scholarly journals A research survey on scheduling techniques in lte-based network and its state of art

Author(s):  
Srinivasa R K ◽  
Hemantha Kumar A.R2

Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed users communication in the licensed frequency band. In response to the behavior of licensed users communication, unlicensed users communication need to change from one frequency band to another band. In this communication paradigm, the performance of unlicensed users transmission control protocol gets degraded due to the features of cognitive radio network. To overcome this, several authors suggested quite a few modifications in the existing wireless transport protocol for cognitive radio network environment. This paper gives an overview of different transport protocols used for unlicensed users’ communication in cognitive radio networks.

Author(s):  
G Shine Let ◽  
G Josemin Bala ◽  
W. Magdalene

Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed users communication in the licensed frequency band. In response to the behavior of licensed users communication, unlicensed users communication need to change from one frequency band to another band. In this communication paradigm, the performance of unlicensed users transmission control protocol gets degraded due to the features of cognitive radio network. To overcome this, several authors suggested quite a few modifications in the existing wireless transport protocol for cognitive radio network environment. This paper gives an overview of different transport protocols used for unlicensed users’ communication in cognitive radio networks


2020 ◽  
Vol 3 (3) ◽  
pp. 106-112
Author(s):  
G Shine Let ◽  
G Josemin Bala ◽  
W. Magdalene

Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed users communication in the licensed frequency band. In response to the behavior of licensed users communication, unlicensed users communication need to change from one frequency band to another band. In this communication paradigm, the performance of unlicensed users transmission control protocol gets degraded due to the features of cognitive radio network. To overcome this, several authors suggested quite a few modifications in the existing wireless transport protocol for cognitive radio network environment. This paper gives an overview of different transport protocols used for unlicensed users’ communication in cognitive radio networks.


2019 ◽  
Vol 10 (1) ◽  
pp. 1-18
Author(s):  
Prince Semba Yawada ◽  
Mesmin J. Mbyamm Kiki ◽  
Mai Trung Dong

The effective design of a cognitive radio network must take into account economic and technical aspects. This article presents a commercial formulation of the spectrum by the primary operators who decide to sell a part of their spectrum to a group of cognitive users in order to earn money and to promote the efficient use of the spectrum. Three systems of spectrum pricing are compared and suggested, such as the cooperative price based on the optimization of the profits, the market equilibrium, and the competitive prices focused on the competition of Bertrand. The Bertrand model examines the influences of certain parameters of the system such as the quality of the channel based on the Nash equilibrium and the substitutability of the spectrum. The differences in the various aspects of these systems of pricing are presented through the graphs. The authors note through the obtained result that the profit of the primary operator depends not only on the demand quantity of the spectrum but also on the behavior of the primary operators.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Ahmed Salah ◽  
Heba M. Abdel-Atty ◽  
Rawya Y. Rizk

Emerging cognitive radio networking technology potentially provides a promising solution to the spectrum underutilization problem in wireless access. In this paper, a cross-layer routing for secondary multihop is studied in cognitive radio network operating in television white spaces. The framework considers a joint channel, power, and routing assignment under signal to interference noise ratio (SINR) constraints. The problem is formulated as a maximum concurrent multicommodity flow problem. The goal of conducting this research is to develop a new routing protocol for the secondary multihop cognitive radio network. Therefore, the objective of this paper focuses on maximizing a flow rate scaling factor. Moreover, the paper focuses on achieving multipath routing when it is possible under SINR constraints to utilize all possible unused channels efficiently. The numerical results proved the strength of the proposed algorithm in its routing ability under the physical model of SINR, in addition to the ability of using multipath routing if there are available free channels to be used in the cognitive communication paradigm.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


2021 ◽  
Author(s):  
Nikhil Marriwala ◽  
Himanshu Punj ◽  
Sunita Panda ◽  
Inderjeet Kaur ◽  
Deepak Rathore

Abstract This is the era of Intelligent cognitive radio network technology that provides the available spectrum with efficient utilization. Cognitive Radio technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the cognitive radio network and countermeasures in CRN security strategies. Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. In cognitive radio networks, several security threats affect the process of cognitive radio. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion centres thus preventing honest users from utilizing the spectrum. Hence, security is a very important issue in cognitive radio networks that needs to be addressed for proper utilization of available spectrum by the users. Cognitive radio technology must promise secure spectrum dynamic access to users. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. Cognitive radio technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The multiple nodes scenario is a good perspective. Software-defined radio is an essential component of cognitive radio Here, secondary users can access the spectrum to primary users whenever their vacant spectrum is available. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of cognitive radio technology. The defence mechanism based on public-key cryptography is proposed in which PU is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Thanh-Tung Nguyen ◽  
Insoo Koo

In cognitive radio networks, secondary users may not sense licensed channels efficiently due to problems of fading channel, shadowing, unfamiliar environment, and so forth. To cope with the limitation, a pervasive sensor network can cooperate with cognitive radio network, which is called sensor-aided cognitive radio network. In the paper, we investigate sensor clustering and sensing time of each sensor cluster with aiming at achieving optimal throughput of sensor-aided cognitive radio network supporting multiple licensed channels. Moreover, the minimum throughput requirement of cognitive radio user is also guaranteed in the sensor clustering problem. To do this, we formulate the throughput maximization problem as a mixed-integer nonlinear programming and utilize the Branch and Bound algorithm to solve it. We also propose an heuristic algorithm which can provide similar performance to that of the Branch and Bound algorithm while reducing computation complexity significantly.


Author(s):  
Jyoti Sekhar Banerjee ◽  
Arpita Chakraborty ◽  
Koushik Karmakar

Today’s wireless networks are characterized by fixed spectrum assignment policy. The spectral scarcity and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum, opportunistically. Cognitive Radio (CR) is that very paradigm for wireless communication, in which either a network or a wireless node reconfigures its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. CR adapts itself to the newer environment on the basis of its intelligent sensing and captures the best available spectrum to meet user communication requirements. When the radio link features are extended to the network layer, the cognitive radios form the cognitive radio network. This book chapter is focused on cognitive radio network, architecture of the CR, and its relevance in the wireless and mobile Ad Hoc networks.


2010 ◽  
Vol 171-172 ◽  
pp. 211-214
Author(s):  
Gui Sen Xu ◽  
Xue Zhi Tan

Cluster-based topology is an energy-efficient topology control method in cognitive radio networks. The cluster head node depletes energy faster than cluster member node and the rotation of cluster head node is needed to balance the energy consumption for the whole network. Aimed at the problem of unbalanced residual energy of each node caused by cluster heads and cluster members in wireless cognitive radio network, a novel algorithm named cluster head rotating threshold (CHRT) is presented. In the proposed algorithm, rotation energy threshold is estimated using cluster head real-time energy load. The simulation results show that comparing with LEACH and EDAC, CHRT can realize the more network lifetime than the others.


Radiotekhnika ◽  
2021 ◽  
pp. 73-79
Author(s):  
Yu.Yu. Kolyadenko ◽  
О.V. Kolyadenko ◽  
B.P. Mulyar

The concept of cognitive radio can be described as a radio with the study of capabilities, i.e. as a radio that is able to gain knowledge about the radio environment and adjust its operating parameters and protocols accordingly. The task of minimizing the frequency band is relevant at the stage of the cognitive radio network functioning when distributing the frequency resource between subscriber stations. With the ever-growing demand for frequency bands, this challenge is driven by the need to improve the efficient use of the radio frequency spectrum through frequency reuse methods. This paper proposes a method for ensuring the reuse of frequencies based on obtaining estimates of mutual distances between subscriber stations in real time. An algorithm is proposed for solving the problem of frequency resource allocation optimization for a cognitive radio network with frequency reuse. The algorithm is based on the method of local optimization, one of the approximate methods of discrete programming. In this case, the condition of local optimality is that the operating frequency assigned to the next subscriber station must be the closest to the frequency assigned in the previous step. The efficiency of the frequency resource optimization algorithm for the LTE network was analyzed using simulation modeling. The dependences of the bandwidth on the number of subscriber stations served are obtained. The analysis showed that the use of this algorithm allows to reduce the frequency band by 2 -3 times. The analysis also showed that the efficiency of the algorithm increases with the growth of the number of subscriber stations served simultaneously.


Sign in / Sign up

Export Citation Format

Share Document