SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1729
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network
(CR-WSN)
Patel Hiral B.
Dept. of Electronics and communication
Dr. S. & S. S. Ghandhy College of Engineering and Technology, Surat, Gujarat, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Todays’ spectrum environment faces so many
challenges but the spectrum scarcity is one of the most critical
problem. To solve this problem effectively, Cognitive radio is a
perfect technology identifying the vacant portion of the
spectrum and also ensuring that primary users are not
affected at all. In sensor network it is reasonable to adopt
cognitive radio capability, which ultimately yields a new
sensor networking paradigm, i.e. cognitive radio wireless
sensor network (CR-WSN). MAC protocols helps CR nodes to
access the channel and use the white space very effectively. It
also ensures that spectrum dynamicsarenotsohighand much
tighter interaction are required by MAC protocols.
Key Words: Cognitive radio, wireless sensor network,
MAC protocol, CR-WSN
1. INTRODUCTION
Cognitive radio word came from the noun “Cognition”. It is
the mental process involving knowing, learning and
understanding the things. Current researches are investing
different techniques of using cognitive radio to reuse more
locally unused spectrums to increase the total system
capacity. Cognitive radio is thesmartandintelligent wireless
communication system which is aware of its surrounding
environment. The main goal of cognitive radio network is to
use the unallocated band very intelligently without
interfering the licensed users. There are manyadvantagesof
wireless sensor network. We can combine the cognitive
radio and wireless sensor network i.e.CR-WSN. Wireless
sensor network has normally largedeploymentarea towork
with the tremendous nodes. That’s why by combining them
we can achieve more features and alsoveryeffectively.It has
also the ability of self-organizing and lifetime of wireless
sensor nodes which is very important.
We know there are different layers for some particular
purposes forachieving tasks.First is Physical layer,secondis
data link layer, third is network layer, forth is transportlayer
and then presentation and application layers. We will work
on MAC layer which comes in category of data link layer. The
function of data link layer is to provide the connection
between hosts on the same network. Sublayer of data link
layer is LLC and MAC. And we focus on the particular mac
protocol forthe cognitive radio that’s why wecall itCOGMAC
protocol.
2. BRIEF OVERVIEW OF COGNITIVE RADIO
TECHNOLOGY
Cognitive radio (CR) integrate radio technology and
networking technology to provide efficient use of radio
spectrum. CR is proposed as a mean to implement efficient
reuse of licensed spectrum to overcome the problem of
traffic scarcity. In cognitive radio network there are
generally two types of users, primary users (PUs) and
secondary users (SUs). PUs have the authority to access the
channel as long as they require. Whenever there is no need
of spectrum at all PUs can lease their spectrum to other
users which is also called cognitive users or SUs. SUs canuse
the shared spectrum without any interference to PUs.
2.1 General Architecture of Cognitive Radio
Cognitive radio (CR) integrate radio technology and
networking technology to provide efficient use of radio
spectrum. CR is proposed as a mean to implement efficient
reuse of licensed spectrum to overcome the problem of
traffic scarcity. In cognitive radio network there are
generally two types of users, primary users (PUs) and
secondary users (SUs). PUs have the authority to access the
channel as long as they require. Whenever there is no need
of spectrum at all PUs can lease their spectrum to other
users which is also called cognitive users or SUs. SUs canuse
the shared spectrum without any interferencetoPUs.This is
the main principle of CR network.
Fig -1: infrastructure architecture (4)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1730
Fig -2: ad-hoc architecture (4)
Fig -3: mesh architecture (4)
3. WIRELESS SENSOR NETWORK
Wireless Sensor Network (WSN) is made up of a set of
spatially distributed autonomous sensors aimingto monitor
physical as well as environmental condition. The
autonomous sensors are equipped with radio transceiver to
enable wireless communication among different wireless
sensor nodes. The architecture of WSN is look like as shown
in fig.4. WSN consists of hundreds of WS nodes deployed
throughout the sensor field. The distance among the nodes
are generally a few meters. Sink node / base station is
responsible for the collecting the data from the WS nodes in
single hop or multi hop manner. Sink node then sends the
collected data to users via a gate-way, internet , routers and
any other way.
Fig -4: conventional wireless sensor network (6)
4. COGNITIVERADIOWIRELESSSENSORNETWORK
Cognitive Radio Wireless Sensor Network (CR-WSN) is
defined as distributed network of wireless sensor nodes,
which sense an event signal and collaboratively
communicatedynamicallyovertheavailablespectrumbands
in multi hop manner. In CR-WSN nodes selects the most
appropriate channel once an idle channel is detected,
identify it and vacate the channel when the licensed users
arrives. CR-WSN increase the spectrum utilization, alsolook
after fulfillment after end-to-end connection also increase
the efficiency of the system.
Fig -5: hardware structure of CR-WSN (6)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1731
5. CLASSIFICATION OF CR MAC PROTOCOL
Fig -6: classification of CR-MAC protocol
6. INTRODUCTION of COGMAC PROTOCOL
COGMAC is a decentralized cognitive mac protocol, which is
based on MPR scheme. It is designed to efficiently utilize the
performance characteristics of PU. Conventional mac
protocols require common control channels but the
noticeable advantage of COGMAC is that it does not require
any MAC protocol. COGMAC is suitable for both licensed as
wellasunlicensedband.Insituationwhereaccuratespectrum
opportunities are hard to predictand cooperation fromPUis
unlikely, decentralize MAC protocols are desirable. The goal
of our MAC solution is to provide a simple learning based
distributed MAC protocolthatisabletochooseanewchannel
in weighted manner if vacating an existing channelforaPUis
required.
6.1multichannel preamble reservation (MPR)
Basically MPR scheme is adoptedtosolvethe rendezvous
problem and guarantee seamless transmission. For that it
requires the receiving node continuously sense all available
channels to detect potential transmissions. The set of
available channels as a channel is called as pool of a node.
That’s why the operation of sequentially sensing these
channels is called as a pool sensing. The transmitting nodeis
supposed to send multiple copies of the sameframe back-to-
back so that we can occupy the channel. Therefore that
nodes are able to detect its transmission during the pool
sensing. Transmitting the same frame repetitively is termed
as a repetitive frame transmission. As shown in the figure,
both RX1 and RX2 detect the transmission and successfully
receive at least one complete frame. But the problem is that
it takes too long time to complete the process. This problem
can be solved by another protocol which is called COGMAC+
protocol.
Fig -7: MPR scheme (7)
7.COGMAC+ PROTOCOL
COGMAC+ uses an adaptive energy detection scheme to
dynamically set the energy detection threshold according to
the carrier sensing status, the false positive ratio and the
estimated noise level. Efficiently support high data traffic we
have to minimize the frame repetition. COGMAC+
continuously transmits frames without any repletion after
the reserving channel, it is called aggregation transmission.
7.1multichannel multi-frame transmission (MMT)
We can overcome the challenge of high data traffic by
MMT scheme. In that we give some bound to the parameter
then try to procced further. In this protocol we use frame
based analysis which gives better performance. We derive
several bounds to optimize the protocol performance and
achieve better protection to Pus protection. MMT scheme is
just upgraded version of MPR scheme.
CR-MAC
Protocol
sGCCC ASSUMED GCCC NON GCCC
HYBRID
ACCESS
MECHANISM
Time Slotted Random Access Hybrid
Overlay/Underlay
Synchronous Dynamic
Spectrum
Access
Asynchrono
us
Direct
Access
based
Game Theoretic Stochasti
c
Genetic Contention
Based
Coordinati
on Based
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1732
Considering the minimal duration between two
successive frames inter_Fr, we have,
= (1) [7]
Where NPU denotes the upper bound of the number of
frames that are allowed to be transmitted in one PU
allowance interval. To avoid missing repetitive frame
transmission, the duration of CCA1 operation hastobelower
bounded as below,
+ (2) [7]
7.2 CCA based random back-off scheme
Channel Collision Avoidance (CCA) is generally used to
avoid the collision which is one of the very serious problem.
In that nodes have to wait for a random time. COGMAC+
choose the duration of (CCA1 + channel switching duration)
as the unit time of random back off scheme. This scheme
improves portability of the protocol.
7.3 noise floor estimation
Whenever carrier sensing is performed, Noise Floor
Estimation (NFE) is carried out. Generally it is used to
compare the power level of received carrier with the
predefined threshold.
When a low detection threshold, there is large detection
range which can enables devices to cooperate whichhaslow
transmit power or long distance.so that it causes high false
positive frame detection ratio and ultimately it causes
unnecessary delay. Unnecessary delay also create problem.
When a high detection threshold, there is lower
communication range, which is also one category of
disadvantage. Therefore appropriate threshold should be
applied to every devices. Fix detection threshold is also
ineffective and unmovable.
For that we have one solution is false positive detection
ratio and detecting range, while keeping protocol stable at
run-time. This requires no priory-knowledge of noise and
external transmission. It allows node to dynamically adjust
the threshold based on parameters.
There are two methods, first is real time Noise Floor
Estimation (NFE) and second is Adaptive Energy Detection
Threshold Adjustment (AEDTA). In NFE method, NFE
updates noise level during carrier sensing operation if
channel is determined idle. In AEDTA, it continuously
reduces the threshold to increase detection range. The
principle of both performs when the channel is idle.
8.SUMMARY
In this paper, we present an overview of the medium
access protocols in cognitiveradionetworks.Cognitive
radioincreasespectrumutilizationandcommunication
quality with opportunistic spectrum access capability
and adaptability to thechannelconditions.Thesesilent
features can also be exploited in resource-constrained
sensor networks. Moreover, multiple channel
availabilityprovidedbycognitiveradiocapabilitiescan
be used to overcome the problemscausedbythedense
deploymentandbustycommunicationnatureofsensor
network.
REFERENCES
[1] Communications”, IEEE Journal on Selected Areas in
Communications (JSAC), Vol. 23, No. 2,pp.201-220,Feb.
2005.
[2] I. F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “NeXt
Generation/ Dynamic Spectrum Access/Cognitive
Radio Wireless Networks: a Survey”, Computer
Networks Journal (Elsevier), Vol. 50, No. 13, pp. 2127-
2159, Sept. 2006.
[3] Joseph Mitola III. Cognitive radio for flexible mobile
multimedia communications. In Sixth International
Workshop on Mobile Multimedia Communications
(MoMuC’99), San Diego, CA, 1999.
[4] Survey of Security Issues in Cognitive Radio Networks
Wassim El-Hajj1, Haidar Safa1, Mohsen Guizani2
1Computer Science Department,AmericanUniversityof
Beirut, Lebanon 2Computer Science Department,
Western Michigan University, USA {we07,
hs33}@aub.edu.lb, mguizani@ieee.org
[5] Cognitive Radio Networks andSecurity:ASurveyArticle
· June 2013 Feng Wang Guang Dong University of
Technology
[6] Cognitive Radio Wireless Sensor Networks:
Applications, Challenges and Research Trends
Gyanendra Prasad Joshi,SeungYeobNamandSung Won
Kim Department of Information and Communication
Engineering, Yeungnam University, 214-1 Dae-dong,
Gyeongsan-si, Kyongsan 712-749, Gyeongsangbuk-do,
Korea; E-Mails: joshi@ynu.ac.kr (G.P.J.);
synam@ynu.ac.kr (S.N.)
[7] CogMAC+: A decentralized MAC protocol for
opportunistic spectrum access in cognitive wireless
networks PengWang, Junaid Ansari, Marina Petrova,
Petri Mähönen Institute for Networked Systems, RWTH
Aachen University, Kackertstrasse 9, D-52072 Aachen,
Germany
[8] I. F. Akyildiz, I. H. Kasimoglu, “WirelessSensorandActor
Networks: Research Challenges”, Ad Hoc Networks
Journal (Elsevier), Vol. 2, No. 4, pp. 351-367, Oct. 2004.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1733
[9] Cognitive Radio Sensor Networks Ozgur B. Akan Osman
B. Karli Ozgur Ergul Next generation Wireless
Communications Laboratory (NWCL) Department of
Electrical and Electronics Engineering Middle East
Technical University, Ankara, Turkey, 06531
[10] He, A.; Bae, K.Y.; Newman, T.R.; Gaeddert, J.; Kim, K.W.;
Menon, R.; Morales-Tirado, L.; Neel, J.J.; Zhao Y.; Reed,
J.H.; et al. A survey of artificial intelligence for cognitive
radios. IEEE Trans. Veh. Technol. 2010, 59, 1578–1592.
[11] X. Zhang and H. Su, “CREAM-MAC: Cognitive Radio-
EnAbled Multi-Channel MAC Protocol Over Dynamic
Spectrum Access Networks,” IEEE Journal of Selected
Topics in Signal Processing, vol. 5, no. 1, pp. 110–123,
Feb. 2011.
[12] ITU–R. Definitions of Software Defined Radio (SDR)and
Cognitive Radio System (CRS); ITU-R Report SM 2152;
ITU: Geneva, Switzerland, 2009.

More Related Content

What's hot

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 
Study of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio NetworkStudy of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio Networkfaskone
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake ineSAT Publishing House
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rtseSAT Journals
 
OFDM Based Cognitive radio
OFDM Based Cognitive radioOFDM Based Cognitive radio
OFDM Based Cognitive radioDeepesh Sinnya
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Eiko Seidel
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...Eswar Publications
 

What's hot (19)

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
Study of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio NetworkStudy of admission and control system in a Centralized Cognitive Radio Network
Study of admission and control system in a Centralized Cognitive Radio Network
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake in
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rts
 
OFDM Based Cognitive radio
OFDM Based Cognitive radioOFDM Based Cognitive radio
OFDM Based Cognitive radio
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 

Similar to Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)

A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...IRJET Journal
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio NetworkIJSRED
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksIJSRED
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkIRJET Journal
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioIRJET Journal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...IRJET Journal
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...IRJET Journal
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 

Similar to Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN) (20)

A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
A Novel Carrier Indexing Method for Side Lobe Suppression and Bit Error Rate ...
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio Network
 
IJET-V3I1P12
IJET-V3I1P12IJET-V3I1P12
IJET-V3I1P12
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor Networks
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio Network
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
 
40120140503011
4012014050301140120140503011
40120140503011
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...manju garg
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 

Recently uploaded (20)

Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 

Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1729 Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN) Patel Hiral B. Dept. of Electronics and communication Dr. S. & S. S. Ghandhy College of Engineering and Technology, Surat, Gujarat, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Todays’ spectrum environment faces so many challenges but the spectrum scarcity is one of the most critical problem. To solve this problem effectively, Cognitive radio is a perfect technology identifying the vacant portion of the spectrum and also ensuring that primary users are not affected at all. In sensor network it is reasonable to adopt cognitive radio capability, which ultimately yields a new sensor networking paradigm, i.e. cognitive radio wireless sensor network (CR-WSN). MAC protocols helps CR nodes to access the channel and use the white space very effectively. It also ensures that spectrum dynamicsarenotsohighand much tighter interaction are required by MAC protocols. Key Words: Cognitive radio, wireless sensor network, MAC protocol, CR-WSN 1. INTRODUCTION Cognitive radio word came from the noun “Cognition”. It is the mental process involving knowing, learning and understanding the things. Current researches are investing different techniques of using cognitive radio to reuse more locally unused spectrums to increase the total system capacity. Cognitive radio is thesmartandintelligent wireless communication system which is aware of its surrounding environment. The main goal of cognitive radio network is to use the unallocated band very intelligently without interfering the licensed users. There are manyadvantagesof wireless sensor network. We can combine the cognitive radio and wireless sensor network i.e.CR-WSN. Wireless sensor network has normally largedeploymentarea towork with the tremendous nodes. That’s why by combining them we can achieve more features and alsoveryeffectively.It has also the ability of self-organizing and lifetime of wireless sensor nodes which is very important. We know there are different layers for some particular purposes forachieving tasks.First is Physical layer,secondis data link layer, third is network layer, forth is transportlayer and then presentation and application layers. We will work on MAC layer which comes in category of data link layer. The function of data link layer is to provide the connection between hosts on the same network. Sublayer of data link layer is LLC and MAC. And we focus on the particular mac protocol forthe cognitive radio that’s why wecall itCOGMAC protocol. 2. BRIEF OVERVIEW OF COGNITIVE RADIO TECHNOLOGY Cognitive radio (CR) integrate radio technology and networking technology to provide efficient use of radio spectrum. CR is proposed as a mean to implement efficient reuse of licensed spectrum to overcome the problem of traffic scarcity. In cognitive radio network there are generally two types of users, primary users (PUs) and secondary users (SUs). PUs have the authority to access the channel as long as they require. Whenever there is no need of spectrum at all PUs can lease their spectrum to other users which is also called cognitive users or SUs. SUs canuse the shared spectrum without any interference to PUs. 2.1 General Architecture of Cognitive Radio Cognitive radio (CR) integrate radio technology and networking technology to provide efficient use of radio spectrum. CR is proposed as a mean to implement efficient reuse of licensed spectrum to overcome the problem of traffic scarcity. In cognitive radio network there are generally two types of users, primary users (PUs) and secondary users (SUs). PUs have the authority to access the channel as long as they require. Whenever there is no need of spectrum at all PUs can lease their spectrum to other users which is also called cognitive users or SUs. SUs canuse the shared spectrum without any interferencetoPUs.This is the main principle of CR network. Fig -1: infrastructure architecture (4)
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1730 Fig -2: ad-hoc architecture (4) Fig -3: mesh architecture (4) 3. WIRELESS SENSOR NETWORK Wireless Sensor Network (WSN) is made up of a set of spatially distributed autonomous sensors aimingto monitor physical as well as environmental condition. The autonomous sensors are equipped with radio transceiver to enable wireless communication among different wireless sensor nodes. The architecture of WSN is look like as shown in fig.4. WSN consists of hundreds of WS nodes deployed throughout the sensor field. The distance among the nodes are generally a few meters. Sink node / base station is responsible for the collecting the data from the WS nodes in single hop or multi hop manner. Sink node then sends the collected data to users via a gate-way, internet , routers and any other way. Fig -4: conventional wireless sensor network (6) 4. COGNITIVERADIOWIRELESSSENSORNETWORK Cognitive Radio Wireless Sensor Network (CR-WSN) is defined as distributed network of wireless sensor nodes, which sense an event signal and collaboratively communicatedynamicallyovertheavailablespectrumbands in multi hop manner. In CR-WSN nodes selects the most appropriate channel once an idle channel is detected, identify it and vacate the channel when the licensed users arrives. CR-WSN increase the spectrum utilization, alsolook after fulfillment after end-to-end connection also increase the efficiency of the system. Fig -5: hardware structure of CR-WSN (6)
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1731 5. CLASSIFICATION OF CR MAC PROTOCOL Fig -6: classification of CR-MAC protocol 6. INTRODUCTION of COGMAC PROTOCOL COGMAC is a decentralized cognitive mac protocol, which is based on MPR scheme. It is designed to efficiently utilize the performance characteristics of PU. Conventional mac protocols require common control channels but the noticeable advantage of COGMAC is that it does not require any MAC protocol. COGMAC is suitable for both licensed as wellasunlicensedband.Insituationwhereaccuratespectrum opportunities are hard to predictand cooperation fromPUis unlikely, decentralize MAC protocols are desirable. The goal of our MAC solution is to provide a simple learning based distributed MAC protocolthatisabletochooseanewchannel in weighted manner if vacating an existing channelforaPUis required. 6.1multichannel preamble reservation (MPR) Basically MPR scheme is adoptedtosolvethe rendezvous problem and guarantee seamless transmission. For that it requires the receiving node continuously sense all available channels to detect potential transmissions. The set of available channels as a channel is called as pool of a node. That’s why the operation of sequentially sensing these channels is called as a pool sensing. The transmitting nodeis supposed to send multiple copies of the sameframe back-to- back so that we can occupy the channel. Therefore that nodes are able to detect its transmission during the pool sensing. Transmitting the same frame repetitively is termed as a repetitive frame transmission. As shown in the figure, both RX1 and RX2 detect the transmission and successfully receive at least one complete frame. But the problem is that it takes too long time to complete the process. This problem can be solved by another protocol which is called COGMAC+ protocol. Fig -7: MPR scheme (7) 7.COGMAC+ PROTOCOL COGMAC+ uses an adaptive energy detection scheme to dynamically set the energy detection threshold according to the carrier sensing status, the false positive ratio and the estimated noise level. Efficiently support high data traffic we have to minimize the frame repetition. COGMAC+ continuously transmits frames without any repletion after the reserving channel, it is called aggregation transmission. 7.1multichannel multi-frame transmission (MMT) We can overcome the challenge of high data traffic by MMT scheme. In that we give some bound to the parameter then try to procced further. In this protocol we use frame based analysis which gives better performance. We derive several bounds to optimize the protocol performance and achieve better protection to Pus protection. MMT scheme is just upgraded version of MPR scheme. CR-MAC Protocol sGCCC ASSUMED GCCC NON GCCC HYBRID ACCESS MECHANISM Time Slotted Random Access Hybrid Overlay/Underlay Synchronous Dynamic Spectrum Access Asynchrono us Direct Access based Game Theoretic Stochasti c Genetic Contention Based Coordinati on Based
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1732 Considering the minimal duration between two successive frames inter_Fr, we have, = (1) [7] Where NPU denotes the upper bound of the number of frames that are allowed to be transmitted in one PU allowance interval. To avoid missing repetitive frame transmission, the duration of CCA1 operation hastobelower bounded as below, + (2) [7] 7.2 CCA based random back-off scheme Channel Collision Avoidance (CCA) is generally used to avoid the collision which is one of the very serious problem. In that nodes have to wait for a random time. COGMAC+ choose the duration of (CCA1 + channel switching duration) as the unit time of random back off scheme. This scheme improves portability of the protocol. 7.3 noise floor estimation Whenever carrier sensing is performed, Noise Floor Estimation (NFE) is carried out. Generally it is used to compare the power level of received carrier with the predefined threshold. When a low detection threshold, there is large detection range which can enables devices to cooperate whichhaslow transmit power or long distance.so that it causes high false positive frame detection ratio and ultimately it causes unnecessary delay. Unnecessary delay also create problem. When a high detection threshold, there is lower communication range, which is also one category of disadvantage. Therefore appropriate threshold should be applied to every devices. Fix detection threshold is also ineffective and unmovable. For that we have one solution is false positive detection ratio and detecting range, while keeping protocol stable at run-time. This requires no priory-knowledge of noise and external transmission. It allows node to dynamically adjust the threshold based on parameters. There are two methods, first is real time Noise Floor Estimation (NFE) and second is Adaptive Energy Detection Threshold Adjustment (AEDTA). In NFE method, NFE updates noise level during carrier sensing operation if channel is determined idle. In AEDTA, it continuously reduces the threshold to increase detection range. The principle of both performs when the channel is idle. 8.SUMMARY In this paper, we present an overview of the medium access protocols in cognitiveradionetworks.Cognitive radioincreasespectrumutilizationandcommunication quality with opportunistic spectrum access capability and adaptability to thechannelconditions.Thesesilent features can also be exploited in resource-constrained sensor networks. Moreover, multiple channel availabilityprovidedbycognitiveradiocapabilitiescan be used to overcome the problemscausedbythedense deploymentandbustycommunicationnatureofsensor network. REFERENCES [1] Communications”, IEEE Journal on Selected Areas in Communications (JSAC), Vol. 23, No. 2,pp.201-220,Feb. 2005. [2] I. F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “NeXt Generation/ Dynamic Spectrum Access/Cognitive Radio Wireless Networks: a Survey”, Computer Networks Journal (Elsevier), Vol. 50, No. 13, pp. 2127- 2159, Sept. 2006. [3] Joseph Mitola III. Cognitive radio for flexible mobile multimedia communications. In Sixth International Workshop on Mobile Multimedia Communications (MoMuC’99), San Diego, CA, 1999. [4] Survey of Security Issues in Cognitive Radio Networks Wassim El-Hajj1, Haidar Safa1, Mohsen Guizani2 1Computer Science Department,AmericanUniversityof Beirut, Lebanon 2Computer Science Department, Western Michigan University, USA {we07, hs33}@aub.edu.lb, mguizani@ieee.org [5] Cognitive Radio Networks andSecurity:ASurveyArticle · June 2013 Feng Wang Guang Dong University of Technology [6] Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Gyanendra Prasad Joshi,SeungYeobNamandSung Won Kim Department of Information and Communication Engineering, Yeungnam University, 214-1 Dae-dong, Gyeongsan-si, Kyongsan 712-749, Gyeongsangbuk-do, Korea; E-Mails: joshi@ynu.ac.kr (G.P.J.); synam@ynu.ac.kr (S.N.) [7] CogMAC+: A decentralized MAC protocol for opportunistic spectrum access in cognitive wireless networks PengWang, Junaid Ansari, Marina Petrova, Petri Mähönen Institute for Networked Systems, RWTH Aachen University, Kackertstrasse 9, D-52072 Aachen, Germany [8] I. F. Akyildiz, I. H. Kasimoglu, “WirelessSensorandActor Networks: Research Challenges”, Ad Hoc Networks Journal (Elsevier), Vol. 2, No. 4, pp. 351-367, Oct. 2004.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1733 [9] Cognitive Radio Sensor Networks Ozgur B. Akan Osman B. Karli Ozgur Ergul Next generation Wireless Communications Laboratory (NWCL) Department of Electrical and Electronics Engineering Middle East Technical University, Ankara, Turkey, 06531 [10] He, A.; Bae, K.Y.; Newman, T.R.; Gaeddert, J.; Kim, K.W.; Menon, R.; Morales-Tirado, L.; Neel, J.J.; Zhao Y.; Reed, J.H.; et al. A survey of artificial intelligence for cognitive radios. IEEE Trans. Veh. Technol. 2010, 59, 1578–1592. [11] X. Zhang and H. Su, “CREAM-MAC: Cognitive Radio- EnAbled Multi-Channel MAC Protocol Over Dynamic Spectrum Access Networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 1, pp. 110–123, Feb. 2011. [12] ITU–R. Definitions of Software Defined Radio (SDR)and Cognitive Radio System (CRS); ITU-R Report SM 2152; ITU: Geneva, Switzerland, 2009.