17,526 research outputs found
Sensing-Throughput Tradeoff for Interweave Cognitive Radio System: A Deployment-Centric Viewpoint
Secondary access to the licensed spectrum is viable only if interference is
avoided at the primary system. In this regard, different paradigms have been
conceptualized in the existing literature. Of these, Interweave Systems (ISs)
that employ spectrum sensing have been widely investigated. Baseline models
investigated in the literature characterize the performance of IS in terms of a
sensing-throughput tradeoff, however, this characterization assumes the
knowledge of the involved channels at the secondary transmitter, which is
unavailable in practice. Motivated by this fact, we establish a novel approach
that incorporates channel estimation in the system model, and consequently
investigate the impact of imperfect channel estimation on the performance of
the IS. More particularly, the variation induced in the detection probability
affects the detector's performance at the secondary transmitter, which may
result in severe interference at the primary users. In this view, we propose to
employ average and outage constraints on the detection probability, in order to
capture the performance of the IS. Our analysis reveals that with an
appropriate choice of the estimation time determined by the proposed model, the
degradation in performance of the IS can be effectively controlled, and
subsequently the achievable secondary throughput can be significantly enhanced.Comment: 13 pages, 10 figures, Accepted to be published in IEEE Transactions
on Wireless Communication
Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver
Spectrum access is an important function of cognitive radios for detecting
and utilizing spectrum holes without interfering with the legacy systems. In
this paper we propose novel cooperative communication models and show how
deploying such cooperations between a pair of secondary transmitter and
receiver assists them in identifying spectrum opportunities more reliably.
These cooperations are facilitated by dynamically and opportunistically
assigning one of the secondary users as a relay to assist the other one which
results in more efficient spectrum hole detection. Also, we investigate the
impact of erroneous detection of spectrum holes and thereof missing
communication opportunities on the capacity of the secondary channel. The
capacity of the secondary users with interference-avoiding spectrum access is
affected by 1) how effectively the availability of vacant spectrum is sensed by
the secondary transmitter-receiver pair, and 2) how correlated are the
perceptions of the secondary transmitter-receiver pair about network spectral
activity. We show that both factors are improved by using the proposed
cooperative protocols. One of the proposed protocols requires explicit
information exchange in the network. Such information exchange in practice is
prone to wireless channel errors (i.e., is imperfect) and costs bandwidth loss.
We analyze the effects of such imperfect information exchange on the capacity
as well as the effect of bandwidth cost on the achievable throughput. The
protocols are also extended to multiuser secondary networks.Comment: 36 pages, 6 figures, To appear in IEEE Transaction on Mobile
Computin
Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments
In this paper we describe a model for calculating the aggregate interference
encountered by primary receivers in the presence of randomly placed cognitive
radios (CRs). We show that incorporating the impact of distance attenuation and
lognormal fading on each constituent interferer in the aggregate, leads to a
composite interference that cannot be satisfactorily modeled by a lognormal.
Using the interference statistics we determine a number of key parameters
needed for the deployment of CRs. Examples of these are the exclusion zone
radius, needed to protect the primary receiver under different types of fading
environments and acceptable interference levels, and the numbers of CRs that
can be deployed. We further show that if the CRs have apriori knowledge of the
radio environment map (REM), then a much larger number of CRs can be deployed
especially in a high density environment. Given REM information, we also look
at the CR numbers achieved by two different types of techniques to process the
scheduling information.Comment: to be presented at IEEE ICC 2009. This posting is the same as the
original one. Only author's list is updated that was unfortunately not
correctly mentioned in first versio
On the Estimation of Channel State Transitions for Cognitive Radio Systems
Coexistence by means of shared access is a cognitive radio application. The
secondary user models the slotted primary users channel access as a Markov
process. The model parameters, i.e, the state transition probabilities
(alpha,beta) help secondary user to determine the channel occupancy, thereby
enables secondary user to rank the primary user channels. These parameters are
unknown and need to be estimated by secondary users for each channel. To do so,
the secondary users have to sense all the primary user channels in every time
slot, which is unrealistic for a large and sparsely allocated primary user
spectrum. With no other choice left, the secondary user has to sense a channel
at random time intervals and estimate the parametric information for all the
channels using the observed slots.Comment: 6 page
Spectrum Utilization and Congestion of IEEE 802.11 Networks in the 2.4 GHz ISM Band
Wi-Fi technology, plays a major role in society thanks to its widespread availability, ease of use and low cost. To assure its long term viability in terms of capacity and ability to share the spectrum efficiently, it is of paramount to study the spectrum utilization and congestion mechanisms in live environments. In this paper the service level in the 2.4 GHz ISM band is investigated with focus on todays IEEE 802.11 WLAN systems with support for the 802.11e extension. Here service level means the overall Quality of Service (QoS), i.e. can all devices fulfill their communication needs? A crosslayer approach is used, since the service level can be measured at several levels of the protocol stack. The focus is on monitoring at both the Physical (PHY) and the Medium Access Control (MAC) link layer simultaneously by performing respectively power measurements with a spectrum analyzer to assess spectrum utilization and packet sniffing to measure the congestion. Compared to traditional QoS analysis in 802.11 networks, packet sniffing allows to study the occurring congestion mechanisms more thoroughly. The monitoring is applied for the following two cases. First the influence of interference between WLAN networks sharing the same radio channel is investigated in a controlled environment. It turns out that retry rate, Clear-ToSend (CTS), Request-To-Send (RTS) and (Block) Acknowledgment (ACK) frames can be used to identify congestion, whereas the spectrum analyzer is employed to identify the source of interference. Secondly, live measurements are performed at three locations to identify this type of interference in real-live situations. Results show inefficient use of the wireless medium in certain scenarios, due to a large portion of management and control frames compared to data content frames (i.e. only 21% of the frames is identified as data frames)
- …