Spectrum Handoff Strategy Using Cumulative Probability in Cognitive Radio Networks

Size: px
Start display at page:

Download "Spectrum Handoff Strategy Using Cumulative Probability in Cognitive Radio Networks"

Transcription

1 Spectrum Handoff Strategy Using Cumulative Probability in Cognitive Radio Networks Adisorn Lertsinsrubtavee, Naceur Malouch and Serge Fdida Laboratoire d Informatiqe de Paris 6 (LIP6) Université Pierre et Marie Curie (UPMC) Paris, France {Adisorn.Lertsinsrubtavee, Naceur.Malouch, Serge.Fdida}@lip6.fr Abstract The existing spectrum handoff techniques for cognitive radio perform handoff based solely on channel availability. This can result in a frequent number of channel handoffs and cannot ensure the quality requirement of applications such as delay bounds. This paper proposes the use of cumulative probability based on past backlog measurements to determine whether and how to perform handoffs. In order to prevent unnecessary handoff operation, secondary user should keep the same channel as long as the cumulative probability estimation does not violate some bound. However, the estimation from past observations may not correspond to the the real behavior in the immediate future even if efficient prediction models are employed. Thus, we propose the use of backup channels for short time periods to alleviate this problem. We analyze our strategies through extensive simulations and we compare them to random and classic approaches. Results show that our proposed strategies significantly reduce the number of channel handoffs up to 76% while still supporting the delay bound requirement. I. INTRODUCTION A spectrum handoff functionality in Cognitive Radio (CR) is slightly different from other wireless technologies such as Wi- Fi or GSM. Normally there, a handoff operation is requested when the signal of current cell is worse than the neighbor cells when users change their location. In CR networks, the secondary user (SU) has to decide to perform handoff when the primary user (PU) is detected in the licensed channel. As was emphasized in [1] and [2], many research works seek to perform channel handoff if the licensed channel becomes unavailable or PU is detected. The communication of SU has to be interrupted and SU packets must wait in the transmission buffer. The communication can be resumed when the connection is successfully switched to a new channel (spectrum handoff). Consequently, long waiting delays can be incurred and packets may be lost. The IEEE Wireless Regional Area Network (WRAN), switching delay is required to be lower than 2 seconds [3]. Here the switching delay includes times for channel selection process, spectrum sensing, signaling for channel establishment, and the RF reconfiguration. Also the FLO (Forward Link Only) air interface used in mobile broadcasting systems, for example MediaFLO developed by Qualcomm has an average physical layer channel switching up to 1.5 second [4]. This switching delay will be reduced depending on the hardware technology but it is still a significant factor to influence the global performance. Nevertheless, SU might perform unnecessary handoff because sometimes PU occupies the channel only for a short periods intermittently. The communication can be continued again on the same channel if SU waits until PU finishes its transmission. In addition, this waiting time should not impact the global performance of the communication regarding the application requirements, e.g. delay, throughput or loss ratio. The study [5] has compared the the performance where SU always decides to wait until PU finishes its transmission, and where SU always does handoff whenever PU is detected based on PRP M/G/1 queueing model. However, SU may suffer from long waiting time delay, if PU occupies the channel for a long period. The delay bandwidth product is proposed in [6] to help SU decide to wait until PU finishes its transmission or if it is better to perform handoff. A channel selection based on low occupancy by primary users and handoff based on prediction models was proposed in various research works [7] and [8]. Conversely, the prediction error cannot be avoided especially for non stationary traffic. SU may selects a bad quality channel leading to fast successive handoffs and degrading the network performance. The study [9] has conducted a large scale measurement and found that the prediction error of PU activity can be approximated by Beta distribution. A dynamic channel selection framework is proposed for realtime application based on utilizing a channel capacity and data loss rate [1]. To reduce the spectrum handoff delay, the out-ofband channels are classified as backup and candidate channels as introduced in IEEE [11]. This classification helps the channel selection process to facilitate fast discovery of the best channel to use when PU is detected on the operating channel, but no algorithm is specified on how to build the list of backup channels. In this paper, we consider a compromise decision to stay on the same channel or to handoff to another channel while supporting a delay bound requirement from the application. This implies the need of observations from the past and most importantly, it requires that the quality of current channel can actually be estimated. In addition, selecting a bad quality channel causes frequent channel handoffs. Therefore, the selection of the new target channel should also take into account similar quality estimations. To achieve these goals, we propose new strategies for the spectrum handoff procedure in cognitive radio networks

2 which make the following contributions. First, a cumulative probability (CP rob) is proposed to estimate channel adequacy for the current transmission and to make handoff decisions. Second, a complete spectrum handoff algorithm based on cumulative probabilities () is designed. It uses a queue in the MAC layer and another in the radio layer. Third, a backup channel for a short time period is applied to our strategy in order to avoid fast successive handoffs even if primary behavior can not be predicted. Finally, we evaluate our method compared to an opportunistic random handoff approach and the low occupancy selection approach. The following sections of this paper are organized as follows. Section II presents the system model. Section III presents the new proposed spectrum handoff strategies using CP rob and backup channels. The performance of the proposed strategies are evaluated in Section IV through simulations, and then the paper concludes in Section V. II. SYSTEM MODEL We consider a wireless device of SU equipped with a cognitive radio that has access to n licensed channels. SU can use any one of the channels at a time if the channel is declared available by the sensing module of the cognitive radio. Each channel has its own independent availability pattern. Collected information about channel availability through spectrum sensing are gathered and analyzed by a queue manager at the MAC layer. Packets from the application are buffered in the MAC queue. If the channel is usable, the MAC queue manager transfers packets to the Physical layer interface (Fig. 1). In this work, we consider spectrum handoff as deployed by a cognitive radio node to focus on the internal algorithm and the channel quality estimation. The Physical interface sends packets to the base station of the cognitive radio network only if the current active channel is available. Virtual Q_ch 1 Secondary User Fig. 1. MAC Q_manager Physical interfaces Ch 1 Current Active Channel Ch 2 Ch n Node architecture for spectrum handoff CR Base Station To estimate the quality of every channel, SU creates a virtual queue for each channel (Fig. 1). The MAC queue manager then forwards packets from the application layer to all virtual queues. Each virtual queue can synchronize information about channel availability from the spectrum sensing module. Then it updates the channel availability pattern to be the same as a real physical channel. If this channel is declared available, packets will be removed from the virtual queue. Section III.A explains why virtual queues are deployed. III. SPECTRUM HANDOFF STRATEGIES USING CUMULATIVE PROBABILITIES Even if the objective of the application is to satisfy a given delay constraint, it is not practical to perform spectrum handoff based on delay measurements. First, these measurements usually require additional feedback messages from the receiver or from the next hop to compute the end-to-end delay or the one-hop delay. Second, the delay of a packet is measured only after the packet is received which means after it is removed from the MAC queue, thus this value can be obtained too late especially if the packet enters a full queue or when the current channel becomes unavailable. In the latter case, the delay measurement will be obtained only when the channel becomes available again. Consequently, SU cannot update the current state of the channel promptly and may wait for the report message thus exceeding the delay constraint. On the other hand, SU can estimate a backlog delay instantaneously once a packet arrives at the MAC queue based on remaining packets in the queue. Therefore, the number of packets in the queue is able to describe the current state of the channel more efficiently than a delay measurement. A. The Cumulative Probability (CP rob) The cumulative probability CP rob can ensure that a packet is serviced through the channel within a backlog delay bound D max and with a maximum probability of delay violation P max. For instance, if D max is 5 ms and P max is.2, it means that no more than 2 % of sending packets should experience a backlog delay larger than 5 ms. The parameters D max and P max depend on the requirements of the application. More precisely, the D max and P max of a delay sensitive application should be lower than the file transfer application. Apart from the delay requirement, the cumulative probability is able to reflect both the state of channels and the traffic sent by the application. Indeed, if packets are sent only when the channel is available then this channel is considered to be usable even if unavailable periods are long. Also, the cumulative probability can decrease the number of unnecessary handoffs due to intermittent channel availability since its computation naturally combines several queue size measurements. Now, to compute CP rob at he MAC queue and the virtual queues, SU estimates first the backlog delay each time a packet p arrives at the queue (Fig. 2). As discussed above, this delay is calculated based on the current queue size at the arrival time by the following expression = size(p) bw i (1) where size(p) is the packet size and bw i is the transmission bandwidth offered by the channel. If is greater than D max, a counter Nmax, w that maintains the number of times the estimated backlog delay is larger than the delay bound, is incremented. The queue manager computes Nmax w over a sliding window of previous backlog delay measurements including the current one. Then, it calculates the ratio CP rob

3 1 2 3 Observation Window (size = ) Calculate Arrival Packet Fig. 2. < D max > D max MAC Q_manager Ch 1 Current Active Channel Ch 2 Ch n Observation Window (size = ) Calculate Forwarded Packet from MAC queue Virtual Q_ch Observation Window (size = ) Calculate Forwarded Packet from MAC queue Virtual Q_ch 2 Observation Window (size = ) Calculate Forwarded Packet from MAC queue Virtual Q_ch n sensing sensing sensing Computing CP rob at the MAC Q-manager and the Virtual queues between max and the total number of packet arrivals in the observation window. Ch 1 Ch 2 Ch n CP rob = max (2) The size of the observation window has a substantial impact on the accuracy of estimating the quality of channels. For example, a large observation window size may not keep the CP rob up-to-date because the traffic from PU and/or SU may change rapidly. In contrast, a short observation window size cannot give enough information to estimate the channel behavior. However, we investigate this impact through simulation in section IV.B. Once a packet arrives at the MAC layer, the MAC queue manager forwards the current packet to the virtual queue for each channel. Then, CP rob is estimated both in the MAC queue and the virtual queue.the MAC queue manager has to estimate the CP rob of the current queue. Besides, CP rob is computed for all the other channels using, on one side, the previous channel status provided by the sensing module for every channel, and on the other side, the arrival instants of packets sent by the application (Fig. 2). This is computed in order to emulate a transmission from SU over each channel and thus compute what CP rob would be if the on-going transmission is sent over another channel instead of the current one. This is possible through the deployment of virtual queues. Let us remember, CP rob is computed at the MAC queue manager in order to decide when SU should do handoff. If CP rob is greater than P max, it means the current active channel cannot provide the required service quality. On the other hand the CP rob of virtual queue is computed to estimate the quality of each channel. The MAC queue manager selects a channel which has the lowest CP rob based on the estimation of the virtual queues and decide to perform handoff according to the procedure described in the next section. B. : Spectrum Handoff based on Cumulative Probabilities One of the objectives of SU is to reduce the number of channel handoffs. To do so, SU should try to keep the same channel if it estimates that the delay bound will not be violated or if other channels can not offer better delays anyway. When handoff is necessary, then the new selected channel should be chosen in order to prevent as much as possible additional future handoffs. Accordingly, SU decides to perform handoff to channel i if the current channel is not available or bw i > bw current, and CP rob current > P max,i.e.,the quality of the current channel is not good enough, and CP rob current CP rob i,i.e., The quality of the target channel is better than the current one and thus handoff is worthwhile. The parameter is a threshold of quality improvement that should be tuned according to the tolerance allowed by the application. Notice that when the channel is available and the new bandwidth does not increase then clearly there is no need for handoff. The target channel i is the one that has the minimum CP rob i among all available channels. C. -BC: Using Short Time Backup Channels Selecting an inappropriate channel after the procedure can still occur because the estimation from the observation window may not provide the same behavior in the immediate future. Moreover, even if sophisticated prediction techniques are used, PU behavior can change at any time unexpectedly. In that case, SU may have to repeat the handoff process. Thus, using a backup channel can alleviate this problem by allowing SU to tune to another channel in addition to the newly selected one when performing the handoff. The best channel according to is set to be the active channel and the second best channel is chosen to be the backup channel. This procedure avoids performing quick successive handoffs. The backup channel can also be used during the backup time to transmit packets. However, at the end of the backup time, SU has to release one of the two channels by the following two rules. The active channel is unavailable and the backup channel is available, SU releases the current active channel and sets the backup channel to be active. In all other cases, SU releases the backup channel. The larger the backup time, the lower the number of handoffs, however, the backup channel can not be used by other users during that time. That is why the backup time should be short. Its impact on the global performance is also examined in the next section. We call this variant of the handoff algorithm -BC. IV. SIMULATION RESULTS We use OMNeT++ simulator [12] to evaluate the performance of our strategies and compare to the opportunistic

4 handoff with random selection approach and also to the classic low occupancy selection approach. The opportunistic and random approach performs handoff immediately once the current channel becomes unavailable. Then, it selects a new available channel randomly. For the low occupancy selection, SU selects a new available channel which offers the longest available time, or in other words the lowest channel occupancy by primary users. However, we further improve this classic approach by adding a waiting time before handoff so the comparison to our strategy is not biased. Hence, whenever the current channel becomes unavailable, we wait for a time W H before performing the handoff. At the end of the W H period, if the channel is available then the handoff is not done and the current channel is kept. This technique can reduce unnecessary handoffs if the W H is well chosen. We simulate a cognitive radio node with a MAC queue and a physical queue before transmission. In order to compute cumulative probabilities CP rob for all channels, we also simulate a virtual physical queue for every channel. To focus on the handoff algorithm and its performance, we simulate a single user between the cognitive radio node and a base station. A. Simulation Parameters and Performance Metrics To simulate primary user activity, we consider channels that are switching between available and unavailable periods with durations exponentially distributed. The means of these durations denoted by µ available and µ unavailable are chosen and combined among the set {1, 1}seconds in order to create 9 channels with different properties (Table I). For the cognitive radio traffic, we follow a Voice over IP model that alternates between idle periods and sending periods with a constant rate. All the values of simulation parameters are mentioned in Table I. Furthermore, every simulation is repeated 2 times and averages along with 95% confident intervals computed with the t-distribution are shown in all plots. To evaluate the performance of the different handoff strategies, we examine the number of channel handoffs and the observed delay violation ratio P v which is the ratio of the number of packets which have backlog delay over D max to the total number of packets. This ratio should be lower than P max as required by the application. In the following sections, we study the impact of the configuration parameters on the different strategies while showing the efficiency of and -BC compared to other strategies. B. Impact of System Parameters In this section, we investigate the impact of system parameters and show through simulation the optimal value of the window size, the threshold of quality improvement and the backup time. Impact of window size. We investigate first what would be the adequate size of the observation window to be used in computing the cumulative probability CP rob. Since CP rob is computed both at the MAC queue and for the virtual queues, Parameter TABLE I SIMULATION CONFIGURATION Value Channel bandwidth 32 kbps Propagation delay to the base station 5 ms Handoff delay 1 ms Channel 1: µ available, µ unavailable 1, 1 in seconds Channel 2: µ available, µ unavailable 1, 2 in seconds Channel 3: µ available, µ unavailable 1, 5 in seconds Channel 4: µ available, µ unavailable 2, 1 in seconds Channel 5: µ available, µ unavailable 2, 2 in seconds Channel 6: µ available, µ unavailable 2, 5 in seconds Channel 7: µ available, µ unavailable 5, 2 in seconds Channel 8: µ available, µ unavailable 5, 5 in seconds Channel 9: µ available, µ unavailable 5, 1 in seconds 5.5 s SU mean idle period µ idle 2.5 s SU transmission rate 64 kbps Packet size bytes P max % D max 4 ms we considered a suitable window size for each. Let us begin with the window size of the MAC queue. As the current active channel maintained by the MAC queue is dynamic, the active channel can be changed in a short period intermittently. For instance, SU switches from channel 1 to channel 2, according to whether the CP rob is over the threshold (P max ). After switching, MAC queue may decide to do short successive handoffs, even though channel 2 is the best channel. The fact of the matter is that a small observation windows is not sufficient to estimate the current behavior of the dynamic channel at the MAC queue. When the current active is moved to channel 2, the statistical data in the observation window reflects the performance using channel 1 (Fig. 3). Thus, the CP rob of MAC queue is still over P max. For this reason, a large window size is more suitable for the MAC queue than a small one. This large window size should contain enough information about the behavior of channel usage from the past. We call the window which records the delay of each packet from the beginning of transmission to W holedb. < D max t -1 t CProb>P max > D max Channel usage Fig. 3. Observation Window of MAC Q_manager CProb still over P max Impact of short observation window at the MAC queue We compare the performance between applying the

5 W holedb and a small observation window (a window size of 1 measurement) at the MAC queue through the simulation while varying the source traffic. Fig. 4(a) shows that applying the W holedb at the MAC queue can reduce the number of channel handoffs significantly compared to the small observation window. Fig. 4(b) illustrates the delay violation ratio where P max constraint is set to %. Apparently, the W holedb can satisfy to the required performance and the delay violation P v is almost equal to P max. However, the small observation window increases the number of handoff substantially while decreases unnecessary P v. Hence, the W holedb is suitable to apply for a window size of the MAC queue WholeDB Short observation window (a) Number of channel Handoffs Fig WholeDB Short observation window Impact of the observation window size at the MAC queue Nevertheless, a window size of the virtual queue should be different from the MAC queue because a virtual queue has the responsibility of estimating the CP rob for only one specific channel. Thus, it is more important to keep the CP rob up-todate by using a small window size. Fig. 5 show the impact of varying the window size at the virtual queue Size of observation window (a) Number of channel Handoffs Fig Size of observation window Impact of the observation window size at the Virtual queue The delay violation ratio P v increases significantly when the window size is over 2. This shows that a large window size is not suitable for a virtual queue. Even though a larger window size can reduce the number of channel handoffs, P v is increased over P max limit which is not acceptable. A small window size between 5 to 2 can achieve the required performance (%) perfectly and P v does not exceed the P max. However, the number of channel handoffs slightly falls when the window size increases. Thus, a window size of 1 measurements (packets) is a good tradeoff between both performance metrics. Impact of the threshold of quality improvement. Fig. 6 illustrates the impact of the threshold of quality improvement used to assess the validity of the handoff decision (Section III.B). These results suggest that. (%) could be a compromise value of because the P v and the number of handoffs do not vary much after this value. A very small value is not adequate because it decreases P v unnecessarily while increasing significantly the number of handoffs. Otherwise, using is efficient in reducing the number of handoffs without impacting the required delay performance Threshold of quality improvement (a) Number of channel handoffs Fig Threshold of quality improvement Impact of the threshold of quality improvement Impact of varying the backup time. Fig. 7 shows the impact of varying the backup time used in -BC. Although the number of handoffs declines steadily when the backup time is increased, the longer the backup time, the less chance for other SUs to find channels to select. Hence, the backup time should be set in order to reduce the P v accordingly. After Fig. 7(b), we set this value to 1.5s for the next simulations Backup Time (s) (a) Number of channel handoffs Fig Backup Time (s) Impact of backup time used in -BC C. Comparison of Different Strategies In this section the performance of and -BC is studied and compared to the random and the low occupancy strategies while applying the values of system parameters from the previous section, i.e. window size = 1, =. and backup time = 1.5s. In this first set of simulations, we vary the load by varying the source traffic. The mean sending period is varied from 1 to 5.5s while keeping the mean idle period µ idle fixed at 2.5s. Fig. 8 illustrates the number of channel handoffs for each strategy, and Fig. 9 illustrates the P v achieved. and -BC strategies are able to reduce the number of channel handoffs significantly compared to the opportunistic random approach by around 66% and 76% respectively while the delay violation ratio P v is lower than

6 the limit (%). Similarly, the low occupancy approach also can reduce the number of channel handoffs moderately, but it is difficult to tune the waiting time before handoff W H to meet the P max and D max requirement. Here, W H =.4s provides the performance near the required P max (%), but the number of handoffs is still higher than and - BC by around 29% and 5% respectively. Backup CH to be Active(%) Random Selection Low Occupancy(WH=) Low Occupancy(WH=.4) Fig. 8. Number of channel handoffs. increases from 1 to Random Selection Low Occupancy(WH=) Low Occupancy(WH=.4) Fig. 9. Delay violation ratio. increases from 1 to 5.5 Importance of backup channel. From all the previous figures, it appears that -BC reduces the delay violation ratio and the number of channel handoffs. Let us remember that at the end of backup time, SU has to release one channel either the active channel or the backup channel. We have found that around in 2% of the cases (Fig. 1), SU releases the active channel and sets the backup channel to be active. This is due to sudden changes in PU behavior that makes the channel unavailable. The backup channel is then useful to avoid interrupting the communication by a second quick handoff as in. Fig. 11 and 12 show the cumulative distribution function (CDF) of the end-to-end delay of packets at the receiver for Fig. 1. Impact of backup channel: Backup channel is set to be actvie different values of traffic load ( ). We observe for instance that when 81% of packets with delay less ms is achieved for and 82% for -BC. These high percentages are observed for all values of the CDF and for all traffic loads. Cumulative Distribution Function Cumulative Distribution Function CDF of E2E Delay ().4 = 3.5s = 4.5s.2 = 5.5s End to End Delay (s) Fig. 11. CDF of End to End Delay () CDF of E2E Delay () = 1.5s = 2.5s End to End Delay (s) Fig. 12. = 1.5s = 2.5s = 3.5s = 4.5s = 5.5s CDF of End to End Delay (-BC) Varying the delay violation requirement. Fig. 13 shows the delay violation ratio when the P max constraint is varied. Interestingly, the and/or -BC can achieve the required performance and the delay violation ratio P v does not exceed the P max except when the latter is less than 1%. When P max = 5%, then P v = 8.9% for SCHP and 6.5% for -BC which are still small violations. As we have shown above, only the opportunistic handoff strategy is able to achieve the lowest P v but at the cost of a huge number of handoffs.

7 Maximum probability of delay violation (%) Fig. 13. Performance results of delay violation ratio while varying the maximum allowed probability of delay violation Impact on primary users. Considering again the case µ on = 5.5. The interference to PUs is examined and illustrated in Fig. 14. The impact on PUs is captured through the interference rate which is computed based on the number of times when SU transmits packets during unavailable periods of channels. We have found that all approaches, including and -BC, reduce the interference rate by around 35% compared to random handoff. This is because the random selection chooses more often channels that are in the end of an availability period, and thus packets in the Physical queue are transmitted while the channel becomes unavailable. Interference Rate (hits/second) Random Selection Low Occupancy(WH=) Low Occupancy(WH=.4) Fig. 14. Impact on primary users: Interference rate V. CONCLUSION AND FUTURE WORKS Using cumulative probabilities improves the performance of cognitive radio devices by reducing the number of channel handoffs while maintaining an application requirement. In this work, we have designed, a spectrum handoff strategy based on computing cumulative probabilities of backlog delays experienced over candidate channels. Besides, the handoff is performed only if the quality of the target channel is worthwhile. For further enhancement, short time backup channels are used in parallel with the new channel which avoids fast successive handoffs. Through simulations, we have provided insights on how to choose the parameters of in order to meet the target probability violation delay. Moreover, comparison with random handoff and low occupancy handoff shows the benefit of in term of reduction of the number of handoffs. Future works include mainly the investigation of other methods to compute the cumulative probability instead of deploying virtual queues. Also, it would be interesting if is extended in order to support variable but not measurable channel bandwidth. This will allow multiple secondary users in the network to be supported without the need of a control channel to exchange information about the available bandwidth. Finally, when multiple channels can be used in parallel by the same cognitive radio, we should investigate a practical way to combine their qualities. REFERENCES [1] I. F. Akyildiz, W.-Y. Lee, and K. R. Chowdhury, CRAHNs: Cognitive radio ad hoc networks, Ad Hoc Networks, vol. 7, no. 5, pp , 29. [2] I. F. Akylidiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey, Computer Networks, vol. 5, no. 13, pp , 26. [3] IEEE P82.22/D.3.8.1, IEEE WG, Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE, 27. [4] M. R. Chari, F. Ling, A. Mantravadi, R. Krishnamoorthi, R. Vijayan, G. K. Walker, and R. Chandhok, Flo physical layer: An overview, IEEE Transactions on Broadcasting, vol. 53, pp. 145, February 27. [5] L.-C. Wang and C.-W. Wang, Spectrum handoff for cognitive radio networks:reactive-sensing or proactive-sensing, in Proc.IEEE Performance Computing and Communications Conference, 28. [6] S. Talat and L.-C. Wang, Qos-guaranteed channel selection scheme for cognitive radio networks variable channel bandwidths, in Proc. IEEE Communications,Circuits and Systems, 29. [7] M. Hoyhtya, S. Pollin, and A. Mammela, Classification-based predictive channel selection for cognitive radios, in Proc. IEEE International Conference on Communications, 21. [8] L. Yang, L. Cao, and H. Zheng, Proactive channel access in dynamic spectrum networks, Physical Communication, vol. 1, no. 2, pp , 28. [9] C. Song and Q. Zhang, Intelligent dynamic spectrum access assisted by channel usage prediction, in Proc. IEEE international conference on Computer Communications Workshops, 21. [1] W.-Y. Lee and I. F. Akyldiz, A spectrum decision framework for cognitive radio networks, IEEE Transactions on Mobile Computing, vol. 1, pp , February 211. [11] G. Ko, A. A. Franklin, S.-J. You, J.-S. Pak, M.-S. Song, and C.- J. Kim, Channel management in ieee wran systems, IEEE Communication Magazine, vol. 48, pp , September 21. [12] Omnet++: A discrete event simulation environment for communication networks, Available from Since 1993.

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication

More information

Intelligent Load Balancing Approach for Cognitive Radio Networks

Intelligent Load Balancing Approach for Cognitive Radio Networks Intelligent Load Balancing Approach for Cognitive Radio Networks 1 Ravneet Kaur, 2 Er.Vimmi Malhotra 1 Student, M.Tech CSE, 2 Assistant Professor, Dept. of CSE, 1 ravneetkaur0013@gmail.com, 2 malhotra.vimmi22@gmail.com

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

An Application-Oriented Routing Protocol for Multi-hop Cognitive Radio Networks

An Application-Oriented Routing Protocol for Multi-hop Cognitive Radio Networks An Application-Oriented Routing Protocol for Multi-hop Cognitive Radio Networks Ba-Lam To, Thuong-Van Vu, Thi-Mai-Trang Nguyen and Anne Fladenmuller University of Pierre and Marie Curie (UPMC) Laboratory

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band New Channel Access Approach for the IEEE 802.15.4 Devices in 2.4 GHz ISM Band Tolga Coplu and Sema F. Oktug Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey {coplu,oktug}@itu.edu.tr

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore

An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore An On-demand Routing Technique for Cognitive Radio Ad Hoc Network Puneeth Kumar T P Student of M.Tech (CSE) Acharya Institute of Technology, Bangalore Abstract Cognitive radio networks are composed of

More information

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),

More information

An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks

An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks Ahmed Chehata, Wessam Ajib, Halima Elbiaze Computer science department Université du Québec à Montréal, Canada

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment

Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment www.ijcsi.org 45 Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment 1 Ateeq Ur Rehman, 2 Muhammad Tariq Sadiq, 3 Noman Shabbir and 4 Ghayoor Abbas Jafri 1 Department

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,

More information

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks 1 Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks Sameer Swami 1, Chittabrata Ghosh 2, Rucha P. Dhekne 2, Dharma P. Agrawal 2, and Kenneth A. Berman 1 Laboratory

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

On the Energy Efficiency of Opportunistic Access in Wireless Home Networks

On the Energy Efficiency of Opportunistic Access in Wireless Home Networks On the Energy Efficiency of Opportunistic Access in Wireless Home Networks Ahmed Khattab EECE Department Cairo University Giza, Egypt akhattab@ieee.org Abstract In this paper, we evaluate the energy efficiency

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL]

Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL] IEEE L802.16-08/032 Source: Doc. 5D/5, 5D/97 and 5D/EVAL-CG TECHNOLOGY Subject: Question ITU-R 229-1/8 Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL] This contribution

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

QUT Digital Repository:

QUT Digital Repository: QUT Digital Repository: http://eprints.qut.edu.au/ Gui, Li and Tian, Yu-Chu and Fidge, Colin J. (2007) Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. In

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

An overview of the IEEE Standard

An overview of the IEEE Standard In the name of God An overview of the IEEE 802.22 Standard P.Rastegari P.Rastegari@ec.iut.ac.ir Summer 88 Summary This tutorial gives a detailed overview of the IEEE 802.22 standard based on Cognitive

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

RACARP: A ROBUSTNESS AWARE ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS

RACARP: A ROBUSTNESS AWARE ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS RACARP: A ROBUSTNESS AWARE ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS 1 ZAMREE CHE-ARON, 2 AISHA HASSAN ABDALLA, 3 KHAIZURAN ABDULLAH, 4 WAN HASLINA HASSAN, 5 MD. ARAFATUR RAHMAN 1 PhD student,

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Cognitive Improved AODV Routing Protocol for Cognitive Radio Adhoc Network

Cognitive Improved AODV Routing Protocol for Cognitive Radio Adhoc Network Cognitive Improved AODV Routing Protocol for Cognitive Radio Adhoc Network Rasha Eltayeb, Adel Gaafar Electrical and Electronics Eng. Dept, Red Sea University, Portsudan, Sudan Abstract: Cognitive Radio

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute

More information

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS

More information

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Performance of Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Chin Hooi Tang, and Tat Chee Wan, Member, IEEE ComSoc. Abstract Quality of Service (QoS) schemes such

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive

More information

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems his paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at A -based Session Setup Procedure in Cellular-WLAN Integrated Systems Gwangwoo Park,

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Spectrum Allocation for Smooth Video Delivery over Cognitive Radio Networks

Spectrum Allocation for Smooth Video Delivery over Cognitive Radio Networks Spectrum Allocation for Smooth Video Delivery over Cognitive Radio Networks Sanying Li, Tom H. Luan, Xuemin(Sherman) Shen Department of Electrical and Computer Engineering University of Waterloo, Waterloo,

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Handover between Macrocell and Femtocell for UMTS based Networks

Handover between Macrocell and Femtocell for UMTS based Networks Handover between Macrocell and Femtocell for UMTS based Networks Mostafa Zaman Chowdhury, Won Ryu, Eunjun Rhee, and Yeong Min Jang Kookmin University, Korea Electronic and Telecommunications Research Institute

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Evaluating the Performance in Term of Throughput of Decentralized users in Cognitive Radio Wireless Torus Networks

Evaluating the Performance in Term of Throughput of Decentralized users in Cognitive Radio Wireless Torus Networks IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 12 June 2016 ISSN (online): 2349-784X Evaluating the Performance in Term of Throughput of Decentralized users in Cognitive

More information

An efficient trigger to improve intra-wifi handover performance

An efficient trigger to improve intra-wifi handover performance An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Study on TCP Performance Improvement in Dynamic Spectrum Access Networks Based on Spectrum Switch Estimation

Study on TCP Performance Improvement in Dynamic Spectrum Access Networks Based on Spectrum Switch Estimation International Symposium on Computers & Informatics (ISCI 2015) Study on TCP Performance Improvement in Dynamic Spectrum Access Networks Based on Spectrum Switch Estimation Peng Zhang 1, Kai Shi 1, Sheng

More information

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage: Ad Hoc Networks 7 (2009) 810 836 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc CRAHNs: Cognitive radio ad hoc networks Ian F. Akyildiz *, Won-Yeol

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Dionysia Triantafyllopoulou *, National and Kapodistrian University of Athens

More information

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information

Distributed Fault-Tolerant Channel Allocation for Cellular Networks

Distributed Fault-Tolerant Channel Allocation for Cellular Networks 1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Cognitive Radio Networks

Cognitive Radio Networks Cognitive Radio Networks Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Outline Radio Allocation Spectrum Management Cognitive Radio Technology Spectrum Sensing

More information

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Error Control in Wireless Sensor Networks: A Cross Layer Analysis University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross

More information

Accurate and Energy-efficient Congestion Level Measurement in Ad Hoc Networks

Accurate and Energy-efficient Congestion Level Measurement in Ad Hoc Networks Accurate and Energy-efficient Congestion Level Measurement in Ad Hoc Networks Jaewon Kang Computer Science Rutgers University jwkang@cs.rutgers.edu Yanyong Zhang Electrical & Computer Engineering Rutgers

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively

More information

OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS

OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS OPPORTUNISTIC RADIO FOR MULTI-CHANNEL USAGE IN WLAN AD HOC NETWORKS Soamsiri Chantaraskul; Klaus Moessner (Centre for Communication Systems Research (CCSR), University of Surrey, Guildford, Surrey, United

More information

PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3

PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3 PERFORMANCE ANALYSIS OF CO-OPERATIVE MULTI AGENT ROUTING IN MOBILE COGNITIVE NETWORKS T.Nivetha 1, A.Nandhini 2, J.Vasanthi 3, K.Vijayalakshmi 4 1,2,3 UG scholar, 4 Assistant professor Department of ECE,

More information

A Handover Optimisation Scheme in Cellular Networks

A Handover Optimisation Scheme in Cellular Networks A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems

Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Christina THORPE 1, Sean MURPHY, Liam MURPHY School of Computer Science and Informatics, University College

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information