SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 180
Execution Evaluation of Routing Protocols for Cognitive
Radio Network
Avinash N
Assistant professor
Department of Computer Science and Engineering
Brindavan College of Engineering
Bangalore -63
Email:avi003@gmail.com
----------------------------------------************************----------------------------------
Abstract:
Cognitive Radio (CR) Networks is one of the most impressive rising regions of remote systems and
correspondences that give fast and ease interchanges for the end clients. It can screen the range and select
frequencies that limit impedance to existing PU correspondence activity. When doing so, it will depend on
an arrangement of guidelines that characterize which frequencies might be considered, what waveforms
might be utilized, what control levels might be utilized for transmission. This paper bargains
fundamentally with MANET based steering conventions execution which enormously relies on upon
accessibility and solidness of remote range and furthermore a vital parameter that ought not to be
dismissed keeping in mind the end goal to acquire exact execution estimations of intellectual radio
network. The essential objective of any CR organize directing convention is to address the difficulties of
the progressively changing system topology and build up a proficient course between any two hubs with
least steering burden and data transfer capacity consumption. Here, we assess the execution and
correlation of AODV, DSR, DSDV and OLSR steering conventions on the premise of different
parameters, for example, parcel conveyance proportion, throughput et cetera. At last, select the best
performing convention for CRN systems in view of various parameters
Keywords —Routing protocols, Cognitive radio network (CRN), PDR, and Throughput
----------------------------------------************************----------------------------------
I. INTRODUCTION
Cognitive radio is an intelligent communication
tool that'saware of its setting. A cognitive radio
network (CRN) permitsUSto determine
communications among CR nodes/users. The
network parameters are often adjusted in line with
the amendmentwithin the radio environment,
topology, operativesituation, or user necessities.
Main objectives of the CR network are:-efficient use
of frequency spectrum and to attain the highly
reliable and efficient wireless communications
Cognitive radios willchange their parameter like
frequency, coding techniques, modulation
techniques, power etc. perchanging communication
settingthereforeleading toefficient utilization of
accessible resources [12].Cognitive radio networks
Consist of2styles of users, primary and secondary
cognitive users
Accredited users have higher priority for the
usage of the licensed spectrum [11]. On the reverse
hand, unauthorized users must opportunistically
communicate in authorized spectrum by dynamic
their parameters in associate degree accommodative
suggests that once spectrum holes environment
offered as shown in fig.1.
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 181
Fig 1: spectrum hole
Cognitive radio-based on sharing has primarily two
major flavours, that is, horizontal spectrum sharing
and vertical spectrum sharing. In the former case,
all CR users have equal restrictivestatus, and in the
latter case all CR users don't have equal
regulativestanding. There are a unitlicensed users
and unlicensed users in vertical spectrum sharing
that dynamically use the spectrum
withoutaffectingthe primary user’s performances.
Horizontal spectrum sharing will be between
similar networks or between heterogeneous
frequencies primarily based networks. Once all the
heterogeneous networks having adaptive
capabilities then it'scited as symmetric sharing.
While, oncethere's one or additional network while
not these cognitive/adaptive capabilities, this is
oftencited as asymmetric spectrum sharing
II Related Work
Recent paper work is based on distributed CR
routing protocols are as follow:
RafizaRuslan, RizauddinSaian,
NurhamizahMohd.Teramizi in [1]- As cognitive
Radio (CR) has the potential to identify the unused
spectrum so as to permit Cr users to use it without
any interference with the primary users (PUs).
Routing may be a important task in cr network
(CRN) due to diversity in available channels. in this
paper, they used Ad-Hoc On-Demand Distance
Vector (AODV) and Weightcumulative Expected
transmission time (WCETT) routing protocols for
the economical route choice between the source and
destination in CRAHN. The performance of AODV
and WCETT are evaluated on the idea of average
throughput in 3differentkind of routing structures to
satisfy different requirements from users: i) single
radio multi-channels, ii) equal number of radios and
channels and iii) multi-radios multi-channels.
[2] MatteoCesana, Francesca Cuomo,
EylemEkici in [8] their working concept is based on
CRN network. They mainly focused on the
problems related to the design and maintenance of
routes in multiple hop CRNs, clearly highlight their
strengths and disadvantages. In a nutshell, the main
challenges for routing information throughout
multihop CRNs include: spectrum-awareness, setup
of quality” routes and route maintenance has been
considered.
[3] S. Selvakanmani and M. Sumathi, in [5] -
They gave overview of various routing protocols for
adhoc networks based on Multiple channel usage,
Link Modelling, Geographic routing, Spectrum
awareness, and Connectivity. They also showed
classification of mobile cognitive radio adhoc
network as Infrastructure CR (Primary/licensed) and
Infrastructure less CR (secondary/unlicensed)
[4] Hang Su and Xi Zhang in [10] -They have
proposed the cross-layer based opportunistic multi-
channel medium access control (MAC) protocols,
which includes the sensing of spectrum at physical
(PHY) layer with the scheduling of packet at MAC
layer. In their proposed protocols, every secondary
user is equipped with 2 transceivers. initial
transceiver is tuned to the dedicated control channel,
whereas the second is intended specifically as a
cognitive radio that may periodically sense and use
the identified un-used channels. To get the channel
state precisely, they proposed 2 community channel
range detecting arrangements, specifically; the
transaction based detecting strategy and irregular
detecting approach, to help the MAC conventions
for distinguishing the supply of remaining channels.
Ms. Shubhangini, R. P. Deshmukh and A. N.
Thakare [5] have evaluated the special features of
cognitive radio networks using the AODV & DSDV
routing protocol for CRAHNs as in the wireless
communication & propose new routing metrics,
including transmission delay. Routing protocols for
network without infrastructures have been
developed. They need capability to determine how
messages can be forwarded, from a source node to a
destination node in the mobile nodes of the network.
They also discuss regarding the packet transmission
over variety of nodes and the next hope packet
forwarding from supply to destination
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 182
III CLASSIFICATION OF ROUTING
PROTOCOLS
In fact routing protocol make a decision and
organized a path to transmit packets between
computing devices in a CR mobile ad hoc network.
In ad hoc networks, nodes aren't familiar with the
topology of their networks. Instead, nodes have to
discover it: usually, any new node announces its
presence and listens for announcements broadcast
by its neighbor’s. Each node learns about others
nearby and the way to reach them, and will
announce that it can also reach them. Note that in a
wide sense, mobile ad hoc protocols can also be
used virtually for specific purpose.The following are
some ad hoc network routing protocols that are also
used for CR network:
A. Proactive or Table-driven routing
protocols
In this, each node maintains one or more tables
containing routing info to every different node in the
network. This protocol should maintain up-to-date
of routing information whenever the topology will
change the routing protocol propagates this
information and store in routing table. There are
different routing protocols have different method by
which the topology change information is
distributed across the network and store that
information with routing-related tables. In this paper
we consider OLSR and DSDV.
a. Optimized Link State Routing Protocol
(OLSR)
OLSR is a proactive connection state directing
set of rules, and utilizations hello and topology
control (TC) messages to discover and afterward
communicate interface state information all through
the portable spontaneous system. Singular hubs
utilize this topology information to figure next jump
goals for all hubs at interims the system exploitation
most brief bounce sending ways that. exploitation hi
messages the OLSR convention at every hub finds
2-bounce neighbor information and plays out a
disseminated decision of a gathering of multipoint
relays (MPRs). Hubs select MPRs such there exists
a way to everything about 2-jump neighbors by
means of a hub hand-picked as partner degree MPR.
These MPR hubs then supply and forward TC
messages that contain the MPR selectors. This
Being a proactive convention, courses to any or all
goals among the system are outstanding and kept up
before utilize. Having the courses out there at
interims the quality routing table will be useful for
some frameworks and system applications as there
is no route disclosure delay related with finding an
inventive course
b. Destination Sequenced Distance Vector
(DSDV)
Every hub keeps up a table that contains the most
short separation and the primary hub on the shortest
way to each other hub in the system. It fuses table
updates with expanding arrangement number labels
to anticipate circles. The tables are exchanged
between neighbors at customary interims to stay up
with the latest view of the system topology. Table
updates are started by a goal with another grouping
number which is constantly more noteworthy than
the past one. The end hub of the broken connection
starts a table refresh message with the broken
connection's weight appointed to boundlessness (∞)
and with a grouping number more noteworthy than
the put away arrangement number for that goal.
Every hub after getting a refresh with weight ∞,
rapidly spreads it to its neighbors keeping in mind
the end goal to engender the broken-connect data to
the entire system. A hub consistently relegates an
odd number to the connection break refresh to
separate it from the even grouping number produced
by the destination.
B. On-Demand Routing Protocols
As opposed to table-driven directing conventions
all up and coming routes aren't kept up at every hub,
rather the routes are made as and when required.
once a source needs to send to a destination, it order
the route discovery instruments to look out the way
to the destination. The route stays legitimate until
the goal is open or until the route is did not require
anymore.
a. Ad-hoc On-Demand Distance vector
(AODV)
AODV is an on request routing protocol with
little deferral. That infers that courses are
conceivably settled when expected to reduce traffic
overhead. It bolsters Unicast, Broadcast and
Multicast with no further conventions. The Count-
To-Infinity and circle issue is comprehended with
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 183
arrangement numbers and the enlistment of the
expenses. In AODV each hop has the steady
expense of one. The routes age rapidly so as to
oblige the development of the mobile hubs.
Connection breakages can locally be fixed
proficiently. [18].
Unicast Routing: For unicast routing three
control messages are utilized: RREQ (Route Reply),
RREP (Route Reply), RERR (Route Error). On the
off chance that a node needs to send a packet to a
node for which no route is accessible it
communicates a RREQ to discover one. A RREP
incorporates a one of a kind identifier, the goal IP
address and grouping number, the source IP address
and succession number just as a hop check
introduced with zero and a few flags.
In the event that a hub gets a RREQ which it
doesn't have seen before it sets up a converse course
to the sender. In the event that it doesn't have a clue
about a course to the goal it rebroadcasts the
invigorated RREQ especially expanding the hop
number. In the event that it knows a course to the
goal it makes a RREP.
Multicast Routing: One of the extraordinary
preferences of AODV is its incorporated multicast
directing. In a multicast steering table the IP address
and the arrangement number of the gathering are put
away. To join a multicast bunch a hub needs to send
a RREQ to the gathering address with the join flag
set. Any hub in the multicast tree which gets the
RREQ can reply with a RREP.
b. Dynamic Source Routing (DSR)
Expected to limit the transmission capacity
consume by control packet in adhoc remote systems
by dispensing with the table refresh messages. The
essential approach here is to establish a route by
flooding Route Request packets within the network
Destination node responds by sending a Route
Reply packet back to the source each Route Request
carries a sequence number generated by the source
node and the path it has traversed A node checks the
sequence number on the packet before forwarding it
if it is not a duplicate Route Request then only
packet is forwarded The sequence number on the
packet is used to prevent loop formations and to
avoid multiple transmissions thus, all nodes except
the destination forward a Route Request packet
throughout the route construction phase
This protocol uses a route cache that stores all
possible information extracted from the supply
route contained in a data packet throughout network
partitions, the affected nodes initiate Route Request
packets DSR also allows piggy-backing of a data
packet on the Route Request As an area of
optimizations, if the intermediate nodes are also
allowed to originate Route Reply packets, then a
source node may receive multiple replies from
intermediate nodes The supply node selects the most
recent and best route and uses that for sending
information packets each data packet carries the
complete path to its destination If a link breaks,
supply node again initiates the route discovery
process.
The proposed work describes the performance of
routing protocol with the spectrum choice, route
discovery and route maintenance in Network layer
considering various numbers of nodes for the
cognitive ad-hoc networks. the subsequent are
considered as our Performance Metrics using which
comparison of routing protocols such as AODV,
DSDV, DSR and OLSR has been performed:-IV
PROPOSED WORK
The proposed work describes the performance of
routing protocol with the spectrum choice, route
discovery and route maintenance in Network layer
considering various numbers of nodes for the
cognitive ad-hoc networks. the subsequent are
considered as our Performance Metrics using which
comparison of routing protocols such as AODV,
DSDV, DSR and OLSR has been performed:-
A. Packet delivery ratio:-
It is defined as the ratio of data packets received
by the destinations to those generated by the
sources; it can be numerically defined as: PDR= Σ
(Data packets received by the each destination) / Σ
(Data packets generated by the each source)
B. Throughput:-
It is defined as the total number of packets
delivered successfully over the total simulation time.
The throughput is usually measured in bits per
second (bits/sec).
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 184
Throughput= (total number of delivered packet *
packet size) / Total duration of simulation
C. End to end delay:-
The time it takes data packet to reach the
destination It incorporates all possible delay happen
while buffering during route discovery latency,
queuing at the interface queue. Delay metric is
calculated by subtracting time at which first packet
was transmitted by source from time at which last
data packet arrived to destination
Avg EED= Σ time spent to deliver packets for
each destination / Number of packets received by all
destination nodes
D. Average Energy consumption:-
It is the ratio of sum of total energy consumed by
each node to the total number of nodes .The energy
consumption of the on-demand protocols increases
as the maximum motion speed grows.
AEC = Σ (Initial Energy - Final Energy) / Total
number of Nodes Residual Energy = Initial Energy
– AEC
E. Normalized Routing Load:-
It is defined as the ratio of number of routing
packets transmitted to data packet delivered at the
destination. Each hop-wise transmission of a routing
packet is considered as one transmission.
NRL = Routing Packet / Received Packets
V SIMULATION RESULTS
Simulation is performed using Network
Simulator-2 (NS-2) version 2.34, since it is open
source free software in which various specifications
can simply modified and changed. The network
consists of Number of nodes placed randomly in a
terrain 1000m*1000m with flat grid topology. For
MAC layer protocol we have used the Distributed
Coordination Function (DCF) of IEEE 802.11 as it
captures link breakages effectively as well as IEEE
802.15.4 used for sensing network. TCP traffic is
exchanged among the nodes with transport layer
protocol being FTP. All the nodes in the simulation
has omni-directional antenna. The simulation
results are as follow:-
Fig 2: Packet Delivery Ratio
Fig 2. A simulation result shows that PDR for
DSR protocol is highest among all protocols which
are almost above 90% for all the nodes topology.
Fig 3: Energy
Other important parameter in any network is
energy consumption which shows that how much
energy is used during whole transmission process.
This paper calculates the residual energy of nodes
which is more in both DSDV and OLSR protocols
for different traffic conditions
Fig 4: Average Throughput
In the above figure Performance in case of
average throughput, DSDV protocol is more
efficient when less traffic is there but with
increasing number of nodes it becomes equal to
DSR protocol.
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 185
Fig 5: End to End Delay
In Fig 5, Results in case of end to end delay,
DSDV is having minimum value and it is best
suited when heavy traffic is present in CR network
Fig 6: Normalized Routing Load
Fig 6: Another parameter used is normalized
routing load which is lowest for DSR protocol and
slightly more than DSR in case of AODV protocol.
Both can be used for efficient CR transmission
while required less routing overhead.
CONCLUSION
The proposed research work presents extensive
simulation analysis for four routing protocols under
varied traffic scenarios for CRN. Routing protocols
will be evaluated for the optimum performance on
all chosen metrics i.e. PDR, End-to-End Delay,
energy, throughput and authority. Performance is
different for different protocols with respect to
various metrics parameter. A future work can be
considered by carrying out simulation to analyze
and compare the performance of hybrid routing
protocol with the routing protocols analyzed in this
work where completely different scenarios could be
inspected while introducing randomness to the
packet size and rate.
REFERENCES
[1] Rafiza Ruslan, Rizauddin Saian, Nurhamizah Mohd.Teramizi,
"Performance Analysis of AODV and WCETT Routing Protocols in
Cognitive Radio Ad-Hoc Network (CRAHN)", Fifth International
Conference on Intelligent Systems, Modelling and Simulation, 2014
[2] ] Ekram Hossain, Dusit Niyato and Dong in Kim, “Evolution and future
trends of research in cognitive radio: a contemporary survey”, Wireless
Communication Mobile Computer (2013) © 2013 John Wiley & Sons,
Ltd., December 2013.
[3] M. T. Mushtaq, “Cognitive Radios and Cognitive Networks: A short
introduction” In the ISSN 2090-4304 Journal of Basic and Applied
Scientific Research, pp: 56-65, et al, 2013
[4] Ashfaque Ahmed Khan, “Research Challenges of Cognitive Radio”,
International Journal of Engineering Research & Technology (IJERT)
Vol. 1 Issue 3, May – 2012, ISSN: 2278-0181
[5] S. Selvakanmani and Dr. M. Sumathi, "Overview and Literature Survey
on routing protocols for mobile cognitive radio adhoc networks",
Natarajan, Meghanathan, Eds: SIPM, FCST, ITCA, WSE, ACSIT, CS
& IT 06, pp. 235–249, 2012.
[6] Ms. Shubhangini, R. P. Deshmukh and A. N. Thakare “Analysis Of
Routing Protocol For Cognitive Adhoc Networks”, IJECCE Volume 3,
Issue 2, ISSN 2249 –071X, 2012
[7] Amjad Ali, Muddesar Iqbal, Adeel Baig, Xingheng Wang, “Routing
Techniques in Cognitive radio networks: a survey”, International
Journal of Wireless & Mobile Networks, Vol 3, No.3, pp 96 – 110,
2011.
[8] Matteo Cesana, Francesca Cuomo, Eylem Ekici, “Routing in cognitive
radio networks: Challenges and solutions”, journal homepage:
www.elsevier.com/locate/adhoc, 2010
[9] Ariananda, D.D M.K. Lakshanan, H. Nikookar, “A Survey on Spectrum
Sensing Techniques for Cognitive Radio” In the proceedings of 2009
2nd International workshop Cognitive Radio and Advanced Spectrum
Management, pp: 74-79.
[10] Hang Su and Xi Zhang, "Cross-Layer Based Opportunistic MAC
Protocols for QoS Provisionings over Cognitive Radio Wireless
Networks", IEEE Journal on selected area in communications, VOL. 26,
NO. 1, January2008
[11] Stuntebeck, E., T. O‟Shea, J. Hecker, T. C. Clancy, 2006. Architecture
for an Open Source cognitive Radio. In the proceedings of 2006 SDR
Forum Conference
[12] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless
Communication” IEEE Journal on Selected Areas in Communications
23 (2): 201-220, 2005
[13] S. Haykin, "Cognitive Radio: Brain-Empowered Wireless
Communications", IEEE Journal on Selected Areas in Communications,
Vol. 23, NO. 2, Feb. 2005, pp. 201-220
[14] https://en.wikipedia.org/wiki/Dynamic_Source_Routing

More Related Content

What's hot

Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016ijcsbi
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivitypaperpublications3
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkIRJET Journal
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 

What's hot (18)

Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
Ni2421862197
Ni2421862197Ni2421862197
Ni2421862197
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivity
 
J1102026164
J1102026164J1102026164
J1102026164
 
G0943745
G0943745G0943745
G0943745
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio Network
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 

Similar to Execution Evaluation of Routing Protocols for Cognitive Radio Network

Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
L0333057062
L0333057062L0333057062
L0333057062theijes
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd Iaetsd
 
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...IRJET Journal
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprj_publication
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksIJSRED
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 

Similar to Execution Evaluation of Routing Protocols for Cognitive Radio Network (20)

Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
L0333057062
L0333057062L0333057062
L0333057062
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and its
 
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Execution Evaluation of Routing Protocols for Cognitive Radio Network

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 180 Execution Evaluation of Routing Protocols for Cognitive Radio Network Avinash N Assistant professor Department of Computer Science and Engineering Brindavan College of Engineering Bangalore -63 Email:avi003@gmail.com ----------------------------------------************************---------------------------------- Abstract: Cognitive Radio (CR) Networks is one of the most impressive rising regions of remote systems and correspondences that give fast and ease interchanges for the end clients. It can screen the range and select frequencies that limit impedance to existing PU correspondence activity. When doing so, it will depend on an arrangement of guidelines that characterize which frequencies might be considered, what waveforms might be utilized, what control levels might be utilized for transmission. This paper bargains fundamentally with MANET based steering conventions execution which enormously relies on upon accessibility and solidness of remote range and furthermore a vital parameter that ought not to be dismissed keeping in mind the end goal to acquire exact execution estimations of intellectual radio network. The essential objective of any CR organize directing convention is to address the difficulties of the progressively changing system topology and build up a proficient course between any two hubs with least steering burden and data transfer capacity consumption. Here, we assess the execution and correlation of AODV, DSR, DSDV and OLSR steering conventions on the premise of different parameters, for example, parcel conveyance proportion, throughput et cetera. At last, select the best performing convention for CRN systems in view of various parameters Keywords —Routing protocols, Cognitive radio network (CRN), PDR, and Throughput ----------------------------------------************************---------------------------------- I. INTRODUCTION Cognitive radio is an intelligent communication tool that'saware of its setting. A cognitive radio network (CRN) permitsUSto determine communications among CR nodes/users. The network parameters are often adjusted in line with the amendmentwithin the radio environment, topology, operativesituation, or user necessities. Main objectives of the CR network are:-efficient use of frequency spectrum and to attain the highly reliable and efficient wireless communications Cognitive radios willchange their parameter like frequency, coding techniques, modulation techniques, power etc. perchanging communication settingthereforeleading toefficient utilization of accessible resources [12].Cognitive radio networks Consist of2styles of users, primary and secondary cognitive users Accredited users have higher priority for the usage of the licensed spectrum [11]. On the reverse hand, unauthorized users must opportunistically communicate in authorized spectrum by dynamic their parameters in associate degree accommodative suggests that once spectrum holes environment offered as shown in fig.1. RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 181 Fig 1: spectrum hole Cognitive radio-based on sharing has primarily two major flavours, that is, horizontal spectrum sharing and vertical spectrum sharing. In the former case, all CR users have equal restrictivestatus, and in the latter case all CR users don't have equal regulativestanding. There are a unitlicensed users and unlicensed users in vertical spectrum sharing that dynamically use the spectrum withoutaffectingthe primary user’s performances. Horizontal spectrum sharing will be between similar networks or between heterogeneous frequencies primarily based networks. Once all the heterogeneous networks having adaptive capabilities then it'scited as symmetric sharing. While, oncethere's one or additional network while not these cognitive/adaptive capabilities, this is oftencited as asymmetric spectrum sharing II Related Work Recent paper work is based on distributed CR routing protocols are as follow: RafizaRuslan, RizauddinSaian, NurhamizahMohd.Teramizi in [1]- As cognitive Radio (CR) has the potential to identify the unused spectrum so as to permit Cr users to use it without any interference with the primary users (PUs). Routing may be a important task in cr network (CRN) due to diversity in available channels. in this paper, they used Ad-Hoc On-Demand Distance Vector (AODV) and Weightcumulative Expected transmission time (WCETT) routing protocols for the economical route choice between the source and destination in CRAHN. The performance of AODV and WCETT are evaluated on the idea of average throughput in 3differentkind of routing structures to satisfy different requirements from users: i) single radio multi-channels, ii) equal number of radios and channels and iii) multi-radios multi-channels. [2] MatteoCesana, Francesca Cuomo, EylemEkici in [8] their working concept is based on CRN network. They mainly focused on the problems related to the design and maintenance of routes in multiple hop CRNs, clearly highlight their strengths and disadvantages. In a nutshell, the main challenges for routing information throughout multihop CRNs include: spectrum-awareness, setup of quality” routes and route maintenance has been considered. [3] S. Selvakanmani and M. Sumathi, in [5] - They gave overview of various routing protocols for adhoc networks based on Multiple channel usage, Link Modelling, Geographic routing, Spectrum awareness, and Connectivity. They also showed classification of mobile cognitive radio adhoc network as Infrastructure CR (Primary/licensed) and Infrastructure less CR (secondary/unlicensed) [4] Hang Su and Xi Zhang in [10] -They have proposed the cross-layer based opportunistic multi- channel medium access control (MAC) protocols, which includes the sensing of spectrum at physical (PHY) layer with the scheduling of packet at MAC layer. In their proposed protocols, every secondary user is equipped with 2 transceivers. initial transceiver is tuned to the dedicated control channel, whereas the second is intended specifically as a cognitive radio that may periodically sense and use the identified un-used channels. To get the channel state precisely, they proposed 2 community channel range detecting arrangements, specifically; the transaction based detecting strategy and irregular detecting approach, to help the MAC conventions for distinguishing the supply of remaining channels. Ms. Shubhangini, R. P. Deshmukh and A. N. Thakare [5] have evaluated the special features of cognitive radio networks using the AODV & DSDV routing protocol for CRAHNs as in the wireless communication & propose new routing metrics, including transmission delay. Routing protocols for network without infrastructures have been developed. They need capability to determine how messages can be forwarded, from a source node to a destination node in the mobile nodes of the network. They also discuss regarding the packet transmission over variety of nodes and the next hope packet forwarding from supply to destination
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 182 III CLASSIFICATION OF ROUTING PROTOCOLS In fact routing protocol make a decision and organized a path to transmit packets between computing devices in a CR mobile ad hoc network. In ad hoc networks, nodes aren't familiar with the topology of their networks. Instead, nodes have to discover it: usually, any new node announces its presence and listens for announcements broadcast by its neighbor’s. Each node learns about others nearby and the way to reach them, and will announce that it can also reach them. Note that in a wide sense, mobile ad hoc protocols can also be used virtually for specific purpose.The following are some ad hoc network routing protocols that are also used for CR network: A. Proactive or Table-driven routing protocols In this, each node maintains one or more tables containing routing info to every different node in the network. This protocol should maintain up-to-date of routing information whenever the topology will change the routing protocol propagates this information and store in routing table. There are different routing protocols have different method by which the topology change information is distributed across the network and store that information with routing-related tables. In this paper we consider OLSR and DSDV. a. Optimized Link State Routing Protocol (OLSR) OLSR is a proactive connection state directing set of rules, and utilizations hello and topology control (TC) messages to discover and afterward communicate interface state information all through the portable spontaneous system. Singular hubs utilize this topology information to figure next jump goals for all hubs at interims the system exploitation most brief bounce sending ways that. exploitation hi messages the OLSR convention at every hub finds 2-bounce neighbor information and plays out a disseminated decision of a gathering of multipoint relays (MPRs). Hubs select MPRs such there exists a way to everything about 2-jump neighbors by means of a hub hand-picked as partner degree MPR. These MPR hubs then supply and forward TC messages that contain the MPR selectors. This Being a proactive convention, courses to any or all goals among the system are outstanding and kept up before utilize. Having the courses out there at interims the quality routing table will be useful for some frameworks and system applications as there is no route disclosure delay related with finding an inventive course b. Destination Sequenced Distance Vector (DSDV) Every hub keeps up a table that contains the most short separation and the primary hub on the shortest way to each other hub in the system. It fuses table updates with expanding arrangement number labels to anticipate circles. The tables are exchanged between neighbors at customary interims to stay up with the latest view of the system topology. Table updates are started by a goal with another grouping number which is constantly more noteworthy than the past one. The end hub of the broken connection starts a table refresh message with the broken connection's weight appointed to boundlessness (∞) and with a grouping number more noteworthy than the put away arrangement number for that goal. Every hub after getting a refresh with weight ∞, rapidly spreads it to its neighbors keeping in mind the end goal to engender the broken-connect data to the entire system. A hub consistently relegates an odd number to the connection break refresh to separate it from the even grouping number produced by the destination. B. On-Demand Routing Protocols As opposed to table-driven directing conventions all up and coming routes aren't kept up at every hub, rather the routes are made as and when required. once a source needs to send to a destination, it order the route discovery instruments to look out the way to the destination. The route stays legitimate until the goal is open or until the route is did not require anymore. a. Ad-hoc On-Demand Distance vector (AODV) AODV is an on request routing protocol with little deferral. That infers that courses are conceivably settled when expected to reduce traffic overhead. It bolsters Unicast, Broadcast and Multicast with no further conventions. The Count- To-Infinity and circle issue is comprehended with
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 183 arrangement numbers and the enlistment of the expenses. In AODV each hop has the steady expense of one. The routes age rapidly so as to oblige the development of the mobile hubs. Connection breakages can locally be fixed proficiently. [18]. Unicast Routing: For unicast routing three control messages are utilized: RREQ (Route Reply), RREP (Route Reply), RERR (Route Error). On the off chance that a node needs to send a packet to a node for which no route is accessible it communicates a RREQ to discover one. A RREP incorporates a one of a kind identifier, the goal IP address and grouping number, the source IP address and succession number just as a hop check introduced with zero and a few flags. In the event that a hub gets a RREQ which it doesn't have seen before it sets up a converse course to the sender. In the event that it doesn't have a clue about a course to the goal it rebroadcasts the invigorated RREQ especially expanding the hop number. In the event that it knows a course to the goal it makes a RREP. Multicast Routing: One of the extraordinary preferences of AODV is its incorporated multicast directing. In a multicast steering table the IP address and the arrangement number of the gathering are put away. To join a multicast bunch a hub needs to send a RREQ to the gathering address with the join flag set. Any hub in the multicast tree which gets the RREQ can reply with a RREP. b. Dynamic Source Routing (DSR) Expected to limit the transmission capacity consume by control packet in adhoc remote systems by dispensing with the table refresh messages. The essential approach here is to establish a route by flooding Route Request packets within the network Destination node responds by sending a Route Reply packet back to the source each Route Request carries a sequence number generated by the source node and the path it has traversed A node checks the sequence number on the packet before forwarding it if it is not a duplicate Route Request then only packet is forwarded The sequence number on the packet is used to prevent loop formations and to avoid multiple transmissions thus, all nodes except the destination forward a Route Request packet throughout the route construction phase This protocol uses a route cache that stores all possible information extracted from the supply route contained in a data packet throughout network partitions, the affected nodes initiate Route Request packets DSR also allows piggy-backing of a data packet on the Route Request As an area of optimizations, if the intermediate nodes are also allowed to originate Route Reply packets, then a source node may receive multiple replies from intermediate nodes The supply node selects the most recent and best route and uses that for sending information packets each data packet carries the complete path to its destination If a link breaks, supply node again initiates the route discovery process. The proposed work describes the performance of routing protocol with the spectrum choice, route discovery and route maintenance in Network layer considering various numbers of nodes for the cognitive ad-hoc networks. the subsequent are considered as our Performance Metrics using which comparison of routing protocols such as AODV, DSDV, DSR and OLSR has been performed:-IV PROPOSED WORK The proposed work describes the performance of routing protocol with the spectrum choice, route discovery and route maintenance in Network layer considering various numbers of nodes for the cognitive ad-hoc networks. the subsequent are considered as our Performance Metrics using which comparison of routing protocols such as AODV, DSDV, DSR and OLSR has been performed:- A. Packet delivery ratio:- It is defined as the ratio of data packets received by the destinations to those generated by the sources; it can be numerically defined as: PDR= Σ (Data packets received by the each destination) / Σ (Data packets generated by the each source) B. Throughput:- It is defined as the total number of packets delivered successfully over the total simulation time. The throughput is usually measured in bits per second (bits/sec).
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 184 Throughput= (total number of delivered packet * packet size) / Total duration of simulation C. End to end delay:- The time it takes data packet to reach the destination It incorporates all possible delay happen while buffering during route discovery latency, queuing at the interface queue. Delay metric is calculated by subtracting time at which first packet was transmitted by source from time at which last data packet arrived to destination Avg EED= Σ time spent to deliver packets for each destination / Number of packets received by all destination nodes D. Average Energy consumption:- It is the ratio of sum of total energy consumed by each node to the total number of nodes .The energy consumption of the on-demand protocols increases as the maximum motion speed grows. AEC = Σ (Initial Energy - Final Energy) / Total number of Nodes Residual Energy = Initial Energy – AEC E. Normalized Routing Load:- It is defined as the ratio of number of routing packets transmitted to data packet delivered at the destination. Each hop-wise transmission of a routing packet is considered as one transmission. NRL = Routing Packet / Received Packets V SIMULATION RESULTS Simulation is performed using Network Simulator-2 (NS-2) version 2.34, since it is open source free software in which various specifications can simply modified and changed. The network consists of Number of nodes placed randomly in a terrain 1000m*1000m with flat grid topology. For MAC layer protocol we have used the Distributed Coordination Function (DCF) of IEEE 802.11 as it captures link breakages effectively as well as IEEE 802.15.4 used for sensing network. TCP traffic is exchanged among the nodes with transport layer protocol being FTP. All the nodes in the simulation has omni-directional antenna. The simulation results are as follow:- Fig 2: Packet Delivery Ratio Fig 2. A simulation result shows that PDR for DSR protocol is highest among all protocols which are almost above 90% for all the nodes topology. Fig 3: Energy Other important parameter in any network is energy consumption which shows that how much energy is used during whole transmission process. This paper calculates the residual energy of nodes which is more in both DSDV and OLSR protocols for different traffic conditions Fig 4: Average Throughput In the above figure Performance in case of average throughput, DSDV protocol is more efficient when less traffic is there but with increasing number of nodes it becomes equal to DSR protocol.
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 185 Fig 5: End to End Delay In Fig 5, Results in case of end to end delay, DSDV is having minimum value and it is best suited when heavy traffic is present in CR network Fig 6: Normalized Routing Load Fig 6: Another parameter used is normalized routing load which is lowest for DSR protocol and slightly more than DSR in case of AODV protocol. Both can be used for efficient CR transmission while required less routing overhead. CONCLUSION The proposed research work presents extensive simulation analysis for four routing protocols under varied traffic scenarios for CRN. Routing protocols will be evaluated for the optimum performance on all chosen metrics i.e. PDR, End-to-End Delay, energy, throughput and authority. Performance is different for different protocols with respect to various metrics parameter. A future work can be considered by carrying out simulation to analyze and compare the performance of hybrid routing protocol with the routing protocols analyzed in this work where completely different scenarios could be inspected while introducing randomness to the packet size and rate. REFERENCES [1] Rafiza Ruslan, Rizauddin Saian, Nurhamizah Mohd.Teramizi, "Performance Analysis of AODV and WCETT Routing Protocols in Cognitive Radio Ad-Hoc Network (CRAHN)", Fifth International Conference on Intelligent Systems, Modelling and Simulation, 2014 [2] ] Ekram Hossain, Dusit Niyato and Dong in Kim, “Evolution and future trends of research in cognitive radio: a contemporary survey”, Wireless Communication Mobile Computer (2013) © 2013 John Wiley & Sons, Ltd., December 2013. [3] M. T. Mushtaq, “Cognitive Radios and Cognitive Networks: A short introduction” In the ISSN 2090-4304 Journal of Basic and Applied Scientific Research, pp: 56-65, et al, 2013 [4] Ashfaque Ahmed Khan, “Research Challenges of Cognitive Radio”, International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 3, May – 2012, ISSN: 2278-0181 [5] S. Selvakanmani and Dr. M. Sumathi, "Overview and Literature Survey on routing protocols for mobile cognitive radio adhoc networks", Natarajan, Meghanathan, Eds: SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 235–249, 2012. [6] Ms. Shubhangini, R. P. Deshmukh and A. N. Thakare “Analysis Of Routing Protocol For Cognitive Adhoc Networks”, IJECCE Volume 3, Issue 2, ISSN 2249 –071X, 2012 [7] Amjad Ali, Muddesar Iqbal, Adeel Baig, Xingheng Wang, “Routing Techniques in Cognitive radio networks: a survey”, International Journal of Wireless & Mobile Networks, Vol 3, No.3, pp 96 – 110, 2011. [8] Matteo Cesana, Francesca Cuomo, Eylem Ekici, “Routing in cognitive radio networks: Challenges and solutions”, journal homepage: www.elsevier.com/locate/adhoc, 2010 [9] Ariananda, D.D M.K. Lakshanan, H. Nikookar, “A Survey on Spectrum Sensing Techniques for Cognitive Radio” In the proceedings of 2009 2nd International workshop Cognitive Radio and Advanced Spectrum Management, pp: 74-79. [10] Hang Su and Xi Zhang, "Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings over Cognitive Radio Wireless Networks", IEEE Journal on selected area in communications, VOL. 26, NO. 1, January2008 [11] Stuntebeck, E., T. O‟Shea, J. Hecker, T. C. Clancy, 2006. Architecture for an Open Source cognitive Radio. In the proceedings of 2006 SDR Forum Conference [12] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communication” IEEE Journal on Selected Areas in Communications 23 (2): 201-220, 2005 [13] S. Haykin, "Cognitive Radio: Brain-Empowered Wireless Communications", IEEE Journal on Selected Areas in Communications, Vol. 23, NO. 2, Feb. 2005, pp. 201-220 [14] https://en.wikipedia.org/wiki/Dynamic_Source_Routing