SlideShare uma empresa Scribd logo
1 de 11
Effects of Location Awareness on Concurrent Transmissions for
Cognitive Ad Hoc Networks Overlaying Infrastructure-Based
Systems

(Synopsis)

8
ABSTRACT

Through wideband spectrum sensing, cognitive radio (CR) can identify
the opportunity of reusing the frequency spectrum of other wireless
systems. To save time and energy of wideband spectrum, we
investigate to what extent a CR system incorporating the location
awareness capability can establish a scanning-free region where a
peer-to-peer ad hoc network can overlay on an infrastructure-based
network. Based on the carrier sense multiple access with collision
avoidance (CSMA/CA) medium access control (MAC) protocol, the
concurrent transmission probability of a peer-to-peer connection and
an infrastructure-based connection is computed. It is shown that the
frequency band of the legacy system can be reused up to 45 percent
by the overlaying cognitive ad hoc network when CR users have the
location information of the primary and secondary users.

8
OBJECTIVE OF THE PROJECT
EXISTING SYSTEM

The existing things are consider the coexistence issue of the hybrid
infrastructure-based and overlaying ad hoc networks has been
addressed but in different scenarios. The idea of combining ad hoc link
and infrastructure based link was proposed mainly to extend the
coverage area of the infrastructure-based network. That is, the
coverage area of ad hoc networks is not overlapped with that of the
infrastructure-based

network.

In

the

present

hybrid

ad

hoc/infrastructure-based network, which maintain the peer-to-peer
cognitive radio (CR) users are located within the coverage area of the
existing legacy wireless network. In this, to further improve the
throughput of a wireless local area network (WLAN), it was suggested
that an access point (AP) could dynamically switch between the
infrastructure mode and the ad hoc mode.

8
PROPOSED SYSTEM

In this project, we are trying to provide the basic idea of utilizing
location awareness to facilitate frequency sharing in a concurrent
transmission manner. Specific achievements are summarized in the
following:
•

We are going to show that a CR device having location
information of other nodes can concurrently transmit a peer-topeer data in the presence of an infrastructure based connection
in some region. We also dimension the concurrent transmission
(or the scanning-free) region for CR users. Nevertheless, the
wideband spectrum sensing procedure is still needed but is
initiated only when the CR user is outside the concurrent
transmission region. Therefore, the energy consumption of CR
systems with location awareness capability can be reduced
significantly.

•

Based on the CSMA/CA MAC protocol, a physical/MAC cross-layer
analytical model is developed to compute the coexistence
probability of a peer-to-peer connection and an infrastructurebased connection. Based on this analytical model, we find that
concurrent transmission of the secondary CR users and the
primary users in the legacy system can significantly enhance the
total throughput over the pure legacy system.

8
INTRODUCTION
FEASIBILITY STUDY

All projects are feasible given unlimited resources and infinite
time. But the development of software is plagued by the scarcity of
resources and difficult delivery rates. It is both necessary and prudent
to evaluate the feasibility of a project at the earliest possible time.
Three key considerations are involved in the feasibility analysis.
Economic Feasibility:
This procedure is to determine the benefits and savings that are
expected from a candidate system and compare them with costs. If
benefits outweigh costs, then the decision is made to design and
implement the system.

Otherwise, further justification or alterations

in proposed system will have to be made if it is to have a chance of
being approved. This is an ongoing effort that improves in accuracy at
each phase of the system life cycle.
Technical Feasibility:
Technical feasibility centers on the existing computer system
(hardware, software, etc.,) and to what extent it can support the
proposed addition. If the budget is a serious constraint, then the
project is judged not feasible.
Operational Feasibility:
People are inherently resistant to change, and computers have been
known to facilitate change. It is understandable that the introduction

8
of a candidate system requires special effort to educate, sell, and train
the staff on new ways of conducting business.

ALGORITHM & EXPLANATION

The above figure is an illustrative example for the coexistence of two CR devices establishing a peer-topeer ad hoc link and a primary user connecting to the infrastructure-based network, where all the devices
(MS1, MS2, and MS3) use the same spectrum simultaneously.

The above figure illustrates a hybrid ad hoc/infrastructure-based
network consisting of two CR devices (MS1 and MS2) and a primary
user MS3. Assume that the secondary CR users MS1 and MS2 try to
make a peer-to-peer connection, and the n primary user MS3 has been
connected to the base station (BS) or AP of the legacy infrastructurebased system. In the figure, MS1, MS2, and MS3 are located at (r1,
θ1), (r2, θ2), and (r3, θ3), respectively; the coverage area of the BS
is πr2. All the primary and secondary users stay fixed or hardly move.
We assume that the CR devices can perform the positioning technique
to acquire their relative or absolute position by using GPS or detecting

8
the signal strength from the BSs of legacy systems. The location
information is broadcasted by using the geographical routing protocols.
Although both the positioning and geographical routing may waste
time and consume energy, they have no need to be processed for
every data transmission. They are only performed when a new node
joins or the node changes its position. Furthermore, with the help of
upper layers, the location information is already stored in the device.
Therefore, compared to the spectrum sensing at every transmission,
we believe that the additional energy consumption and memory space
due to the positioning and location update is relatively small.
Based on the CSMA/CA MAC protocol, multiple users contend the
channel, and only one mobile station within the coverage of the BS can
establish an infrastructure-based communication link at any instant. To
set up an extra peer to peer ad hoc connection in the same frequency
band of the primary user, the secondary users not only require
ensuring that the current infrastructure-based link quality cannot be
degraded but also has to win the contentions between other feasible
secondary users. Here, we consider that both primary and secondary
users have identical transmit power. It is reasonable to assume that
only one secondary user can establish a link after the contention at
one instance due to the similar interference range. Denote SIRi and
SIRa as the received signal-to-interference ratios (SIRs) of the
infrastructure-based and ad hoc links, respectively.
Then, we can define the coexistence (or concurrent transmission)
probability (PCT) of the infrastructure-based link and CR-based ad hoc
link in an overlapped area as follows:

8
Where zi and za are the required SIR thresholds for the infrastructurebased and ad hoc links, respectively. To obtain the concurrent
transmission region, it is crucial to calculate the coexistence probability
of both the infrastructure and ad hoc links. If the link quality of the
primary user cannot be guaranteed, CR devices have to sense and
change to other frequency bands.
We consider the two-ray ground reflection model in which there exist
two paths between the transmitter and receiver. One is the line-ofsight, and the other is reflected from ground. Thus, the received power
can be written as

Where Pr and Pt are the received and transmitted power levels at a
mobile station, respectively; hbs and hms represent the antenna heights
of the BS and the mobile station, respectively; Gbs and Gms stand for
the antenna gains of the BS and the mobile station, respectively; r is
the distance between the transmitter and receiver; α is the path loss
exponent; and 10ξ/10 is the logs normally distributed shadowing
component.

In our project, we are going to create an environment as a base
station, some cognitive radios and some users. We are going to place
some video frames in the base station for simulating the concept
overlaying. Whenever, the user wants to retrieve a file with the carrier
frequency through cognitive radios. For each GUI window as consider
as a system. Also we will monitor the status of every cognitive radio.
Software Requirements:

8
# OPERATING SYSTEM

:

Windows XP

# TECHNOLOGY

:

J2SDK1.4.1

And

above

Hardware Requirements:

# PROCESSOR

:

Pentium III

# CLOCK SPEED

:

550 MHz

# HARD DISK

:

20GB

# RAM

:

128MB

# CACHE MEMORY
# OPERAING SYSEM

:
:

512KB
Windows

2000

Professional
# MONITOR

:

Color Monitor

# KEYBOARD

:

104Keys

# MOUSE

:

3Buttons

MODULE DESCRIPTION

8
 Base Station:

Cognitive device must be able to detect

very reliably whether it is far enough away from a primary
base station and/or whether this primary base station is
silent at a given point in time. For an individual detector
this is very difficult due to different radio propagation
paths and it may need to sense primary user signals
buried deep under the noise floor.
 Cognitive Radio:

A cognitive radio transceiver is able to

adapt to the dynamic radio environment and the network
parameters to maximize the utilization of the limited radio
resources while providing flexibility in wireless access. In
this project, we show that a CR device having location
information of other nodes can concurrently transmit a
peer-to-peer data in the presence of an infrastructure
based connection in some region. We also dimension the
concurrent transmission (or the scanning-free) region for
CR users. Note that a concurrent transmission region of a
CR system is equivalent to a scanning-free region. A
Cognitive Radio is a radio that can change its transmitter
parameters based on interaction with the environment in
which it operates.
 Users: The identity of the users of radios who wish to join
a network needs to be assured. In the CSMA/CA MAC
protocol, multiple users contend the channel, and only one
mobile station within the coverage of the BS can establish
an infrastructure-based communication link at any instant.
To set up an extra peer-to-peer ad hoc connection in the

8
same frequency band of the primary user, the secondary
users

not

only

require

ensuring

that

the

current

infrastructure-based link quality cannot be degraded but
also has to win the contentions between other feasible
secondary users. Here, we consider that both primary and
secondary users have identical transmit power. It is
reasonable to assume that only one secondary user can
establish a link after the contention at one instance due to
the similar interference range.

 Multimedia frames: Wireless multimedia applications
require significant bandwidth and often have to satisfy
relatively tight delay constraints. Radio spectrum is a
scarce resource. Limited available bandwidth is considered
one of the major bottlenecks for high-quality multimedia
wireless services. A reason for this is the fact that a major
portion of the spectrum has already been allocated. On the
other hand, actual measurements taken on the 0–6 GHz
band and other spectrum occupancy measurements on
licensed bands, such as TV bands, show the significant
under utilization of the spectrum. Since Cognitive Radio
can operate in different frequency bands which provides
multimedia services.

8

Mais conteúdo relacionado

Mais procurados

M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Stationidescitation
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...Eswar Publications
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstractMukundhan Elumalai
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocolchirag bhatt
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsVijay Karan
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 

Mais procurados (20)

M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
J1102026164
J1102026164J1102026164
J1102026164
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 

Destaque

One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)Mumbai Academisc
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)Mumbai Academisc
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Mumbai Academisc
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Mumbai Academisc
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mumbai Academisc
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Mumbai Academisc
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Mumbai Academisc
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Mumbai Academisc
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Mumbai Academisc
 
A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)Mumbai Academisc
 
Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Mumbai Academisc
 
Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Mumbai Academisc
 

Destaque (18)

One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
 
Web based development
Web based developmentWeb based development
Web based development
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
Engineering
EngineeringEngineering
Engineering
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)
 
A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)
 
Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)
 
Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)
 

Semelhante a Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlayin(synopsis)

Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsVijay Karan
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio NetworkIJSRED
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsMalik Saad
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
Performance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control ProtocolsPerformance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control Protocolsijtsrd
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksIJSRED
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...tsysglobalsolutions
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingeSAT Publishing House
 

Semelhante a Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlayin(synopsis) (20)

Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio Network
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM Configurations
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
Performance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control ProtocolsPerformance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control Protocols
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
 

Mais de Mumbai Academisc

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list Mumbai Academisc
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list Mumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsMumbai Academisc
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Mumbai Academisc
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Mumbai Academisc
 

Mais de Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Jsp
JspJsp
Jsp
 
Project list
Project listProject list
Project list
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlayin(synopsis)

  • 1. Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems (Synopsis) 8
  • 2. ABSTRACT Through wideband spectrum sensing, cognitive radio (CR) can identify the opportunity of reusing the frequency spectrum of other wireless systems. To save time and energy of wideband spectrum, we investigate to what extent a CR system incorporating the location awareness capability can establish a scanning-free region where a peer-to-peer ad hoc network can overlay on an infrastructure-based network. Based on the carrier sense multiple access with collision avoidance (CSMA/CA) medium access control (MAC) protocol, the concurrent transmission probability of a peer-to-peer connection and an infrastructure-based connection is computed. It is shown that the frequency band of the legacy system can be reused up to 45 percent by the overlaying cognitive ad hoc network when CR users have the location information of the primary and secondary users. 8
  • 3. OBJECTIVE OF THE PROJECT EXISTING SYSTEM The existing things are consider the coexistence issue of the hybrid infrastructure-based and overlaying ad hoc networks has been addressed but in different scenarios. The idea of combining ad hoc link and infrastructure based link was proposed mainly to extend the coverage area of the infrastructure-based network. That is, the coverage area of ad hoc networks is not overlapped with that of the infrastructure-based network. In the present hybrid ad hoc/infrastructure-based network, which maintain the peer-to-peer cognitive radio (CR) users are located within the coverage area of the existing legacy wireless network. In this, to further improve the throughput of a wireless local area network (WLAN), it was suggested that an access point (AP) could dynamically switch between the infrastructure mode and the ad hoc mode. 8
  • 4. PROPOSED SYSTEM In this project, we are trying to provide the basic idea of utilizing location awareness to facilitate frequency sharing in a concurrent transmission manner. Specific achievements are summarized in the following: • We are going to show that a CR device having location information of other nodes can concurrently transmit a peer-topeer data in the presence of an infrastructure based connection in some region. We also dimension the concurrent transmission (or the scanning-free) region for CR users. Nevertheless, the wideband spectrum sensing procedure is still needed but is initiated only when the CR user is outside the concurrent transmission region. Therefore, the energy consumption of CR systems with location awareness capability can be reduced significantly. • Based on the CSMA/CA MAC protocol, a physical/MAC cross-layer analytical model is developed to compute the coexistence probability of a peer-to-peer connection and an infrastructurebased connection. Based on this analytical model, we find that concurrent transmission of the secondary CR users and the primary users in the legacy system can significantly enhance the total throughput over the pure legacy system. 8
  • 5. INTRODUCTION FEASIBILITY STUDY All projects are feasible given unlimited resources and infinite time. But the development of software is plagued by the scarcity of resources and difficult delivery rates. It is both necessary and prudent to evaluate the feasibility of a project at the earliest possible time. Three key considerations are involved in the feasibility analysis. Economic Feasibility: This procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. Otherwise, further justification or alterations in proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. Technical Feasibility: Technical feasibility centers on the existing computer system (hardware, software, etc.,) and to what extent it can support the proposed addition. If the budget is a serious constraint, then the project is judged not feasible. Operational Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. It is understandable that the introduction 8
  • 6. of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. ALGORITHM & EXPLANATION The above figure is an illustrative example for the coexistence of two CR devices establishing a peer-topeer ad hoc link and a primary user connecting to the infrastructure-based network, where all the devices (MS1, MS2, and MS3) use the same spectrum simultaneously. The above figure illustrates a hybrid ad hoc/infrastructure-based network consisting of two CR devices (MS1 and MS2) and a primary user MS3. Assume that the secondary CR users MS1 and MS2 try to make a peer-to-peer connection, and the n primary user MS3 has been connected to the base station (BS) or AP of the legacy infrastructurebased system. In the figure, MS1, MS2, and MS3 are located at (r1, θ1), (r2, θ2), and (r3, θ3), respectively; the coverage area of the BS is πr2. All the primary and secondary users stay fixed or hardly move. We assume that the CR devices can perform the positioning technique to acquire their relative or absolute position by using GPS or detecting 8
  • 7. the signal strength from the BSs of legacy systems. The location information is broadcasted by using the geographical routing protocols. Although both the positioning and geographical routing may waste time and consume energy, they have no need to be processed for every data transmission. They are only performed when a new node joins or the node changes its position. Furthermore, with the help of upper layers, the location information is already stored in the device. Therefore, compared to the spectrum sensing at every transmission, we believe that the additional energy consumption and memory space due to the positioning and location update is relatively small. Based on the CSMA/CA MAC protocol, multiple users contend the channel, and only one mobile station within the coverage of the BS can establish an infrastructure-based communication link at any instant. To set up an extra peer to peer ad hoc connection in the same frequency band of the primary user, the secondary users not only require ensuring that the current infrastructure-based link quality cannot be degraded but also has to win the contentions between other feasible secondary users. Here, we consider that both primary and secondary users have identical transmit power. It is reasonable to assume that only one secondary user can establish a link after the contention at one instance due to the similar interference range. Denote SIRi and SIRa as the received signal-to-interference ratios (SIRs) of the infrastructure-based and ad hoc links, respectively. Then, we can define the coexistence (or concurrent transmission) probability (PCT) of the infrastructure-based link and CR-based ad hoc link in an overlapped area as follows: 8
  • 8. Where zi and za are the required SIR thresholds for the infrastructurebased and ad hoc links, respectively. To obtain the concurrent transmission region, it is crucial to calculate the coexistence probability of both the infrastructure and ad hoc links. If the link quality of the primary user cannot be guaranteed, CR devices have to sense and change to other frequency bands. We consider the two-ray ground reflection model in which there exist two paths between the transmitter and receiver. One is the line-ofsight, and the other is reflected from ground. Thus, the received power can be written as Where Pr and Pt are the received and transmitted power levels at a mobile station, respectively; hbs and hms represent the antenna heights of the BS and the mobile station, respectively; Gbs and Gms stand for the antenna gains of the BS and the mobile station, respectively; r is the distance between the transmitter and receiver; α is the path loss exponent; and 10ξ/10 is the logs normally distributed shadowing component. In our project, we are going to create an environment as a base station, some cognitive radios and some users. We are going to place some video frames in the base station for simulating the concept overlaying. Whenever, the user wants to retrieve a file with the carrier frequency through cognitive radios. For each GUI window as consider as a system. Also we will monitor the status of every cognitive radio. Software Requirements: 8
  • 9. # OPERATING SYSTEM : Windows XP # TECHNOLOGY : J2SDK1.4.1 And above Hardware Requirements: # PROCESSOR : Pentium III # CLOCK SPEED : 550 MHz # HARD DISK : 20GB # RAM : 128MB # CACHE MEMORY # OPERAING SYSEM : : 512KB Windows 2000 Professional # MONITOR : Color Monitor # KEYBOARD : 104Keys # MOUSE : 3Buttons MODULE DESCRIPTION 8
  • 10.  Base Station: Cognitive device must be able to detect very reliably whether it is far enough away from a primary base station and/or whether this primary base station is silent at a given point in time. For an individual detector this is very difficult due to different radio propagation paths and it may need to sense primary user signals buried deep under the noise floor.  Cognitive Radio: A cognitive radio transceiver is able to adapt to the dynamic radio environment and the network parameters to maximize the utilization of the limited radio resources while providing flexibility in wireless access. In this project, we show that a CR device having location information of other nodes can concurrently transmit a peer-to-peer data in the presence of an infrastructure based connection in some region. We also dimension the concurrent transmission (or the scanning-free) region for CR users. Note that a concurrent transmission region of a CR system is equivalent to a scanning-free region. A Cognitive Radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates.  Users: The identity of the users of radios who wish to join a network needs to be assured. In the CSMA/CA MAC protocol, multiple users contend the channel, and only one mobile station within the coverage of the BS can establish an infrastructure-based communication link at any instant. To set up an extra peer-to-peer ad hoc connection in the 8
  • 11. same frequency band of the primary user, the secondary users not only require ensuring that the current infrastructure-based link quality cannot be degraded but also has to win the contentions between other feasible secondary users. Here, we consider that both primary and secondary users have identical transmit power. It is reasonable to assume that only one secondary user can establish a link after the contention at one instance due to the similar interference range.  Multimedia frames: Wireless multimedia applications require significant bandwidth and often have to satisfy relatively tight delay constraints. Radio spectrum is a scarce resource. Limited available bandwidth is considered one of the major bottlenecks for high-quality multimedia wireless services. A reason for this is the fact that a major portion of the spectrum has already been allocated. On the other hand, actual measurements taken on the 0–6 GHz band and other spectrum occupancy measurements on licensed bands, such as TV bands, show the significant under utilization of the spectrum. Since Cognitive Radio can operate in different frequency bands which provides multimedia services. 8