Preview

Nt1310 Unit 3 Channel Assignment

Good Essays
Open Document
Open Document
8009 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Channel Assignment
Computer Communications 36 (2013) 411–420

Contents lists available at SciVerse ScienceDirect

Computer Communications journal homepage: www.elsevier.com/locate/comcom

Effective channel assignments in cognitive radio networks
Jie Wu a, Ying Dai a,⇑, Yanchao Zhao a,b a b

Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, United States
State Key Lab of Novel Software, Department of Computer Science and Technology, Nanjing University, PR China

a r t i c l e

i n f o

Article history:
Received 5 January 2012
Received in revised form 20 October 2012
Accepted 23 October 2012
Available online 5 November 2012
Keywords:
Channel assignment
Cognitive radio networks
Dynamic spectrum
…show more content…
The channel assignment (CA) problem is one of the most important issues in CRNs, with the objective of satisfying the interference constraints, and maximizing the number of nodes with channels assigned. In this paper, our goal is to design highly-efficient and localized protocols for CA. In addition, we want to maximize node connectivity after CA, which is important for packet delivery. To this end, we design two basic algorithms and an advanced algorithm framework. Within this framework, we can change the edge priority in CA to meet different requirements. Simulation results show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.
Ó 2012 Elsevier B.V. All rights reserved.

1. Introduction
Today we are facing a dilemma of rapidly increasing demand of wideband wireless access, and shrinking out of unallocated spectrum. Studies indicate that, at any given time and location, there exists a large portion of under-utilized licensed spectrum [1].
…show more content…
In this way, the assignment algorithm will converge faster without affecting the network performance. The edgetrimming strategy must follow these design objectives:
 Cut as many non-essential edges as possible, so that the algorithms will converge faster.
 Make sure the performance of networks does not degrade after channel assignment.
To achieve a better tradeoff between these two objectives, the most crucial part is how to evaluate the importance of edges.
Our method is marking the edges as essential or non-essential, according to Definition 4.

416

J. Wu et al. / Computer Communications 36 (2013) 411–420

We can develop more strategies to perform edge-trimming, like the conflict possibility and effective degrees. Due to space limitations, we will not extend these topics here.

we compare the three conflict resolutions of our third algorithm.
Moreover, we implement the approach proposed in our discussion part, and make some comparisons.

6.2. Dealing with dense networks

7.1. Simulation settings & methodology

In some cases, we may face situations of dense networks where the number of neighbors of each node is much larger than normal

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The load balancer is an attractive feature [43] for network, thus we need to combine the QoS with a load balancer in one topic to solve some…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given $U$ as the set all the devices located at the edge of the network with physical proximity of the device that wants to request computational resources $D$. Therefore, the PAR problem can be modeled as a graph $G$, where the vertexes of this graph are elements of the set U, and the edges of G are the communication link between them. In our approach, the vertexes are classified according to into the following types:…

    • 232 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    The need for computers of networks with guaranteed quality of service is widely recognized today. Unlike todays best effort networks like the Internet, where the user has no guarantee on the performing it may expect from the network, Quality of service networks guarantee the end user application a certain level of performance. Jitter measures the fluctuating of delay of packets in the given stream for packets, which is an important property for much application. Ideally, packets should be delivered in a completely periodic fashion; however, even if the source establish an evenly spaced stream, unavoidable jitter is displayed by the network due to the different queuing and propagation delays, and packets reach the destination with a wide range of inter-arrival times[36]. We need to achievement the QoS with the best performance thus the suggestion to combine two algorithms, the first algorithm simple switching spanning tree, and second algorithm multipath and must be using the Queue to set in switching. The first method design to learning the all switches about the location of the host in switch and then avoid any loop by using some codes, and second method design to send the packets to all path to decrease the…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This is our first individual assignment for Programming unit this semester. This assignment was given in December 2013, and submission date is on 10th February 2014.…

    • 1859 Words
    • 8 Pages
    Good Essays
  • Best Essays

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Mis589 Wk7 Mini-Cases

    • 487 Words
    • 2 Pages

    Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in…

    • 487 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs. A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Misra, S., Misra, S. C., & Woungang, I. (2010). Selected topics in communication networks and distributed systems. Singapore: World Scientific.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Scientific study of genetic contributions to chronic antisocial behavior has stemmed from many lines of…

    • 7797 Words
    • 32 Pages
    Powerful Essays
  • Good Essays

    Metro Ethernet

    • 1641 Words
    • 7 Pages

    Disclaimer; this is intended to be an introductory technical article; certain details have been excluded in the interests of space and clarity. Network design examples are presented to illustrate specific technical points and are not intended to fully complete.…

    • 1641 Words
    • 7 Pages
    Good Essays
  • Best Essays

    Network coding technique extends traditional copyand-forward paradigm to code-and-forward paradigm to improve efficiency of network by reducing the total number of forwarding packets—forwarding single…

    • 5228 Words
    • 21 Pages
    Best Essays
  • Powerful Essays

    Improved Robustness Adaptive Step Size LMS Equalization Algorithm and Its Analysis Lan-Jian Cao Zhi-Zhong Fu Qing-Kun Yang Department of Communications Department of Communications Department of Communications University of Electronic Science and Technology of China University of Electronic Science and Technology of China University of Electronic Science and Technology of China Chengdu, China caolanjian@126.com Chengdu, China fuzz@uestc.edu.cn Chengdu, China Yqk86@yahoo.com.cn Abstract- In order to improve the performance of LMS (Least Mean Square) adaptive filtering algorithm, an improved robustness adaptive step-size LMS equalization algorithm was presented by establishing a nonlinear relationship between the two relevant statistics for step-size factor μ ( n ) and the error signal e( n ) . Compared with other algorithms, this algorithm overcomes of sensitivity to the noise coming from outside by introducing the statistics for the correlation of error signal e( n ) .…

    • 2600 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Data link layer

    • 5080 Words
    • 21 Pages

    Chapter 5: The Data Link Layer Our goals: ❒ understand principles behind data link layer services: ❍ ❍ ❍ ❍ ❒ error detection, correction sharing a broadcast channel: multiple access link layer addressing reliable data transfer, flow control: done! instantiation and implementation of various link layer technologies 5: DataLink Layer 5-1 Link Layer ❒ ❒ ❒ ❒ ❒ 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches ❒ 5.7 PPP ❒ 5.8 Link Virtualization: ATM and MPLS ❒ 5: DataLink Layer 5-2 Link Layer: Introduction Some terminology: “link” ❒ hosts and routers are nodes ❒ communication channels that connect adjacent nodes along communication path are links ❍ ❍ ❍…

    • 5080 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    In this paper we deal with the problem of Radio Admission Control (RAC) for various service types in Long Term…

    • 2272 Words
    • 10 Pages
    Better Essays

Related Topics