International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Efficient Utilization of Spectrum in Cognitive Networks by Using Femtocell. Bhaskaruni Ramalakshmi (Student), Modadugu Rangababu(Student), Padyala Varaprasad (Ast.Professor) Department Of Computer Science and Engineering, K L University Vaddeswaram, GunturDt., AndhraPradesh, India. Abstract Keywords: Cutting edge, volatile, femtocell, zero knowledge protocol. In communication networks, cognitive network is a new type of data network that makes use of cutting edge technology from several research areas to solve some problems current networks are faced with. Cognitive MACs are becoming a reality for efficiently utilizing the constrained spectral resources. The spectrum opportunities are volatile and often difficult to predict. In this paper we propose the cognitive networks are the secondary users are going to use the spectrum which is free in a particular time slot. These secondary users are going to use the unused space without affecting the primary users. The femtocell is small base station; with this we will reuse the unused spectrum frequency in uncovered region also. While exchanging the sensed information by the nodes we are going to use zero knowledge protocol for security purpose. Femtocell connects to the service provider’s network via broadband current designs typically support two to four active mobile phones in a residential setting, and eight to 16 active mobile phones in enterprise settings. A femtocell allows service providers to extend service coverage indoors or at the cell edge, especially where access would otherwise be limited or unavailable. In cryptography, a zeroknowledge proof or zero-knowledge protocol is a method by which one party can prove to another that a statement is true, without allowing the other party to prove the statement to anyone else. A zero-knowledge proof must necessarily require interactive input from the verifying party; otherwise the verifier could simply record the proof and replay it to convince someone else. ISSN: 2231-5381 I. predict, Introduction We consider a cognitive radio network with one primary user and multiple secondary users. Packets randomly arrive at the primary user and are queued for transmission. The primary user transmits on every slot that it has packets. The success probability is determined by the cooperation decisions made by the secondary users. [1] In CR networks, channel sensing and spectrum access are tightly coupled to the medium access—no matter if it is through random access, time slotted principle or hybrid scheme. In recent years, a number of spectrum agile and Cognitive MAC protocols have been proposed. These solutions have different requirements for network infrastructure and hardware capabilities of Secondary Users (SUs). This would allow secondary users to identify available spectrum resources and communicate in a manner that limits the level of interference perceived by the primary users. Traditional protocols for the identification of parties in a transaction suffer from flaws that are inherent to the process used to achieve the objective. In simple password protocols, a claimant A gives his password to a verifier B. If certain precautions are not taken, an eavesdropper can get hold of the password that was transferred, and from there on he can impersonate A to his liking. [2]. While simplifying the design of OSA networks, continuous full-spectrum sensing is energy inefficient and hardware demanding, especially for low-cost battery-powered wireless nodes with busty traffic. We assume instead that each secondary user can choose to sense a subset of the possible channels (only when it has data to transmit) and must decide whether transmission is possible based on the sensing outcome. [3] Inspired by the cognitive radio technology which enables a station to cognize and adapt to the communication environment to reach the optimum network performance. However, since an enormous number of femto-networks can be expected to overlay the http://www.ijettjournal.org Page 1458 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Macro-network, the computational complexity and large among of scheduling related information exchanges are challenges in such centralized scheme. As a result, a radio resource management scheme for each femtonetwork shall be able to “autonomously” utilize the radio resources not occupied by the Macro-network so as to mitigate interference while providing QoS guarantees. To combat the fading channel (both small scale fading and large scale fading) and interference from the Macro-network, the truncated channel inversion power control is chosen as the power control scheme in the femto-network. As a result, the signal to interference and noise power ratio (SINR) of each resource block can be maintained at a requirement value. [4] Although some works have been done for heterogeneous cognitive radio networks with femtocells, most of previous works are focused on spectrum sharing and interference avoidance. Consequently, the energy efficiency aspect in this setting is largely ignored. In addition, most of previous works assume that only the femtocell base station has the cognitive capability, without considering the cognitive capability of the macrocell base station. There is a growing body of work that investigates alternate models for the interaction between the primary and secondary users in a cognitive radio network. In particular, the idea of cooperation at the physical layer has been considered from an information-theoretic perspective in many works. These are motivated by the work on the classical interference and relay channels. The main idea in these works is that the resources of the secondary user can be utilized to improve the performance of the primary transmissions. In return, the secondary user can obtain more transmission opportunities for its own data when the primary channel is idle. These works mainly treat the problem from a physical layer/information theoretic perspective and do not consider upper layer issues such as queuing, higher priority for primary user, etc. exploit the opportunities to transmit with increased throughput. With its remembrance capability, it can arrange a new call by a different carrier for those locations where calls with existing services drop. The fundamental features of CR technology have been shown in Fig.2. CR network serves as a framework in accessing the spectrum allocation dynamically, and spectrum opportunity deals with the usage of a free channel that is part of radio [8]. II. DESIGN AND IMPLEMENTATION Fig.3 shows the spectrum usage by PUs and the formation of free channels (also called white spaces). These free channels are in fact the opportunities for SUs to transmit. MAC protocols deal with the exchange of this type of information in the form of free channel list (FCL) amongst CR nodes. MAC protocols for CR networks can be broadly classified as centralized and decentralized. The centralized MAC protocols use a central entity, usually called a base station, which is responsible for detection, coordination and communication of multiple cognitive devices in a cognitive radio network [8] Cognitive radio (CR) technology is the solution to the shortage of spectrum and the inefficiency of its utilization. CR nodes are intelligent wireless devices that sense the environment, observe the network changes, and then use knowledge learnt from the previous interaction with the network and make intelligent decisions to seize the opportunities to transmit. This process of scanning the spectrum (S), exchanging control information (E), agreeing upon white space (A) and transmitting data (T) on the network is repeated continuously in a cycle called SEAT cycle. Fig.1 shows how a cognitive radio learns from its environment and tunes its transceivers to adapt the network changes. CR can autonomously detect the unoccupied spectrum and ISSN: 2231-5381 Fig 1: SEAT Cycle Fig2: Fundamental features of a cognitive radio http://www.ijettjournal.org Page 1459 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 form of a frame-train. Since longer occupancy of the spectrum by a cognitive user may cause a clash with the primary owner of the spectrum, the protocol shortly listens to the medium between two consecutive frame transmissions to ensure the availability of the spectrum. [6] Fig3: Spectrum usage by PUs and the formation of whitespaces. Dynamic channel selection is performed before packet transmissions and opportunistic utilization of an available channel is accomplished. Nodes are able to communicate with each other even without having any prior knowledge about the sensed spectrum characteristics of other nodes in the network. However in practice, nodes exchange the sensed channel characteristics (compressed in a binary format) inside the preamble sequence, which is transmitted before data. Channel maps of neighbours allow a node to avoid spatially local interferers as will be demonstrated. In each sensing cycle, a node scans the available channels sequentially for any potential spectral activity and updates the history and the associated channel weights. During the sensing operation, a node is also able to characterize the interferers, their strengths and occupancy levels. We use a heuristics based method for channel selection. Without compromising the baseline operation, any learning algorithm predicting the spectrum occupancy can be plugged in to the protocol for improving channel selection. Different components of the spectrum sensing and channel selection methods are shown in Fig.4. A transmitting node sends a repeated sequence of short preamble frames using the base rate modulation in the selected channel followed by data. Each frame contains control information such as the destination address, source address, timing offset for the data frame, the modulation scheme for data transmission and its own channel characteristics map. Fig.4 illustrates the various components of the MAC involving a packet transmission. A non-addressed node is also able to gather the spatial spectral characteristics of the transmitting node and other relevant meta-data by overhearing a preamble frame. If a unicast transmission is taking place, other nodes in the neighbourhood can also simultaneously utilize an available spectrum hole for data communication, resulting in higher capacity. In order to support variable data traffic volumes, the protocol is able to transmit multiple data frames back to back in the ISSN: 2231-5381 Fig 4: Simplified component diagram involving a packet transmission III. Proposed System In this paper I propose the cognitive networks are the secondary users are going to use the spectrum which is free in a particular time slot. These secondary users are going to use the unused space without affecting the primary users. For the usage of unused space by using femtocell. The femtocell cell is small base station; with this we will reuse the unused spectrum frequency in uncovered region also. While exchanging the sensed information by the nodes we are going to use zero knowledge protocol for security purpose. IV. Remarks and observations It is clear that the zero knowledge property and the soundness property have no say in the level of security that a system presents. It is of key importance to the security of a given protocol for it to depend on computationally difficult problems. No proofs exist for the most commonly used problems (e.g., integer factorization, knapsack problem, discrete logarithm, etc.), so the securities of the systems that use them are directly dependent on future developments in the field of Computational Complexity. [2] V. CONCLUSIONS AND FUTURE WORK In Stage I, the primary network offers the spectrum selling price to the cognitive base station. In Stage II, the cognitive base station decides to buy the spectrum size from a primary network and allocates the spectrum to femtocells or macro secondary users. In Stage III, the femtocell base station http://www.ijettjournal.org Page 1460 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 performs power allocation for the femtocell secondary users. Then we have used the backward induction method to solve the resource allocation and proved the existence and uniqueness of the Stackelberg game equilibrium. Our protocol dynamically selects an interference minimal channel using a distributed channel selection strategy. An available wireless channel can further be utilized in an opportunistic fashion with only a little overhead for potentially subsequent transmissions by keeping the nodes listening for a short duration to the available channel. Performance evaluation experiments conducted on a WARP testbed show that our protocol is able to deliver packets with high reliability and throughput in interfering environments. On the contrary, a random channel selection scheme shows very low packet delivery ratios. 5. 6. 7. 8. Femtocell Networks by Shao-Yu Lien in 2010. SWITCH: A Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks by Mohamed A. Kalil, Andr´e Puschmann and Andreas Mitschele-Thiel . Demo Abstract: A Decentralized MAC Protocol for Opportunistic Spectrum Access in Cognitive Wireless Networks by Junaid Ansari, Kackertstrasse 9, D52072, Aachen. Text Book Mobile cellular Telecommunications by william c.y.lee. An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks By Munam Ali Shah Sijing Zhang Carsten Maple in 2013. References: 1. Opportunistic Cooperation in Cognitive Femtocell Networks by Rahul Urgaonkar, Michael J. Neely in 2011. 2. A Primer on Zero Knowledge Protocols by Gerardo I. Simari in 2002. 3. Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc Networks: A POMDP Framework by Qing Zhao, Lang Tong in 2007. 4. Cognitive Radio Resource Management for QoS Guarantees in Autonomous ISSN: 2231-5381 http://www.ijettjournal.org Page 1461