Abstract
Remarkable wireless networks technology developments have made us to expect the realization of new applications like the advanced traffic system, the disaster prevention system, and the adhoc network system. However the resources of wireless bandwidths are not enough to use for such new applications because it is not efficient usage. Therefore, it is necessary to develop with new efficient wireless transmission methods like cognitive wireless network. In this paper, the transmission control methods in cognitive wireless network considering with cross layers including user policies are discussed. First, at the observation stage, the physical data such as user policy, electric field strength, bit error rate, jitter, latency, packet error rate, and throughput are observed. Then, at the decision stage, AHP (Analytic hierarchy process) is applied for decision making process with those parameters. Finally, the action stage, one of the suitable link is chosen and changed links and networks.
In the simulation, ns2 are used for the computational results to the effectiveness of the suggested transmission methods in cognitive wireless networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: part I – general structure. In: ICUIMC 2008: Proceedings of the 2nd international conference on Ubiquitous information management and communication (January 2008)
Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: part II – trusted network layer structure. In: ICUIMC 2008: Proceedings of the 2nd international conference on Ubiquitous information management and communication (January 2008)
Cordeiro, C., Challapali, K., Ghosh, M.: Cognitive PHY and MAC layers for dynamic spectrum access and sharing of TV bands. In: TAPAS 2006: Proceedings of the first international workshop on Technology and policy for accessing spectrum (August 2006)
Weingart, T., Sicker, D.C., Grunwald, D.: Evaluation of cross-layer interactions for reconfigurable radio platforms. In: TAPAS 2006: Proceedings of the first international workshop on Technology and policy for accessing spectrum (August 2006)
Kliazovich, D., Granelli, F.: Packet concatenation at the IP level for performance enhancement in wireless local area networks. Wireless Networks 14(4) (2008)
Renk, T., Kloeck, C., Burgkhardt, D., Jondral, F.K., Grandblaise, D., Gault, S., Dunat, J.-C.: Bio-inspired algorithms for dynamic resource allocation in cognitive wireless networks. In: Mobile Networks and Applications, October 2008, vol. 13(5) (2008)
Staple, G., Werbach, K.: IEEE Spectrum: The End of Spectrum Scarcity, http://www.spectrum.ieee.org/telecom/wireless/the-end-of-spectrum-scarcity
Sugimoto, T., Yamaguhi, S., Asatani, K.: A Proposal for System Selection Scheme Using Multiple Handover Triggers in Heterogeneous Wireless Networks, Technical Report of IEICE
He, W., Nahrstedt, K., Liu, X.: End to End Delay Control of Multumedia Applications over Multihop Wireless Links. ACM Transaction on Multimedia Computing, Communications and Applications 5(2), Article 16 (November 2008)
Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90–100 (1999)
Chakeres, I.D., Royer, E.M.: AODV Routing Protocol Implementation Design. In: Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN) (March 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Uchida, N., Shibata, Y., Takahata, K. (2010). User Policy Based Transmission Control Method in Cognitive Wireless Network. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6018. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12179-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-12179-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12178-4
Online ISBN: 978-3-642-12179-1
eBook Packages: Computer ScienceComputer Science (R0)