Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By: Al-Sakib Khan Pathan A Neighbour Discovery Approach for.

Slides:



Advertisements
Similar presentations
Multimedia and Mobile Communication Laboratory. Outline Multimedia and Mobile Communication Laboratory.
Advertisements

VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
MULTI-BAND CSMA/CA- BASED COGNITIVE RADIO NETWORKS Jo Woon Chong, Youngchul Sung, and Dan Keun Sung School of EECS KAIST IWCMC
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Downlink Channel Assignment and Power Control in Cognitive Radio Networks Using Game Theory Ghazale Hosseinabadi Tutor: Hossein Manshaei January, 29 th,
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Section 6.1 Recurrence Relations. 2 Recursive definition of a sequence Specify one or more initial terms Specify rule for obtaining subsequent terms.
Submission doc.: IEEE /0058r1 September 2014 Alireza Babaei, CableLabsSlide 1 Fair Spectrum Sharing in Unlicensed Spectrum Date: Authors:
The Analysis of Variance
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Opportunistic Routing Based Scheme with Multi-layer Relay Sets in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences.
Chapter 8 With Question/Answer Animations 1. Chapter Summary Applications of Recurrence Relations Solving Linear Recurrence Relations Homogeneous Recurrence.
Copyright © Cengage Learning. All rights reserved.
Advanced Counting Techniques
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Towers of Hanoi. Introduction This problem is discussed in many maths texts, And in computer science an AI as an illustration of recursion and problem.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Chapter 8. Section 8. 1 Section Summary Introduction Modeling with Recurrence Relations Fibonacci Numbers The Tower of Hanoi Counting Problems Algorithms.
KARTIK DABBIRU Roll # EE
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005:
Asynchronous Channel Hopping for Establishing Rendezvous in Cognitive Radio Networks Kaigui Bian and Jung-Min “Jerry” Park Department of Electrical and.
Cognitive Radio Networks
School of EECS, Peking University 1 A Group-theoretic Framework for Rendezvous in Heterogeneous Cognitive Radio Networks Lin Chen ∗, Kaigui Bian ∗, Lin.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
TITLE (tentative) A Quality-of-Service (QoS) based broadcast protocol in a multi- hop Cognitive Radio ad hoc network under blind information D.Veeraswamy.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Tarun Bansal, Bo Chen and Prasun Sinha
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Chapter 8 With Question/Answer Animations. Chapter Summary Applications of Recurrence Relations Solving Linear Recurrence Relations Homogeneous Recurrence.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
ECOM 4314 Data Communications Fall September, 2010.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Chapter 6.1: Recurrence Relations Discrete Mathematical Structures: Theory and Applications.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Cooperative MIMO Paradigms for Cognitive Radio Networks
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Pass the Buck Every good programmer is lazy, arrogant, and impatient. In the game “Pass the Buck” you try to do as little work as possible, by making your.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Fast and Slow Hopping MAC Protocol for Single-hop Ad Hoc Wireless Networks Khaled Hatem Almotairi, Xuemin (Sherman) Shen Department of Electrical and Computer.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
Shou-Chih Lo and Chia-Wei Tseng National Dong Hwa University A Novel Multi-channel MAC Protocol for Wireless Ad Hoc Networks VTC 2007-spring.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
Straight Line Routing for Wireless Sensor Networks Cheng-Fu Chou, Jia-Jang Su, and Chao-Yu Chen Computer Science and Information Engineering Dept., National.
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Bandwidth Utilization
Bandwidth Utilization
Cognitive Radio Based 5G Wireless Networks
Chapter 4: Digital Transmission
Spectrum Sharing in Cognitive Radio Networks
Presentation transcript:

Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By: Al-Sakib Khan Pathan A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous Md. Rafiqul Islam 1, M.A.E. Shakib 1, Md. Azizur Rahaman 1, Md. Obaidur Rahman 1, and Al-Sakib Khan Pathan 2 1 Department of Computer Science and Engineering, Dhaka University of Engineering & Technology, Gazipur, Bangladesh 2 Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia

Outline of This Presentation Introduction Problem Statement and Related Works ToH based Channel Hopping and Rendezvous Performance Evaluation Conclusions and Future Works 2 ICT4M 2014, Nov , Kuching, Malaysia.

Introduction Cognitive Radio Network (CRN) is a relatively new research area to improve spectral efficiency of wireless communication. Nowadays, the concept of commercial CRN (i.e., existence of primary and secondary users in licensed bands) is gaining popularity in wireless communication research. 3 ICT4M 2014, Nov , Kuching, Malaysia.

Introduction (Ctnd.) In CRN, two types of users namely Primary User (PU), the owner of licensed band; and Secondary User (SU) (shown in Figure 1), of the unlicensed ISM band coexist. At the absence of PUs in licensed bands, opportunistic medium access by SUs in licensed channels renders better bandwidth provisioning. 4 ICT4M 2014, Nov , Kuching, Malaysia.

Primary & Secondary Networks 5 ICT4M 2014, Nov , Kuching, Malaysia.

Overview and Objective In CRN, SUs search the channels dynamically and use the obtainable channels to enhance throughput and connectivity. If two neighbour SUs want to communicate, both should operate on at least one available common channel during a particular interval of time. Hence, both SUs can discover each other, exchange control information and negotiate for further data communication using MAC protocols like IEEE ICT4M 2014, Nov , Kuching, Malaysia.

Overview and Objective (Ctnd.) Since the SUs operate independently on different channels based on availability (i.e., during the absence of PUs), channel rendezvous seems to be the most challenging issue in CRN. 7 ICT4M 2014, Nov , Kuching, Malaysia.

SU Channels 8 Secondary users (SUs) may operate on various channels freely, at any given time. This figure shows that nodes a and b, p and q, x and y; the pairs of SUs opportunistically make channel rendezvous on channel 1, channel 2, and channel 4, respectively, where no primary user exists. Note that channel 3 is occupied by the PU; hence, SUs do not have any activity on that channel. ICT4M 2014, Nov , Kuching, Malaysia.

Message Broadcasting 9 In this procedure, to find neighbours in CRN, an SU broadcasts a control message (i.e., informing its presence) first on one channel and nodes those get that message repeatedly broadcast the same information over multiple channels. Effectiveness and Performance are questioned Procedure of message broadcasting using channel hopping. ICT4M 2014, Nov , Kuching, Malaysia.

Common Control Channel (CCC) 10 In CCC approach, one common channel is selected from the available channel list and used as rendezvous channel. ICT4M 2014, Nov , Kuching, Malaysia.

Pseudo Random Hopping 11 The channel hopping sequence as presented here, each SU generates a pseudo random sequence and switches/hops from one channel to another by following that predefined hopping sequence. Pseudo random hopping sequence for SU x and y; where channel rendezvous occurs on a channel (Ch-2) after ten iterations. ICT4M 2014, Nov , Kuching, Malaysia.

Tower of Hanoi (ToH) In Tower of Hanoi (ToH) (sometimes referred to as the Tower of Brahma or the End of the World Puzzle), different sized disks are initially placed in a first tower (initial) and all the disks are needed to be shifted to a third tower (target), taking help of a second tower (intermediate). At each of the tower and during disk movements, a large disk should be placed under a smaller disk. 12 ICT4M 2014, Nov , Kuching, Malaysia.

Tower of Hanoi (ToH) 13 ICT4M 2014, Nov , Kuching, Malaysia.

Our Proposal We assume the disks of the ToH as the available channels to the SUs of a CRN. The number of disks equals to the number of available channels, denoted by n. Larger numbered channel is considered to be the larger disk and a smaller numbered channel is considered to be the smaller disk, and so on. Therefore, the disks’ movement sequence that we get using ToH method will actually provide a channel hopping sequence for the SUs. 14 ICT4M 2014, Nov , Kuching, Malaysia.

Our Proposal (Ctnd.) Let, n disks (channels) need to be moved from first tower (initial) to third tower (target) with the help of second tower. Start Condition for Generating Sequence: –Transfer all the n disks from first tower to third tower. –Move only one disk at a time and store the disk ID (identity) in a sequence. –A large disk may not rest on top of a smaller one. 15 ICT4M 2014, Nov , Kuching, Malaysia.

Our Proposal (Ctnd.) End Condition for Generating Sequence: –Add and store the sequence of disk movement whenever one disk needs to be moved from one tower to another tower. –The largest disk can only go to an empty tower. –Similarly, transfer all the n disks from first tower to third tower. –All transfer sequence will complete within (2 n -1) steps. –Finally, derive the sequence when the largest disk is in the bottom and smallest disk is on the top of third tower. 16 ICT4M 2014, Nov , Kuching, Malaysia.

Our Proposal (Ctnd.) Let us assume that n = 3, so the ToH hopping sequence will form a cycle having a length of seven (i.e., using (2 n -1)). Based on the example given, if a particular SU has three available channels namely, 1, 2, and 3; then, ToH provides the channel hopping sequence as having a cycle length of seven. ToH based sequence. 17 ICT4M 2014, Nov , Kuching, Malaysia.

Channels and Length of Cycle 18 ICT4M 2014, Nov , Kuching, Malaysia.

Flaw of Pseudo Random Seq. Suppose, a secondary user x has four available channels (1, 2, 3, and 4) and y has two available channels (2 and 5). So, channel 2 is common between x and y. If x and y maintain the pseudo random sequence of the figure, even after twelve iterations, no possibility of channel rendezvous between SUs x and y occurs. 19 ICT4M 2014, Nov , Kuching, Malaysia.

ToH based Sequence Let us consider the similar scenario and generate the proposed ToH sequence as in this figure. The SU x has four available channels (1, 2, 3 and 4) and the ToH sequence is with a cycle length of fifteen. In contrast, y has two channels (2 and 5) with a ToH sequence of having a cycle length of three. Since, the cycle replicates again and again, in ToH based method, channel rendezvous between x and y occurs within six iterations. 20 ICT4M 2014, Nov , Kuching, Malaysia.

Flaw of Basic ToH Seq. Problem in the proposed ToH based hopping sequence for x and y; where channel rendezvous does not occur on channel (Ch-4). 21 ICT4M 2014, Nov , Kuching, Malaysia.

Channel Sequence Shifting Channel Sequence Shifting. In the adaptive module, if any node is not able to make channel rendezvous for several iterations, it would presume that the generated ToH sequence is not allowing it to make channel rendezvous with other nodes. Therefore, considering the original ToH sequence as an origin, it will make a 1-bit left-shift in its channel sequence. However, even after 1-bit left-shift, if channel rendezvous does not occur, then the node will make 1-bit right-shift in its channel sequence from the origin. 22 ICT4M 2014, Nov , Kuching, Malaysia.

Performance Analysis 23 ICT4M 2014, Nov , Kuching, Malaysia.

Performance Analysis (Ctnd.) Comparison of number of iterations required for channel rendezvous, (a.) No. of Channels for Receiver = 2 24 ICT4M 2014, Nov , Kuching, Malaysia.

Performance Analysis (Ctnd.) 25 Comparison of number of iterations required for channel rendezvous, (b.) No. of Channels for Receiver = 3 ICT4M 2014, Nov , Kuching, Malaysia.

Performance Analysis (Ctnd.) 26 Comparison of number of iterations required for channel rendezvous, (c.) No. of Channels for Receiver = 4 ICT4M 2014, Nov , Kuching, Malaysia.

Performance Analysis (Ctnd.) Comparison of success rates of channel rendezvous. 27 ICT4M 2014, Nov , Kuching, Malaysia.

Final Words and Future Works The proposed approach is a novel one that uses Tower of Hanoi (ToH) principle to derive the channel hopping sequence for the SUs. It provides less number of iterations for channel rendezvous with a higher success rate than that of the existing pseudo random based approach, which could be the apparent best alternative. In future, we aim to extend the work toward a complete medium access solution for Cognitive Radio Network. 28 ICT4M 2014, Nov , Kuching, Malaysia.

THANK YOU 29 ICT4M 2014, Nov , Kuching, Malaysia.

Questions and Answers Any query should be directed to ??? For More Information: 30 ICT4M 2014, Nov , Kuching, Malaysia.