs properly. Keywords— Security, CR networks, denial of sleep attack, ARIMA, SARIMA I. INTRODUCTION COGNITIVE radio (CR) has been attracting great attention from researchers as one of the most feasible solutions to the problem of spectrum scarcity in wireless communications. In CR systems, the nodes search spectrum band not being used by the licensed primary user (PU), called a spectrum hole, and use a part (or the whole) of the spectrum hole as their communication channel [1]. Since a CR system should not interfere with the PU, it has to release the channel as fast as possible when the PU is activated. Therefore, the spectrum sensing for finding empty channels and the channel switching to another empty channel at the PU appearance are the key operations of CR systems that distinguish them from the conventional wireless networks [2], [3]. Recently, a standard for wireless regional area networks (WRANs) that adopt the CR technology for providing internet access to sparsely populated rural and remote areas has been developed by IEEE 802.22 Working Group [4], and IEEE 802.11h Task Group completed the enhancement of IEEE 802.11 standard for operating 802.11 wireless local area networks (WLANs) on the 5 GHz licensed band in Europe [5]. Also, various wireless networks that utilize the CR technology under ad hoc environment have been proposed in the literature (e.g., [6]). Most of the CR-based ad hoc networks proposed up to recently operate on multiple channels in order to fully utilize the spectrum access opportunity without a centralized controller [7], [8], [9], [10], [11], [12], [13], [14]. In these networks, a CR node transmits data traffic using one or more channels that are identified as empty at the time of data transmission, and releases the channels immediately after transmission. Therefore, the design of the medium access control (MAC) scheme for these multichannel CR ad hoc networks is focused on the efficient sensing of multiple channels rather than the channel switching. Some multichannel CR ad hoc networks (e.g., [8], [9]) adopt the policy to lower the possibility to use the PU existence channels at the cost of the increased data transmission delay of CR nodes, by carrying out the channel sensing just before the transmission of data traffic (just-before- transmission sensing). In [8], when a CR node wants to transmit traffic, it first reserves a data channel and then checks whether the channel can be or not used for traffic transmission, by sensing it. Since the CR node repeats the work to reserve a channel and sense it until an empty channel is got, the node may suffer a long delay to obtain the channel for traffic transmission. To reduce this delay, [9] has proposed the scheme where the nodes having data traffic contend for obtaining the right of using the entire channel and the winner acquires all channels. Then, the winner senses sequentially the channels until finding as many empty channels as it needs, and transmits its traffic over the found empty channels. Since only the winner can use the data channels, the concurrent transmission by several nodes is not allowed even though there remain empty channels.
  • 2. Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776 773 | P a g e Under the environment that the PU signal covers only a part of the network, since the nodes can have different sensing outcomes, the channel state information of a node may be worthless to other nodes. Thus, each node should sense individually all channels for getting more vacant channels. However, since a CR node usually senses one channel at a time, the channel state information may be inaccurate due to the long sensing interval of each channel. As a result, there may be the channels which are not actually empty but are regarded as empty by the node, i.e., the channels with hidden PU. The occurrence of hidden PU on a channel can be reduced with the shorter sensing interval of the channel. When a node should sense all channels one at a time, it can shorten the sensing interval of a channel by optimally setting the channel sensing duration. Liang et al. [16] have designed the optimal sensing duration for maximizing the achievable throughput of CR system while protecting PU sufficiently. On the other hand, a CR node may find the hidden PUs by exploiting the channel state information of other nodes. Nan et al. [10] have partially solved the hidden PU problem, by letting both the sender and receiver nodes inquire of their neighbors about vacancy of candidate channels before selecting a data channel. Although this scheme decreases the occurrence rate of hidden PUs, there may exist still the channels with hidden PU. Therefore, the CR networks should provide the mechanism for protecting the hidden PUs. Salameh et al. [17] have designed a CR MAC protocol to protect PUs, by limiting the transmission power of a CR node so as that the total interference power at a PU receiver does not exceed a threshold with given probability. Once the primary user becomes available, the other users using the channel has to relinquish the channel. The data transfer must be started once again by acquiring the channel. This reduces the throughput of the system & also increases the data latency. In this paper, we study the above problem in detail and propose a solution to prevent this problem and increase the throughput & reduce the latency. II. Literature Survey “A Novel MAC Scheme for Multichannel cognitive radio adhoc networks” proposed by Wha Sook Jenon is the most recent work on cognitive work which is base on which our work is based. They considered a CR-based ad hoc network using multiple channels. There are one control channel and N data channels within the network. It is assumed that CR network will not be disturbed by PUs in accessing the control channel. The transmission power of a CR node on the control channel is set to be high enough that the packets transmitted through the control channel can be decoded by all nodes within the CR network. In other words, the transmission range of a CR node on the control channel covers the whole network. The data channels are licensed to PUs and can be opportunistically used by the CR nodes. In the environment under consideration, the PU signal can have influence not on the whole CR network but on only a part of the CR network. That is, there exist the nodes that cannot detect the PU activation, within the CR network. On the other hand, a CR node should transmit data traffic with the controlled power as low as possible so as not to largely disturb PU even when it does not know the existence of a PU by failing to detect the PU. For example, in Fig. 1, the node A which has detected the PU signal on the channel i uses another channel (let’s say, the channel k) to transmit its data traffic, whereas the node B located out of the sensing range of the PU signal cannot find the PU and may transmit data traffic through the channel i. In this case, the transmission power of the node B should be controlled so that the signal from the node B does not seriously interfere with the PU. We consider the networks where the CR nodes transmit data traffic with power lower than the maximum allowable power, which is defined as the maximum transmission power for guaranteeing the QoS requirement of the PU. In Appendix, available in the online supplemental material, we calculate the maximum allowable transmission power of a CR node for maintaining the outage probability of PU transmission below the predefined value. When a CR node does not detect the PU signal on a data channel, the node is allowed to access the channel with transmission power lower than the maximum allowable power, irrespective of the sensing results of other nodes. The maximum allowable power is unlikely to be high enough that all nodes within the network can overhear the packets on a data channel. Thus, only some nodes adjacent to the sender node can decode the data packets. We will call these nodes one-hop neighbors of the sender. In Fig. 1, the nodes C and D are one-hop neighbors of the node B.
  • 3. Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776 774 | P a g e In their proposed MAC, each CR node is equipped with two transceivers: one is dedicated to the control channel (the control transceiver) and the other is used to sense data channels and transmit/receive traffic on data channels (the data transceiver). The CR node uses the control channel to transmit channel management packets or to reserve a data channel for traffic transmission. For simple description, a data channel will be called shortly a channel, if there is no confusion with the control channel. In addition, we regard a data channel not being used by all CR nodes within the network as an idle channel. An empty channel means a data channel where a PU is not activated. Time for channel sensing is not regularly arranged on a channel time. Thus, whenever its data transceiver is not being used for data transmission/reception, a CR node selects the idle channel with highest sensing priority and carries out sensing for the selected channel (opportunistic time for channel sensing is not regularly arranged on a channel time. Thus, whenever its data transceiver is not being used for data transmission/reception, a CR node selects the idle channel with highest sensing priority and carries out sensing for the selected channel (opportunistic sensing), independent of other nodes. The sensing priority of a channel will be explained in detail later. Since each CR node is able to sense one data channel at a time, even though the PU has appeared on a channel, the CR node does not know the PU activation until the node itself senses the channel. This detection delay can be shortened if the nodes receive an explicit notice for PU appearance. With the proposed scheme, a CR node that has found earliest the PU appearance on a channel within the network broadcasts an urgent sensing request (US_REQ) packet so that the other nodes carry out quiet sensing on the corresponding channel as soon as possible. It is noted that all nodes within the network can hear this packet since the transmission range of the control channel covers the whole network. The node that receives the US_REQ packet senses the channel as soon as its data transceiver becomes idle (urgent sensing). III. Overview of Proposed Solution The current solution in cognitive network uses the primary channel till the time primary users are available. Once the primary users are sensed, then the channel must be released immediately. The ongoing data transfer should be aborted. This will reduce the overall throughput of the system and the data transfer should be started again, it will increase the packet delivery length. To solve this problem we propose a mechanism based on the prediction of availability of channel. Once the channel availability time is predicted, the time to occupy the channel can be calculated. Based on this time, the data transfer can be scheduled. This mechanism will improve the throughput of the system & also effectively manage data latency. IV. DETAILS OF PROPOSED METHOD In the proposed solution secondary users must sense the use of primary user channels. Based on the monitoring of the primary user channels, it constructs a time series model to predict the usage trend of primary channel. ARIMA is a popular family of time-series models that are commonly used for studying weather and stock market data. Seasonal ARIMA models (also known as SARIMA) are a class of ARIMA models that are suitable for data exhibiting seasonal trends and are well-suited for sensor data. Further they offer a way to deal with non-stationary data i.e., whose statistical properties change over time [1]. Last, as we demonstrate later, while seasonal ARIMA models are computationally expensive to construct, they are inexpensive to check at the remote sensors—an important property we seek from our system. We model the time series of observations at a node as an Autoregressive Integrated Moving Average (ARIMA) process. In particular, the data is assumed to conform to the Box-Jenkins SARIMA model [1]. While a detailed discussion of SARIMA models is outside the scope of this paper, we provide the intuition behind these models for the benefit of the reader. An SARIMA process has four components: auto-regressive (AR), moving-average (MA), one-step differencing, and seasonal differencing. The AR component estimates the current sample as a linear weighted sum of previous samples; the MA component captures relationship between prediction errors; the one-step differencing component captures relationship between adjacent samples; and the seasonal differencing component captures the diurnal, monthly, or yearly patterns in
  • 4. Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776 775 | P a g e the data. In SARIMA, the MA component is modeled as a zero-mean, uncorrelated Gaussian random variable (also referred to as white noise). The AR component captures the temporal correlation in the time series by modeling a future value as a function of a number of past values. Each cognitive node applies SARIMA method to learn the prediction model for the finding the time at which the primary user is going to use the channel. When the secondary node has some data to be sent, it will use the model to find the time when the channel will be free and duration till it will get occupied once again. Accordingly it will schedule the data transfer. Also in case of selecting among multiple primary channels, it can build multiple SARIMA model for each primary user channel. It will then choose the primary user channel which can transfer the data with no failures. When a single channel usage is alone is not sufficient to send the data, multiple channels can be used or data transfer can be done in batches. This way, delivery latency is also reduced. V. PERFORMANCE ANALYSYS We implemented the proposed solution in NS2 and analyze the performance of the system in terms of throughput & data delivery latency. We did this for cognitive networks by varying the secondary to primary user ratio. The rate of channel usage for the primary user is uniform poison distribution. The secondary user use the channel is random distribution. At the end of simulation, we measure the average data delivery latency & the throughput of the system. From it we found that by using prediction using ARIMA, we are able to reduce the latency by 10% and increase the throughput by around 20%. VI. CONCLUSION By introducing the prediction, we were able to increase the throughput of the system. The throughput increases because we have avoided the number of aborted data flows. Also retransmissions have been avoided which decreases the delay. ARIMA is the prediction algorithm used. In future we plan to add some other prediction mechanism like neural network & SOM to further improve the prediction accuracy. The improved prediction accuracy will contribute to increased throughput. . REFERENCES [1] S. Haykin, “Cognitive Radio: Brain- Empowered Wireless Communications,” IEEE J. Selected Areas Comm., vol. 23, no. 2, pp. 201 220, Feb. 2005. [2] I.F. Akyildiz, W.Y. Lee, M.C. Vuran, and S. Mohanty, “NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey,” Elsevier Computer Networks, vol. 50, no. 13, pp. 2127-2159, Sept. 2006. [3] W.S. Jeon, D.G. Jeong, J.A. Han, G. Ko, and M.S. Song, “An Efficient Quiet Period Management Scheme for Cognitive Radio Systems,” IEEE Trans. Wireless Comm., vol. 7, no. 2, pp. 505-509, Feb. 2008. [4] IEEE P802.22/D0.3.7, Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE, July 2007. [5] IEEE 802.11h-2003, Spectrum and Transmit Power Management Extensions in the 5 GHz Band in Europe, IEEE, 2003. [6] Standard ECMA-392, MAC and PHY for Operation in TV White Space, ECMA, Dec. 2009.
  • 5. Poornima B V, Prof. Padmanayana / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.772-776 776 | P a g e [7] C. Cordeiro and K. Challapali, “C-MAC: A Cognitive MAC Protocol for Multi- Channel Wireless Networks,” Proc. IEEE Int’l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 147-157, Apr. 2007. [8] Q. Zhao, L. Tong, A. Swami, and Y. Chen, “Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc Networks: A POMDP Framework,” IEEE J. Selected Areas Comm., vol. 25, no. 3, pp. 106-117, Apr. 2007. [9] J. Jia, Q. Zhang, and X. Shen, “HC-MAC: A Hardware- Constrained Cognitive MAC for Efficient Spectrum Management,” IEEE J. Selected Areas Comm., vol. 26, no. 1, pp. 106-117, Jan. 2008. [10] H. Nan, T. Hyon, and S. Yoo, “Distributed Coordinated Spectrum Sharing MAC Protocol for Cognitive Radio,” Proc. IEEE Int’l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySpan), pp. 240-249, Apr. 2007. [11] H. Su and X. Zhang, “Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings over Cognitive Radio Wireless Networks,” IEEE J. Selected Areas Comm., vol. 26, no. 1, pp. 118-129, Jan. 2008. [12] S.M. Mishra, A. Sahai, and R.W. Brodersen, “Cooperative Sensing among Cognitive Radios,” Proc. IEEE Int’l Conf. Comm. (ICC ’06), pp. 1658-1663, June 2006. [13] A. Ghasemi and E.S. Sousa, “Collaborative Spectrum Sensing for Opportunistic Access in Fading Environments,” Proc. IEEE First Int’l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 131-136, Nov. 2005. [14] E. Visotsky, S. Kuffner, and R. Peterson, “On Collaborative Detection of TV Transmissions in Support of Dynamic Spectrum Sharing,” Proc. IEEE First Int’l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 338-345, Nov. 2005. [15] M. Timmers, A. Dejonghe, L.V. Perre, and F. Catthoor, “A Distributed Multichannel MAC Protocol for Cognitive Radio Networks with Primary User Recognition,” Proc. Second Int’l Conf. Cognitive Radio Oriented Wireless Networks and Comm., pp. 216-223, Apr. 2007. [16] Y.-C. Liang, Y. Zang, E. Peh, and A.T. Hoang, “Sensing- Throughput Tradeoff for Cognitive Radio Networks,” IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1326- 1337, Apr. 2008. [17] H.A.B. Salameh, M.M. Krunz, and O. Younis, “MAC Protocol for Opportunistic Cognitive Radio Networks with Soft Guarantees,” IEEE Trans. Mobile Computing, vol. 8, no. 10, pp. 1339-1352, Oct. 2009. [18] W.C. Jakes, Microwave Mobile Communications. IEEE, 1994. [19] J. Polastre, R. Szewczyk, and D. Culler, “Telos: Enabling Ultra- Low Power Wireless Research,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN ’05), Apr. 2005. [20] S.S. Jeong, W.S. Jeon, and D.G. Jeong, “Collaborative Spectrum Sensing for Multiuser Cognitive Radio Systems,” IEEE Trans. Vehicular Technology, vol. 58, no. 5, pp. 2564-2569, June 2009. [21] Y. Zeng and Y.-C. Liang, “Spectrum- Sensing Algorithms for Cognitive Radio Based on Statistical Covariances,” IEEE Trans. Vehicular Technology, vol. 58, no. 4, pp. 1804-1815, May 2009. [22] Y. Zeng and Y.-C. Liang, “Eigenvalue- Based Spectrum Sensing Algorithms for Cognitive Radio,” IEEE Trans. Comm., vol. 57, no. 6, pp. 1784-1793, June 2009.