Sunteți pe pagina 1din 28

EVALUATE TIME MODULATED ARRAYS:FOR

spectrum utilization in Cognitive


Network (CRN)
BY
NAKIMBUGWE MASTURAH
REG:2018/HD05/2014U
MASTERS IN DATA COMMUNICATION AND SOFTWARE ENGINEERING.
Background:
Wireless technology revolution has gone through a number of
development for the past 10 to 15 years where many innovations has been
attained due to challenges and desire to improve the previous technology
[3, 1, 27].
As the way to meet all the wireless and mobile devices demand,
spectrum sharing a special technology technique was introduced.
“Cognitive Radio Network (CRN)” an intelligent mechanism using
Multiplexing techniques in order to satisfy market demand was
introduced [6, 8].
Enabled spectrum utilization between licensed users and unlicensed
users
Continue……..
It`s identified that amidst these unlicensed users there are malicious
selfish secondary users [14, 15, 23]
This is through radio frequency jamming, packet sniffing, and denial of
service comparing to CRN technology objectives [3]
All jammers are intended to flood the radio channel frequencies with
noise
Continue……..
The cognitive radio networks are defined so that the
cognitive users perform all the functions such as spectrum
sensing, sharing etc. to utilize the underutilized band of
the primary users however, no extra function need to
perform by the primary systems since primary users are the
legacy users.[5]
Note :The current technologies have adopted the use of
the IOT devices and so used by the cognitive networks .
PROBLEM STATEMENT
Jitter in the Cognitive Radio Network limits
resource utilization within primary users and
secondary users. Hence self jamming limits
performance management is experienced that delay
resource delivery, recovery and unconditional time
lines. The set buffer size causes variations in the
frequencies between Cognitive Radio Network . [15].
OBJECTIVES
Main objective
To evaluate the time modulation for the spectrum cognitive networks.
Specific objective
1. Reviewing literature on Impact of variance in frequencies in cognitive
networks .
2. Modeling an algorithm based on a time modulation in cognitive
networks .
3. Evaluating the time modulated array based on the available bandwidth
within the cognitive networks .
RESEARCH QUESTIONS
To what extent do Cognitive Radio Network influence the
IoT?
To what extent are time modulated array influenced variance
in frequencies?
To what extent is the time modulated array influential to
Cognitive Radio Network ?
PHILOSOPHY OF MANETS
The Adaptive Array System affected by network load and Periodic external
interference. It is an improved performance processes used in the antenna array
given. It considers the timely updates, signal process switches in the route for
most wanted users. The techniques assume slowly varying Gaussian ambient noise
fields depend on noise moments. So, when non-Gaussian noise fields must be dealt
with, a need to adopt the Gaussian-equivalent suboptimum adaptive system
based on the second-order moments of the non-Gaussian noise field. We
therefore dress confidence in understanding that, if Adaptive Array System have been
successful in allocating frequencies though external factors. The aim of delivering
services enormous changes in industry, medicine, environmental care, and
urban development. It should as well be adopted to work for the different IoT
devices in the MANETs, we note therefore that understanding the variance in
frequencies during routing. Is the most initial element in addressing the AODV
routing protocol utilization in MANETS [16].
Continue…….
Adaptive antenna systems can improve link quality by combating the effects of
multipath propagation or constructively exploiting the different paths, and
increase capacity by mitigating interference and allowing transmission of
different data streams from different antennas. More specifically, the benefits of
smart antennas can be summarized as follows
Increased range/coverage: The array or beam- forming gain is the average
increase in the signal power at the receiver due to a coherent combination of the
signals received at all antenna elements. It is proportional to the number of
receive antennas and also allows for lower battery life.
Lower power requirements and/or cost reduction: Optimizing transmission
toward the wanted user (transmit beam-forming gain) achieves lower power
consumption and amplifier costs
Security STANDARD USED
The IPsec is an open standard as a part of the IPV4 suite. the IPsec standard and the RFCs that
make up VPN technology and introduces protocols of the protocols of the IPsec suite and key
management. the different protocols are used for authentication headers (AH) provides
connectionless data integrity and data origin authentication for IP datagrams and provides
protection against replay attacks.
RESEARCH MOTIVATION
Social: The emerging algorithm has led to the improvement in multimedia industries like streaming graphics, animation, communications
providers use a technical solution commonly known as onward routing to convey calls to fixed and mobile telephone numbers that have been
used. Calls are first routed to the provider which originally held the number and that provider (known as the number range holder or donor
provider) forwards (or onward routes) the call to the provider currently serving the subscriber (known as the recipient provider). [24]

Economic: The mobile devices provide an analysis of how climate change damages may affect international trade in the coming decades and
how international trade can help limit the costs of climate change. It analyses the impacts of climate change on trade considering both direct
effects on infrastructure and transport routes and the indirect economic impacts resulting from changes in endowments and production [25]

Technological: As people are using mobile devices, it is important to note that Cognitive Radio Network has an inbuilt security mechanism to
boost the technology industry. The purpose is to investigate issues in the Cognitive Radio Network like discovering security attacks. Passive
eavesdropping, Signal jamming, DoS attacks and hardware tempering popular attacks. [26]

Research: The routing has focused area is to improve the QoS in MANETs by creating a protocol, which considers delay requests of real-time
multimedia applications (voice and video) in making routing decisions. For this we will use Omnet simulator as a test bed. Because of
improvement in QoS, the scope in the research handling performance and evaluation metrics, Biological research is broadened thus improving
the state of countries development. [27]
TOOLS
Solar Winds Network Bandwidth Analyzer Pack (FREE TRIAL)
NetSim from TETCOS
Solar Winds Real-Time Bandwidth Monitor (FREE TOOL)
Extra Hop.
Comparitech Speed Test.
Iperf.
NetCPS.
Netperf.
TIME MODULATED ARRAY.
Evaluation of the modulation
The network self-interference is modeled as a Gaussian random variable which is equal to
the sum of the interference from all other transmitting nodes. Nodes are randomly
distributed in the plane according to a Poisson point process of density . Each node is
assumed to transmit at the same frequency f with the same power P0 using an
omnidirectional antenna.

Pr =Received Power
I= Total Interference
Nt =Thermal noise at the receiver
Note :it is a uniform distribution.
Modelling the interference.
Two poison distribution processes.

Assume the number of node density = N=(4L2)

Using the Rayleigh channel(disruptions during transmission)


Gaussian distributed
The thermal noise at the receiver is taken to be constant.
Continue------
Packet successful.
Network load
Algorithm procedure.
The Adaptive Array System affected by network load and Periodic external interference

Timely updates, signal process switches in the route for


most wanted users.

The Gaussian-equivalent suboptimum adaptive system


based on the second-order moments of the non-Gaussian
noise field.

The thermal noise at the receiver is taken to be constant. Take


Note Packet successful. A node throughput is given.

Frequencies vary based on the available network load and


prevailing external factors
Analysis of the algorithm
The resulting modified algorithm .
Evaluate the low time moments of the time modulation array?
Evaluate the effectiveness of the Cognitive Radio Network .
Evaluate the procedure and Experiment set up.
Note: this was repeated by different network scenarios of (10 20
30),(3022 8)(40 22 30) .that account for Gaussian Channel allocation
and the Rayleigh channel allocation
 RELATED WORKS
The current years have considered the cognitive networks so
productive to the network environment and have considered the
performance management as a key to drive the communication
over the internet .much of the IOT devices are using the
network of efficient communication. however related works
explain the big hinderance as jitter in the network putting the
primary users and secondary users at a stand still due to the
variations in the frequencies.
RESEARCH MOTIVATION
Social: The emerging algorithm has led to the improvement in multimedia industries like streaming graphics, animation, communications
providers use a technical solution commonly known as onward routing to convey calls to fixed and mobile telephone numbers that have been
used. Calls are first routed to the provider which originally held the number and that provider (known as the number range holder or donor
provider) forwards (or onward routes) the call to the provider currently serving the subscriber (known as the recipient provider). [24]

Economic: The mobile devices provide an analysis of how climate change damages may affect international trade in the coming decades and
how international trade can help limit the costs of climate change. It analyses the impacts of climate change on trade considering both direct
effects on infrastructure and transport routes and the indirect economic impacts resulting from changes in endowments and production [25]

Technological: As people are using mobile devices, it is important to note that Cognitive Radio Network has an inbuilt security mechanism to
boost the technology industry. The purpose is to investigate issues in the Cognitive Radio Network like discovering security attacks. Passive
eavesdropping, Signal jamming, DoS attacks and hardware tempering popular attacks. [26]

Research: The routing has focused area is to improve the QoS in MANETs by creating a protocol, which considers delay requests of real-time
multimedia applications (voice and video) in making routing decisions. For this we will use Omnet simulator as a test bed. Because of
improvement in QoS, the scope in the research handling performance and evaluation metrics, Biological research is broadened thus improving
the state of countries development. [27]
DATA COLLECTION METHODS
These include all the known techniques used in collecting requirements. I am to use document
analysis, survey methods (e.g. interviews, questionnaires and observation).
Literature review; this is a critical analysis or evaluation involving studying, understanding, and
critiquing work that is related to the traffic Multi-hop wireless network traffic policing mechanism.
Newspapers, books, journals, internet will be used as our sources of literature.
Interviewing key informants; the users provide current information when decision-making can be
achieved through qualitative and descriptive information. it accounts for when it is important to gain
an understanding of the perspectives, behavior and motivations of customers and partners of an
activity or 3 project in order to explain the shortcomings and successes of an activity. It also helps to
when generating recommendations is the key purpose. This is done in order to interpret quantitative
data by interviewing key informants about the how and why of the quantitative findings. This could
help frame the issues that are relevant before designing a quantitative study.
Survey: It helps you look at the wireless at a broad scale. Extensive use of the wireless sensors
networks had started due to a wide variety of applications of them including military, health, space
explorations, vehicular movements, environment monitoring, disaster management etc. Hence
different protocols should be designed based on the QoS requirement of the application. Also sensor
nodes have limited storage capacity, energy and computational capacities.
Future work

Evaluating security of the Cognitive Radio network based on a time


modulated array..
Analysis of Network Layer Attacks and their Solutions in Cognitive
Radio network .
Suggesting the Possible Solution of the Most Probable Security Attacks
of Cognitive Radio network
CONCLUSION
evaluate time modulated arrays: for Cognitive Radio
network utilization in it should as well be adopted to work
for the different IoT devices in the Cognitive Radio network
, we note therefore that understanding the variance in
frequencies during communication. Considering the
beamforming, is the most initial element in addressing the
Cognitive Radio network utilization in (CRN) [16].
references
1] Vishnevskiy, Vladimir “Distributed Computer and Communication Networks”21st International Conference, DCCN 2018.
[2] Kumar, bhuvaneswaran, “A Proposed on multi agent ants based routing algorithm, Department of Electrical and Electronics”,” SOLVED:
JavaScript: void (0)” Research Scholar, Anna University, India,2018.
[3] Pranita, Gajendra et al “Security Enhancement with Removal of Denial of Service Attack in MANET”. Research Scholar, Computer
Science Department, SSSIST,Sehore, MP, India,pranita.joshi16@gmail.com, International Journal of Research in Engineering Technology
and Management . ISSN 2347 -753.
[4] Abida , Mehak et al.. “Analysis of network layer attacks and their solutions in MANET” international journal of multidisciplinary
sciences and engineering, vol. 8, no. 1, 2017
[5] Conference: ICEDEG.” Noise Pollution Measurement System Using Wireless Sensor Network and BAN Sensors “Conference Paper (PDF
Available) · April 2017.
[6]Yang, Andreli et al.”Assessing Recurrent Interactions in Cortical Networks: Modeling EEG Response to Transcranial Magnetic
Stimulation” Journal of Neuroscience Methods 2018.
[7] Ram Ramanathan “antenna beamforming and power control for ad hoc networks” BBN technologies cambridge, massachusetts.
[8]Srinidhi, Kumar et al.”Network optimizations in the Internet of Things: A review “ 2019
.https://doi.org/10.1016/j.jestch.2018.09.003Get rights and content
Beamforming
Beamforming is a process that allows you to focus your WiFi signal. Put simply,
when your router is sending out a WiFi signal, the signal gets wider and wider as
it leaves the router decreasing, losing strength in exchange for coverage.

S-ar putea să vă placă și