SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 198
QoS - Aware Spectrum Sharing for Multi-Channel Vehicular Network
G.Madhubala1
R.Sangeetha2
2
Assistant Professor
1,2
Department of Information Technology
1,2
Vivekanandha College Of Engineering For Women,Tiruchengode
Abstract— We consider QoS -aware band sharing in
cognitive wireless networks where secondary users are
allowed to access the band owned by a primary network
provider. The intrusion from secondary users to primary
users is forced to be below the tolerable limit. Also, signal to
intrusion plus noise ratio (SINR) of each secondary user is
maintained higher than a required level for QoS cover.
When network load is high, admission control needs to be
performed to satisfy both QoS and intrusion constraint. We
propose an admission control algorithm which is performed
jointly with power manage such that QoS needs of all
admitted secondary users are satisfied while keeping the
intrusion to primary users below the passable limit. When
all secondary users can be supported at minimum rates, we
allow them to increase their spread rates and share the
spectrum in a fair manner. We formulate the joint
power/rate allocation with max-min equality principle as an
optimization problem. We show how to change it into a
convex optimization problem so that its globally most
favourable solution can be obtained. Numerical grades show
that the proposed admission control algorithm achieves
performance very close to the optimal solution.
Key words: Frequent Pattern Mining, High Utility Itemset
Mining, Transaction Database
I. INTRODUCTION
Wireless access in vehicular environments (WAVE) is
distinct to carry applications for intelligent transportation
systems (ITSs), with security and disaster services,
automatic toll collection, traffic management, and
commercial trans-actions among vehicles. It specifies the
architecture and management functions to allow protected
vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)
wireless announcement. In order to ease ITS applications,
local area networks are recognized to consist two types of
major archi-tectural mechanism, i.e., the onboard units
(OBUs) in vehicles and the roadside units (RSUs) install in
road infrastructure, which are denoted as stations in this
paper. Specifically, the IEEE1609.4 criterion is intended to
improve the IEEE802:11p medium access control (MAC)
protocol for multi-channel operations. The WAVE system is
intended to work on the75 MHz band in the licensed
ITS5:9GHz band. The operating band is divided into seven
channels, including one control channel (CCH) and six
service channels (SCHs), each with10MHz bandwidth.
Execution of increasing high-speed wireless applications
requires exponential growth in spectrum demand. How-ever,
it has been reported that current use of owed spectrum can
be as low as 15%. Thus, there is an increasing interest in
initial well planned method for spectrum administration and
sharing which is encouraged by both industry and FCC
authority. This motivates to exploit the spectrum
opportunities in space, time, and frequency while protecting
users of the primary network holder from extreme
interference due to opportunistic spectrum access. In fact, it
is required that an intrusion limit corresponding to an
intrusion tempera-ture level be maintained at the receiving
points of the primary network. The input challenge in
cognitive radio networks is how to construct band
access/sharing schemes such that users of the primary
network (will be called primary users in the sequel) are
protected from excessive intrusion due to secondary band
access and QoS performance of secondary users are guar-
anteed. In this paper, we present a band sharing frame for
cognitive CDMA wireless networks with explicit
interference protection for primary users and QoS constraint
for secondary users. Secondary users have minimum
transmission rates with required QoS performance and
highest power constraints. When the network load is lofty,
an admission control algorithm is proposed to guarantee
QoS constraint for secondary users and intrusion constraints
for primary users. When all the secondary user can be
support, we present a joint rate and power allocation
solution with QoS and intrusion constraint.Prioritized
optimal channel allocation (POCA) protocol to improve the
system throughput of non-safety data delivery with definite
transmission reliability of safety-related messages. By
adopting the concepts in CR network [14], [15], the primary
provider (PP) and secondary provider (SP) are defined to
represent the stations that are delivering safety messages and
non-safety information, respectively. On the other hand, the
primary user (PU) and secondary user (SU) are defined to
indicate the stations that are receiving messages from PP
and SP, respectively. In order to provide privilege for safety
information, PPs are designed to possess smaller contention
window (CW) size compared to that of SPs.More
opportunity for channel entrée will be available to PPs in
order to effectively deliver their safety messages. PPs are
more disposed to change to both CHs 172 and 184 in the
SCH interval to deliver their safety-related messages; while
SPs will have relatively more opportunity to use the other
four SCHs.
II. EXISTING SYSTEM
Existing research works have been proposed based on the
IEEE 802:11p/1609 standards a Self-Organizing Time
Division Multiple Access (STDMA) scheme was proposed
into ensure successful transmission of time critical traffic
between the vehicles. In, a carrier sense multiple access
(CSMA) based protocol for multi-channel network is
proposed. A separate control channel is utilized to eliminate
interference between the control and data messages. All
RTS and CTS packets are transmitted on the control
channel, and the optimal channel for each user is selected
based on the signal to interference plus noise ratio (SINR) to
exchange data messages. However, without the
consideration of different priorities among stations in the
delivery of safety-related messages cannot be protected and
guaranteed. In POCA-D, distributed CR network, SPs are
not allowed to negotiate with each other. In POCA-C,
QoS - Aware Spectrum Sharing for Multi-Channel Vehicular Network
(IJSRD/Vol. 3/Issue 10/2015/046)
All rights reserved by www.ijsrd.com 199
centralized CR network, SPs can negotiate with each other
by sending control messages at the beginning of SCH
interval drawback of existing system 1)Throughput is low
2)Delay is high 3)Quality of service is low.
Considering either distributed or centralized
networks, the proposed POCA schemes can be distinguished
into distributed POCA (POCA-D) and centralized POCA
(POCAC) protocols. Distributed network system is
considered in POCA-D scheme with the knowledge of PPs’
distribution probability. Optimal channel-hopping sequence
can be obtained based on dynamic programming (DP) in
order to achieve maximum aggregate throughput for SPs
under the quality-of-service (QoS) constraint of PPs. On the
other hand, the POCA-C scheme is proposed for centralized
networks, where an optimal channel allocation for SPs is
derived by means of linear programming based on the
number of PPs of each channel in every SCH interval. With
the adoption of proposed POCA schemes, optimal load
balance can be achieved between the probability of channel
availability and channel utilization; while the transmission
opportunities for safety-related messages can also be
preserved. Note that the proposed POCA-D and POCA-C
schemes can be utilized to investigate the effects from
different network scenarios. Performance validation and
comparison of both protocols will be evaluated via
simulations.
A. Multi-Channel Operation
The coordinated universal time (UTC) is adopt for all
stations the synchronization scheme for sync intervals. As
the stations will toggle to the CCH in every CCH interval to
either listen or transmit advertising messages, and
potentially switch into one of the SCHs during the SCH
interval for data spread. During the CCH interval, the safety-
related messages can be broadcast on the CCH by the
providers and these messages are expected to be received by
all stations. On the other hand, if a provider intends to
deliver non-safety information to some of the users, the
provider will broadcast the WAVE services advertisement
(WSA) edge on the CCH. The WSA frame nmainly contains
two fields including the SCH that the provider plans to
switch into and the planned MAC address of user for data
transmission. In order to facilitate two-way handshaking
process, the WSA response (WSAR) casing is defined in
this paper and will be issued by the corresponding user to
acknowledge the reception of WSA frame if the user agrees
to receive data from the provider. After the provider has
received the WSAR frame, both the provider and user will
switch to the consequent SCH that is recorded in the WSA
frame in the following SCH interval. During the SCH
interval, the channel access method for provider is based on
the carrier sense multiple access with smash evading
(CSMA/CA) scheme. A data transmission is completed by
means of the RTS/CTS/DATA/ACK four-way handshaking
mechanism. Furthermore, there can be multiple providers
that intend to compete for both the announcement on the
CCH during CCH interval and the utilization of six SCHs
during SCH interval. The random backoff plan is adopted to
improve potential smash between the WSA frames on CCH
as well as collision between the the RTS frames on SCHs.
Note that even with successful data delivery, each provider
can further conduct multiple channel contentions within an
SCH interval if it has additional data to be transmited.
III. PROPOSED SYSTEM
When the network weight is lofty, an admission control
algorithm is proposed to guarantee QoS constraint for
secondary users and intrusion constraints for primary users.
When all secondary users can be supported, we present a
joint rate and power allocation solution with QoS and
intrusion constraints. In this paper, consider the spectrum
sharing problem among unlicensed users (secondary users)
and licensed users (primary users). The entities we will
work with are communication associates each of which is a
pair of users communicating with each other. We will refer
to communication links belonging to secondary networks as
secondary associates. We will also deem the interference
constraints at the receiving nodes of chief network which
will be referred to as primary receiving points in the sequel.
We assume that each primary receiving point can accept a
maximum interference level. Admission control problem
when the network load is high and all secondary links
transmit with their minimum rate. advantages of proposed
system 1)High Quality of Service 2)Interference Avoided
3)High network performance 4)Separate power allocation
for channels
Fig. 1: Architecture
IV. ALGORITHM USED
A. Admission Control Algorithm
An admission control algorithm which is perform together
with power control such that QoS requirements of all
admitted secondary users are contented while keeping the
intrusion to primary users below the tolerable limit. When
all secondary users can be supported at least rates, we permit
them to increase their transmission rates and share the
spectrum in a fair manner. Admission control algorithms to
be used during high network load conditions which are
performed mutually with power control so that QoS desires
of all admitted secondary users are satisfied while keeping
the intrusion to primary users below the passable limit. If all
secondary users can be supported at minimum rates, we
allow them to enlarge their broadcast rates and share the
band in a fair manner. The secondary links requesting access
to the band approved to the primary network have QoS
requirements.
V. EXPERIMENTAL RESULT
When the network load is small, all secondary associates
can be admitted into the network and they would increase
their broadcast rates over the least values. In core, we wish
QoS - Aware Spectrum Sharing for Multi-Channel Vehicular Network
(IJSRD/Vol. 3/Issue 10/2015/046)
All rights reserved by www.ijsrd.com 200
to solve the optimization problem. The decision variables
are transmission rates and powers P. Transform this problem
into a convex optimization problem where globally optimal
solution can be obtained. We would like to note that the
joint rate and power allocation for cellular CDMA networks
has been an active research topics over the last several years.
We refer the readers to and references therein for existing
fiction on the trouble. However, the work is one of the first
papers which adapt the problem to the ad hoc network
setting. Here, the objective is to minimize the maximum
service time on different transmission links. In this paper,
we proceed one step further by solving the joint rate and
power allocation problem in the spectrum sharing context
where total interference at the primary receiving point
should be smaller the tolerable limit. We will assume that
transmission rate of secondary link can be adjusted in an
allowable range with minimum and maximum values are
minimum and maximum , respectively. Also, power of
secondary link is constrained to be smaller than the
maximum limit. When the network weight is small, all
requesting secondary links with minimum transmission rates
can be supported while fulfilling both QoS and intrusion
constraints. If it is the case, secondary links would increase
their broadcast rates above the least values and split the
spectrum in a fair manner. For fairness issue, we adopt the
max-min standard which aims to maximize the broadcast
rate of the secondary link with a minimum broadcast rate.
VI. CONCLUSION
In this paper presented a solution approach to the spectrum
sharing problem in cognitive wireless networks. In
particular, an admission control algorithm has been
proposed which aims to remove the least number of
secondary links so that both QoS constraints in terms of
desired SINR for accepted links and interference constraints
for primary links are satisfied. We have also formulated the
joint rate and power allocation problem for the secondary
links as an optimization problem with both QoS and
interference constraints. Also, several interesting impacts of
system, QoS and interference constraint parameters on
network performance is high.
REFERENCE
[1] R. A. Uzcategui and G. Acosta-Marum, “WAVE: A
Tutorial,” Commun. Mag., vol. 47, no. 5, pp. 126–133,
May 2009.
[2] IEEE P1609.4/D6.0, “Draft Standard for Wireless
Access in Vehicular Environments (WAVE) - Multi-
Channel Operation”, 2010.
[3] IEEE P802.11p/D7.0, “Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY)
Specifications-Amendment 7: Wireless Access in
Vehicular Environment,”2009.
[4] S. Eichler, “Performance evaluation of the IEEE
802.11p WAVE communication standard,” inProc.
IEEE 66th Veh. Technol. Conf., Oct. 2007, pp. 2199–
2203.
[5] Y. Wang, A. Ahmed, B. Krishnamachari, and K.
Psounis, “IEEE 802.11p performance evaluation and
protocol enhancement,” in Proc. IEEE Int. Conf. Veh.
Electron. Safety, Sep. 2008, pp. 317–322.
[6] N. Choi, S. Choi, Y. Seok, T. Kwon, and Y. Choi, “A
solicitation-based IEEE 802.11p MAC protocol for
roadside to vehicular networks,” inProc. Mobile Netw.
Veh. Environ., May 2007, pp. 91–96.
[7] K. Bilstrup, E. Uhlemann, E. Strom, and U. Bilstrup,
“Evaluation of the IEEE 802.11p MAC method for
vehicle-to-vehicle communication,” inProc. IEEE 68th
Veh. Technol. Conf., Sep. 2008, pp. 1–5.
[8] S. Wang, C. Chou, K. Liu, T. Ho, W. Hung, C. Huang,
M. Hsu, H.Chen, and C. Lin, “Improving the channel
utilization of IEEE 802.11p/1609 Networks,” inProc.
IEEE Wireless Commun. Netw. Conf., Apr. 2009, pp.
1–6.
[9] C.-M. Lee, J.-S. Lin, Y.-P. Hsu, and K.-T. Feng,
“Design and analy-sis of optimal channel-hopping
sequence for cognitive radio networks,” inProc. IEEE
Wireless Commun. Netw. Conf., Apr. 2010,pp. 1–6.
[10]J. So and N. H. Vaidya, “Multi-channel MAC for ad
hoc networks: Handling multi-channel hidden terminals
using a single trans-ceiver,” inProc. 5th ACM Int.
Symp. Mobile Ad Hoc Netw. Comput., May 2004, pp.
222–233.
[11]N. Jain, S. Das, and A. Nasipuri, “A multichannel
CSMA MAC protocol with receiver-based channel
selection for multihop wire-less networks,” in Proc.
10th Int. Conf. Comput. Commun. Netw., Oct. 2001,
pp. 432 –439.
[12]T. Shu, S. Cui, and M. Krunz, “Medium access control
for multi-channel parallel transmission in cognitive
radio networks,” inProc. IEEE Global Telecommun.
Conf., Dec. 2006, pp. 1–5.
[13]C. Han, M. Dianati, R. Tafazolli, and R. Kernchen,
“Throughput analysis of the IEEE 802.11p enhanced
distributed channel access function in vehicular
environment,” inProc. IEEE 72nd Veh. Tech-nol. Conf.
Fall, 2010, pp. 1 –5.
[14]S. Haykin, “Cognitive radio: Brain-empowered wireless
communications,” IEEE J. Select. Areas Commun.,
vol.23,no. 2, pp. 201–220, Feb. 2005.
[15]I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S.
Mohanty, “Next generation/dynamic spectrum access/
cognitive radio wireless net-works: A survey,”Comput.
Netw., vol. 50, pp. 2127–2159, 2006.

More Related Content

PDF
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
PDF
Ec34781784
PDF
Vol 16 No 1 - January-June 2016
PDF
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
PDF
Performance Evaluation Cognitive Medium Access Control Protocols
PDF
Ea34772776
PDF
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
PDF
Elastic hybrid MAC protocol for wireless sensor networks
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Ec34781784
Vol 16 No 1 - January-June 2016
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance Evaluation Cognitive Medium Access Control Protocols
Ea34772776
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
Elastic hybrid MAC protocol for wireless sensor networks

What's hot (18)

PDF
Inspecting Vanet for Determined Ways with Watertight Connectivity
PDF
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
PDF
A survey on routing algorithms and routing metrics for wireless mesh networks
PPT
5G Enabled Vehicular Networks
PDF
Comparative study on priority based qos
PDF
Execution Evaluation of Routing Protocols for Cognitive Radio Network
PDF
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
PPTX
ISSUES IN AD HOC WIRELESS NETWORKS
DOC
Effects of location awareness on concurrent transmissions for cognitive ad ho...
PDF
High speed down link packet access (hsdpa)
PDF
3g evolution alcatel
PPT
Skg gsm channel concept ; call processing
PDF
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PPTX
Cluster based mac in vane ts for safety applications
PDF
Lecture 19 22. transport protocol for ad-hoc
PDF
Dynamic Spectrum Allocation in Wireless sensor Networks
Inspecting Vanet for Determined Ways with Watertight Connectivity
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
A survey on routing algorithms and routing metrics for wireless mesh networks
5G Enabled Vehicular Networks
Comparative study on priority based qos
Execution Evaluation of Routing Protocols for Cognitive Radio Network
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
International Journal of Engineering Research and Development (IJERD)
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
ISSUES IN AD HOC WIRELESS NETWORKS
Effects of location awareness on concurrent transmissions for cognitive ad ho...
High speed down link packet access (hsdpa)
3g evolution alcatel
Skg gsm channel concept ; call processing
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
Cluster based mac in vane ts for safety applications
Lecture 19 22. transport protocol for ad-hoc
Dynamic Spectrum Allocation in Wireless sensor Networks
Ad

Viewers also liked (17)

PDF
Fault Tolerance 101
PDF
Performance Characteristic of Infinitely Short Bearing
PDF
Testing and Performance of Parabolic Trough Collector in Indian climate
PPTX
Poster mock ups
PPTX
Initial covers I made
PDF
NTE Seg3A-B-C
PPTX
Mi presentacion
PDF
Making Distributed Data Persistent Services Elastic (Without Losing All Your ...
DOCX
DEFINICIÓN DE HARDWARE Y SOFTWARE.
PDF
PARTES RICOH 1515
PPT
Dealing with Substance Abuse in the Workplace
PDF
Informe de inversion publicitaria en internet iab peru - 2015 semestre 1 pa...
PPTX
Direccion ipv4
DOCX
Guano de la isla
PPT
La Europa feudal. S. IX -XI Tema 5 2ºeso curso 2017
PDF
DTZ CHINA INSIGHT Internet +-CHN
Fault Tolerance 101
Performance Characteristic of Infinitely Short Bearing
Testing and Performance of Parabolic Trough Collector in Indian climate
Poster mock ups
Initial covers I made
NTE Seg3A-B-C
Mi presentacion
Making Distributed Data Persistent Services Elastic (Without Losing All Your ...
DEFINICIÓN DE HARDWARE Y SOFTWARE.
PARTES RICOH 1515
Dealing with Substance Abuse in the Workplace
Informe de inversion publicitaria en internet iab peru - 2015 semestre 1 pa...
Direccion ipv4
Guano de la isla
La Europa feudal. S. IX -XI Tema 5 2ºeso curso 2017
DTZ CHINA INSIGHT Internet +-CHN
Ad

Similar to QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network (20)

DOCX
EDSA: ENERGY-EFFICIENT DYNAMIC SPECTRUMACCESS PROTOCOLS FOR COGNITIVE RADIO N...
PDF
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
PDF
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PDF
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PDF
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PDF
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
PDF
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
PDF
Addressing the Multichannel Selection, Scheduling and Coordination Cost
PDF
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
PDF
Addressing the Multichannel Selection, Scheduling and Coordination Cost
PDF
Shared Spectrum Throughput for Secondary Users
PPT
medium access tcpip network layer data link layer
PDF
555 473-479
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
Distributed Priority based channel access for VANET (DPBCA)
PDF
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
PPTX
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
PDF
PDF
Tech report: Fair Channel Allocation and Access Design for Cognitive Ad Hoc N...
PDF
Fair channel allocation and access design for cognitive ad hoc networks
EDSA: ENERGY-EFFICIENT DYNAMIC SPECTRUMACCESS PROTOCOLS FOR COGNITIVE RADIO N...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Addressing the Multichannel Selection, Scheduling and Coordination Cost
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
Addressing the Multichannel Selection, Scheduling and Coordination Cost
Shared Spectrum Throughput for Secondary Users
medium access tcpip network layer data link layer
555 473-479
Welcome to International Journal of Engineering Research and Development (IJERD)
Distributed Priority based channel access for VANET (DPBCA)
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Tech report: Fair Channel Allocation and Access Design for Cognitive Ad Hoc N...
Fair channel allocation and access design for cognitive ad hoc networks

More from IJSRD (20)

PPTX
#IJSRD #Research Paper Publication
PDF
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
PDF
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
PDF
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
PDF
Prevention and Detection of Man in the Middle Attack on AODV Protocol
PDF
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
PDF
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PDF
Keystroke Dynamics Authentication with Project Management System
PDF
Diagnosing lungs cancer Using Neural Networks
PDF
A Survey on Sentiment Analysis and Opinion Mining
PDF
A Defect Prediction Model for Software Product based on ANFIS
PDF
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
PDF
Product Quality Analysis based on online Reviews
PDF
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
PDF
Study of Clustering of Data Base in Education Sector Using Data Mining
PDF
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
PDF
Investigation of Effect of Process Parameters on Maximum Temperature during F...
PDF
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
PDF
A Survey on Data Mining Techniques for Crime Hotspots Prediction
#IJSRD #Research Paper Publication
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Keystroke Dynamics Authentication with Project Management System
Diagnosing lungs cancer Using Neural Networks
A Survey on Sentiment Analysis and Opinion Mining
A Defect Prediction Model for Software Product based on ANFIS
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Product Quality Analysis based on online Reviews
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Study of Clustering of Data Base in Education Sector Using Data Mining
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
A Survey on Data Mining Techniques for Crime Hotspots Prediction

Recently uploaded (20)

PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Trump Administration's workforce development strategy
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
IGGE1 Understanding the Self1234567891011
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
Classroom Observation Tools for Teachers
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Complications of Minimal Access Surgery at WLH
PDF
Empowerment Technology for Senior High School Guide
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Hazard Identification & Risk Assessment .pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Trump Administration's workforce development strategy
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
IGGE1 Understanding the Self1234567891011
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Final Presentation General Medicine 03-08-2024.pptx
Final Presentation General Medicine 03-08-2024.pptx
Indian roads congress 037 - 2012 Flexible pavement
Computing-Curriculum for Schools in Ghana
Digestion and Absorption of Carbohydrates, Proteina and Fats
Classroom Observation Tools for Teachers
Chinmaya Tiranga quiz Grand Finale.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Complications of Minimal Access Surgery at WLH
Empowerment Technology for Senior High School Guide
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1_English_Language_Set_2.pdf probationary
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Hazard Identification & Risk Assessment .pdf

QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 198 QoS - Aware Spectrum Sharing for Multi-Channel Vehicular Network G.Madhubala1 R.Sangeetha2 2 Assistant Professor 1,2 Department of Information Technology 1,2 Vivekanandha College Of Engineering For Women,Tiruchengode Abstract— We consider QoS -aware band sharing in cognitive wireless networks where secondary users are allowed to access the band owned by a primary network provider. The intrusion from secondary users to primary users is forced to be below the tolerable limit. Also, signal to intrusion plus noise ratio (SINR) of each secondary user is maintained higher than a required level for QoS cover. When network load is high, admission control needs to be performed to satisfy both QoS and intrusion constraint. We propose an admission control algorithm which is performed jointly with power manage such that QoS needs of all admitted secondary users are satisfied while keeping the intrusion to primary users below the passable limit. When all secondary users can be supported at minimum rates, we allow them to increase their spread rates and share the spectrum in a fair manner. We formulate the joint power/rate allocation with max-min equality principle as an optimization problem. We show how to change it into a convex optimization problem so that its globally most favourable solution can be obtained. Numerical grades show that the proposed admission control algorithm achieves performance very close to the optimal solution. Key words: Frequent Pattern Mining, High Utility Itemset Mining, Transaction Database I. INTRODUCTION Wireless access in vehicular environments (WAVE) is distinct to carry applications for intelligent transportation systems (ITSs), with security and disaster services, automatic toll collection, traffic management, and commercial trans-actions among vehicles. It specifies the architecture and management functions to allow protected vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) wireless announcement. In order to ease ITS applications, local area networks are recognized to consist two types of major archi-tectural mechanism, i.e., the onboard units (OBUs) in vehicles and the roadside units (RSUs) install in road infrastructure, which are denoted as stations in this paper. Specifically, the IEEE1609.4 criterion is intended to improve the IEEE802:11p medium access control (MAC) protocol for multi-channel operations. The WAVE system is intended to work on the75 MHz band in the licensed ITS5:9GHz band. The operating band is divided into seven channels, including one control channel (CCH) and six service channels (SCHs), each with10MHz bandwidth. Execution of increasing high-speed wireless applications requires exponential growth in spectrum demand. How-ever, it has been reported that current use of owed spectrum can be as low as 15%. Thus, there is an increasing interest in initial well planned method for spectrum administration and sharing which is encouraged by both industry and FCC authority. This motivates to exploit the spectrum opportunities in space, time, and frequency while protecting users of the primary network holder from extreme interference due to opportunistic spectrum access. In fact, it is required that an intrusion limit corresponding to an intrusion tempera-ture level be maintained at the receiving points of the primary network. The input challenge in cognitive radio networks is how to construct band access/sharing schemes such that users of the primary network (will be called primary users in the sequel) are protected from excessive intrusion due to secondary band access and QoS performance of secondary users are guar- anteed. In this paper, we present a band sharing frame for cognitive CDMA wireless networks with explicit interference protection for primary users and QoS constraint for secondary users. Secondary users have minimum transmission rates with required QoS performance and highest power constraints. When the network load is lofty, an admission control algorithm is proposed to guarantee QoS constraint for secondary users and intrusion constraints for primary users. When all the secondary user can be support, we present a joint rate and power allocation solution with QoS and intrusion constraint.Prioritized optimal channel allocation (POCA) protocol to improve the system throughput of non-safety data delivery with definite transmission reliability of safety-related messages. By adopting the concepts in CR network [14], [15], the primary provider (PP) and secondary provider (SP) are defined to represent the stations that are delivering safety messages and non-safety information, respectively. On the other hand, the primary user (PU) and secondary user (SU) are defined to indicate the stations that are receiving messages from PP and SP, respectively. In order to provide privilege for safety information, PPs are designed to possess smaller contention window (CW) size compared to that of SPs.More opportunity for channel entrée will be available to PPs in order to effectively deliver their safety messages. PPs are more disposed to change to both CHs 172 and 184 in the SCH interval to deliver their safety-related messages; while SPs will have relatively more opportunity to use the other four SCHs. II. EXISTING SYSTEM Existing research works have been proposed based on the IEEE 802:11p/1609 standards a Self-Organizing Time Division Multiple Access (STDMA) scheme was proposed into ensure successful transmission of time critical traffic between the vehicles. In, a carrier sense multiple access (CSMA) based protocol for multi-channel network is proposed. A separate control channel is utilized to eliminate interference between the control and data messages. All RTS and CTS packets are transmitted on the control channel, and the optimal channel for each user is selected based on the signal to interference plus noise ratio (SINR) to exchange data messages. However, without the consideration of different priorities among stations in the delivery of safety-related messages cannot be protected and guaranteed. In POCA-D, distributed CR network, SPs are not allowed to negotiate with each other. In POCA-C,
  • 2. QoS - Aware Spectrum Sharing for Multi-Channel Vehicular Network (IJSRD/Vol. 3/Issue 10/2015/046) All rights reserved by www.ijsrd.com 199 centralized CR network, SPs can negotiate with each other by sending control messages at the beginning of SCH interval drawback of existing system 1)Throughput is low 2)Delay is high 3)Quality of service is low. Considering either distributed or centralized networks, the proposed POCA schemes can be distinguished into distributed POCA (POCA-D) and centralized POCA (POCAC) protocols. Distributed network system is considered in POCA-D scheme with the knowledge of PPs’ distribution probability. Optimal channel-hopping sequence can be obtained based on dynamic programming (DP) in order to achieve maximum aggregate throughput for SPs under the quality-of-service (QoS) constraint of PPs. On the other hand, the POCA-C scheme is proposed for centralized networks, where an optimal channel allocation for SPs is derived by means of linear programming based on the number of PPs of each channel in every SCH interval. With the adoption of proposed POCA schemes, optimal load balance can be achieved between the probability of channel availability and channel utilization; while the transmission opportunities for safety-related messages can also be preserved. Note that the proposed POCA-D and POCA-C schemes can be utilized to investigate the effects from different network scenarios. Performance validation and comparison of both protocols will be evaluated via simulations. A. Multi-Channel Operation The coordinated universal time (UTC) is adopt for all stations the synchronization scheme for sync intervals. As the stations will toggle to the CCH in every CCH interval to either listen or transmit advertising messages, and potentially switch into one of the SCHs during the SCH interval for data spread. During the CCH interval, the safety- related messages can be broadcast on the CCH by the providers and these messages are expected to be received by all stations. On the other hand, if a provider intends to deliver non-safety information to some of the users, the provider will broadcast the WAVE services advertisement (WSA) edge on the CCH. The WSA frame nmainly contains two fields including the SCH that the provider plans to switch into and the planned MAC address of user for data transmission. In order to facilitate two-way handshaking process, the WSA response (WSAR) casing is defined in this paper and will be issued by the corresponding user to acknowledge the reception of WSA frame if the user agrees to receive data from the provider. After the provider has received the WSAR frame, both the provider and user will switch to the consequent SCH that is recorded in the WSA frame in the following SCH interval. During the SCH interval, the channel access method for provider is based on the carrier sense multiple access with smash evading (CSMA/CA) scheme. A data transmission is completed by means of the RTS/CTS/DATA/ACK four-way handshaking mechanism. Furthermore, there can be multiple providers that intend to compete for both the announcement on the CCH during CCH interval and the utilization of six SCHs during SCH interval. The random backoff plan is adopted to improve potential smash between the WSA frames on CCH as well as collision between the the RTS frames on SCHs. Note that even with successful data delivery, each provider can further conduct multiple channel contentions within an SCH interval if it has additional data to be transmited. III. PROPOSED SYSTEM When the network weight is lofty, an admission control algorithm is proposed to guarantee QoS constraint for secondary users and intrusion constraints for primary users. When all secondary users can be supported, we present a joint rate and power allocation solution with QoS and intrusion constraints. In this paper, consider the spectrum sharing problem among unlicensed users (secondary users) and licensed users (primary users). The entities we will work with are communication associates each of which is a pair of users communicating with each other. We will refer to communication links belonging to secondary networks as secondary associates. We will also deem the interference constraints at the receiving nodes of chief network which will be referred to as primary receiving points in the sequel. We assume that each primary receiving point can accept a maximum interference level. Admission control problem when the network load is high and all secondary links transmit with their minimum rate. advantages of proposed system 1)High Quality of Service 2)Interference Avoided 3)High network performance 4)Separate power allocation for channels Fig. 1: Architecture IV. ALGORITHM USED A. Admission Control Algorithm An admission control algorithm which is perform together with power control such that QoS requirements of all admitted secondary users are contented while keeping the intrusion to primary users below the tolerable limit. When all secondary users can be supported at least rates, we permit them to increase their transmission rates and share the spectrum in a fair manner. Admission control algorithms to be used during high network load conditions which are performed mutually with power control so that QoS desires of all admitted secondary users are satisfied while keeping the intrusion to primary users below the passable limit. If all secondary users can be supported at minimum rates, we allow them to enlarge their broadcast rates and share the band in a fair manner. The secondary links requesting access to the band approved to the primary network have QoS requirements. V. EXPERIMENTAL RESULT When the network load is small, all secondary associates can be admitted into the network and they would increase their broadcast rates over the least values. In core, we wish
  • 3. QoS - Aware Spectrum Sharing for Multi-Channel Vehicular Network (IJSRD/Vol. 3/Issue 10/2015/046) All rights reserved by www.ijsrd.com 200 to solve the optimization problem. The decision variables are transmission rates and powers P. Transform this problem into a convex optimization problem where globally optimal solution can be obtained. We would like to note that the joint rate and power allocation for cellular CDMA networks has been an active research topics over the last several years. We refer the readers to and references therein for existing fiction on the trouble. However, the work is one of the first papers which adapt the problem to the ad hoc network setting. Here, the objective is to minimize the maximum service time on different transmission links. In this paper, we proceed one step further by solving the joint rate and power allocation problem in the spectrum sharing context where total interference at the primary receiving point should be smaller the tolerable limit. We will assume that transmission rate of secondary link can be adjusted in an allowable range with minimum and maximum values are minimum and maximum , respectively. Also, power of secondary link is constrained to be smaller than the maximum limit. When the network weight is small, all requesting secondary links with minimum transmission rates can be supported while fulfilling both QoS and intrusion constraints. If it is the case, secondary links would increase their broadcast rates above the least values and split the spectrum in a fair manner. For fairness issue, we adopt the max-min standard which aims to maximize the broadcast rate of the secondary link with a minimum broadcast rate. VI. CONCLUSION In this paper presented a solution approach to the spectrum sharing problem in cognitive wireless networks. In particular, an admission control algorithm has been proposed which aims to remove the least number of secondary links so that both QoS constraints in terms of desired SINR for accepted links and interference constraints for primary links are satisfied. We have also formulated the joint rate and power allocation problem for the secondary links as an optimization problem with both QoS and interference constraints. Also, several interesting impacts of system, QoS and interference constraint parameters on network performance is high. REFERENCE [1] R. A. Uzcategui and G. Acosta-Marum, “WAVE: A Tutorial,” Commun. Mag., vol. 47, no. 5, pp. 126–133, May 2009. [2] IEEE P1609.4/D6.0, “Draft Standard for Wireless Access in Vehicular Environments (WAVE) - Multi- Channel Operation”, 2010. [3] IEEE P802.11p/D7.0, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-Amendment 7: Wireless Access in Vehicular Environment,”2009. [4] S. Eichler, “Performance evaluation of the IEEE 802.11p WAVE communication standard,” inProc. IEEE 66th Veh. Technol. Conf., Oct. 2007, pp. 2199– 2203. [5] Y. Wang, A. Ahmed, B. Krishnamachari, and K. Psounis, “IEEE 802.11p performance evaluation and protocol enhancement,” in Proc. IEEE Int. Conf. Veh. Electron. Safety, Sep. 2008, pp. 317–322. [6] N. Choi, S. Choi, Y. Seok, T. Kwon, and Y. Choi, “A solicitation-based IEEE 802.11p MAC protocol for roadside to vehicular networks,” inProc. Mobile Netw. Veh. Environ., May 2007, pp. 91–96. [7] K. Bilstrup, E. Uhlemann, E. Strom, and U. Bilstrup, “Evaluation of the IEEE 802.11p MAC method for vehicle-to-vehicle communication,” inProc. IEEE 68th Veh. Technol. Conf., Sep. 2008, pp. 1–5. [8] S. Wang, C. Chou, K. Liu, T. Ho, W. Hung, C. Huang, M. Hsu, H.Chen, and C. Lin, “Improving the channel utilization of IEEE 802.11p/1609 Networks,” inProc. IEEE Wireless Commun. Netw. Conf., Apr. 2009, pp. 1–6. [9] C.-M. Lee, J.-S. Lin, Y.-P. Hsu, and K.-T. Feng, “Design and analy-sis of optimal channel-hopping sequence for cognitive radio networks,” inProc. IEEE Wireless Commun. Netw. Conf., Apr. 2010,pp. 1–6. [10]J. So and N. H. Vaidya, “Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single trans-ceiver,” inProc. 5th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., May 2004, pp. 222–233. [11]N. Jain, S. Das, and A. Nasipuri, “A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wire-less networks,” in Proc. 10th Int. Conf. Comput. Commun. Netw., Oct. 2001, pp. 432 –439. [12]T. Shu, S. Cui, and M. Krunz, “Medium access control for multi-channel parallel transmission in cognitive radio networks,” inProc. IEEE Global Telecommun. Conf., Dec. 2006, pp. 1–5. [13]C. Han, M. Dianati, R. Tafazolli, and R. Kernchen, “Throughput analysis of the IEEE 802.11p enhanced distributed channel access function in vehicular environment,” inProc. IEEE 72nd Veh. Tech-nol. Conf. Fall, 2010, pp. 1 –5. [14]S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE J. Select. Areas Commun., vol.23,no. 2, pp. 201–220, Feb. 2005. [15]I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “Next generation/dynamic spectrum access/ cognitive radio wireless net-works: A survey,”Comput. Netw., vol. 50, pp. 2127–2159, 2006.