SlideShare a Scribd company logo
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1866

Abstract—
Spectrum scarcity is one of the most critical recent problems in
the field of wireless communication. One of the promising
approaches to resolve this issue is the use of Cognitive Radio
technique. CR technique is performed by Secondary User (SU)
to utilize the spectrums more efficiently. SU transmission mode
can be broadly divided into two modes: interference avoidance
mode (white space) and interference management mode (black
and gray space). In this paper, interference avoidance mode is
considered. The interference avoidance mode is often referred to
as interweave access. In interweave access method, SU finds the
spectrum hole by sensing the radio frequency. Here we have
used continuous time Markov chain model to calculate QoS
parameter of the SU for fixed payload length and exponential
distribution payload length for a single channel of PU and SU.
Numerical results show that the blocking probability and force
termination probability are greater in fixed payload length than
in exponential distribution payload length.
Index Terms—— wireless communication; interweave access;
cognitive radio; blocking probability; force termination
probability; CTMC model.
I. INTRODUCTION
The demand for spectrum access is growing rapidly in
wireless communication. Therefore, an efficient spectrum
management and spectrum access techniques are needed.
However, studies on spectrum usage have revealed that most
of the allotted spectrum is not used efficiently due to the static
frequency allocation methods. With the evolution of cognitive
radio, spectrum access techniques shift from static spectrum
allocation to dynamic allocation. CR enables the secondary
user (SU) to build transmission links in vacant PU channels
such that there is no/minimum interference to PUs. CR has the
following functionalities: spectrum sensing; spectrum access;
spectrum allocation and management among different SUs.
SU transmission modes can be broadly categorized into two
modes: interference avoidance (white space) mode and the
Interference management (black and grey space) mode [1].
The interference avoidance mode is often termed as
interweave access. In interweave access, the SU finds
spectrum holes (white space) by sensing the radio frequency
spectrum. These spectrum holes are used by the SU for its
Pinki Yadav1
, Department of Electronics and Communication
Engineering Faculty of Engineering and Technology Mody Institute of
Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar,
Rajasthan, Pin-332311,India ,
Partha Pratim Bhattacharya2
, Department of Electronics and
Communication Engineering Faculty of Engineering and Technology Mody
Institute of Technology & Science (Deemed University) Lakshmangarh,
Dist. Sikar, Rajasthan, Pin-332311,India,
transmission. This scheme is often referred to as opportunistic
spectrum access (OSA) [1]. On the other hand the interference
management mode in a CR can be categorized as overlay and
underlay. The underlay approach assumes that a PU transmits
all the time and imposes severe restrictions on the
transmission power of a SU. The overlay approach relies on
spectrum holes detection by SU in the network and does not
impose severe restrictions on their transmission power [2].
In this paper, the quality of service of secondary users is
analyzed in an interweave access scenario. A continuous time
Markov model is used to calculate the forced termination
probability and blocking probability. Here Simple closed
form expressions for the forced termination probability,
blocking probability are derived for both fixed and
exponential payload lengths [3].
II. SYSTEM MODEL
A widely acceptable spectrum pooling model [4] is
adopted, in which a vacant wideband PU channel is divided
into multiple narrowband sub channels. These narrowband
sub channels are used by SU groups for their opportunistic
transmissions. Fig.1 shows the system model, in which there
is K available PU channels k . Each of the PU
channels has a fixed bandwidth Wp, which is subdivided into
N sub channels of bandwidth, Ws = W=Np. We consider
spectrum sharing scenarios: a single SU group is interweaving
the PU channels, denoted by S1.
Fig. 1 Channel arrangements of PU and SU Channels
1) The service duration of the PU connections are assumed to
be exponentially distributed with a mean 1/ . The arrival of
new connections from the PU group follows a Poisson
process with a mean rate .
2) PU network is an M/M/m/m loss network. In this network
channel occupancy only depends on the mean service rate of
PU group.
Performance Study of Interweave Spectrum Sharing
Method in Cognitive Radio
Pinki Yadav1
, Partha Pratim Bhattacharya2
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1867
www.ijarcet.org
3) In a single PU channel and single SU channel group two
types of SU connections are considered: fixed header with
fixed payload and fixed header with exponentially distributed
payload.
The fixed header duration is denoted by 1/ , the fixed
payload length denoted by 1/ , and the mean exponential
payload length is denoted by 1/ . The Poisson arrival rate of
a single SU group is denoted by .
III. PERFORMANCE ANALYSIS
CTMC is used the spectrum sharing scenario between the
PU and SU groups. CTMC has been extensively used in
conventional cellular systems to model the cell residence
time1, call dropping probability and handover probability [5].
In these scenarios, the birth-death process (often referred to as
a loss system) is one of the commonly used CTMC models. In
a CTMC model, the number of connections from the user
groups are represented by states (written as n tuples), such as
(x1, x2), where x1 and x2 may represent the number of PU and
SU connections. The transition of one state to another is based
on the Markov property [6] which assumes memory less
arrivals and departures. Under stationary assumptions, the
rate of transition from and to a state is equal. This
fundamental fact is used to calculate the state probabilities
under the constraint that the sum of all state probabilities is
equal to 1.
A. Fixed Payload Length
When the payload is fixed, the total connection length can
be expressed by the sum of the overhead and payload length,
i.e. [3]
(1)
When the fixed length SU connection on the channel, the
system is not purely Markovian and also it cannot represent
by a simple birth-death process. In this approach, the
connection with fixed length is replaced by a continuous
group of Y exponentially distributed connection which are
independent and identically distributed (i.i.d.). The total
length of this Y i.i.d. connection is Erlang distributed and
individual connection has an average length of 1/ Y . It is
well established that as Y , then the total length is the
same as the fixed length connections 1/ .
Science the fixed length connection is replaced by a group
of Y i.i.d connection, a Y node CTMC is used the number of
the arrivals of the connection in the group, and i.e. the yth node
models the arrival of the connection in the group. These
states are referred to as the phases of a fixed SU connection
[6]. Complete CTMC model is shown in Fig.2, where the
state is (i; j; y), where, i and k ( represents the
presence (1) and absence (0) of a SU and PU connection on
the channel, 1≤y≤Y represents the phases of a SU
connection when i=1 shown in fig. The total mean departure
rate from each phase of the SU connection is (Y ),
where Y is the completion rate of each i.i.d connection
and ), is the termination rate due to the arrival of a PU
connection. A set of balance equations for the CTMC in
figure is given as
(a)
(b)
Fig. 2. CTMC model of SU connections with fixed
payload
( + ) P(0,0,0)= P(0,1,0)+Y P(1,0,Y);
Y P (1, 0, 1) = P (0, 0, 0);
(Y + )P (1, 0, 2) =Y P (1, 0, 1);
.
. (2)
.
.
.
(Y + ) P (1, 0, Y) =Y P (1, 0, Y-1)
Such that
(3)
Where, P (i; k; y) represents the probability of the state (i;
k; y). By simple algebraic manipulation of equations in (2),
the probability of the phase P (1; 0; y) in terms of P (0, 0,
and 0) can be written as [3]
(4)
i, k, y
Phase of SU connection
when
i=1
i=1 -- Active SU
connection
i=0 -- Inactive SU
connection
k=1 -- Active PU connection
k=0 -- Inactive PU connection
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1868
Using P (i; k; y), the expression for the force termination
probability, blocking probability and throughput are derived.
1) Blocking probability: In Fig. 2(b), an incoming SU
connection is blocked when the channel is occupied by a PU
or SU connection. The blocking probability in this
scenario can be expressed as [3]
1-P (0, 0, 0) (5)
Since the arrival of a PU connection is in dependent of a SU
connection, the Probability of a PU connection on the channel
P (0, 1, and 0) can be written as
(6)
Using (2), (4) and (6), the blocking probability of a SU
connection with Erlang-Y distributed connection length has
the following mathematical expression
(7)
Let the blocking probability of
SU connections with fixed payload length becomes
(8)
2) Force termination probability: Forced termination
probability is defined as the probability that an ongoing SU
connection is terminated prematurely. Based on the fact that
the sum of forced and unforced termination rates equals to the
incoming connection rate, the forced termination probability
can be written as [3]
(9)
Using (9), the forced termination probability of SU with
Erlang-Y distributed connection length can be written as
(10)
Using (2) and (5), can be expressed as
(11)
Note that the geometric series in the above equation is
convergent (common ratio ); hence (11) can be
simplified to
(12)
Let be the force termination
probability of SU connection with fixed payload. The
can be written as
(13)
B. Exponential Payload Length
In the following, the forced termination probability,
blocking probability of the SU connection with a fixed header
and exponentially distributed payload length are calculated.
Fig. 3 CTMC model of SU connections with fixed header and exponentially
distributed payload.
Fig. 3 shows that the CTMC of the system. In this figure the
states (1, 0, y), y= {1….Y} represent the phases of fixed
header portion, whereas the state (1, 0, 0) represents the
exponentially distributed payload portion. Similarly to the
fixed header length 1/ is modeled as limiting case of
Erlang-Y distribution, and exponentially distributed payload
length is given by 1/ . The global balance equation of the
above system is as follows [7]
( + ) P (0, 0, 0) = P (0, 1, 0) + . P (1, 0, 0),
(Y + )P (1, 0, 1) = P (0, 0, 0),
(Y + )P (1, 0, 2) =Y P (1, 0, 1),
.
. (14)
.
.
.
(Y + )P (1, 0, Y) =Y P (1, 0, Y-1),
( + .) P (1, 0, 0) = Y P (1, 0, Y),
1) Blocking probability: - Solving (14) for P (0; 0; 0) and
using (5), the blocking probability of the SU connection can
be written as
(15)
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1869
www.ijarcet.org
In the limit is the blocking
probability of SU connections with exponentially distributed
payload length. It can be shown that [7]
(16)
2) Force termination Probability: The force termination
probability can be calculated by using the definition in (9). In
this scenario the force termination probability [7]
(17)
Using the balance equation (14) the can be
expressed as
(18)
In the limit, let be the force
termination probability of SU connection with exponentially
payload length.
(19)
(20)
Where and .
IV. NUMERICAL RESULT
In this section, we have shown some numerical examples of
the forced termination probability and blocking probability
with fixed and exponentially distributed payload length. The
Fig. 4 shows the blocking probability for fixed payload length
( for different value of mean header duration (1/ .
So it is clear from the figure when mean payload length
increases (1/ , blocking probability decreases and also
analyzed when mean header duration (1/ increases,
blocking probability also increases.
Fig. 4 Blocking probability for fixed payload against mean payload length
for different mean header duration
Fig. 5 Force termination probability for fixed payload against mean payload
length for different mean header duration
The Fig. 5 shows the force termination probability for fixed
payload length ( for different value of mean header
duration (1/ . So it is clear from the figure when mean
payload length increases (1/ , force termination
probability increases and also analyzed when mean header
duration (1/ increases, force termination probability also
increases.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1870
Fig. 6 Blocking probability ( for exponential distribution payload
payload against mean payload length for different mean header duration
The Fig. 6 shows the blocking probability for exponential
distributed payload length ( for different value of
mean header duration (1/ . So it is clear from the figure
when mean payload length increases (1/ , blocking
probability decreases and also analyzed when mean header
duration (1/ increases, blocking probability also increases.
Fig. 7 Force termination probability ( for exponential distribution
against mean payload length for different mean header duration
The Fig.7 shows the force termination probability for fixed
payload length ( for different value of mean header
duration (1/ . So it is clear from the figure when mean
payload length increases (1/ , force termination
probability increases and also analyzed when mean header
duration (1/ increases, force termination probability also
increases.
The Fig.8 shows the blocking probability for fixed payload
length ( against arrival rate of SU for different value
of mean header duration (1/ . So it is clear from the figure
when arrival rate of SU increases ( , blocking probability
increases and also analyzed when mean header duration
(1/ increases, blocking probability also decreases.
Fig.9 shows the blocking probability for exponential
distributed payload length against arrival rate of SU
for different value of mean header duration. In this figure
when arrival rate of SU increases, blocking probability
increases, but when mean header length increases blocking
probability also increases.
Fig. 8 Blocking probability for fixed payload against arrival rate of SU for
different mean header duration
Fig. 9 Blocking probability for exponential distributed payload
against arrival rate of SU for different mean header duration
A. Comparison between fixed and exponential payload
length
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1871
www.ijarcet.org
Fig. 10 Comparison between Blocking probability for fixed ( and
exponential payload ( length against mean payload (1/ )
In Fig. 10 shows the Comparison between Blocking
probability for fixed ( and exponential payload
( length against mean payload (1/ ) for
mean header duration ( =0.1. So it is clear from the
figure blocking probability decreases when mean payload
length increase and also observe the exponential distribution
of blocking probability are lower than the fixed payload
blocking probability.
Fig. 11 Comparison between Force termination probability for fixed
( and exponential payload ( length against mean payload
(1/ )
In Fig. 11 shows that the Comparison between Force
termination probability for fixed ( and exponential
payload ( length against mean payload
(1/ ) for mean header duration ( =0.1. So it
is clear from the figure force termination probability increases
when mean payload length increase and also observe the
exponential distribution of force termination probability are
lower than the fixed payload force termination probability.
In Fig. 12 shows that the Comparison between Blocking
probability for fixed ( and exponential payload
( length against arrival rate of SU for mean header
duration ( =0.1. So it is clear from the figure blocking
probability increases when arrival rate of SU increase and
also observe the exponential distribution of blocking
probability are lower than the fixed payload blocking
probability.
Fig. 12 Comparison between Blocking probability for fixed ( and
exponential payload ( length against arrival rate of SU
V. CONCLUSION
In this paper, we have used a continuous time markov chain
model to calculate QoS parameter of the SU for fixed payload
length and exponential distribution payload length with fixed
header using a single channel of PU and SU. Numerical
results are shown and compared with those of fixed header
duration. Results show that the blocking probability and force
termination probability is greater in fixed payload length
rather than exponential distribution payload length.
This work may further be extended for multiple PU
channel and two SU groups with spectrum handoff and
channel reservation in interweave access mode.
REFERENCES
[1] Sudhir Srinivasa and Syed Ali Jafar, “The Throughput Potential of
Cognitive Radio: A Theoretical Perspective”, IEEE Communications
Magazine, May 2007 pp.73-79.
[2] Qing Zhao and Brian M. Sadler, “A Survey of Dynamic Spectrum
Access”, IEEE Signal Processing Magazine, May 2007 pp.79-89
[3] W. Ahmed, J. Gao, H. Zhou and M. Faulkner, “Goodput and Channel
allocation," in Proceedings Personal Indoor and Mobile Radio
Communications (PIMRC), pp. 476-480, 13-16 Sept. 2009.
[4] T. Weiss and F. Jondral, “Spectrum Pooling: An Innovative Strategy
for the Enhancement of Spectrum Efficiency," IEEE Communication.
Mag., vol. 42, pp. S8- S14, Mar. 2004.
[5] D. Hong and S. Rappaport, “Traffic Model and Performance Analysis
for Cellular Mobile Radio Telephone Systems with Prioritized and
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1872
Nonprioritized Handoff Procedures," IEEE Transactions. Vehicular.
Technol., vol. 35, pp. 77-92, Aug. 1986.
[6] J. Mehdi, Stochastic Models in Queuing Theory. Academic Press, San
Diego: CA, 1991.
[7] J. Gao, W. Ahmed, J. Yang, and M. Faulkner, “Throughput
Comparison in Cognitive Radio Networks," in Proceedings of
Electrical Engineering/Electronics Computer Telecommunications
and Information Technology (ECTI-CON), pp. 748-751, 19-21 May
2010.
Pinki Yadav was born in India on February 2,
1987. She received her B.E. degree in Electronics
and Communication from Mandsaur institute of
technology, Mandsaur (University RGPV Bhopal),
M.P. India in 2010 and currently is a M. Tech
(Signal Processing) student in Mody Institute of
Technology and Science (Deemed University),
Rajasthan, India.
Dr. Partha Pratim Bhattacharya was born in
India on January 3, 1971. He has 15 years of
experience in teaching and research. He served
many reputed educational Institutes in India in
various positions starting from Lecturer to
Professor and Principal. At present he is working as
Professor in Department of Electronics and
Communication Engineering in the Faculty of
Engineering and Technology, Mody Institute of Technology and Science
(Deemed University), Rajasthan, India. He worked on Microwave devices
and systems and mobile cellular communication systems. He has published a
good number of papers in refereed journals and conferences. His present
research interest includes mobile communication and cognitive radio. Dr.
Bhattacharya is a member of The Institution of Electronics and
Telecommunication Engineers, India and The Institution of Engineers, India.
He is the recipient of Young Scientist Award from International Union of
Radio Science in 2005. He is working as the chief editor, editorial board
member and reviewer in many reputed journals.

More Related Content

What's hot

Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manets
csandit
 
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossMM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
journalBEEI
 
General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...
Polytechnique Montreal
 
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
ijmnct
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IJCNCJournal
 
40120140503007
4012014050300740120140503007
40120140503007
IAEME Publication
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
TELKOMNIKA JOURNAL
 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
IJERA Editor
 
Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...
International Journal of Science and Research (IJSR)
 
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
IJCSEA Journal
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_Qian
Qian Han
 
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
ijwmn
 
218
218218
Q01742112115
Q01742112115Q01742112115
Q01742112115
IOSR Journals
 
N017428692
N017428692N017428692
N017428692
IOSR Journals
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
cscpconf
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation
IJERA Editor
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
journalBEEI
 
18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn
IAESIJEECS
 

What's hot (19)

Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manets
 
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossMM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
 
General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...General analytical framework for cooperative sensing and access trade-off opt...
General analytical framework for cooperative sensing and access trade-off opt...
 
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
IMPACT OF FADING CORRELATION, POLARIZATION COUPLING AND KEYHOLES ON MIMO DETE...
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
 
40120140503007
4012014050300740120140503007
40120140503007
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
 
Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...
 
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_Qian
 
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...
 
218
218218
218
 
Q01742112115
Q01742112115Q01742112115
Q01742112115
 
N017428692
N017428692N017428692
N017428692
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn18 15993 31427-1-sm(edit)nn
18 15993 31427-1-sm(edit)nn
 

Viewers also liked

Presentacion general babel studies sin video
Presentacion general babel studies sin videoPresentacion general babel studies sin video
Presentacion general babel studies sin video
Julian Babel
 
Trust in God
Trust in God Trust in God
Trust in God
ways2capitalcsr
 
1861 1865
1861 18651861 1865
1861 1865
Editor IJARCET
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
Editor IJARCET
 
Dina yuliana & makiyah xii ips 3
Dina yuliana & makiyah xii ips 3Dina yuliana & makiyah xii ips 3
Dina yuliana & makiyah xii ips 3Paarief Udin
 
System scalability
System scalabilitySystem scalability
System scalability
AVEVA
 
1811 1815
1811 18151811 1815
1811 1815
Editor IJARCET
 
Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662
Editor IJARCET
 
Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
Editor IJARCET
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Editor IJARCET
 
Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040
Editor IJARCET
 
Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036
Editor IJARCET
 
Mocio vilanova
Mocio vilanovaMocio vilanova
Mocio vilanovaPAH Garraf
 
Ijarcet vol-2-issue-3-1280-1284
Ijarcet vol-2-issue-3-1280-1284Ijarcet vol-2-issue-3-1280-1284
Ijarcet vol-2-issue-3-1280-1284
Editor IJARCET
 
Ijarcet vol-2-issue-2-352-358
Ijarcet vol-2-issue-2-352-358Ijarcet vol-2-issue-2-352-358
Ijarcet vol-2-issue-2-352-358
Editor IJARCET
 
Daily mcx newsletter 22 aug 2013
Daily mcx newsletter 22 aug 2013Daily mcx newsletter 22 aug 2013
Daily mcx newsletter 22 aug 2013
Richa Sharma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Viewers also liked (20)

Presentacion general babel studies sin video
Presentacion general babel studies sin videoPresentacion general babel studies sin video
Presentacion general babel studies sin video
 
Trust in God
Trust in God Trust in God
Trust in God
 
1861 1865
1861 18651861 1865
1861 1865
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
projecten MW
projecten MWprojecten MW
projecten MW
 
Dina yuliana & makiyah xii ips 3
Dina yuliana & makiyah xii ips 3Dina yuliana & makiyah xii ips 3
Dina yuliana & makiyah xii ips 3
 
System scalability
System scalabilitySystem scalability
System scalability
 
1811 1815
1811 18151811 1815
1811 1815
 
презентация Rim view
презентация Rim viewпрезентация Rim view
презентация Rim view
 
Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662
 
Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040
 
Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036Volume 2-issue-6-2034-2036
Volume 2-issue-6-2034-2036
 
Mocio vilanova
Mocio vilanovaMocio vilanova
Mocio vilanova
 
Ijarcet vol-2-issue-3-1280-1284
Ijarcet vol-2-issue-3-1280-1284Ijarcet vol-2-issue-3-1280-1284
Ijarcet vol-2-issue-3-1280-1284
 
Ijarcet vol-2-issue-2-352-358
Ijarcet vol-2-issue-2-352-358Ijarcet vol-2-issue-2-352-358
Ijarcet vol-2-issue-2-352-358
 
Daily mcx newsletter 22 aug 2013
Daily mcx newsletter 22 aug 2013Daily mcx newsletter 22 aug 2013
Daily mcx newsletter 22 aug 2013
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Similar to 1866 1872

Effective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channelsEffective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channels
Marwan Hammouda
 
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
ijmnct
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
 SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO... SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
ijmnct
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
ijmnct
 
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKSOPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
ijwmn
 
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
ijceronline
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
TELKOMNIKA JOURNAL
 
Adaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsAdaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systems
IJECEIAES
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks
IJECEIAES
 
The impact of M-ary rates on various quadrature amplitude modulation detection
The impact of M-ary rates on various quadrature amplitude  modulation detectionThe impact of M-ary rates on various quadrature amplitude  modulation detection
The impact of M-ary rates on various quadrature amplitude modulation detection
IJECEIAES
 
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKSA NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
sri ganesh college of engineering and technology
 
Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...
eSAT Journals
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
eSAT Publishing House
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
Polytechnique Montreal
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
IJERA Editor
 
Channel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsChannel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systems
ijmnct
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
Alexander Decker
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
KARTHIKEYAN V
 
Bd4103341345
Bd4103341345Bd4103341345
Bd4103341345
IJERA Editor
 

Similar to 1866 1872 (20)

Effective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channelsEffective capacity in cognitive radio broadcast channels
Effective capacity in cognitive radio broadcast channels
 
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cog...
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
 SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO... SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...
 
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...
 
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKSOPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
 
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
Medium Access Probability of Cognitive Radio Network Under ECC-33/Hata-Okumur...
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
Adaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsAdaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systems
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks
 
The impact of M-ary rates on various quadrature amplitude modulation detection
The impact of M-ary rates on various quadrature amplitude  modulation detectionThe impact of M-ary rates on various quadrature amplitude  modulation detection
The impact of M-ary rates on various quadrature amplitude modulation detection
 
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKSA NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS
 
Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...Spectrum sensing performance of cognitive radio under awgn and fading channel...
Spectrum sensing performance of cognitive radio under awgn and fading channel...
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Channel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systemsChannel characterization and modulation schemes of ultra wideband systems
Channel characterization and modulation schemes of ultra wideband systems
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
 
Bd4103341345
Bd4103341345Bd4103341345
Bd4103341345
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

1866 1872

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1866  Abstract— Spectrum scarcity is one of the most critical recent problems in the field of wireless communication. One of the promising approaches to resolve this issue is the use of Cognitive Radio technique. CR technique is performed by Secondary User (SU) to utilize the spectrums more efficiently. SU transmission mode can be broadly divided into two modes: interference avoidance mode (white space) and interference management mode (black and gray space). In this paper, interference avoidance mode is considered. The interference avoidance mode is often referred to as interweave access. In interweave access method, SU finds the spectrum hole by sensing the radio frequency. Here we have used continuous time Markov chain model to calculate QoS parameter of the SU for fixed payload length and exponential distribution payload length for a single channel of PU and SU. Numerical results show that the blocking probability and force termination probability are greater in fixed payload length than in exponential distribution payload length. Index Terms—— wireless communication; interweave access; cognitive radio; blocking probability; force termination probability; CTMC model. I. INTRODUCTION The demand for spectrum access is growing rapidly in wireless communication. Therefore, an efficient spectrum management and spectrum access techniques are needed. However, studies on spectrum usage have revealed that most of the allotted spectrum is not used efficiently due to the static frequency allocation methods. With the evolution of cognitive radio, spectrum access techniques shift from static spectrum allocation to dynamic allocation. CR enables the secondary user (SU) to build transmission links in vacant PU channels such that there is no/minimum interference to PUs. CR has the following functionalities: spectrum sensing; spectrum access; spectrum allocation and management among different SUs. SU transmission modes can be broadly categorized into two modes: interference avoidance (white space) mode and the Interference management (black and grey space) mode [1]. The interference avoidance mode is often termed as interweave access. In interweave access, the SU finds spectrum holes (white space) by sensing the radio frequency spectrum. These spectrum holes are used by the SU for its Pinki Yadav1 , Department of Electronics and Communication Engineering Faculty of Engineering and Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar, Rajasthan, Pin-332311,India , Partha Pratim Bhattacharya2 , Department of Electronics and Communication Engineering Faculty of Engineering and Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar, Rajasthan, Pin-332311,India, transmission. This scheme is often referred to as opportunistic spectrum access (OSA) [1]. On the other hand the interference management mode in a CR can be categorized as overlay and underlay. The underlay approach assumes that a PU transmits all the time and imposes severe restrictions on the transmission power of a SU. The overlay approach relies on spectrum holes detection by SU in the network and does not impose severe restrictions on their transmission power [2]. In this paper, the quality of service of secondary users is analyzed in an interweave access scenario. A continuous time Markov model is used to calculate the forced termination probability and blocking probability. Here Simple closed form expressions for the forced termination probability, blocking probability are derived for both fixed and exponential payload lengths [3]. II. SYSTEM MODEL A widely acceptable spectrum pooling model [4] is adopted, in which a vacant wideband PU channel is divided into multiple narrowband sub channels. These narrowband sub channels are used by SU groups for their opportunistic transmissions. Fig.1 shows the system model, in which there is K available PU channels k . Each of the PU channels has a fixed bandwidth Wp, which is subdivided into N sub channels of bandwidth, Ws = W=Np. We consider spectrum sharing scenarios: a single SU group is interweaving the PU channels, denoted by S1. Fig. 1 Channel arrangements of PU and SU Channels 1) The service duration of the PU connections are assumed to be exponentially distributed with a mean 1/ . The arrival of new connections from the PU group follows a Poisson process with a mean rate . 2) PU network is an M/M/m/m loss network. In this network channel occupancy only depends on the mean service rate of PU group. Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Pinki Yadav1 , Partha Pratim Bhattacharya2
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1867 www.ijarcet.org 3) In a single PU channel and single SU channel group two types of SU connections are considered: fixed header with fixed payload and fixed header with exponentially distributed payload. The fixed header duration is denoted by 1/ , the fixed payload length denoted by 1/ , and the mean exponential payload length is denoted by 1/ . The Poisson arrival rate of a single SU group is denoted by . III. PERFORMANCE ANALYSIS CTMC is used the spectrum sharing scenario between the PU and SU groups. CTMC has been extensively used in conventional cellular systems to model the cell residence time1, call dropping probability and handover probability [5]. In these scenarios, the birth-death process (often referred to as a loss system) is one of the commonly used CTMC models. In a CTMC model, the number of connections from the user groups are represented by states (written as n tuples), such as (x1, x2), where x1 and x2 may represent the number of PU and SU connections. The transition of one state to another is based on the Markov property [6] which assumes memory less arrivals and departures. Under stationary assumptions, the rate of transition from and to a state is equal. This fundamental fact is used to calculate the state probabilities under the constraint that the sum of all state probabilities is equal to 1. A. Fixed Payload Length When the payload is fixed, the total connection length can be expressed by the sum of the overhead and payload length, i.e. [3] (1) When the fixed length SU connection on the channel, the system is not purely Markovian and also it cannot represent by a simple birth-death process. In this approach, the connection with fixed length is replaced by a continuous group of Y exponentially distributed connection which are independent and identically distributed (i.i.d.). The total length of this Y i.i.d. connection is Erlang distributed and individual connection has an average length of 1/ Y . It is well established that as Y , then the total length is the same as the fixed length connections 1/ . Science the fixed length connection is replaced by a group of Y i.i.d connection, a Y node CTMC is used the number of the arrivals of the connection in the group, and i.e. the yth node models the arrival of the connection in the group. These states are referred to as the phases of a fixed SU connection [6]. Complete CTMC model is shown in Fig.2, where the state is (i; j; y), where, i and k ( represents the presence (1) and absence (0) of a SU and PU connection on the channel, 1≤y≤Y represents the phases of a SU connection when i=1 shown in fig. The total mean departure rate from each phase of the SU connection is (Y ), where Y is the completion rate of each i.i.d connection and ), is the termination rate due to the arrival of a PU connection. A set of balance equations for the CTMC in figure is given as (a) (b) Fig. 2. CTMC model of SU connections with fixed payload ( + ) P(0,0,0)= P(0,1,0)+Y P(1,0,Y); Y P (1, 0, 1) = P (0, 0, 0); (Y + )P (1, 0, 2) =Y P (1, 0, 1); . . (2) . . . (Y + ) P (1, 0, Y) =Y P (1, 0, Y-1) Such that (3) Where, P (i; k; y) represents the probability of the state (i; k; y). By simple algebraic manipulation of equations in (2), the probability of the phase P (1; 0; y) in terms of P (0, 0, and 0) can be written as [3] (4) i, k, y Phase of SU connection when i=1 i=1 -- Active SU connection i=0 -- Inactive SU connection k=1 -- Active PU connection k=0 -- Inactive PU connection
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1868 Using P (i; k; y), the expression for the force termination probability, blocking probability and throughput are derived. 1) Blocking probability: In Fig. 2(b), an incoming SU connection is blocked when the channel is occupied by a PU or SU connection. The blocking probability in this scenario can be expressed as [3] 1-P (0, 0, 0) (5) Since the arrival of a PU connection is in dependent of a SU connection, the Probability of a PU connection on the channel P (0, 1, and 0) can be written as (6) Using (2), (4) and (6), the blocking probability of a SU connection with Erlang-Y distributed connection length has the following mathematical expression (7) Let the blocking probability of SU connections with fixed payload length becomes (8) 2) Force termination probability: Forced termination probability is defined as the probability that an ongoing SU connection is terminated prematurely. Based on the fact that the sum of forced and unforced termination rates equals to the incoming connection rate, the forced termination probability can be written as [3] (9) Using (9), the forced termination probability of SU with Erlang-Y distributed connection length can be written as (10) Using (2) and (5), can be expressed as (11) Note that the geometric series in the above equation is convergent (common ratio ); hence (11) can be simplified to (12) Let be the force termination probability of SU connection with fixed payload. The can be written as (13) B. Exponential Payload Length In the following, the forced termination probability, blocking probability of the SU connection with a fixed header and exponentially distributed payload length are calculated. Fig. 3 CTMC model of SU connections with fixed header and exponentially distributed payload. Fig. 3 shows that the CTMC of the system. In this figure the states (1, 0, y), y= {1….Y} represent the phases of fixed header portion, whereas the state (1, 0, 0) represents the exponentially distributed payload portion. Similarly to the fixed header length 1/ is modeled as limiting case of Erlang-Y distribution, and exponentially distributed payload length is given by 1/ . The global balance equation of the above system is as follows [7] ( + ) P (0, 0, 0) = P (0, 1, 0) + . P (1, 0, 0), (Y + )P (1, 0, 1) = P (0, 0, 0), (Y + )P (1, 0, 2) =Y P (1, 0, 1), . . (14) . . . (Y + )P (1, 0, Y) =Y P (1, 0, Y-1), ( + .) P (1, 0, 0) = Y P (1, 0, Y), 1) Blocking probability: - Solving (14) for P (0; 0; 0) and using (5), the blocking probability of the SU connection can be written as (15)
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1869 www.ijarcet.org In the limit is the blocking probability of SU connections with exponentially distributed payload length. It can be shown that [7] (16) 2) Force termination Probability: The force termination probability can be calculated by using the definition in (9). In this scenario the force termination probability [7] (17) Using the balance equation (14) the can be expressed as (18) In the limit, let be the force termination probability of SU connection with exponentially payload length. (19) (20) Where and . IV. NUMERICAL RESULT In this section, we have shown some numerical examples of the forced termination probability and blocking probability with fixed and exponentially distributed payload length. The Fig. 4 shows the blocking probability for fixed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , blocking probability decreases and also analyzed when mean header duration (1/ increases, blocking probability also increases. Fig. 4 Blocking probability for fixed payload against mean payload length for different mean header duration Fig. 5 Force termination probability for fixed payload against mean payload length for different mean header duration The Fig. 5 shows the force termination probability for fixed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , force termination probability increases and also analyzed when mean header duration (1/ increases, force termination probability also increases.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1870 Fig. 6 Blocking probability ( for exponential distribution payload payload against mean payload length for different mean header duration The Fig. 6 shows the blocking probability for exponential distributed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , blocking probability decreases and also analyzed when mean header duration (1/ increases, blocking probability also increases. Fig. 7 Force termination probability ( for exponential distribution against mean payload length for different mean header duration The Fig.7 shows the force termination probability for fixed payload length ( for different value of mean header duration (1/ . So it is clear from the figure when mean payload length increases (1/ , force termination probability increases and also analyzed when mean header duration (1/ increases, force termination probability also increases. The Fig.8 shows the blocking probability for fixed payload length ( against arrival rate of SU for different value of mean header duration (1/ . So it is clear from the figure when arrival rate of SU increases ( , blocking probability increases and also analyzed when mean header duration (1/ increases, blocking probability also decreases. Fig.9 shows the blocking probability for exponential distributed payload length against arrival rate of SU for different value of mean header duration. In this figure when arrival rate of SU increases, blocking probability increases, but when mean header length increases blocking probability also increases. Fig. 8 Blocking probability for fixed payload against arrival rate of SU for different mean header duration Fig. 9 Blocking probability for exponential distributed payload against arrival rate of SU for different mean header duration A. Comparison between fixed and exponential payload length
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1871 www.ijarcet.org Fig. 10 Comparison between Blocking probability for fixed ( and exponential payload ( length against mean payload (1/ ) In Fig. 10 shows the Comparison between Blocking probability for fixed ( and exponential payload ( length against mean payload (1/ ) for mean header duration ( =0.1. So it is clear from the figure blocking probability decreases when mean payload length increase and also observe the exponential distribution of blocking probability are lower than the fixed payload blocking probability. Fig. 11 Comparison between Force termination probability for fixed ( and exponential payload ( length against mean payload (1/ ) In Fig. 11 shows that the Comparison between Force termination probability for fixed ( and exponential payload ( length against mean payload (1/ ) for mean header duration ( =0.1. So it is clear from the figure force termination probability increases when mean payload length increase and also observe the exponential distribution of force termination probability are lower than the fixed payload force termination probability. In Fig. 12 shows that the Comparison between Blocking probability for fixed ( and exponential payload ( length against arrival rate of SU for mean header duration ( =0.1. So it is clear from the figure blocking probability increases when arrival rate of SU increase and also observe the exponential distribution of blocking probability are lower than the fixed payload blocking probability. Fig. 12 Comparison between Blocking probability for fixed ( and exponential payload ( length against arrival rate of SU V. CONCLUSION In this paper, we have used a continuous time markov chain model to calculate QoS parameter of the SU for fixed payload length and exponential distribution payload length with fixed header using a single channel of PU and SU. Numerical results are shown and compared with those of fixed header duration. Results show that the blocking probability and force termination probability is greater in fixed payload length rather than exponential distribution payload length. This work may further be extended for multiple PU channel and two SU groups with spectrum handoff and channel reservation in interweave access mode. REFERENCES [1] Sudhir Srinivasa and Syed Ali Jafar, “The Throughput Potential of Cognitive Radio: A Theoretical Perspective”, IEEE Communications Magazine, May 2007 pp.73-79. [2] Qing Zhao and Brian M. Sadler, “A Survey of Dynamic Spectrum Access”, IEEE Signal Processing Magazine, May 2007 pp.79-89 [3] W. Ahmed, J. Gao, H. Zhou and M. Faulkner, “Goodput and Channel allocation," in Proceedings Personal Indoor and Mobile Radio Communications (PIMRC), pp. 476-480, 13-16 Sept. 2009. [4] T. Weiss and F. Jondral, “Spectrum Pooling: An Innovative Strategy for the Enhancement of Spectrum Efficiency," IEEE Communication. Mag., vol. 42, pp. S8- S14, Mar. 2004. [5] D. Hong and S. Rappaport, “Traffic Model and Performance Analysis for Cellular Mobile Radio Telephone Systems with Prioritized and
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1872 Nonprioritized Handoff Procedures," IEEE Transactions. Vehicular. Technol., vol. 35, pp. 77-92, Aug. 1986. [6] J. Mehdi, Stochastic Models in Queuing Theory. Academic Press, San Diego: CA, 1991. [7] J. Gao, W. Ahmed, J. Yang, and M. Faulkner, “Throughput Comparison in Cognitive Radio Networks," in Proceedings of Electrical Engineering/Electronics Computer Telecommunications and Information Technology (ECTI-CON), pp. 748-751, 19-21 May 2010. Pinki Yadav was born in India on February 2, 1987. She received her B.E. degree in Electronics and Communication from Mandsaur institute of technology, Mandsaur (University RGPV Bhopal), M.P. India in 2010 and currently is a M. Tech (Signal Processing) student in Mody Institute of Technology and Science (Deemed University), Rajasthan, India. Dr. Partha Pratim Bhattacharya was born in India on January 3, 1971. He has 15 years of experience in teaching and research. He served many reputed educational Institutes in India in various positions starting from Lecturer to Professor and Principal. At present he is working as Professor in Department of Electronics and Communication Engineering in the Faculty of Engineering and Technology, Mody Institute of Technology and Science (Deemed University), Rajasthan, India. He worked on Microwave devices and systems and mobile cellular communication systems. He has published a good number of papers in refereed journals and conferences. His present research interest includes mobile communication and cognitive radio. Dr. Bhattacharya is a member of The Institution of Electronics and Telecommunication Engineers, India and The Institution of Engineers, India. He is the recipient of Young Scientist Award from International Union of Radio Science in 2005. He is working as the chief editor, editorial board member and reviewer in many reputed journals.