SlideShare a Scribd company logo
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume 5, Issue 1, June 2016, Page No.79-82
ISSN: 2278-2419
79
Spectrum Management Techniques using
Cognitive Radios Cognitive Radio Technology
U. Steve Arul, S. Salai Chandira Rajan
III ECE, Saranathan College of Engineering, Panjappur , Trichy, Tamilnadu, India
stevearul96@gmail.com, salaichandirarajans@gmail.com
Abstract - Spectrum has been a very valuable resource in
wireless communication systems. The available
electromagnetic radio spectrum is getting crowded day by day
due to manipulation in wireless devices and applications.
Underutilization of Spectrum has become a major source of
concern for each network user. The present paper attempts to
portray “Spectrum Management Techniques using Cognitive
Radios”, where the strength and scope of Cognitive Radio
Technology are discussed. It also highlights the efficiency and
effectiveness of the system when compared to conventional
mode of operations. Further, the present paper also lucidly
explains the modus operandus of Cognitive Radio Technology
Spectrum Management Techniques namely Spectrum Sensing,
Spectrum Decision-Making, Spectrum Sharing and Spectrum
Mobility. These functionalities make Cognitive Radio
Technology an asset to the network domain and easily solves
issues like interference, noise and underutilization. The paper
also focusses on describing the Transreceiver and network
architecture. On the whole, this paper is an overall description
about the Spectrum Management Techniques in Cognitive
Radio Technology in brief.
I. INTRODUCTION
The growing demand of wireless applications has put a lot of
constraints in the usage of available radio spectrum .which is
limited and precious resource. Also, it has been found that the
allocated spectrum is underutilized due to spectrum static
allocation. Moreover the conventional approach to manage
spectrum is very inflexible. Present wireless networks are
characterized by such a policy, where governmental agencies
assign this spectrum on a long term basics to license holders.
With most of these sort of allocations it is hard to find vacant
bands to either deploy new services or to enhance existing
ones. In order to overcome this situation, a new means for
improved utilization of the spectrum creating opportunities for
dynamic spectrum access is preferred. This issue can be solved
using Cognitive Radio (CR) technology.
II. COGNITIVE RADIO TECHNOLOGY
Cognitive Radios are designed such as through provide highly
reliable communication to all users of the network, wherever
and whenever needed and to facilitate effective Radio spectrum
utilization. Cognitive Radio can change it’s transmitter
parameters based on it’s interaction with the environment. CR
Networks are envisioned to provide higher bandwidth to
mobile users the key enabling technologies of CR Networks
are the Cognitive Radio techniques that provide the capability
to share the spectrum in an opportunistic manner.
CR enables the wide usage of temporally unused spectrum,
referred to as spectrum hold or white space. Consequently, it
selects the best spectrum which is shared with other users and
exploited without interference from the licensed user. CR as
the functionality to be programmed to transmit and receive on
a wide variety of frequencies. Through this capability, the best
spectrum band the most suitable operating parameters can be
selected and can reconfigured.
Figure 1: White space or Spectrum hole
III. ARCHITECTURE:
Figure 2: CR Transreceiver Architecture
CR requires a novel Radio Frequency (RF) Transreceiver
architecture. The main components of CR Transreceiver or the
Radio front-end and the Base-band processing unit. The novel
characteristic of the CR Transreceiver is the wideband RF
front-end that is capable of simultaneous sensing over a wide
frequency range. Here, the received signal is amplified, mixed
and analog to digital converter. In the base-band processing
unit the signal is either modulated or demodulated.
A comprehensive description of CR Network architecture is
essential for developing communication protocols that address
the dynamic spectrum variation. The components of the CR
Network architecture can be classified as two group’s namely
primary network and CR Network the primary network (or
licensed network) is refer to as an existing network. Here, the
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 04 Issue: 01, June 2015 Page No.79-82
ISSN: 2278-2419
80
primary users pertain a license to operate in a specific spectrum
band. If primary networks possess an infrastructure, their
activities or controlled through primary base stations. The CR
Network (dynamic spectrum access network/secondary
network/unlicensed network) does not have a license to operate
in a desire band. Thus, additional functionality is required
these users to share the licensed spectrum band. CR Networks
may include spectrum brokers that distribute spectrum
resources among secondary networks.
Figure 3: CR Network Architecture
IV. ADVANTAGES OVER TRADITIONAL
NETWORKS
Overcome radio spectrum scarcity
By sensing spectrum utilization (irrespective of channel
allocation), cognitive radios can broadcast on unused radio
spectrum, while still avoiding interference with the operation
of the primary licensee.
Avoid intentional radio jamming scenarios
By sensing channel availability and even predicting the
jammer’s tactics , cognitive radios can evade jamming by
dynamically and preemptively switching to higher quality
channels.
Switch to power saving protocol
By switching to protocols that trade off lower power
consumption for lower bandwidth, cognitive radios conserve
power when slower data rates suffice.
Improve satellite communications
By predicting rain fade and reconfiguring
transmitters/receivers for optimum bandwidth, cognitive radios
improve communication quality when and where the
information is needed most.
Improves quality of service
By sensing environmental and inadvertent man-made radio
interferences, cognitive radios can select frequency channels
with a higher Signal to Noise Ratio (SNR).
V. SPECTRUM MANAGEMENT
Figure 4: Process of Spectrum Management
The Spectrum Management Process consists of four major
steps. They are
 Spectrum Sensing
 Spectrum Decision-Making
 Spectrum Sharing
 Spectrum Mobility
Spectrum Sensing: A CR User can allocate only an unused
portion of the spectrum. Therefore, a CR User should monitor
the available spectrum bands, capture their information, and
then detect spectrum holes.
Spectrum Decision-Making: Based on the spectrum
availability, CR Users can allocate a channel. This allocation
not only depends upon Spectrum availability, but also based on
internal policies.
Spectrum Sharing: Because there maybe multiple CR Users
trying to access the spectrum, CR Network should be
coordinated to prevent collision of multiple users.
Spectrum Mobility: CR Users are regarded as visitors to the
Spectrum. Hence, if the specific portion of the spectrum is a
primary network, communication must be continued in another
vacant portion of the Spectrum.
VI. SPECTRUM SENSING
We can categorize Spectrum Sensing technique into:
Frequency Domain Approach, Time Domain Approach
Frequency Domain Approach: In this approach, the estimation
is carries out directly from the signal. It is also known as Direct
Spectrum Sensing technique.
Time Domain Approach: The estimation is performed using
auto-correlation the signal. It is also known as Indirect
Spectrum Sensing technique. Another way of classification is
done as follows:
Non-Cooperative System: It is based on detection of the weak
signal from a primary transmitter through the local observation
of CR Users. Three schemes are generally used for transmitter
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 04 Issue: 01, June 2015 Page No.79-82
ISSN: 2278-2419
81
detection. Matched filter detection, Energy detection,
Cyclostationary feature detection
Matched filter detection: Matched filter is a linear filter
designed to maximize the output signal to noise ratio for the
given input signal. Matched filter operation is equivalent to
correlation in which the unknown signal is convolved with the
filter whose impulse response is the mirror and time shifted
version of reference signal. The operation of Matched filter
detection is expressed as Where x is the unknown signal
(vector) and h is the impulse response of the matched filter.
Energy detection: It is a non-coherent detection method that
detect the primary signal based on the sensed energy. Due to
it’s simplicity and no requirement, it is the most popular
sensing technique is con-cooperative sensing.
Cyclostationary feature detection: Cyclostationary feature
detection is robust to noise uncertainties and performs better
than energy detection in low signal to noise ratio regions.
Although it requires a prior knowledge of the signal
characteristics, cyclostationary feature detection is capable of
distinguishing the CR Transmissions from various types of
primary user signals.
Figure 5: Spectrum Sensing Techniques
Cooperative System: Although Cooperative System reduces
the probability of interference, the most efficient way to detect
spectrum holes is to detect the primary users who are receiving
data within the communication range of CR Users. Currently,
this method is only feasible in the detection of TV Receivers
and various topologies are currently used and are broadly
classified into three regions according to their level of
cooperation. Decentralized uncoordinated technique,
Centralized coordinated technique, Decentralized coordinated
technique
Decentralized uncoordinated technique: The Cognitive Users
in the network do not have any kind of cooperation, which
means that each CR user will independently detect the
channels.
Centralized coordinated technique: In this technique, it
cooperated only in sensing the channel. CR Users
independently detect the channel and inform the CR
Controller, which then notifies all CR Users.
Decentralized coordinated technique: This type of
coordination implies building up a network of Cognitive
Radios without having the need of a controller.
Interference Based Detection: Primary Receiver emits the local
oscillator and leakage power from it’s RF front-end while
receiving the data from Primary Transmitter. Within the
communication range of CR system users, the local sensor then
reports the sensed information to the CR Users so that they can
identify the Spectrum occupancy status.
VII.SPECRUM DECISION-MAKING
CR Networks require the capacity to decide the best spectrum
band among the available bands this notion is called spectrum
decision-making. It is closely related to channel characteristics
and operations of primary users because available spectrum
holes show variations overtime, each spectrum hole is
characteristics considering few parameters.
 Interference: from the amount of interference at the
primary receiver, the permissible power of a CR can be
derived.
 Path loss: the path loss is closely related to distance and
frequency as frequency increases, path loss increases
which results in transmission range.
 Wireless link errors: Depending on modulating schemes
an interference, error rate changes.
 Link layer delay: different types of link layer protocols are
required at different spectrum bands.
After characterization, appropriate bands are selected. To
describe the nature of CR Networks, primary user activity is
defined, which is the probability of appearance of primary
users during CR transmission. It is important to consider how
often the primary users appears on the spectrum band.
VIII. SPECTRUM SHARING
The share nature of wireless channels require the coordination
of attempts between CR users. Spectrum sharing can be
classified by four aspects namely architecture, spectrum
allocation behavior, spectrum access technique, and scope.
The first classification based on architecture
Centralized spectrum sharing: The spectrum allocation and
access procedures are controlled by a central entity. The central
entity can lease spectrum two users in a limited geographical
region for a specific amount of time.
Distributed spectral sharing: Spectrum allocation and access
are based on local policies performed by each node
distributively. They are also used between different networks.
The second classification is based on allocation behavior
Cooperative system sharing: Cooperative or collaborative
solutions exploit the interference measurement of each node
such that the effect of communication of one node on others is
considered.
Non-cooperative system sharing: Only a single node is
considered this selfish or non –collaborative technique results
in a certain degree of fairness, as well as improved throughput.
The third classification is based on access technology:
Overlay spectrum sharing: Nodes access the network using a
portion of a spectrum that has not been used by primary users.
Underlay spectrum sharing: The spread spectrum techniques
are exploited such that the transmission of a CR node is
regarded as a noise by primary users.
The fourth classification is based on scope:
Intranetwork spectrum sharing: Spectrum is allocated between
the entities of a CR network.
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 04 Issue: 01, June 2015 Page No.79-82
ISSN: 2278-2419
82
Internetwork spectrum sharing: It enables multiple system to
be deployed in overlapping locations and spectrum.
IX. SPECTRUM MOBILITY
After a CR captures the best available spectrum, Primary User
activity on the selected spectrum may necessitate that the users
change it’s operating spectrum bands, which is referred to as
Spectrum Mobility. It gives rise to a new type of handoff in CR
Networks, called as Spectrum Handoffs. Each time a CR user
changes it’s frequency of operation, a network protocol may
require modifications to the operation parameters. The purpose
of Spectrum Mobility in CR Networks is to ensure smooth and
fast transition leaving through minimum performance
degradation during a spectrum handoff.
X. CONCLUSION
Cognitive Radios are a promising source for usage of
underutilized network spectrum. As discussed, we saw how
Spectrum Sensing, Spectrum Decision-Making, Spectrum
Sharing and Spectrum Mobility manage spectrum in an
effective manner. It may be called as an asset to the modern
world in the future generations. Since it has an edge over
conventional methods in terms on interference, scarcity and
quality of service provided, it will create an impact not only in
the fields of networks, but also in the minds of network users.
References
[1] http://web.it.kth.se/~maguire/jmitola/Mitola_Dissertation8
_Integrated.pdf
[2] V. Valenta et al., "Survey on spectrum utilization in
Europe: Measurements, analyses and observations",
Proceedings of the Fifth International Conference on
Cognitive Radio Oriented Wireless Networks &
Communications (CROWNCOM), 2010
[3] J. Mitola III and G. Q. Maguire, Jr., "Cognitive radio:
making software radios more personal," IEEE Personal
Communications Magazine, vol. 6, nr. 4, pp. 13–18, Aug.
1999
IEEE 802.22
[4] Carl, Stevenson; G. Chouinard; Zhongding Lei; Wendong
Hu; S. Shellhammer; W. Caldwell (January 2009). "IEEE
802.22: The First Cognitive Radio Wireless Regional Area
Networks (WRANs) Standard = IEEE Communications
Magazine". IEEE Communications
Magazine (US: IEEE) 47 (1): 130–
138. doi:10.1109/MCOM.2009.4752688.
IEEE 802.15.2
[5] S. Haykin, "Cognitive Radio: Brain-empowered Wireless
Communications", IEEE Journal on Selected Areas of
Communications, vol. 23, nr. 2, pp. 201–220, Feb. 2005
[6] X. Kang et. al ``Sensing-Based Spectrum Sharing in
Cognitive Radio Networks, IEEE Transactions on
Vehicular Technology, vol. 58, no. 8, pp. 4649-4654, Oct
2009.
[7] http://www.eecs.berkeley.edu/wireless/posters/WFW05_c
ognitive.pdf
[8] http://ieeexplore.ieee.org/iel5/4234/30631/01413630.pdf?t
p=&arnumber=1413630&isnumber=30631
[9] Ian F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty,
"NeXt Generation/Dynamic Spectrum Access/Cognitive
Radio Wireless Networks: A Survey," Computer
Networks (Elsevier) Journal, September 2006. [1]
[10] Cognitive Functionality in Next Generation Wireless
Networks
[11] X. Kang et. al ``Optimal power allocation for fading
channels in cognitive radio networks: Ergodic capacity
and outage capacity, IEEE Trans. on Wireless Commun.,
vol. 8, no. 2, pp. 940-950, Feb 2009.
[12] H. Urkowitz Energy detection of unknown deterministic
signals, IEEE Proceedings, Apr. 1967.
[13] R. Tandra and A. Sahai, SNR walls for signal detection,
IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 4 –
17, Feb. 2008.
[14] A. Mariani, A. Giorgetti, and M. Chiani, Effects of Noise
Power Estimation on Energy Detection for Cognitive
Radio Applications, IEEE Trans. Commun., vol. 50, no.
12, Dec., 2011.
[15] W. A. Gardner, Exploitation of spectral redundancy in
cyclostationary signals, IEEE Sig. Proc. Mag., vol. 8, no.
2, pp. 14 – 36, 1991.
[16] H. Sun, A. Nallanathan, C.-X. Wang, and Y.-F. Chen,
“Wideband spectrum sensing for cognitive radio networks:
a survey,” IEEE Wireless Communications, vol. 20, no. 2,
pp. 74–81, April 2013.

More Related Content

Similar to V5_I1_2016_Paper19.doc

D1082731
D1082731D1082731
D1082731
IJERD Editor
 
Methods for Detecting Energy and Signals in Cognitive Radio: A Review
Methods for Detecting Energy and Signals in Cognitive Radio: A ReviewMethods for Detecting Energy and Signals in Cognitive Radio: A Review
Methods for Detecting Energy and Signals in Cognitive Radio: A Review
IRJET Journal
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
IJERA Editor
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
IJERA Editor
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524IJRAT
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
ijwmn
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
ijwmn
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
Alexander Decker
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
Vatsala Sharma
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET Journal
 
H010434655
H010434655H010434655
H010434655
IOSR Journals
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
ijngnjournal
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
Sandeep Meena
 
Cognitive Radio Technology challenges
Cognitive Radio Technology challengesCognitive Radio Technology challenges
Cognitive Radio Technology challenges
Dr. Nafel Alotaibi
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
ijngnjournal
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
Seshagiri Rao Kornepati
 
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
cscpconf
 
Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...
csandit
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
IOSR Journals
 

Similar to V5_I1_2016_Paper19.doc (20)

D1082731
D1082731D1082731
D1082731
 
Methods for Detecting Energy and Signals in Cognitive Radio: A Review
Methods for Detecting Energy and Signals in Cognitive Radio: A ReviewMethods for Detecting Energy and Signals in Cognitive Radio: A Review
Methods for Detecting Energy and Signals in Cognitive Radio: A Review
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524
 
Paper 1 2019
Paper 1 2019Paper 1 2019
Paper 1 2019
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
 
H010434655
H010434655H010434655
H010434655
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Cognitive Radio Technology challenges
Cognitive Radio Technology challengesCognitive Radio Technology challenges
Cognitive Radio Technology challenges
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE EN...
 
Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 

More from IIRindia

An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques
IIRindia
 
E-Agriculture - A Way to Digitalization
E-Agriculture - A Way to DigitalizationE-Agriculture - A Way to Digitalization
E-Agriculture - A Way to Digitalization
IIRindia
 
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
IIRindia
 
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
IIRindia
 
Silhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log AnalysisSilhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log Analysis
IIRindia
 
Analysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based SystemAnalysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based System
IIRindia
 
A Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningA Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data Mining
IIRindia
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
IIRindia
 
Feature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM ClassifierFeature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM Classifier
IIRindia
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining Techniques
IIRindia
 
V5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docxV5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docx
IIRindia
 
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
IIRindia
 
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
IIRindia
 
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
IIRindia
 
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
IIRindia
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
IIRindia
 
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
IIRindia
 
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
IIRindia
 
Survey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord ImagesSurvey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord Images
IIRindia
 

More from IIRindia (20)

An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques
 
E-Agriculture - A Way to Digitalization
E-Agriculture - A Way to DigitalizationE-Agriculture - A Way to Digitalization
E-Agriculture - A Way to Digitalization
 
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
 
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
 
Silhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log AnalysisSilhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log Analysis
 
Analysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based SystemAnalysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based System
 
A Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningA Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data Mining
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
 
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
 
Feature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM ClassifierFeature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM Classifier
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining Techniques
 
V5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docxV5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docx
 
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
 
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
 
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
 
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
 
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
 
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
 
Survey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord ImagesSurvey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord Images
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 

V5_I1_2016_Paper19.doc

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume 5, Issue 1, June 2016, Page No.79-82 ISSN: 2278-2419 79 Spectrum Management Techniques using Cognitive Radios Cognitive Radio Technology U. Steve Arul, S. Salai Chandira Rajan III ECE, Saranathan College of Engineering, Panjappur , Trichy, Tamilnadu, India stevearul96@gmail.com, salaichandirarajans@gmail.com Abstract - Spectrum has been a very valuable resource in wireless communication systems. The available electromagnetic radio spectrum is getting crowded day by day due to manipulation in wireless devices and applications. Underutilization of Spectrum has become a major source of concern for each network user. The present paper attempts to portray “Spectrum Management Techniques using Cognitive Radios”, where the strength and scope of Cognitive Radio Technology are discussed. It also highlights the efficiency and effectiveness of the system when compared to conventional mode of operations. Further, the present paper also lucidly explains the modus operandus of Cognitive Radio Technology Spectrum Management Techniques namely Spectrum Sensing, Spectrum Decision-Making, Spectrum Sharing and Spectrum Mobility. These functionalities make Cognitive Radio Technology an asset to the network domain and easily solves issues like interference, noise and underutilization. The paper also focusses on describing the Transreceiver and network architecture. On the whole, this paper is an overall description about the Spectrum Management Techniques in Cognitive Radio Technology in brief. I. INTRODUCTION The growing demand of wireless applications has put a lot of constraints in the usage of available radio spectrum .which is limited and precious resource. Also, it has been found that the allocated spectrum is underutilized due to spectrum static allocation. Moreover the conventional approach to manage spectrum is very inflexible. Present wireless networks are characterized by such a policy, where governmental agencies assign this spectrum on a long term basics to license holders. With most of these sort of allocations it is hard to find vacant bands to either deploy new services or to enhance existing ones. In order to overcome this situation, a new means for improved utilization of the spectrum creating opportunities for dynamic spectrum access is preferred. This issue can be solved using Cognitive Radio (CR) technology. II. COGNITIVE RADIO TECHNOLOGY Cognitive Radios are designed such as through provide highly reliable communication to all users of the network, wherever and whenever needed and to facilitate effective Radio spectrum utilization. Cognitive Radio can change it’s transmitter parameters based on it’s interaction with the environment. CR Networks are envisioned to provide higher bandwidth to mobile users the key enabling technologies of CR Networks are the Cognitive Radio techniques that provide the capability to share the spectrum in an opportunistic manner. CR enables the wide usage of temporally unused spectrum, referred to as spectrum hold or white space. Consequently, it selects the best spectrum which is shared with other users and exploited without interference from the licensed user. CR as the functionality to be programmed to transmit and receive on a wide variety of frequencies. Through this capability, the best spectrum band the most suitable operating parameters can be selected and can reconfigured. Figure 1: White space or Spectrum hole III. ARCHITECTURE: Figure 2: CR Transreceiver Architecture CR requires a novel Radio Frequency (RF) Transreceiver architecture. The main components of CR Transreceiver or the Radio front-end and the Base-band processing unit. The novel characteristic of the CR Transreceiver is the wideband RF front-end that is capable of simultaneous sensing over a wide frequency range. Here, the received signal is amplified, mixed and analog to digital converter. In the base-band processing unit the signal is either modulated or demodulated. A comprehensive description of CR Network architecture is essential for developing communication protocols that address the dynamic spectrum variation. The components of the CR Network architecture can be classified as two group’s namely primary network and CR Network the primary network (or licensed network) is refer to as an existing network. Here, the
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 04 Issue: 01, June 2015 Page No.79-82 ISSN: 2278-2419 80 primary users pertain a license to operate in a specific spectrum band. If primary networks possess an infrastructure, their activities or controlled through primary base stations. The CR Network (dynamic spectrum access network/secondary network/unlicensed network) does not have a license to operate in a desire band. Thus, additional functionality is required these users to share the licensed spectrum band. CR Networks may include spectrum brokers that distribute spectrum resources among secondary networks. Figure 3: CR Network Architecture IV. ADVANTAGES OVER TRADITIONAL NETWORKS Overcome radio spectrum scarcity By sensing spectrum utilization (irrespective of channel allocation), cognitive radios can broadcast on unused radio spectrum, while still avoiding interference with the operation of the primary licensee. Avoid intentional radio jamming scenarios By sensing channel availability and even predicting the jammer’s tactics , cognitive radios can evade jamming by dynamically and preemptively switching to higher quality channels. Switch to power saving protocol By switching to protocols that trade off lower power consumption for lower bandwidth, cognitive radios conserve power when slower data rates suffice. Improve satellite communications By predicting rain fade and reconfiguring transmitters/receivers for optimum bandwidth, cognitive radios improve communication quality when and where the information is needed most. Improves quality of service By sensing environmental and inadvertent man-made radio interferences, cognitive radios can select frequency channels with a higher Signal to Noise Ratio (SNR). V. SPECTRUM MANAGEMENT Figure 4: Process of Spectrum Management The Spectrum Management Process consists of four major steps. They are  Spectrum Sensing  Spectrum Decision-Making  Spectrum Sharing  Spectrum Mobility Spectrum Sensing: A CR User can allocate only an unused portion of the spectrum. Therefore, a CR User should monitor the available spectrum bands, capture their information, and then detect spectrum holes. Spectrum Decision-Making: Based on the spectrum availability, CR Users can allocate a channel. This allocation not only depends upon Spectrum availability, but also based on internal policies. Spectrum Sharing: Because there maybe multiple CR Users trying to access the spectrum, CR Network should be coordinated to prevent collision of multiple users. Spectrum Mobility: CR Users are regarded as visitors to the Spectrum. Hence, if the specific portion of the spectrum is a primary network, communication must be continued in another vacant portion of the Spectrum. VI. SPECTRUM SENSING We can categorize Spectrum Sensing technique into: Frequency Domain Approach, Time Domain Approach Frequency Domain Approach: In this approach, the estimation is carries out directly from the signal. It is also known as Direct Spectrum Sensing technique. Time Domain Approach: The estimation is performed using auto-correlation the signal. It is also known as Indirect Spectrum Sensing technique. Another way of classification is done as follows: Non-Cooperative System: It is based on detection of the weak signal from a primary transmitter through the local observation of CR Users. Three schemes are generally used for transmitter
  • 3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 04 Issue: 01, June 2015 Page No.79-82 ISSN: 2278-2419 81 detection. Matched filter detection, Energy detection, Cyclostationary feature detection Matched filter detection: Matched filter is a linear filter designed to maximize the output signal to noise ratio for the given input signal. Matched filter operation is equivalent to correlation in which the unknown signal is convolved with the filter whose impulse response is the mirror and time shifted version of reference signal. The operation of Matched filter detection is expressed as Where x is the unknown signal (vector) and h is the impulse response of the matched filter. Energy detection: It is a non-coherent detection method that detect the primary signal based on the sensed energy. Due to it’s simplicity and no requirement, it is the most popular sensing technique is con-cooperative sensing. Cyclostationary feature detection: Cyclostationary feature detection is robust to noise uncertainties and performs better than energy detection in low signal to noise ratio regions. Although it requires a prior knowledge of the signal characteristics, cyclostationary feature detection is capable of distinguishing the CR Transmissions from various types of primary user signals. Figure 5: Spectrum Sensing Techniques Cooperative System: Although Cooperative System reduces the probability of interference, the most efficient way to detect spectrum holes is to detect the primary users who are receiving data within the communication range of CR Users. Currently, this method is only feasible in the detection of TV Receivers and various topologies are currently used and are broadly classified into three regions according to their level of cooperation. Decentralized uncoordinated technique, Centralized coordinated technique, Decentralized coordinated technique Decentralized uncoordinated technique: The Cognitive Users in the network do not have any kind of cooperation, which means that each CR user will independently detect the channels. Centralized coordinated technique: In this technique, it cooperated only in sensing the channel. CR Users independently detect the channel and inform the CR Controller, which then notifies all CR Users. Decentralized coordinated technique: This type of coordination implies building up a network of Cognitive Radios without having the need of a controller. Interference Based Detection: Primary Receiver emits the local oscillator and leakage power from it’s RF front-end while receiving the data from Primary Transmitter. Within the communication range of CR system users, the local sensor then reports the sensed information to the CR Users so that they can identify the Spectrum occupancy status. VII.SPECRUM DECISION-MAKING CR Networks require the capacity to decide the best spectrum band among the available bands this notion is called spectrum decision-making. It is closely related to channel characteristics and operations of primary users because available spectrum holes show variations overtime, each spectrum hole is characteristics considering few parameters.  Interference: from the amount of interference at the primary receiver, the permissible power of a CR can be derived.  Path loss: the path loss is closely related to distance and frequency as frequency increases, path loss increases which results in transmission range.  Wireless link errors: Depending on modulating schemes an interference, error rate changes.  Link layer delay: different types of link layer protocols are required at different spectrum bands. After characterization, appropriate bands are selected. To describe the nature of CR Networks, primary user activity is defined, which is the probability of appearance of primary users during CR transmission. It is important to consider how often the primary users appears on the spectrum band. VIII. SPECTRUM SHARING The share nature of wireless channels require the coordination of attempts between CR users. Spectrum sharing can be classified by four aspects namely architecture, spectrum allocation behavior, spectrum access technique, and scope. The first classification based on architecture Centralized spectrum sharing: The spectrum allocation and access procedures are controlled by a central entity. The central entity can lease spectrum two users in a limited geographical region for a specific amount of time. Distributed spectral sharing: Spectrum allocation and access are based on local policies performed by each node distributively. They are also used between different networks. The second classification is based on allocation behavior Cooperative system sharing: Cooperative or collaborative solutions exploit the interference measurement of each node such that the effect of communication of one node on others is considered. Non-cooperative system sharing: Only a single node is considered this selfish or non –collaborative technique results in a certain degree of fairness, as well as improved throughput. The third classification is based on access technology: Overlay spectrum sharing: Nodes access the network using a portion of a spectrum that has not been used by primary users. Underlay spectrum sharing: The spread spectrum techniques are exploited such that the transmission of a CR node is regarded as a noise by primary users. The fourth classification is based on scope: Intranetwork spectrum sharing: Spectrum is allocated between the entities of a CR network.
  • 4. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 04 Issue: 01, June 2015 Page No.79-82 ISSN: 2278-2419 82 Internetwork spectrum sharing: It enables multiple system to be deployed in overlapping locations and spectrum. IX. SPECTRUM MOBILITY After a CR captures the best available spectrum, Primary User activity on the selected spectrum may necessitate that the users change it’s operating spectrum bands, which is referred to as Spectrum Mobility. It gives rise to a new type of handoff in CR Networks, called as Spectrum Handoffs. Each time a CR user changes it’s frequency of operation, a network protocol may require modifications to the operation parameters. The purpose of Spectrum Mobility in CR Networks is to ensure smooth and fast transition leaving through minimum performance degradation during a spectrum handoff. X. CONCLUSION Cognitive Radios are a promising source for usage of underutilized network spectrum. As discussed, we saw how Spectrum Sensing, Spectrum Decision-Making, Spectrum Sharing and Spectrum Mobility manage spectrum in an effective manner. It may be called as an asset to the modern world in the future generations. Since it has an edge over conventional methods in terms on interference, scarcity and quality of service provided, it will create an impact not only in the fields of networks, but also in the minds of network users. References [1] http://web.it.kth.se/~maguire/jmitola/Mitola_Dissertation8 _Integrated.pdf [2] V. Valenta et al., "Survey on spectrum utilization in Europe: Measurements, analyses and observations", Proceedings of the Fifth International Conference on Cognitive Radio Oriented Wireless Networks & Communications (CROWNCOM), 2010 [3] J. Mitola III and G. Q. Maguire, Jr., "Cognitive radio: making software radios more personal," IEEE Personal Communications Magazine, vol. 6, nr. 4, pp. 13–18, Aug. 1999 IEEE 802.22 [4] Carl, Stevenson; G. Chouinard; Zhongding Lei; Wendong Hu; S. Shellhammer; W. Caldwell (January 2009). "IEEE 802.22: The First Cognitive Radio Wireless Regional Area Networks (WRANs) Standard = IEEE Communications Magazine". IEEE Communications Magazine (US: IEEE) 47 (1): 130– 138. doi:10.1109/MCOM.2009.4752688. IEEE 802.15.2 [5] S. Haykin, "Cognitive Radio: Brain-empowered Wireless Communications", IEEE Journal on Selected Areas of Communications, vol. 23, nr. 2, pp. 201–220, Feb. 2005 [6] X. Kang et. al ``Sensing-Based Spectrum Sharing in Cognitive Radio Networks, IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4649-4654, Oct 2009. [7] http://www.eecs.berkeley.edu/wireless/posters/WFW05_c ognitive.pdf [8] http://ieeexplore.ieee.org/iel5/4234/30631/01413630.pdf?t p=&arnumber=1413630&isnumber=30631 [9] Ian F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, "NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey," Computer Networks (Elsevier) Journal, September 2006. [1] [10] Cognitive Functionality in Next Generation Wireless Networks [11] X. Kang et. al ``Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity, IEEE Trans. on Wireless Commun., vol. 8, no. 2, pp. 940-950, Feb 2009. [12] H. Urkowitz Energy detection of unknown deterministic signals, IEEE Proceedings, Apr. 1967. [13] R. Tandra and A. Sahai, SNR walls for signal detection, IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 4 – 17, Feb. 2008. [14] A. Mariani, A. Giorgetti, and M. Chiani, Effects of Noise Power Estimation on Energy Detection for Cognitive Radio Applications, IEEE Trans. Commun., vol. 50, no. 12, Dec., 2011. [15] W. A. Gardner, Exploitation of spectral redundancy in cyclostationary signals, IEEE Sig. Proc. Mag., vol. 8, no. 2, pp. 14 – 36, 1991. [16] H. Sun, A. Nallanathan, C.-X. Wang, and Y.-F. Chen, “Wideband spectrum sensing for cognitive radio networks: a survey,” IEEE Wireless Communications, vol. 20, no. 2, pp. 74–81, April 2013.