Simulation Design and Performance Analysis for VoIP in Cognitive Radio Networks

نویسندگان

  • Tamal Chakraborty
  • Iti Saha Misra
  • Salil Kumar Sanyal
چکیده

Increasing popularity of VoIP systems has witnessed applications in emerging technologies like Cognitive Radio Networks (CRN). The stringent QoS requirements in VoIP coupled with complexities in CRN have initiated intensive research in the field of performance analysis and optimizations guided by simulation results. However, in the absence of any standard model of VoIP over CRN, accuracy and credibility of the simulation output are strongly dependent on proper design of the simulation model that must have a strong mathematical foundation. The objective of this paper is to build standard models for VoIP in CRN and successfully implement VoIP applications over CRN domain, which will serve as initial point for development with respect to all future simulation studies in VoIP over CRN category. Initially, models of VoIP in CRN are developed using OPNET Modeler 16. 0. A following distributed architecture in single-channel and multi-channel scenarios and further in Visual C++ adhering to the principles of centralized architecture. The models are validated by comparison of simulation results obtained in both platforms. The underlying mathematical model behind the design is established and the critical factors pertaining to both VoIP and CRN domain are extensively analyzed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proactive QoS Enhancement Technique for Efficient VoIP Performance over Wireless LAN and Cognitive Radio Network

——VoIP over Wireless LANs is greatly affected by path-loss, RF interference and other sources of signal attenuation in addition to network congestion. The primary factors involved in effective real-time communication, namely delay and loss, must be within certain controlled limits in such a scenario. Wireless LAN Access Points must, therefore, act in tune with the codecs to ensure high quality ...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

QoS Enhancement Techniques for Efficient VoIP Performance in Cognitive Radio Network

VoIP service demands strong QoS support for enhanced call quality and increased user satisfaction. Deploying VoIP in opportunistic communication models like cognitive radio requires thorough analysis of the factors involved in design and implementation. The objective of this paper is to implement VoIP successfully over a cognitive radio network and maintain the call quality at an acceptable lim...

متن کامل

Spectrum Assignment in Cognitive Radio Networks Using Fuzzy Logic Empowered Ants

The prevalent communications networks suffer from lack of spectrum and spectrum inefficiency. This has motivated researchers to develop cognitive radio (CR) as a smart and dynamic radio access promised solution. A major challenge to this new technology is how to make fair assignment of available spectrum to unlicensed users, particularly for smart grids communication. This paper introduces an i...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013