Skip to main content

User Policy Based Transmission Control Method in Cognitive Wireless Network

  • Conference paper
Computational Science and Its Applications – ICCSA 2010 (ICCSA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6018))

Included in the following conference series:

  • 875 Accesses

Abstract

Remarkable wireless networks technology developments have made us to expect the realization of new applications like the advanced traffic system, the disaster prevention system, and the adhoc network system. However the resources of wireless bandwidths are not enough to use for such new applications because it is not efficient usage. Therefore, it is necessary to develop with new efficient wireless transmission methods like cognitive wireless network. In this paper, the transmission control methods in cognitive wireless network considering with cross layers including user policies are discussed. First, at the observation stage, the physical data such as user policy, electric field strength, bit error rate, jitter, latency, packet error rate, and throughput are observed. Then, at the decision stage, AHP (Analytic hierarchy process) is applied for decision making process with those parameters. Finally, the action stage, one of the suitable link is chosen and changed links and networks.

In the simulation, ns2 are used for the computational results to the effectiveness of the suggested transmission methods in cognitive wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: part I – general structure. In: ICUIMC 2008: Proceedings of the 2nd international conference on Ubiquitous information management and communication (January 2008)

    Google Scholar 

  2. Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: part II – trusted network layer structure. In: ICUIMC 2008: Proceedings of the 2nd international conference on Ubiquitous information management and communication (January 2008)

    Google Scholar 

  3. Cordeiro, C., Challapali, K., Ghosh, M.: Cognitive PHY and MAC layers for dynamic spectrum access and sharing of TV bands. In: TAPAS 2006: Proceedings of the first international workshop on Technology and policy for accessing spectrum (August 2006)

    Google Scholar 

  4. Weingart, T., Sicker, D.C., Grunwald, D.: Evaluation of cross-layer interactions for reconfigurable radio platforms. In: TAPAS 2006: Proceedings of the first international workshop on Technology and policy for accessing spectrum (August 2006)

    Google Scholar 

  5. Kliazovich, D., Granelli, F.: Packet concatenation at the IP level for performance enhancement in wireless local area networks. Wireless Networks 14(4) (2008)

    Google Scholar 

  6. Renk, T., Kloeck, C., Burgkhardt, D., Jondral, F.K., Grandblaise, D., Gault, S., Dunat, J.-C.: Bio-inspired algorithms for dynamic resource allocation in cognitive wireless networks. In: Mobile Networks and Applications, October 2008, vol. 13(5) (2008)

    Google Scholar 

  7. Staple, G., Werbach, K.: IEEE Spectrum: The End of Spectrum Scarcity, http://www.spectrum.ieee.org/telecom/wireless/the-end-of-spectrum-scarcity

  8. Sugimoto, T., Yamaguhi, S., Asatani, K.: A Proposal for System Selection Scheme Using Multiple Handover Triggers in Heterogeneous Wireless Networks, Technical Report of IEICE

    Google Scholar 

  9. He, W., Nahrstedt, K., Liu, X.: End to End Delay Control of Multumedia Applications over Multihop Wireless Links. ACM Transaction on Multimedia Computing, Communications and Applications 5(2), Article 16 (November 2008)

    Google Scholar 

  10. Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90–100 (1999)

    Google Scholar 

  11. Chakeres, I.D., Royer, E.M.: AODV Routing Protocol Implementation Design. In: Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN) (March 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Uchida, N., Shibata, Y., Takahata, K. (2010). User Policy Based Transmission Control Method in Cognitive Wireless Network. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6018. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12179-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12179-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12178-4

  • Online ISBN: 978-3-642-12179-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics