Analysis of Efficient Cognitive Radio MAC Protocol for Ad Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 2
Abstract
Cognitive Radio (CR) is an emerging technology to exploit the existing spectrum dynamically. It can intelligently access the vacant spectrum frequency bands. Although a number of methodologies have been suggested for improving the performance of CR networks, little attention has been given to efficient usage, management and energy efficiency. In this paper, a modern paradigm pertaining to the spectrum allotment and usage, manifested as CR, has been introduced as a potential solution to this problem, where the CR (unlicensed) users can opportunistically deploy the available free licensed spectrum bands in such a way that restricts the degree of interference to the extent that the primary (licensed) users can allow. In this article, we analysis and compare various protocols, in addition, we evaluate CREAM MAC, RMC MAC, SWITCH MAC, EECR MAC protocols related to the CR MAC in term of different parameters such as throughput, data transmission and time efficiency. We conclude the most efficient protocol, which have similar features named as Proposed Efficient Cognitive Radio MAC (PECR-MAC) protocol.
Authors and Affiliations
Muhammad Yaseer, Haseeb Ur Rehman, Amir Usman, Muhammad Tayyab Shah
Agent based Architecture for Modeling and Analysis of Self Adaptive Systems using Formal Methods
Self-adaptive systems (SAS) can modify their behavior during execution; this modification is done because of change in internal or external environment. The need for self-adaptive software systems has increased tremendou...
Prediction by a Hybrid of Wavelet Transform and Long-Short-Term-Memory Neural Network
Data originating from some specific fields, for in-stance tourist arrivals, may exhibit a high degree of fluctuations as well as non-linear characteristics due to time varying behaviors. This paper proposes a new hybrid...
Fault Attacks Resistant Architecture for KECCAK Hash Function
The KECCAK cryptographic algorithms widely used in embedded circuits to ensure a high level of security to any systems which require hashing as the integrity checking and random number generation. One of the most efficie...
Optimized Voting Scheme for Efficient Vanishing Point Detection in General Road Images
Next generation automobile industries are aiming for development of vision-based driver assistance system and driver-less vehicle system. In the context of this application, a major challenge lies in the identification o...
An Ontological Model for Generating Complete, Form-based, Business Web Applications
This paper presents an ontological model for specifying and automatically generating complete business Web applications. First, a modular and expandable ontological model for specifying form-based, business Web applicati...