QUEUEING ANALYSIS OF MOBILE ADHOC NETWORKS EQUIPPED WITH COGNITIVE RADIO TECHNOLOGY
Journal Title: ICTACT Journal on Communication Technology - Year 2018, Vol 9, Issue 4
Abstract
In this paper, the Mobile Ad Hoc Networks (MANETs) with integrated Primary/Secondary User (PU or SU) traffic has been considered. Nodes in the MANET are equipped with Cognitive Radio Technology (CRT). The blocking probability and dropping probability for SUs are obtained by considering a 3D Markov Chain analytical model. To provide efficient service to PUs, we offer priority of channels, higher priority and lower priority is given to PUs and SUs, respectively. The expressions for blocking probability, dropping probability, throughput and non-completion of SU are established. Sensitivity analysis is carried out to explore the effect of system parameters. It is observed that Ad Hoc network utilized the unused spectrum of the existing legacy systems in an opportunistic manner in addition to using the unlicensed spectrum. The results show an improved performance in terms of blocking probabilities, dropping probabilities of SU and over all throughput of the system.
Authors and Affiliations
Neeta Singh, Jyoti Singh
TARGET TRACKING BASED ON BASE STATION NODE USING PREDICTION METHOD AND CLUSTER STRUCTURE IN WIRELESS SENSOR NETWORKS
One of the most important and major challenging issues of wireless sensor networks is the tracking of mobile targets. The network continuously reports the spatial information of moving objects during specified periods to...
A DECENTRALIZED ADAPTIVE MEDIUM ACCESS CONTROL FOR V2I VANET
Vehicular Adhoc Networks (VANETs) resemble similar characteristic as Mobile Adhoc Network (MANETs). The performance of VANET are affected by factors such as mobility, vehicle density and environmental condition. Provisio...
ENERGY EFFICIENT CENTRALIZED DYNAMIC CLUSTERING RESERVATION MAC PROTOCOL FOR MWSN
Mobile wireless sensor networks (MWSN) have recently emerged as a hot research topic as their communication links and topology change due to node mobility. In a dynamically changing environment it is essential to build e...
AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an inves...
QUALITY OF SERVICE IMPROVEMENTS IN IEEE 802.11AX WI-FI
IEEE 802.11ax is the latest high rate Wi-Fi technology (also known as high efficiency Wireless) introduces some new features like OFDMA, Uplink multi-user MIMO (UL MU-MIMO) to deliver benefits in reliability, capacity, a...