Cognitive Radio Networks
|
|
- Maude Sanders
- 5 years ago
- Views:
Transcription
1 Cognitive Radio Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology
2 Outline Introduction Cognitive Radio Technology Spectrum Sensing Spectrum Management Spectrum Mobility Spectrum Sharing Cognitive MAC Protocols Conclusions Example From ICS Research References 2
3 Introduction 3
4 Introduction Limited spectrum Inefficiency in spectrum usage Utilization of the assigned licensed spectrum varies between 15% and 85% A new technology is required to enable better utilization of unused licensed spectrum Cognitive radio technology 4
5 Cognitive Radio Technology 5
6 What is a Cognitive Radio Definitions Federal Communications Commission Definition: a cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates Mitola Definition: the cognitive radio identifies the point at which wireless PDAs and the related networks are sufficiently computationally intelligent on the subject of radio resources and related computer-to-computer communications to detect user communication needs as a function of use context, and to provide radio resources and wireless services most appropriate to those needs 6
7 What is a Cognitive Radio Characteristics Cognitive capability: the capability of the radio technology of capturing or sensing information from its radio environment (monitoring the power in some frequency band) Reconfigurability: the ability of the radio to be dynamically programmable according to the radio environment (transmission and receipt of data on a variety of frequencies and using various radio access technologies) 7
8 What Should Cognitive Radio Enable to Do? Determination of unused portion of spectrum (spectrum holes or white space) Selection of the best available channel Coordination of the access with other users Detection of the appearance of licensed users vacate the channel 8
9 Cognitive Radio Network Architecture 9
10 Cognitive Radio Network Architecture Primary networks Networks with access right to certain spectrum bands, e.g. common cellular systems and TV broadcast networks Users of these networks are referred to as primary users. They have the right to operate in licensed spectrum Users of certain primary network do not care of other primary or secondary network users Secondary networks Do not have license to operate in the spectrum band they currently use or aim at using Opportunistic spectrum access Users of these networks are referred to as secondary users. They have no right to access licensed bands currently used Additional functionalities are required to share licensed spectrum bands with other secondary or primary networks 10
11 Cognitive Radio Cycle Radio environment Transmitted signal RF stimuli Spectrum Sharing Spectrum Mobility Primary user detection Spectrum Sensing Channel capacity Decision request Spectrum hole Spectrum characterizations Spectrum Decision 11
12 Spectrum Sensing 12
13 Spectrum Sensing Spectrum sensing is determined as the capability of detection of spectrum holes Spectrum Sensing Transmitter Detection Cooperative Detection Interference - Based Detection Matched Filter Detection Energy Detection Cyclostationary Feature Detection 13
14 Transmitter Detection Location of primary receiver is not known (no signaling between primary and secondary users) detection of the weak signal from a primary transmitter through local observations of secondary users Mechanisms Matched filter detection Energy detection Cyclostationary feature detection 14
15 Transmitter Detection Matched filter detection Optimal detector when all information of the primary user signal is known (it maximizes the received signal-to-noise ratio) Produces poor performance if primary users information not known Energy detection Used if primary users information not known Cyclostationary feature detection Mean and autocorrelation of modulated signals exhibit periodicity (modulated signals are coupled normally with sine wave carriers, pulse trains, repeating spreading, etc.) Differentiates noise from modulated signal (noise is a wide-sense stationary signal with no correlation) Computationally complex and requires long observation time 15
16 Transmitter Detection Primary and secondary networks are physically separated transmitter detection can not avoid interference due to the lack of the primary receiver s information Even if the secondary user has a line of sight to the transmitter, the secondary user may not be able to detect the transmitter, e.g. due to shadowing, etc. Can not prevent hidden terminal problem Primary transmitter range Interference Interference Secondary transmitter range Secondary user Primary user Transmitter Can not detect transmitter Can not detect transmitter 16
17 Cooperative Detection Incorporating information from multiple secondary users to detect primary users Clasified into Centralized cooperative detection Controlled mostly by cognitive BSs Cognitive BS collects sensing information from all secondary users it serves and detects spectrum holes Distributed cooperative detection No centralized infrastructure Observations are exchanged among secondary users More accurate detection than that based on single secondary user observations, e.g. transmitter detection. Moreover, multi-path fading and shadowing effects are mitigated 17
18 Interference-Based Detection Interference takes place at the receiver side (i.e. the receiver is disrupted). However, it is controlled at the transmitter side, e.g. using power control, etc. Interference temperature is well-known example (receiverdetection model) Power at receiver Licensed signal New opportunities for spectrum access Minimum service range with interference cap Service range at orginal noise floor Secondary users are allowed to communicate as long as they do not produce more interference than this limit Orginal noise floor 18
19 Challenges Interference temperature measurement Secondary users are aware of their locations and transmission power. They are not aware of primary users locations Currently, no practical way for a cognitive radio to measure or estimate the interference temperature at neighbor primary users Spectrum sensing in multi-user networks Multi-user environment makes it more difficult to sense primary users (secondary networks coexist with each other as well as with primary networks) Cooperative detection can be considered as possible solution for such environments Detection capability Detection of primary users in very short time is essential OFDM-based secondary users are best adequate (multi-carrier sensing can be exploited) 19
20 Spectrum Decision 20
21 Managing Available Spectrum Spectrum bands are spread over wide frequency range including licensed and unlicensed bands Radio environment characteristics show fast and mostly not predictable variation over time Secondary users have to select the best spectrum band meeting their QoS requirements spectrum management functions are required Spectrum management includes following steps 1. Getting data from spectrum sensing 2. Performing spectrum analysis 3. Finally making a spectrum decision 21
22 Spectrum Analysis Characterizes sensed spectrum holes to obtain the band appropriate for user s requirements Characteristics of spectrum holes Interference Some spectrum bands are more crowded than others Based on the interference at primary receivers, the allowed sending power of secondary user can be derived channel capacity is estimated Path loss Path loss increases as frequency increases. To retain the capacity when switching to higher frequency, sending power should be increased more interference produced Wireless link errors Modulation scheme and interference affect strongly the error rate Link layer delay Affected by the interference, path loss, etc. Holding time Expected time duration the secondary user can occupy the channel 22
23 Spectrum Decision Entity or CR Engine Once spectrum bands are characterized, the band best meeting QoS requirements should be selected spectrum decision function should be aware of QoS requirements of current ongoing applications Spectrum decision rules are required QoS requirements for secondary user Data rate Acceptable error rate Delay... 23
24 Challenges Decision Model Development of suitable decision rules that consider spectrum bands characters is until now an open issue Multiple spectrum band decision In case secondary users are capable of using multiple channels for transmission simultaneously, it is important to determine the number of spectrum bands available and select the bands appropriately Spectrum decision over heterogeneous spectrum bands Support spectrum decision operations on both licensed and unlicensed bands is challenging 24
25 Spectrum Mobility 25
26 Spectrum Mobility The process when a secondary user changes its frequency of operation, also called spectrum handoff Reasons - Operating channel becomes worse - Primary user wants to communicate on the channel - User movements (available spectrum bands change) Requirements - Low latency - Transparence to upper layers protocols if possible - No impairments on ongoing applications (ideal case) Multi-layer mobility management is required with which protocols of many layers cooperate to support mobility, 26
27 Challenges Smooth spectrum mobility schemes Synchronization between protocols of many layers and possibly with applications to support smooth spectrum handoffs (e.g. applications or protocols switch from operation mode to another upon prediction of a spectrum handoff, etc.) Support of horizontal (changing channels while staying in the same secondary network) and vertical handoffs (between secondary networks) Performing spectrum handoffs to maintain QoS requirements satisfied 27
28 Spectrum Sharing 28
29 Spectrum Sharing Considered similar to Medium Access Control (MAC) issue in existing systems. However, different challenges arise due to Coexistence with licensed users Wide range of available spectrum Spectrum sharing steps Spectrum sensing: detect unused spectrum holes Spectrum allocation: allocation of possible target channels based on spectrum sensing results and allocation policies Spectrum access: coordination of access to the allocated channel to avoid collisions Transmitter-receiver handshake: negotiation of communication channel between sender and receiver Spectrum mobility: enable continuous communication between sender and receiver in spite of primary user appearance on the used channel 29
30 Spectrum Sharing Techniques 1/3 Spectrum sharing techniques are classified according to Architecture Centralized - Centralized entity controls the spectrum allocation and access - Secondary users do observations and report to the centralized entity, which creates spectrum allocation map Distributed - Applied when construction of infrastructure is not possible or not preferable - Each node is responsible for the spectrum allocation 30
31 Spectrum Sharing Techniques 2/3 Spectrum allocation behavior Cooperative - Observation results of each node are shared with other nodes spectrum allocation is done based on these measurements - These techniques result in better spectrum utilization at the cost of considerable signaling between nodes Non-cooperative (selfish) - Each node does its observations and allocates its spectrum band - These techniques result in reduced spectrum utilization. However, they may be practical for certain applications or situations 31
32 Spectrum Sharing Techniques 3/3 Spectrum access technology Interweave spectrum sharing (sometimes called overlay in the noninformation-theoretic literature) - Secondary nodes access spectrum holes not used by primary networks Interference to primary users is minimized Underlay spectrum sharing - Based on spread spectrum techniques developed for cellular networks - After acquiring spectrum allocation map, secondary users begin sending, so that their transmission power is regarded as noise by licensed users - Overlay spectrum sharing - Cooperation with the primary transmission - SUs devote part of its transmit power to enhance the primary signal - Interference level may be increased 32
33 Intra/Inter-Network Spectrum Sharing Inter-network spectrum sharing Secondary user (operator1) Secondary user (operator2) Intra-network spectrum sharing Inter-network spectrum sharing Centralized inter-network spectrum sharing: secondary networks organize cooperatively the spectrum allowed to be accessed by users of each secondary network, e.g. by means of central spectrum policy server, etc. Distributed inter-network spectrum sharing: BSs of secondary networks compete to allocate spectrum holes 33
34 Challenges Common control channel (CCC) Tasks Transmitter-receiver handshake Communication with a central entity organizing the spectrum allocation Sensing information exchange Problems Fixed CCC is infeasible (CCC must be vacated when a primary user appears on it) CCC for all users seems to be topology-dependent, thus CCC varies over time If no CCC is allocated, transmitter-receiver handshake becomes a challenge Dynamic radio range Radio range and characteristics change with operating frequency CCC must be selected carefully (better to select CCC in lower spectrum bands and data channels in higher ones) Spectrum unit Existing techniques consider channel as the basic spectrum unit. As known, channel may be time slot, frequency, code, etc. 34
35 Cognitive Radio MAC Protocols 35
36 Classification Cognitive Radio (CR) MAC Protocols Random Access MAC Protocols Time Slotted MAC Protocols Hybrid MAC Protocols CR Centralized MAC (CSMA/CA-like random access for control packets and data) Single Radio (Time synchronized control and data slots) (Partially time slotted and partially random access) CSMA-MAC IEEE DSA Driven MAC CR Ad Hoc MAC Single Radio Multi Radi o SCA-MAC HC-MAC DOSS DSA-MAC C-MAC OS-MAC SYN-MAC 36
37 Classification Classified according to the access method into Random access MAC protocols No need for time synchronization Based on Carrier Sense Multiple Access (CSMA) Time slotted MAC protocols Need for network-wide synchronization Time is divided into slots for both control and data channels Hybrid MAC protocols Partially slotted transmission, in which Signaling generally occurs over synchronized time slots Data transmission may have random channel access schemes without time synchronization Classified according to the architecture into CR centralized MAC Central entity manages, synchronizes and coordinates operations among secondary users CR Ad Hoc MAC No central entity, neighbors cooperate to gain access to available channels 37
38 CSMA-MAC Protocol PS Busy RTS RTS CTS Data CRN Busy Carrier sense(t s ) RTS CTS Data (a) PS Busy RTS RTS CTS Data CRN Busy Carrier sense(t s ) RTS (b) Collision Still no successfull transmisssion PS Busy RTS RTS CRN Busy Carrier sense(t s ) RTS CTS Data (c) PS CRN Channel is free Busy Busy Carrier sense(t s ) RTS CTS Data (d) Primary System (PS) Cognitive Radio Network (CRN) 38
39 CSMA-MAC Protocol Case (a): CRN out of the range of PS Primary user gains the access to the channel and sends its data Secondary user senses the channel for a period t s The secondary user finds the channel vacant (assuming the primary and secondary users are separated by a large distance) The secondary user gains access to the channel and sends its data Case (b): CRN in the range of PS but not of the PS transmitter RTS packet sent by the secondary user experiences collision The secondary user waits for the next transmission opportunity after repeating the previous sensing process Case (c): PS experiences internal collision Primary user sends repeated RTS packets. However, a collision incurs each time Secondary user can start transmission Case (d): Channel is not used by PS Primary user has no packets to send, thus the channel is free Secondary user can start transmission 39
40 SYN-MAC Protocol Available channels A B C D E F Slot for Ch1 Slot for Ch2 Slot for Ch3 Slot for Ch4 Slot for Ch5 Ch1 Ch2 Ch3 Ch4 RTS1 CTS1 Data IE IE Primary user active Ch5 RTS CTS DATA Information Event (IE) Backoff 40
41 SYN-MAC Protocol Time is divided into fixed-time intervals (slots) Each time slot is dedicated to one channel Each node has two radios, one for listening to control messages and one for sending data C wants to send data to D Each node knows the available channel sets of their neighbors Channels 1 and 5 are common C chooses Ch1 for transmission and starts negotiation over it using RTS/CTS Once negotiation is successful, data transmission takes place on Ch1 B observes that primary user of Ch 4 has returned B knows that it can reach its neighbors (A and C) through Ch2 B waits for the time slot which represents Ch2 B sends Information Events (IE) control message with its new channel list Nodes A and C, on receiving this information learn that node B will not be available on Ch 4 E applies the same procedure as B to notify D and F that Ch 4 is removed from its channels list 41
42 CR Standards IEEE af Super Wi-Fi (Feb. 2014) IEEE (July 2011) TV white space spectrum in the VHF and UHF, MHz, OFDM Cognitive sensing, flexible adjustment of bandwidth, modulation, power and coding Database driven approach: Access granted by Geolocation DataBase (GDB) Local sensing is used in certain special cases Up to 1 km, 35.6 Mbit/s for 8 MHz channels Access points (AP) and stations Wireless local area network (WLAN) km, 19 Mbit/s for 6 MHz channels Base stations (BS) and customerpremises equipment (CPE) Wireless regional area network (WRAN) 42
43 Example from ICS Research Flexible MAC as Spectrum Mobility Solution by André Puschmann 43
44 Motivation TDMA CSMA/CA Power consumption Low High Bandwidth utilization Maximum Low Preferred traffic level High Low Dynamics (network change) Poor Good Effect of packet failure High (latency) Low Synchronization Crucial - Reference: TDMA Protocol Requirements for Wireless Sensor Networks, IEEE
45 Proposed Improvement Flexible Link Layer Architecture [1] Features: Multiple configurations Component reuse Complexity reduction Reuse of existing MACs Separated control logic Frame Error Rate (FER) / Channel Busy Fraction (CBF) switching metric [1] Puschmann et al., A Component-based Approach for Constructing Flexible Link-Layer Protocols, CROWNCOM 2013, Washington DC, USA. 45
46 Results Gain: 46
47 Conclusions Cognitive radio technology enables better utilization of unused licensed spectrum Basic idea Allocation of an unused spectrum band Utilization of the allocated band for communication as long as no primary user appears on this band or no interference produced for primary users working around Requirements Fast and accurate spectrum sensing equipment as well as mechanisms Adequate spectrum decision approaches Seamless spectrum mobility techniques Efficient spectrum sharing methods However Lots of new open issues and challenges to solve IEEE , IEEE af are standards for cognitive radio networks 47
48 References Cognitive Radio Technology, Spectrum Sensing, Management, Mobility and Sharing I.F. Akyildiz, W.Y. Lee, M.C. Vuran, S. Mohanty, NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey, Computer Networks Journal, 2006 S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE Journal on Selected Areas in Communications, 2005 H. Arslan Cognitive radio, software defined radio, and adaptive wireless systems, Springer, 2007 J.J. Mitola, Cognitive Radio - An Integrated Agent Architecture for Software Defined Radio, Doctoral thesis, Royal Institute of Technology (KTH), Teleinformatics, ISSN 1403 ISSN , Stockholm, 2000 Cognitive MAC Protocols A. Chia-Chun Hsu, D. S. L. Weit, C. C. J. Kuo, A cognitive mac protocol using statistical channel allocation for wireless ad-hoc networks, in Proceeding of IEEE Wireless Communications and Networking Conference (WCNC 2007), March 2007 J. Jia, Q. Zhang, X. Shen, Hc-mac: A hardware-constrained cognitive mac for efficient spectrum management, IEEE Journal on Selected Areas In Communications, vol. 26, no. 1, January 2008 L. Ma, X. Han, C. C. Shen, Dynamic open spectrum sharing mac protocol for wireless ad hoc networks, in Proceeding of the first IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), November 2005 C. Cordeiro, K. Challapali, C-mac: A cognitive mac protocol for multi-channel wireless networks, in Proceeding of the 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2007), April 2007 L. Le, E. Hossain, Osa-mac: A mac protocol for opportunistic spectrum access in cognitive radio networks, in Proceeding of the IEEE Wireless Communications and Networking Conference (WCNC 2008), April 2008 Y. R. Kondareddy, P. Agrawal, Synchronized mac protocol for multi-hop cognitive radio networks, in Proceeding of IEEE International Conference on Communications (ICC 2008), May
49 References Claudia Cormio, Kaushik R. Chowdhury, A survey on MAC protocols for cognitive radio networks, Ad Hoc Networks journal, 2009 IEEE Standards Activities C. Stevenson, G. Chouinard, L. Zhongding, H. Wendong, S. Shellhammer, W. Caldwell, IEEE : The first cognitive radio wireless regional area network standard, IEEE Communications Magazine, 2009 IEEE P / DRAFTv1.0 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands, April 2008 IEEE af Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: TV White Spaces Operation, February
50 Contact Integrated Communication Systems Group Ilmenau University of Technology Prof. Dr.-Ing. habil. Andreas Mitschele-Thiel Dr.-Ing. Oleksandr Artemenko fon: +49 (0) /2788 fax: +49 (0) mitsch, Visitors address: Technische Universität Ilmenau Helmholtzplatz 5 Zuse Building, room 1032/1071 D Ilmenau Integrated Communication Systems Group Ilmenau University of Technology
Cognitive Radio Networks
Cognitive Radio Networks Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Outline Radio Allocation Spectrum Management Cognitive Radio Technology Spectrum Sensing
More informationCognitive Radio Networks
Cognitive Radio Networks Mobile Communication Networks (RCSE) Winter Semester 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline Radio Allocation Radio Flexibility
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationMedium access control protocols in cognitive radio networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2010; 10:31 49 Published online in Wiley InterScience (www.interscience.wiley.com).906 Medium access control protocols in cognitive
More informationOpportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment
www.ijcsi.org 45 Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment 1 Ateeq Ur Rehman, 2 Muhammad Tariq Sadiq, 3 Noman Shabbir and 4 Ghayoor Abbas Jafri 1 Department
More informationAd Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:
Ad Hoc Networks 7 (2009) 810 836 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc CRAHNs: Cognitive radio ad hoc networks Ian F. Akyildiz *, Won-Yeol
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationMSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach
MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute
More informationA survey on dynamic spectrum access protocols for distributed cognitive wireless networks
REVIEW Open Access A survey on dynamic spectrum access protocols for distributed cognitive wireless networks Pinyi Ren *, Yichen Wang, Qinghe Du and Jing Xu Abstract With the rapid development of wireless
More informationA MAC protocol with an improved connectivity for cognitive radio networks
AL Sukkar et al. EURASIP Journal on Wireless Communications and Networking (26) 26:6 DOI.86/s3638-6-63-5 RESEARCH A MAC protocol with an improved connectivity for cognitive radio networks Ghazi AL Sukkar
More informationInternational Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online
REVIEW ARTICLE ISSN: 2321-7758 COGNITIVE RADIO BASED WIRELESS REGIONAL AREA NETWORK (IEEE STANDARD 802.22): A REVIEW AVNEET KAUR 2 nd Year M.Tech, Dept. Of Electronics & Communication Engineering, Guru
More informationAn overview of the IEEE Standard
In the name of God An overview of the IEEE 802.22 Standard P.Rastegari P.Rastegari@ec.iut.ac.ir Summer 88 Summary This tutorial gives a detailed overview of the IEEE 802.22 standard based on Cognitive
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO
ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication
More informationAn Adaptive Multiple Rendezvous Control Channel for Cognitive Radio Wireless Ad Hoc Networks
An Adaptive Multiple Rendezvous Control Channel for Cognitive Radio Wireless Ad Hoc Networks Claudia Cormio Telematics Lab, Dipartimento di Elettronica ed Elettrotecnica Politecnico di Bari, Italy ccormio@polibait
More informationSpectrum Sharing in Cognitive Radio Networks
Spectrum Sharing in Cognitive Radio Networks H.Feizresan Dr. M. J. Omidi Electrical and Computer Engineering Department, Isfahan University of Technology Abstract The limited available spectrum and the
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationPERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS
International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationAd Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationWireless networks. Wireless Network Taxonomy
Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationSpectrum Sensing and Management in Cooperative Cognitive Radio
Spectrum Sensing and Management in Cooperative Cognitive Radio Ghayoor Abbas Jafri Ateeq Ur Rehman Muhammad Tariq Sadiq This thesis is presented as part of Degree of Master of Science in Electrical Engineering
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationIEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks
IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationAn efficient trigger to improve intra-wifi handover performance
An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationPerformance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks
Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar Department of Computer Science and Technology, University of
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationA survey on MAC protocols for complex self organizing cognitive radio networks
DOI 10.1186/s40294-016-0030-y REVIEW Open Access A survey on MAC protocols for complex self organizing cognitive radio networks Munam Ali Shah 1, Sijing Zhang 2, Muhammad Kamran 3*, Qaisar Javaid 4 and
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationNew Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band
New Channel Access Approach for the IEEE 802.15.4 Devices in 2.4 GHz ISM Band Tolga Coplu and Sema F. Oktug Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey {coplu,oktug}@itu.edu.tr
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationAd Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Mobile Communication Networks (RCSE) Winter Semester 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) Routing
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationMODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS
MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationAn on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks
An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks Ahmed Chehata, Wessam Ajib, Halima Elbiaze Computer science department Université du Québec à Montréal, Canada
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationMULTI-HOP DISTRIBUTED COORDINATION IN COGNITIVE RADIO NETWORKS
MULTI-HOP DISTRIBUTED COORDINATION IN COGNITIVE RADIO NETWORKS Abdallah Ijjeh Department of Electrical and Electronic Engineering, Al-Balqa` Applied University / Al- Huson University College, Irbid, Jordan
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT
MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationBridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang
Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationAdvanced Mobile Communication Networks
Advanced Mobile Communication Networks Course Description and Introduction Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Objectives Organizational Stuff Contents
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationMAC Protocols for VANETs
MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationIntelligent Load Balancing Approach for Cognitive Radio Networks
Intelligent Load Balancing Approach for Cognitive Radio Networks 1 Ravneet Kaur, 2 Er.Vimmi Malhotra 1 Student, M.Tech CSE, 2 Assistant Professor, Dept. of CSE, 1 ravneetkaur0013@gmail.com, 2 malhotra.vimmi22@gmail.com
More informationProceeding An Overview of Medium Access Control Protocols for Cognitive Radio Sensor Networks
Proceeding An Overview of Medium Access Control Protocols for Cognitive Radio Sensor Networks Jemish Maisuria 1, * Dr. Saurabh Mehta 2 1 E. & C. Department, Uka Tarsadia University, Surat, Gujarat, India;
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationOPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS
OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS Soamsiri Chantaraskul; Klaus Moessner (Centre for Communication Systems Research (CCSR), University of Surrey, Guildford, Surrey, United
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationControl Channel Allocation in Cognitive Radio Networks using Clustering
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationReview of Medium Access Control protocol for MANET
Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network
More informationAn overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks
An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks Ajmery Sultana, Xavier Fernando & Lian Zhao Peer-to-Peer Networking and Applications ISSN 1936-6442
More informationAn On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore
An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore Abstract Cognitive radio networks are composed of
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationWireless Networking: An Introduction. Hongwei Zhang
Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource
More informationECE 4600 Design Project
ECE 4600 Design Project Design and implementation of ZigBee-based cognitive radio for ISM band Group Number 9: Shuo Dong Willy Palahnuk Faculty Supervisors: Ekram Hossain, Ph.D. Date: October 1, 2012 1
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationProject: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: WPAN Applications Operating in TV White Space Date Submitted: March, 2011 Source: Mi-Kyung Oh, Cheolho
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationPERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3
PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3 UG scholar, 4 Assistant professor Department of ECE,
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationSample solution to Midterm
College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the
More information