Neighbour and network discovery in cognitive radio networks: research activities and results in the ACROPOLIS Network of Excellence
نویسندگان
چکیده
Cognitive radio networks operation relies on the capability to gather information about the surrounding environment, as regards both internal network status (presence and capabilities of other devices belonging to the same network) and external systems potentially coexisting with the cognitive network. In particular, retrieving information at the local level is a function required to all wireless networks, and goes under the name of neighbour discovery. Under this aspect, cognitive networks make no exception. Similarly, cognitive networks share with traditional wireless networks the necessity of a function for retrieving and exchanging information on a network wide scale, referred to in the following as network discovery. The definition of efficient neighbour and network discovery strategies for cognitive networks, taking into account their specific characteristics, is one of the goals of the research activities undergoing within the framework of the ACROPOLIS NoE. In this work, neighbour and network discovery solutions currently under investigation within the ACROPOLIS joint research activities are presented, and future research lines are identified. The paper first presents algorithms and results on neighbour discovery and Medium Access Control, and moves then to network wide protocols by presenting the work carried out in ACROPOLIS on routing for underlay cognitive networks. The paper provides then an overview on the common simulation platform developed within ACROPOLIS to investigate neighbour and network discovery, and finally discusses future research directions on such topics.
منابع مشابه
Designing an Ontology for Knowledge Discovery in Iran’s Vaccine
Ontology is a requirement engineering product and the key to knowledge discovery. It includes the terminology to describe a set of facts, assumptions, and relations with which the detailed meanings of vocabularies among communities can be determined. This is a qualitative content analysis research. This study has made use of ontology for the first time to discover the knowledge of vaccine in Ir...
متن کاملCluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملConstruction and Analysis of Tissue-Specific Protein-Protein Interaction Networks in Humans
We have studied the changes in protein-protein interaction network of 38 different tissues of the human body. 123 gene expression samples from these tissues were used to construct human protein-protein interaction network. This network is then pruned using the gene expression samples of each tissue to construct different protein-protein interaction networks corresponding to different studied ti...
متن کاملDTMP: Energy Consumption Reduction in Body Area Networks Using a Dynamic Traffic Management Protocol
Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite new branches in the world of telemedicine. Small wireless sensors, to be quite precise and calc...
متن کاملAttack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
متن کامل