Spectrum-aware shared protection (SASP) algorithm for cognitive radio networks

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cognitive radio (CR) has become a key technology for addressing spectrum scarcity. In CR networks, spectrum access should not interfere the incumbent networks. Due to the requirement above, common control channel approaches, which are widely used in traditional multichannel environments, may face serious CR long-time blocking problem and control channel saturation problem. Although channel-hopping-based approaches can avoid these two problems, existing works still have significant drawbacks including long time-to-rendezvous, unbalance channel loading, and low channel utilization. This paper tends to the issue of range mindful survivable methodologies with disappointment likelihood limitations under static activity in adaptable transfer speed optical systems. The joint disappointment likelihood amongst essential and reinforcement ways must be beneath the most extreme fair joint disappointment likelihood for each activity request. It creates whole number direct program (ILP) models for committed way security and shared-way assurance with a specific end goal to limit the aggregate number of recurrence spaces expended, and furthermore propose a range mindful devoted insurance (SADP) calculation and a range mindful shared security (SASP) calculation. This demonstrates the ILP show arrangements devour least number of recurrence spaces, however prompt higher normal joint disappointment likelihood contrasted with the SADP and SASP calculations. In addition, both the SADP and SASP calculations accomplish a superior execution as far as aggregate number of recurrence openings expended when contrasted with a customary devoted way insurance calculation and an ordinary shared-way assurance calculation, separately, however prompt higher normal joint disappointment likelihood.

  • Keywords

    Cognitive Radio; Spectrum-Aware Dedicated Protection (SADP); Frequency Slots and Shared-Path Protection Algorithm.

  • References

      [1] I.F. Akyildiz, W.-Y. Lee, M.C. Vuran, and S. Mohanty, “Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey,” Computer Networks J., vol. 50, no. 13, pp. 2127-2159, 2006. https://doi.org/10.1016/j.comnet.2006.05.001.

      [2] P. Bahl, R. Chandra, and J. Dunagan, “SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad Hoc Wireless Networks,” Proc. ACM MobiCom, pp. 216-230, 2004. https://doi.org/10.1145/1023720.1023742.

      [3] K. Bian and J.-M Park, “Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks,” IEEE Trans. Mobile Computing, vol. 12, no. 7, pp. 1294-1307, July 2013. https://doi.org/10.1109/TMC.2012.103.

      [4] H. Kim and K.G. Shin, “Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks,” IEEE Trans. Mobile Computing, vol. 7, no. 5, pp. 533-545, May 2008. https://doi.org/10.1109/TMC.2007.70751.

      [5] Christo Ananth, Dr.S. Selvakani, K. Vasumathi, “An Efficient Privacy Preservation in Vehicular Communications Using EC-Based Chameleon Hashing”, Journal of Advanced Research in Dynamical and Control Systems, 15-Special Issue, December 2017,pp: 787-792..

      [6] B.F. Lo, I.F. Akyildiz, and A.M. Al-Dhelaan, “Efficient Recovery Control Channel Design in Cognitive Radio Ad Hoc Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 9, pp. 4513-4526, Nov.2010. https://doi.org/10.1109/TVT.2010.2073725.

      [7] H.A.B. Salameh, M.M. Krunz, and O. Younis, “MAC Protocol for Opportunistic Cognitive Radio Networks with Soft Guarantees,” IEEE Trans. Mobile Computing, vol. 8, no. 10, pp. 1339-1352, Oct.2009. https://doi.org/10.1109/TMC.2009.19.

      [8] Y. Shi, Y.T. Hou, H. Zhou, and S.F. Midkiff, “Distributed Cross-Layer Optimization for Cognitive Radio Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4058-4069, Oct. 2010. https://doi.org/10.1109/TVT.2010.2058875.

      [9] J. Tang, R. Hincapie, G. Xue, W. Zhang, and R. Bustamante, “Fair Bandwidth Allocation in Wireless Mesh Networks with Cognitive Radios,” IEEE Trans. Vehicular Technology, vol. 59, no. 3, pp. 1487-1496, Mar. 2010 https://doi.org/10.1109/TVT.2009.2038478.

      [10] N.C. Theis, R.W. Thomas, and L.A. DaSilva, “Rendezvous for Cognitive Radios,” IEEE Trans. Mobile Computing, vol. 10, no. 2, pp. 216-227, Feb. 2010. https://doi.org/10.1109/TMC.2010.60.




Article ID: 10002
DOI: 10.14419/ijet.v7i1.9.10002

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.