{"title":"Joint power and spectrum allocation for cooperative cognitive radio network with end user mobility","authors":"Rahul Bajpai, A. Trivedi","doi":"10.1109/WOCN.2014.6923096","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923096","url":null,"abstract":"Cooperative cognitive radio network (CCRN) has gained much attention in the literature of wireless communication. In CCRN, cooperative relaying stimulates primary user (PU) to lease more spectrum to secondary users (SUs). This paper proposes a two stage joint power and spectrum allocation scheme for a CCRN. In the proposed scheme, PU leases unused licensed spectrum to multiple SUs using the frequency division multiple access (FDMA) technique. Here, we have considered that the end users (primary and secondary receivers) can move randomly in any direction. In the first stage, a pricing based dynamic spectrum leasing (DSL) has been used for PU to lease its unused frequency band to the SUs to maximize the revenue. Equal power has been allocated to the PU and all SUs in this stage. In the second stage, a relay assisted DSL scheme has been proposed to induce the PU to lease extra bandwidth to satisfy the increased quality of service (QoS) demands of the SUs, on the condition that QoS of the PU is satisfied. In this stage, power has been allocated to maximize the rate gain of PU and all the SUs. Numerical results have been used to verify the validation of the proposed methodology.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of OFDM-based multi-relay multi-pair two-way communication network","authors":"N. Parveen, D. S. Venkateswarlu, B. Bhandari","doi":"10.1109/WOCN.2014.6923057","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923057","url":null,"abstract":"With increasing demand for higher data rate, better quality of service, and higher network capacity, there is a migration from Single Input Single Output (SISO) antenna technology to a more promising Multiple Input Multiple Output (MIMO) antenna technology. On the other hand, Orthogonal Frequency Division Multiplexing (OFDM) technique has emerged as a very popular multi-carrier modulation technique to enhance the data rate of future broadband wireless communication systems. Applying these technologies with a wireless relay network where multiple user pairs conduct bidirectional communications via multiple relays based on OFDM transmission. The joint optimization of channel and relay assignment, including subcarrier pairing, subcarrier allocation as well as relay selection, for total throughput maximization is formulated as a combinatorial optimization problem. Using a graph theoretical approach, we solve the problem optimally in polynomial time by transforming it into a maximum weighted bipartite matching (MWBM) problem. Simulation studies are carried out to evaluate the network total throughput versus transmit power per node and the number of relay nodes.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"92 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstration of RZ-OOK modulation scheme for high speed optical data transmission","authors":"Adarsh Jain, R. K. Bahl, A. Banik","doi":"10.1109/WOCN.2014.6923082","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923082","url":null,"abstract":"The optical communication has gained enormous popularity as an effective means of transferring data at high rates because of extremely high bandwidth access and cost effectiveness. On-Off keying (OOK) modulation scheme with direct detection is the most widely used intensity modulation scheme for optical communication. OOK can use either nonreturn-to-zero (NRZ) or return-to-zero (RZ) pulse formats for communication. RZ modulation format is becoming increasingly popular for high speed data transmission due to its superior performance over conventional NRZ format. In this paper, we demonstrate the design and implementation details for RZ-OOK modulation scheme for various duty cycles. The experimental setup and test results for 1 Gbps RZ-OOK transmitter has also been presented. This RZ-OOK transmitter consists of a laser diode followed by two Mach-Zehnder (MZ) modulators connected in cascade. We also present analysis and simulation results such as eye diagram, optical spectrum etc. for RZ-OOK as well as NRZ-OOK modulation schemes for data rates upto 10 Gbps.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of FTDSR and AOTDV trust based routing protocols","authors":"Hema R. Karande, S. Thorat","doi":"10.1109/WOCN.2014.6923064","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923064","url":null,"abstract":"Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128450107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal detection in cognitive radio networks over AWGN, Nakagami-m and Nakagami-q channels","authors":"R. Ujjinimatad, S. Patil","doi":"10.1109/WOCN.2014.6923092","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923092","url":null,"abstract":"In this paper, we consider the problem of spectrum sensing based on energy detection (ED) method in cognitive radio (CR) over wireless communication channels when users experiences fading and non fading effects. The closed form analytical expressions for the detection probability are derived over non fading Additive White Gaussian Noise (AWGN) channel and Nakagami-m and Nakagami-q fading channels. The detection probability involving Marcum-Q function is replaced by closed form expression. The probability distribution function (PDF) of fading channels is used to obtain the expressions for detection probability. The new derived numerical results are simulated under various parameters. The performance of the derived theoretical expressions closely matches with the simulated results.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128919645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An HSM-based scalable network service model","authors":"Yinlu Peng, Jun Shen, Xiaojian Zhu","doi":"10.1109/WOCN.2014.6923088","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923088","url":null,"abstract":"The scalability of the ability to provide and deploy network services is one of the major demands of the next generation network, and is also the main challenge of the development of the network service model technique. Through the comparison of several different network service models and the analysis of the key mechanisms of the next generation network, this paper proposes an HSM (hierarchical state machine) based scalable network service model which can dynamically build the users' required network services. The paper gives an example of implementing a network transfer service with connections using our proposed dynamic service composition method. The experiment results illustrate the feasibility and flexibility of this scalable network service model.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. K. Panda, J. Swain, Durga Prasad Mishra, B. Sahu
{"title":"Analysis of effect of mobility and transmission power on AODV and DSR in mobile Adhoc network","authors":"B. K. Panda, J. Swain, Durga Prasad Mishra, B. Sahu","doi":"10.1109/WOCN.2014.6923073","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923073","url":null,"abstract":"Now a days there is a remarkable growth in telecommunication technology which makes users of mobile electronic devices accessible to a communication network. These electronic devices are nothing but the nodes of the Mobile Ad hoc Network (MANET). Each node can move from one place to other during communication and this mobility is having its effect on performance of the network. Mobility changes when speed of the node and pause time with which it moves changes. Change in mobility causes break of link with neighboring nodes as a result of which the performance of a network may be reduced. A number of packets are dropped at different layers of the network. This paper describes the analysis of change in performance due to change in mobility and transmission power. The parameters describing the reason of variation in performance are (1) number of link breaks and (2) number of packet delivered. (3)End to end delay. The simulator we have used in our work for the calculation of performance matrices is GLOMOSIM. The performance comparison has also made between two types of on demand routing protocols AODV and DSR.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122640996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zeba Syed, R. Raju, Sandeep Joshi, Jeril Kuriakose
{"title":"A novel approach to naval architecture using 1G VLAN with RSTP","authors":"Zeba Syed, R. Raju, Sandeep Joshi, Jeril Kuriakose","doi":"10.1109/WOCN.2014.6923086","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923086","url":null,"abstract":"Traditional naval architecture includes all the departments concatenated into a single physical network and if it has to be separated, then physically different network is formed. This paper strives on removing the logical single network whilst maintaining the physical network intact on all the departments by implementing VLAN. Various automation systems like IBS, IPMS, CCTV, APMS and communication systems could be on the same physical network (reducing the cabling) and logically separated leading to isolation of network traffic to specified systems and smooth running of the automation systems without additional load in it, further as VLAN segment the network into different broadcast domains so the packets are only delivered between ports that are combined for the same VLAN. The latency is of key importance, to boost this up, further rapid spanning tree protocol; RSTP is used to get better results. The monitoring software; wireshark was used to compare the analysis of latency, considering real time architectural parameters.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A digital watermarking approach based on DCT domain combining QR code and chaotic theory","authors":"Qingbo Kang, Ke Li, Jichun Yang","doi":"10.1109/WOCN.2014.6923098","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923098","url":null,"abstract":"This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of QR Code are utilized to decode the text watermark information which improves the robustness of the watermarking algorithm. Then the QR Code image is encrypted with chaotic system to enhance the security of this approach. Finally the encrypted image is embedded to the carrier image's DCT blocks after they underwent block-based Arnold scrambling transformation. During the extraction process, as long as the QR Code image can be decoded, the completeness and accuracy of the text watermarking information can be guaranteed. The results of simulation experiment show that this approach has high robustness and security and has, therefore, some practical value in the copyright protection.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130880108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}