SlideShare a Scribd company logo
1 of 4
Download to read offline
Cognitive Radio-Aware Transport Protocol for Mobile Ad Hoc Networks
Abstract:
With the proliferation of new wireless service, scarce wireless resources is
expected to become a critical issue. For this reason, cognitive radio mobile
ad hoc networks (CogMANET) are being developed as a promising
solution to this problem. However, in CogMANET, channel switching is
inherently necessary whenever a primary user with a license appears on
the channel. Allowing secondary users to choose an available channel from
among a wide spectrum range thus enables reliable communication in this
context, but communication characteristics such as bottleneck bandwidth
and RTT will change with channel switch. In response to this change, TCP
has to adaptively update its congestion window (cwnd) to make an
efficient use of the available resources. For this purpose, TCP CRAHN was
proposed for CogMANET. In this paper, TCP CRAHN is first evaluated in
cases where bottleneck bandwidth and RTT drastically change. Based on
these results, TCP CoBA is proposed to further improve the throughput of
the above use cases. TCP CoBA updates the cwnd based upon the available
buffer space in the relay node upon channel switch, as well as other
communication characteristics. Through simulations, we show that
compared with TCP CRAHN, TCP CoBA improves the throughput by up
to 200 percent.
Existing System:
A promising way to improve not only the survivability but also the
reliability of communication in CogMANET is to allow SUs to select a
communication channel (channel) satisfying their application requirements
from a wide range of spectrum.
However, since SUs always need to guarantee no impact on PU
performance, they have to engage in periodical sensing to detect PUs, and
then switch channels whenever a new PU appears. Hence, communication
in CogMANET is likely to experience changes in characteristics in terms of
bottleneck bandwidth and round-trip time (RTT) due to channel switching.
Proposed System:
The target network is multihop communication in CogMANET. It is
assumed that different channels are used in each hop so that
communication of each hop does not interfere with each other.
Communication in CogMANET is likely to suffer from changes in
characteristics due to channel switching and interruptions caused by
periodical sensing.
In this study, channel characteristics, such as bandwidth and transmission
coverage area of channel, are changed as a result of channel switching,
because it is assumed that the nodes select a channel from a wide range of
the spectrum, such as 400 MHz to 6 GHz.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server
Cognitive radio aware transport protocol for mobile ad hoc networks

More Related Content

What's hot

Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPAttila Balazs
 
GPRS telecommunication
GPRS telecommunicationGPRS telecommunication
GPRS telecommunicationDawood Aqlan
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umtssivakumar D
 
secured communication over wireless broadcast networks
secured communication over wireless broadcast networkssecured communication over wireless broadcast networks
secured communication over wireless broadcast networksVenkatesh Reddy
 
Congestion control
Congestion controlCongestion control
Congestion controlnandhulaks
 
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Dotnet  power allocation for statistical qo s provisioning in opportunistic m...Dotnet  power allocation for statistical qo s provisioning in opportunistic m...
Dotnet power allocation for statistical qo s provisioning in opportunistic m...Ecway Technologies
 
GSM channels wireless
GSM channels  wirelessGSM channels  wireless
GSM channels wirelesssdrhr
 
Factors affecting 2g data speed
Factors affecting 2g data speedFactors affecting 2g data speed
Factors affecting 2g data speedAlfred Ongere
 
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...I3E Technologies
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
Matlb communication
Matlb communicationMatlb communication
Matlb communicationxlncinfotech
 

What's hot (15)

5 abstract M.TECH ( M S WORD FILE )
5 abstract M.TECH ( M S WORD FILE )5 abstract M.TECH ( M S WORD FILE )
5 abstract M.TECH ( M S WORD FILE )
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCP
 
GPRS telecommunication
GPRS telecommunicationGPRS telecommunication
GPRS telecommunication
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
 
secured communication over wireless broadcast networks
secured communication over wireless broadcast networkssecured communication over wireless broadcast networks
secured communication over wireless broadcast networks
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Dotnet  power allocation for statistical qo s provisioning in opportunistic m...Dotnet  power allocation for statistical qo s provisioning in opportunistic m...
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
 
GSM channels wireless
GSM channels  wirelessGSM channels  wireless
GSM channels wireless
 
Factors affecting 2g data speed
Factors affecting 2g data speedFactors affecting 2g data speed
Factors affecting 2g data speed
 
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...
Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in ...
 
Chap 9 gsm
Chap 9 gsmChap 9 gsm
Chap 9 gsm
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ad hoc network ppt slides
Ad hoc network ppt slidesAd hoc network ppt slides
Ad hoc network ppt slides
 
Matlb communication
Matlb communicationMatlb communication
Matlb communication
 

Similar to Cognitive radio aware transport protocol for mobile ad hoc networks

Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
93755181 lte-hoping
93755181 lte-hoping93755181 lte-hoping
93755181 lte-hopingSadef Karish
 
LTE premiere
LTE premiereLTE premiere
LTE premiereBP Tiwari
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
 
Evolution of Passive optical network
Evolution of Passive optical networkEvolution of Passive optical network
Evolution of Passive optical networkYatish Bathla
 
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELSPARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELScsandit
 
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...IRJET Journal
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Schedulingijbuiiir1
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...ijwmn
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Journals
 
Internet Scheduling of Bluetooth Scatter Nets by Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets by Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets by Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets by Inter Piconet Schedulingijcnes
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
 

Similar to Cognitive radio aware transport protocol for mobile ad hoc networks (20)

Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
93755181 lte-hoping
93755181 lte-hoping93755181 lte-hoping
93755181 lte-hoping
 
Ea34772776
Ea34772776Ea34772776
Ea34772776
 
LTE premiere
LTE premiereLTE premiere
LTE premiere
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
HSPA Essentials
HSPA EssentialsHSPA Essentials
HSPA Essentials
 
Evolution of Passive optical network
Evolution of Passive optical networkEvolution of Passive optical network
Evolution of Passive optical network
 
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELSPARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELS
 
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Internet Scheduling of Bluetooth Scatter Nets by Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets by Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets by Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets by Inter Piconet Scheduling
 
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
 
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD  FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD  FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD FILE )
 
What is 5G Flexible Duplexing.pdf
What is 5G Flexible Duplexing.pdfWhat is 5G Flexible Duplexing.pdf
What is 5G Flexible Duplexing.pdf
 

More from ieeeprojectschennai

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...ieeeprojectschennai
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...ieeeprojectschennai
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wildieeeprojectschennai
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...ieeeprojectschennai
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...ieeeprojectschennai
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...ieeeprojectschennai
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...ieeeprojectschennai
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesieeeprojectschennai
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksieeeprojectschennai
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksieeeprojectschennai
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersieeeprojectschennai
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsieeeprojectschennai
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingieeeprojectschennai
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffieeeprojectschennai
 

More from ieeeprojectschennai (20)

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
 

Cognitive radio aware transport protocol for mobile ad hoc networks

  • 1. Cognitive Radio-Aware Transport Protocol for Mobile Ad Hoc Networks Abstract: With the proliferation of new wireless service, scarce wireless resources is expected to become a critical issue. For this reason, cognitive radio mobile ad hoc networks (CogMANET) are being developed as a promising solution to this problem. However, in CogMANET, channel switching is inherently necessary whenever a primary user with a license appears on the channel. Allowing secondary users to choose an available channel from among a wide spectrum range thus enables reliable communication in this context, but communication characteristics such as bottleneck bandwidth and RTT will change with channel switch. In response to this change, TCP has to adaptively update its congestion window (cwnd) to make an efficient use of the available resources. For this purpose, TCP CRAHN was proposed for CogMANET. In this paper, TCP CRAHN is first evaluated in cases where bottleneck bandwidth and RTT drastically change. Based on these results, TCP CoBA is proposed to further improve the throughput of the above use cases. TCP CoBA updates the cwnd based upon the available buffer space in the relay node upon channel switch, as well as other communication characteristics. Through simulations, we show that
  • 2. compared with TCP CRAHN, TCP CoBA improves the throughput by up to 200 percent. Existing System: A promising way to improve not only the survivability but also the reliability of communication in CogMANET is to allow SUs to select a communication channel (channel) satisfying their application requirements from a wide range of spectrum. However, since SUs always need to guarantee no impact on PU performance, they have to engage in periodical sensing to detect PUs, and then switch channels whenever a new PU appears. Hence, communication in CogMANET is likely to experience changes in characteristics in terms of bottleneck bandwidth and round-trip time (RTT) due to channel switching. Proposed System: The target network is multihop communication in CogMANET. It is assumed that different channels are used in each hop so that communication of each hop does not interfere with each other. Communication in CogMANET is likely to suffer from changes in characteristics due to channel switching and interruptions caused by periodical sensing. In this study, channel characteristics, such as bandwidth and transmission coverage area of channel, are changed as a result of channel switching,
  • 3. because it is assumed that the nodes select a channel from a wide range of the spectrum, such as 400 MHz to 6 GHz. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP. • Front End : - .Net • Back End : - SQL Server