Model-Based Opportunistic Channel Access in Cognitive Radio Enabled Dynamic Spectrum Access Networks

نویسندگان

  • Manuj Sharma
  • Anirudha Sahoo
  • K. D. Nayak
چکیده

We propose a model-based channel access mechanism for cognitive radio-enabled secondary network, which opportunistically uses the channel of an unslotted primary network when the channel is sensed idle. We refer to primary network as the network which carry the main traffic in a designated spectrum band. We have considered IEEE 802.11 WLAN as a de facto primary network operating in ISM band. Our study focuses on a single WLAN channel that is used by WLAN clients and a WLAN server for a mix of Email, FTP, and HTTP-based web browsing applications. We model the occupancy of the channel by primary WLAN nodes as an alternating renewal process. When the secondary sender node has one or more frames to send, this model is used by the the sender and receiver pair to estimate residual idle time duration after the channel is sensed as idle. The secondary sender then opportunistically transmits frames in that duration without significantly degrading performance of the primary WLAN applications. Our simulation results show that the performance of secondary network is sensitive to the channel sensing duration and that high secondary throughput can be achieved without affecting the primary network significantly by choosing appropriate value of channel sensing duration.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants

The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...

متن کامل

Entropy-Based Opportunistic Spectrum Access Algorithm in Cognitive Radio Networks

In this paper, we propose an opportunistic channel access scheme based on weighted residual entropy function in cognitive radio networks. This central decision scheme significantly improves spectrum utilization compared with random and first opportunistic spectrum access schemes. Particularly, in this mechanism, appropriate spectrum opportunity will be selected based on the usefulness of idle c...

متن کامل

Technical Report: An Optimal Energy-Delay Tradeoff for Opportunistic Spectrum Access in Cognitive Radio Networks

Cognitive radio (CR) technology has been considered promising to enhance spectrum efficiency via opportunistic transmission at link level. Several existing works focus on either spectrum sensing or dynamic spectrum sharing. But CR protocols allow in general a secondary user to transmit only when a licensed channel is not occupied by primary user. However waiting for idle timeslot may include la...

متن کامل

Quality-of-service-aware weighted-fair medium access control protocol for coexisting cognitive radio networks

Opportunistic usage selection of a licensed channel by a secondary user (SU) and its contention for data transmission is a challenging problem in coexisting cognitive radio network (CCRN). This is caused by the presence of many SUs from different CRNs in a shared environment, and the problem is further intensified when the user applications, with heterogeneous quality-of-service (QoS) requireme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009