Cognitive Radio Networks

Size: px
Start display at page:

Download "Cognitive Radio Networks"

Transcription

1 Cognitive Radio Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology

2 Outline Introduction Cognitive Radio Technology Spectrum Sensing Spectrum Management Spectrum Mobility Spectrum Sharing Cognitive MAC Protocols Conclusions Example From ICS Research References 2

3 Introduction 3

4 Introduction Limited spectrum Inefficiency in spectrum usage Utilization of the assigned licensed spectrum varies between 15% and 85% A new technology is required to enable better utilization of unused licensed spectrum Cognitive radio technology 4

5 Cognitive Radio Technology 5

6 What is a Cognitive Radio Definitions Federal Communications Commission Definition: a cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates Mitola Definition: the cognitive radio identifies the point at which wireless PDAs and the related networks are sufficiently computationally intelligent on the subject of radio resources and related computer-to-computer communications to detect user communication needs as a function of use context, and to provide radio resources and wireless services most appropriate to those needs 6

7 What is a Cognitive Radio Characteristics Cognitive capability: the capability of the radio technology of capturing or sensing information from its radio environment (monitoring the power in some frequency band) Reconfigurability: the ability of the radio to be dynamically programmable according to the radio environment (transmission and receipt of data on a variety of frequencies and using various radio access technologies) 7

8 What Should Cognitive Radio Enable to Do? Determination of unused portion of spectrum (spectrum holes or white space) Selection of the best available channel Coordination of the access with other users Detection of the appearance of licensed users vacate the channel 8

9 Cognitive Radio Network Architecture 9

10 Cognitive Radio Network Architecture Primary networks Networks with access right to certain spectrum bands, e.g. common cellular systems and TV broadcast networks Users of these networks are referred to as primary users. They have the right to operate in licensed spectrum Users of certain primary network do not care of other primary or secondary network users Secondary networks Do not have license to operate in the spectrum band they currently use or aim at using Opportunistic spectrum access Users of these networks are referred to as secondary users. They have no right to access licensed bands currently used Additional functionalities are required to share licensed spectrum bands with other secondary or primary networks 10

11 Cognitive Radio Cycle Radio environment Transmitted signal RF stimuli Spectrum Sharing Spectrum Mobility Primary user detection Spectrum Sensing Channel capacity Decision request Spectrum hole Spectrum characterizations Spectrum Decision 11

12 Spectrum Sensing 12

13 Spectrum Sensing Spectrum sensing is determined as the capability of detection of spectrum holes Spectrum Sensing Transmitter Detection Cooperative Detection Interference - Based Detection Matched Filter Detection Energy Detection Cyclostationary Feature Detection 13

14 Transmitter Detection Location of primary receiver is not known (no signaling between primary and secondary users) detection of the weak signal from a primary transmitter through local observations of secondary users Mechanisms Matched filter detection Energy detection Cyclostationary feature detection 14

15 Transmitter Detection Matched filter detection Optimal detector when all information of the primary user signal is known (it maximizes the received signal-to-noise ratio) Produces poor performance if primary users information not known Energy detection Used if primary users information not known Cyclostationary feature detection Mean and autocorrelation of modulated signals exhibit periodicity (modulated signals are coupled normally with sine wave carriers, pulse trains, repeating spreading, etc.) Differentiates noise from modulated signal (noise is a wide-sense stationary signal with no correlation) Computationally complex and requires long observation time 15

16 Transmitter Detection Primary and secondary networks are physically separated transmitter detection can not avoid interference due to the lack of the primary receiver s information Even if the secondary user has a line of sight to the transmitter, the secondary user may not be able to detect the transmitter, e.g. due to shadowing, etc. Can not prevent hidden terminal problem Primary transmitter range Interference Interference Secondary transmitter range Secondary user Primary user Transmitter Can not detect transmitter Can not detect transmitter 16

17 Cooperative Detection Incorporating information from multiple secondary users to detect primary users Clasified into Centralized cooperative detection Controlled mostly by cognitive BSs Cognitive BS collects sensing information from all secondary users it serves and detects spectrum holes Distributed cooperative detection No centralized infrastructure Observations are exchanged among secondary users More accurate detection than that based on single secondary user observations, e.g. transmitter detection. Moreover, multi-path fading and shadowing effects are mitigated 17

18 Interference-Based Detection Interference takes place at the receiver side (i.e. the receiver is disrupted). However, it is controlled at the transmitter side, e.g. using power control, etc. Interference temperature is well-known example (receiverdetection model) Power at receiver Licensed signal New opportunities for spectrum access Minimum service range with interference cap Service range at orginal noise floor Secondary users are allowed to communicate as long as they do not produce more interference than this limit Orginal noise floor 18

19 Challenges Interference temperature measurement Secondary users are aware of their locations and transmission power. They are not aware of primary users locations Currently, no practical way for a cognitive radio to measure or estimate the interference temperature at neighbor primary users Spectrum sensing in multi-user networks Multi-user environment makes it more difficult to sense primary users (secondary networks coexist with each other as well as with primary networks) Cooperative detection can be considered as possible solution for such environments Detection capability Detection of primary users in very short time is essential OFDM-based secondary users are best adequate (multi-carrier sensing can be exploited) 19

20 Spectrum Decision 20

21 Managing Available Spectrum Spectrum bands are spread over wide frequency range including licensed and unlicensed bands Radio environment characteristics show fast and mostly not predictable variation over time Secondary users have to select the best spectrum band meeting their QoS requirements spectrum management functions are required Spectrum management includes following steps 1. Getting data from spectrum sensing 2. Performing spectrum analysis 3. Finally making a spectrum decision 21

22 Spectrum Analysis Characterizes sensed spectrum holes to obtain the band appropriate for user s requirements Characteristics of spectrum holes Interference Some spectrum bands are more crowded than others Based on the interference at primary receivers, the allowed sending power of secondary user can be derived channel capacity is estimated Path loss Path loss increases as frequency increases. To retain the capacity when switching to higher frequency, sending power should be increased more interference produced Wireless link errors Modulation scheme and interference affect strongly the error rate Link layer delay Affected by the interference, path loss, etc. Holding time Expected time duration the secondary user can occupy the channel 22

23 Spectrum Decision Entity or CR Engine Once spectrum bands are characterized, the band best meeting QoS requirements should be selected spectrum decision function should be aware of QoS requirements of current ongoing applications Spectrum decision rules are required QoS requirements for secondary user Data rate Acceptable error rate Delay... 23

24 Challenges Decision Model Development of suitable decision rules that consider spectrum bands characters is until now an open issue Multiple spectrum band decision In case secondary users are capable of using multiple channels for transmission simultaneously, it is important to determine the number of spectrum bands available and select the bands appropriately Spectrum decision over heterogeneous spectrum bands Support spectrum decision operations on both licensed and unlicensed bands is challenging 24

25 Spectrum Mobility 25

26 Spectrum Mobility The process when a secondary user changes its frequency of operation, also called spectrum handoff Reasons - Operating channel becomes worse - Primary user wants to communicate on the channel - User movements (available spectrum bands change) Requirements - Low latency - Transparence to upper layers protocols if possible - No impairments on ongoing applications (ideal case) Multi-layer mobility management is required with which protocols of many layers cooperate to support mobility, 26

27 Challenges Smooth spectrum mobility schemes Synchronization between protocols of many layers and possibly with applications to support smooth spectrum handoffs (e.g. applications or protocols switch from operation mode to another upon prediction of a spectrum handoff, etc.) Support of horizontal (changing channels while staying in the same secondary network) and vertical handoffs (between secondary networks) Performing spectrum handoffs to maintain QoS requirements satisfied 27

28 Spectrum Sharing 28

29 Spectrum Sharing Considered similar to Medium Access Control (MAC) issue in existing systems. However, different challenges arise due to Coexistence with licensed users Wide range of available spectrum Spectrum sharing steps Spectrum sensing: detect unused spectrum holes Spectrum allocation: allocation of possible target channels based on spectrum sensing results and allocation policies Spectrum access: coordination of access to the allocated channel to avoid collisions Transmitter-receiver handshake: negotiation of communication channel between sender and receiver Spectrum mobility: enable continuous communication between sender and receiver in spite of primary user appearance on the used channel 29

30 Spectrum Sharing Techniques 1/3 Spectrum sharing techniques are classified according to Architecture Centralized - Centralized entity controls the spectrum allocation and access - Secondary users do observations and report to the centralized entity, which creates spectrum allocation map Distributed - Applied when construction of infrastructure is not possible or not preferable - Each node is responsible for the spectrum allocation 30

31 Spectrum Sharing Techniques 2/3 Spectrum allocation behavior Cooperative - Observation results of each node are shared with other nodes spectrum allocation is done based on these measurements - These techniques result in better spectrum utilization at the cost of considerable signaling between nodes Non-cooperative (selfish) - Each node does its observations and allocates its spectrum band - These techniques result in reduced spectrum utilization. However, they may be practical for certain applications or situations 31

32 Spectrum Sharing Techniques 3/3 Spectrum access technology Interweave spectrum sharing (sometimes called overlay in the noninformation-theoretic literature) - Secondary nodes access spectrum holes not used by primary networks Interference to primary users is minimized Underlay spectrum sharing - Based on spread spectrum techniques developed for cellular networks - After acquiring spectrum allocation map, secondary users begin sending, so that their transmission power is regarded as noise by licensed users - Overlay spectrum sharing - Cooperation with the primary transmission - SUs devote part of its transmit power to enhance the primary signal - Interference level may be increased 32

33 Intra/Inter-Network Spectrum Sharing Inter-network spectrum sharing Secondary user (operator1) Secondary user (operator2) Intra-network spectrum sharing Inter-network spectrum sharing Centralized inter-network spectrum sharing: secondary networks organize cooperatively the spectrum allowed to be accessed by users of each secondary network, e.g. by means of central spectrum policy server, etc. Distributed inter-network spectrum sharing: BSs of secondary networks compete to allocate spectrum holes 33

34 Challenges Common control channel (CCC) Tasks Transmitter-receiver handshake Communication with a central entity organizing the spectrum allocation Sensing information exchange Problems Fixed CCC is infeasible (CCC must be vacated when a primary user appears on it) CCC for all users seems to be topology-dependent, thus CCC varies over time If no CCC is allocated, transmitter-receiver handshake becomes a challenge Dynamic radio range Radio range and characteristics change with operating frequency CCC must be selected carefully (better to select CCC in lower spectrum bands and data channels in higher ones) Spectrum unit Existing techniques consider channel as the basic spectrum unit. As known, channel may be time slot, frequency, code, etc. 34

35 Cognitive Radio MAC Protocols 35

36 Classification Cognitive Radio (CR) MAC Protocols Random Access MAC Protocols Time Slotted MAC Protocols Hybrid MAC Protocols CR Centralized MAC (CSMA/CA-like random access for control packets and data) Single Radio (Time synchronized control and data slots) (Partially time slotted and partially random access) CSMA-MAC IEEE DSA Driven MAC CR Ad Hoc MAC Single Radio Multi Radi o SCA-MAC HC-MAC DOSS DSA-MAC C-MAC OS-MAC SYN-MAC 36

37 Classification Classified according to the access method into Random access MAC protocols No need for time synchronization Based on Carrier Sense Multiple Access (CSMA) Time slotted MAC protocols Need for network-wide synchronization Time is divided into slots for both control and data channels Hybrid MAC protocols Partially slotted transmission, in which Signaling generally occurs over synchronized time slots Data transmission may have random channel access schemes without time synchronization Classified according to the architecture into CR centralized MAC Central entity manages, synchronizes and coordinates operations among secondary users CR Ad Hoc MAC No central entity, neighbors cooperate to gain access to available channels 37

38 CSMA-MAC Protocol PS Busy RTS RTS CTS Data CRN Busy Carrier sense(t s ) RTS CTS Data (a) PS Busy RTS RTS CTS Data CRN Busy Carrier sense(t s ) RTS (b) Collision Still no successfull transmisssion PS Busy RTS RTS CRN Busy Carrier sense(t s ) RTS CTS Data (c) PS CRN Channel is free Busy Busy Carrier sense(t s ) RTS CTS Data (d) Primary System (PS) Cognitive Radio Network (CRN) 38

39 CSMA-MAC Protocol Case (a): CRN out of the range of PS Primary user gains the access to the channel and sends its data Secondary user senses the channel for a period t s The secondary user finds the channel vacant (assuming the primary and secondary users are separated by a large distance) The secondary user gains access to the channel and sends its data Case (b): CRN in the range of PS but not of the PS transmitter RTS packet sent by the secondary user experiences collision The secondary user waits for the next transmission opportunity after repeating the previous sensing process Case (c): PS experiences internal collision Primary user sends repeated RTS packets. However, a collision incurs each time Secondary user can start transmission Case (d): Channel is not used by PS Primary user has no packets to send, thus the channel is free Secondary user can start transmission 39

40 SYN-MAC Protocol Available channels A B C D E F Slot for Ch1 Slot for Ch2 Slot for Ch3 Slot for Ch4 Slot for Ch5 Ch1 Ch2 Ch3 Ch4 RTS1 CTS1 Data IE IE Primary user active Ch5 RTS CTS DATA Information Event (IE) Backoff 40

41 SYN-MAC Protocol Time is divided into fixed-time intervals (slots) Each time slot is dedicated to one channel Each node has two radios, one for listening to control messages and one for sending data C wants to send data to D Each node knows the available channel sets of their neighbors Channels 1 and 5 are common C chooses Ch1 for transmission and starts negotiation over it using RTS/CTS Once negotiation is successful, data transmission takes place on Ch1 B observes that primary user of Ch 4 has returned B knows that it can reach its neighbors (A and C) through Ch2 B waits for the time slot which represents Ch2 B sends Information Events (IE) control message with its new channel list Nodes A and C, on receiving this information learn that node B will not be available on Ch 4 E applies the same procedure as B to notify D and F that Ch 4 is removed from its channels list 41

42 CR Standards IEEE af Super Wi-Fi (Feb. 2014) IEEE (July 2011) TV white space spectrum in the VHF and UHF, MHz, OFDM Cognitive sensing, flexible adjustment of bandwidth, modulation, power and coding Database driven approach: Access granted by Geolocation DataBase (GDB) Local sensing is used in certain special cases Up to 1 km, 35.6 Mbit/s for 8 MHz channels Access points (AP) and stations Wireless local area network (WLAN) km, 19 Mbit/s for 6 MHz channels Base stations (BS) and customerpremises equipment (CPE) Wireless regional area network (WRAN) 42

43 Example from ICS Research Flexible MAC as Spectrum Mobility Solution by André Puschmann 43

44 Motivation TDMA CSMA/CA Power consumption Low High Bandwidth utilization Maximum Low Preferred traffic level High Low Dynamics (network change) Poor Good Effect of packet failure High (latency) Low Synchronization Crucial - Reference: TDMA Protocol Requirements for Wireless Sensor Networks, IEEE

45 Proposed Improvement Flexible Link Layer Architecture [1] Features: Multiple configurations Component reuse Complexity reduction Reuse of existing MACs Separated control logic Frame Error Rate (FER) / Channel Busy Fraction (CBF) switching metric [1] Puschmann et al., A Component-based Approach for Constructing Flexible Link-Layer Protocols, CROWNCOM 2013, Washington DC, USA. 45

46 Results Gain: 46

47 Conclusions Cognitive radio technology enables better utilization of unused licensed spectrum Basic idea Allocation of an unused spectrum band Utilization of the allocated band for communication as long as no primary user appears on this band or no interference produced for primary users working around Requirements Fast and accurate spectrum sensing equipment as well as mechanisms Adequate spectrum decision approaches Seamless spectrum mobility techniques Efficient spectrum sharing methods However Lots of new open issues and challenges to solve IEEE , IEEE af are standards for cognitive radio networks 47

48 References Cognitive Radio Technology, Spectrum Sensing, Management, Mobility and Sharing I.F. Akyildiz, W.Y. Lee, M.C. Vuran, S. Mohanty, NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey, Computer Networks Journal, 2006 S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE Journal on Selected Areas in Communications, 2005 H. Arslan Cognitive radio, software defined radio, and adaptive wireless systems, Springer, 2007 J.J. Mitola, Cognitive Radio - An Integrated Agent Architecture for Software Defined Radio, Doctoral thesis, Royal Institute of Technology (KTH), Teleinformatics, ISSN 1403 ISSN , Stockholm, 2000 Cognitive MAC Protocols A. Chia-Chun Hsu, D. S. L. Weit, C. C. J. Kuo, A cognitive mac protocol using statistical channel allocation for wireless ad-hoc networks, in Proceeding of IEEE Wireless Communications and Networking Conference (WCNC 2007), March 2007 J. Jia, Q. Zhang, X. Shen, Hc-mac: A hardware-constrained cognitive mac for efficient spectrum management, IEEE Journal on Selected Areas In Communications, vol. 26, no. 1, January 2008 L. Ma, X. Han, C. C. Shen, Dynamic open spectrum sharing mac protocol for wireless ad hoc networks, in Proceeding of the first IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), November 2005 C. Cordeiro, K. Challapali, C-mac: A cognitive mac protocol for multi-channel wireless networks, in Proceeding of the 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2007), April 2007 L. Le, E. Hossain, Osa-mac: A mac protocol for opportunistic spectrum access in cognitive radio networks, in Proceeding of the IEEE Wireless Communications and Networking Conference (WCNC 2008), April 2008 Y. R. Kondareddy, P. Agrawal, Synchronized mac protocol for multi-hop cognitive radio networks, in Proceeding of IEEE International Conference on Communications (ICC 2008), May

49 References Claudia Cormio, Kaushik R. Chowdhury, A survey on MAC protocols for cognitive radio networks, Ad Hoc Networks journal, 2009 IEEE Standards Activities C. Stevenson, G. Chouinard, L. Zhongding, H. Wendong, S. Shellhammer, W. Caldwell, IEEE : The first cognitive radio wireless regional area network standard, IEEE Communications Magazine, 2009 IEEE P / DRAFTv1.0 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands, April 2008 IEEE af Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: TV White Spaces Operation, February

50 Contact Integrated Communication Systems Group Ilmenau University of Technology Prof. Dr.-Ing. habil. Andreas Mitschele-Thiel Dr.-Ing. Oleksandr Artemenko fon: +49 (0) /2788 fax: +49 (0) mitsch, Visitors address: Technische Universität Ilmenau Helmholtzplatz 5 Zuse Building, room 1032/1071 D Ilmenau Integrated Communication Systems Group Ilmenau University of Technology

Cognitive Radio Networks

Cognitive Radio Networks Cognitive Radio Networks Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Outline Radio Allocation Spectrum Management Cognitive Radio Technology Spectrum Sensing

More information

Cognitive Radio Networks

Cognitive Radio Networks Cognitive Radio Networks Mobile Communication Networks (RCSE) Winter Semester 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline Radio Allocation Radio Flexibility

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Medium access control protocols in cognitive radio networks

Medium access control protocols in cognitive radio networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2010; 10:31 49 Published online in Wiley InterScience (www.interscience.wiley.com).906 Medium access control protocols in cognitive

More information

Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment

Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment www.ijcsi.org 45 Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment 1 Ateeq Ur Rehman, 2 Muhammad Tariq Sadiq, 3 Noman Shabbir and 4 Ghayoor Abbas Jafri 1 Department

More information

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage: Ad Hoc Networks 7 (2009) 810 836 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc CRAHNs: Cognitive radio ad hoc networks Ian F. Akyildiz *, Won-Yeol

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute

More information

A survey on dynamic spectrum access protocols for distributed cognitive wireless networks

A survey on dynamic spectrum access protocols for distributed cognitive wireless networks REVIEW Open Access A survey on dynamic spectrum access protocols for distributed cognitive wireless networks Pinyi Ren *, Yichen Wang, Qinghe Du and Jing Xu Abstract With the rapid development of wireless

More information

A MAC protocol with an improved connectivity for cognitive radio networks

A MAC protocol with an improved connectivity for cognitive radio networks AL Sukkar et al. EURASIP Journal on Wireless Communications and Networking (26) 26:6 DOI.86/s3638-6-63-5 RESEARCH A MAC protocol with an improved connectivity for cognitive radio networks Ghazi AL Sukkar

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online REVIEW ARTICLE ISSN: 2321-7758 COGNITIVE RADIO BASED WIRELESS REGIONAL AREA NETWORK (IEEE STANDARD 802.22): A REVIEW AVNEET KAUR 2 nd Year M.Tech, Dept. Of Electronics & Communication Engineering, Guru

More information

An overview of the IEEE Standard

An overview of the IEEE Standard In the name of God An overview of the IEEE 802.22 Standard P.Rastegari P.Rastegari@ec.iut.ac.ir Summer 88 Summary This tutorial gives a detailed overview of the IEEE 802.22 standard based on Cognitive

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication

More information

An Adaptive Multiple Rendezvous Control Channel for Cognitive Radio Wireless Ad Hoc Networks

An Adaptive Multiple Rendezvous Control Channel for Cognitive Radio Wireless Ad Hoc Networks An Adaptive Multiple Rendezvous Control Channel for Cognitive Radio Wireless Ad Hoc Networks Claudia Cormio Telematics Lab, Dipartimento di Elettronica ed Elettrotecnica Politecnico di Bari, Italy ccormio@polibait

More information

Spectrum Sharing in Cognitive Radio Networks

Spectrum Sharing in Cognitive Radio Networks Spectrum Sharing in Cognitive Radio Networks H.Feizresan Dr. M. J. Omidi Electrical and Computer Engineering Department, Isfahan University of Technology Abstract The limited available spectrum and the

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Spectrum Sensing and Management in Cooperative Cognitive Radio

Spectrum Sensing and Management in Cooperative Cognitive Radio Spectrum Sensing and Management in Cooperative Cognitive Radio Ghayoor Abbas Jafri Ateeq Ur Rehman Muhammad Tariq Sadiq This thesis is presented as part of Degree of Master of Science in Electrical Engineering

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

An efficient trigger to improve intra-wifi handover performance

An efficient trigger to improve intra-wifi handover performance An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks

Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar Department of Computer Science and Technology, University of

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

A survey on MAC protocols for complex self organizing cognitive radio networks

A survey on MAC protocols for complex self organizing cognitive radio networks DOI 10.1186/s40294-016-0030-y REVIEW Open Access A survey on MAC protocols for complex self organizing cognitive radio networks Munam Ali Shah 1, Sijing Zhang 2, Muhammad Kamran 3*, Qaisar Javaid 4 and

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band New Channel Access Approach for the IEEE 802.15.4 Devices in 2.4 GHz ISM Band Tolga Coplu and Sema F. Oktug Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey {coplu,oktug}@itu.edu.tr

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Ad Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology

Ad Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology Ad Hoc Networks Mobile Communication Networks (RCSE) Winter Semester 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) Routing

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks

An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks Ahmed Chehata, Wessam Ajib, Halima Elbiaze Computer science department Université du Québec à Montréal, Canada

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

M06:Wireless and Mobile Networks. Corinna Schmitt

M06:Wireless and Mobile Networks. Corinna Schmitt M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

MULTI-HOP DISTRIBUTED COORDINATION IN COGNITIVE RADIO NETWORKS

MULTI-HOP DISTRIBUTED COORDINATION IN COGNITIVE RADIO NETWORKS MULTI-HOP DISTRIBUTED COORDINATION IN COGNITIVE RADIO NETWORKS Abdallah Ijjeh Department of Electrical and Electronic Engineering, Al-Balqa` Applied University / Al- Huson University College, Irbid, Jordan

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,

More information

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Advanced Mobile Communication Networks

Advanced Mobile Communication Networks Advanced Mobile Communication Networks Course Description and Introduction Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Objectives Organizational Stuff Contents

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

MAC Protocols for VANETs

MAC Protocols for VANETs MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM

More information

Research Directions in Low-Power Wireless Networks

Research Directions in Low-Power Wireless Networks Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Intelligent Load Balancing Approach for Cognitive Radio Networks

Intelligent Load Balancing Approach for Cognitive Radio Networks Intelligent Load Balancing Approach for Cognitive Radio Networks 1 Ravneet Kaur, 2 Er.Vimmi Malhotra 1 Student, M.Tech CSE, 2 Assistant Professor, Dept. of CSE, 1 ravneetkaur0013@gmail.com, 2 malhotra.vimmi22@gmail.com

More information

Proceeding An Overview of Medium Access Control Protocols for Cognitive Radio Sensor Networks

Proceeding An Overview of Medium Access Control Protocols for Cognitive Radio Sensor Networks Proceeding An Overview of Medium Access Control Protocols for Cognitive Radio Sensor Networks Jemish Maisuria 1, * Dr. Saurabh Mehta 2 1 E. & C. Department, Uka Tarsadia University, Surat, Gujarat, India;

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS

OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS Soamsiri Chantaraskul; Klaus Moessner (Centre for Communication Systems Research (CCSR), University of Surrey, Guildford, Surrey, United

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Control Channel Allocation in Cognitive Radio Networks using Clustering

Control Channel Allocation in Cognitive Radio Networks using Clustering Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks

An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks Ajmery Sultana, Xavier Fernando & Lian Zhao Peer-to-Peer Networking and Applications ISSN 1936-6442

More information

An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore

An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore Abstract Cognitive radio networks are composed of

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Wireless Networking: An Introduction. Hongwei Zhang

Wireless Networking: An Introduction. Hongwei Zhang Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource

More information

ECE 4600 Design Project

ECE 4600 Design Project ECE 4600 Design Project Design and implementation of ZigBee-based cognitive radio for ISM band Group Number 9: Shuo Dong Willy Palahnuk Faculty Supervisors: Ekram Hossain, Ph.D. Date: October 1, 2012 1

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: WPAN Applications Operating in TV White Space Date Submitted: March, 2011 Source: Mi-Kyung Oh, Cheolho

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3

PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3 PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3 UG scholar, 4 Assistant professor Department of ECE,

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Sample solution to Midterm

Sample solution to Midterm College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the

More information