Routing In Cognitive Radio Networks: A Detailed Description

Abstract

The lack of spectrum availability and the need for effective use of the spectrum has led to the novel technology called cognitive radio networks. There are two kinds of users in the network. The primary or licensed users, who make use of the spectrum assigned to them by any governmental agencies. The Secondary or unlicensed users has restricted access to the spectrum. The secondary user is also called as Cognitive user. The basic idea of the cognitive radio network is that the unlicensed or secondary users can make use of the spectrum of a primary user but the secondary user has to vacate the band once the primary user starts transmitting the packets. There is also another option in which the primary and the secondary user can transmit the packets simultaneously. In order to achieve this coexistence, the transmission power of the secondary user must be lesser than a threshold value such that the QoS requirements of the primary user are satisfied.

Authors and Affiliations

Ms. A. Rajeswari, , Dr. R. Dhaya,

Keywords

Related Articles

A Taxonomy of High Level Software Clones

The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones a...

A Study for Finding Location of Nodes in Wireless Sensor Networks

The popularity of Wireless Sensor Network (WSN) has increased tremendously in recent times. WSN has the potential to connect the physical world with the virtual world by forming a network of sensor nodes. Sensor nodes tr...

Classification of Image Steganography Techniques in Spatial Domain: A Study

Steganography is a method of secret communication wherein the very existence of communication is hidden. During the last few decades there have been a tremendous development in digital image steganography and a large num...

Implementation of Knowledge Mining with Ontology

Today, huge amount of data available on the web in the form of unstructured, semi-structured and unstructured data. With the use of ontology we can make structured data and use of knowledge mining. As, the knowledge mini...

Simulation of Gray Hole Attack in Adhoc Network Using NS2

A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist...

Download PDF file
  • EP ID EP112573
  • DOI -
  • Views 145
  • Downloads 0

How To Cite

Ms. A. Rajeswari, , Dr. R. Dhaya, (2016). Routing In Cognitive Radio Networks: A Detailed Description. International Journal of Computer Science & Engineering Technology, 7(5), 167-172. https://europub.co.uk./articles/-A-112573