4,608 research outputs found

    Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing

    Get PDF
    To promote economic growth and unleash the potential of wireless broadband, there is a need to introduce more spectrally efficient technologies and spectrum management regimes. That led to an environment where commercial wireless broadband need to share spectrum with the federal and non-federal operations. Implementing sharing regimes on a non-opportunistic basis means that sharing agreements must be implemented. To have meaning, those agreements must be enforceable.\ud \ud With the significant exception of license-free wireless systems, commercial wireless services are based on exclusive use. With the policy change facilitating spectrum sharing, it becomes necessary to consider how sharing might take place in practice. Beyond the technical aspects of sharing, that must be resolved lie questions about how usage rights are appropriately determined and enforced. This paper is reasoning about enforcement in a particular spectrum bands (1695-1710 MHz and 3.5 GHz) that are currently being proposed for sharing between commercial services and incumbent spectrum users in the US. We examine three enforcement approaches, exclusion zones, protection zones and pure ex post and consider their implications in terms of cost elements, opportunity cost, and their adaptability

    Distributed Power Allocation Algorithm for General Authorised Access in Spectrum Access System

    Full text link
    © 2019 IEEE. To meet the capacity needs of the next generation wireless communications, U.S. Federal Communications Commission has recently introduced Spectrum Access System. Spectrum is shared between three tiers - Incumbents, Priority Access Licensees (PAL) and General Authorised Access (GAA) Licensees. When the incumbents are absent, PAL and GAA share the spectrum under the constraint that GAA ensure the aggregate interference to PAL is no more than -80 dBm within the PAL protection area. Currently GAA users are required to report their geolocations. However, geolocation is private information that GAA may not be willing to share. We propose a distributed GAA power allocation algorithm that does not require centralised coordination on sharing locations with other GAA users via SAS. We analytically proved the critical point of the interference along the PAL protection area to avoid calculating the interference on every points of the area. We proposed exclusion zone, transitional zone and open zone for GAA users to calculate the self-determined transmit power. Simulation results show that our method meets the interference requirement and achieve more than 90% of capacity approximation to the optimal centralised method, while completely masking the GAA locations

    Invisible hands behind 3.5GHz spectrum sharing

    Get PDF
    There has been considerable discussion surrounding the barriers to spectrum sharing in the literature. Among those is the ‘trust gap’ that exists, according to the PCAST report. Trust is a complex human construct that significantly includes risk. In this paper, we examine the risks faced by the different user classes proposed by the FCC for sharing in the 3.5 GHz band. We argue that the “invisible hands” of spectrum sharing in this band is the balance between spectrum sharing gain and associated risks. We find that both gains and risks can be linked to the distance between incumbents’ systems and Citizen Broadband Radio Services (CBRS)’ systems. The risk portfolio is linked to spectrum rights that each tier has, since the rights they have determine risks and risk mitigation strategies. We further propose a model to calculate spectrum sharing utilities for different tiers. The optimized utility determines the distance between incumbents and CBRS systems

    ASCENT: A Context-Aware Spectrum Coexistence Design and Implementation Toolset for Policymakers in Satellite Bands

    Full text link
    This paper introduces ASCENT (context Aware Spectrum Coexistence Design and Implementation) toolset, an advanced context-aware terrestrial satellite spectrum sharing toolset designed for researchers, policymakers, and regulators. It serves two essential purposes (a) evaluating the potential for harmful interference to primary users in satellite bands and (b) facilitating the analysis, design, and implementation of diverse regulatory policies on spectrum usage and sharing. Notably, ASCENT implements a closed-loop feedback system that allows dynamic adaptation of policies according to a wide range of contextual factors (e.g., weather, buildings, summer/winter foliage, etc.) and feedback on the impact of these policies through realistic simulation. Specifically, ASCENT comprises the following components (i) interference evaluation tool for evaluating interference at the incumbents in a spectrum-sharing environment while taking the underlying contexts, (ii) dynamic spectrum access (DSA) framework for providing context-aware instructions to adapt networking parameters and control secondary terrestrial network's access to the shared spectrum band according to context aware prioritization, (iii) Context broker to acquire essential and relevant contexts from external context information providers; and (iv) DSA Database to store dynamic and static contexts and the regulator's policy information. The closed-loop feedback system of ASCENT is implemented by integrating these components in a modular software architecture. A case study of sharing the lower 12 GHz Ku band (12.2-12.7 GHz) with the 5G terrestrial cellular network is considered, and the usability of ASCENT is demonstrated by dynamically changing exclusion zone's radius in different weather conditions

    Licensed Shared Access Evolution to Provide Exclusive and Dynamic Shared Spectrum Access for Novel 5G Use Cases

    Get PDF
    This chapter studies the Licensed Shared Access (LSA) concept, which was initially developed to enable the use of the vacant spectrum resources in 2.3–2.4 GHz band for mobile broadband (MBB) through long-term static licenses. The LSA system was developed to guarantee LSA licensees a predictable quality of service (QoS) and exclusive access to shared spectrum resources. This chapter describes the development and architecture of LSA for 2.3–2.4 GHz band and compares the LSA briefly to the Spectrum Access System (SAS) concept developed in the USA. 5G and its new use cases require a more dynamic approach to access shared spectrum resources than the LSA system developed for 2.3–2.4 GHz band can provide. Thus, a concept called LSA evolution is currently under development. The novel concepts introduced in LSA evolution include spectrum sensing, short-term license periods, possibility to allocate spectrum locally, and support for co-primary sharing, which can guarantee the quality of service (QoS) from spectrum perspective. The chapter also describes a demonstration of LSA evolution system with spectrum user prioritization, which was created for Programme Making and Special Events (PMSE) use case

    Interference-aware multi-hop path selection for device-to-device communications in a cellular interference environment

    Get PDF
    Device-to-Device (D2D) communications is widely seen as an efficient network capacity scaling technology. The co-existence of D2D with conventional cellular (CC) transmissions causes unwanted interference. Existing techniques have focused on improving the throughput of D2D communications by optimising the radio resource management and power allocation. However, very little is understood about the impact of the route selection of the users and how optimal routing can reduce interference and improve the overall network capacity. In fact, traditional wisdom indicates that minimising the number of hops or the total path distance is preferable. Yet, when interference is considered, we show that this is not the case. In this paper, we show that by understanding the location of the user, an interference-aware routing algorithm can be devised. We propose an adaptive Interference-Aware-Routing (IAR) algorithm, that on average achieves a 30% increase in hop distance, but can improve the overall network capacity by 50% whilst only incurring a minor 2% degradation to the CC capacity. The analysis framework and the results open up new avenues of research in location-dependent optimization in wireless systems, which is particularly important for increasingly dense and semantic-aware deployments

    Intelligent spectrum management techniques for wireless cognitive radio networks

    Get PDF
    PhD ThesisThis thesis addresses many of the unique spectrum management chal- lenges in CR networks for the rst time. These challenges have a vital e ect on the network performance and are particularly di cult to solve due to the unique characteristics of CR networks. Speci cally, this thesis proposes and investigates three intelligent spectrum management tech- niques for CR networks. The issues investigated in this thesis have a fundamental impact on the establishment, functionality and security of CR networks. First, an intelligent primary receiver-aware message exchange protocol for CR ad hoc networks is proposed. It considers the problem of alleviat- ing the interference collision risk to primary user communication, explic- itly to protect primary receivers that are not detected during spectrum sensing. The proposed protocol achieves a higher measure of safeguard- ing. A practical scenario is considered where no global network topology is known and no common control channel is assumed to exist. Second, a novel CR broadcast protocol (CRBP) to reliably disseminate the broadcast messages to all or most of the possible CR nodes in the network is proposed. The CRBP formulates the broadcast problem as a bipartite-graph problem. Thus, CRBP achieves a signi cant successful delivery ratio by connecting di erent local topologies, which is a unique feature in CR ad hoc networks. Finally, a new defence strategy to defend against spectrum sensing data falsi cation attacks in CR networks is proposed. In order to identify malicious users, the proposed scheme performs multiple veri cations of sensory data with the assistance of trusted nodes.Higher Committee For Education Devel- opment in Iraq (HCED-Iraq

    Analyzing Usage Conflict Situations in Localized Spectrum Sharing Scenarios: An Agent-Based Modeling and Machine Learning Approach

    Get PDF
    As spectrum sharing matures, different approaches have been proposed for a more efficient allocation, assignment, and usage of spectrum resources. These approaches include cognitive radios, multi-level user definitions, radio environment maps, among others. However, spectrum usage conflicts (e.g., "harmful" interference) remain a common challenge in spectrum sharing schemes. In particular, in conflict situations where it is necessary to take actions to ensure the sound operations of sharing agreements. A typical example of a usage conflict is where incumbents' tolerable levels of interference (i.e., interference thresholds) are surpassed. In this work, we present a new method to examine and study spectrum usage conflicts. A fundamental goal of this project is to capture local resource usage patterns to provide more realistic estimates of interference. For this purpose, we have defined two spectrum and network-specific characteristics that directly impact the local interference assessment: resource access strategy and governance framework. Thus, we are able to test the viability in spectrum sharing situations of distributed or decentralized governance systems, including polycentric and self-governance. In addition, we are able to design, model, and test a multi-tier spectrum sharing scheme that provides stakeholders with more flexible resource access opportunities. To perform this dynamic and localized study of spectrum usage and conflicts, we rely on Agent-Based Modeling (ABM) as our main analysis instrument. A crucial component for capturing local resource usage patterns is to provide agents with local information about their spectrum situation. Thus, the environment of the models presented in this dissertation are given by the REM's Interference Cartography (IC) map. Additionally, the agents' definitions and actions are the results of the interaction of the technical aspects of resource access and management, stakeholder interactions, and the underlying usage patterns as defined in the Common Pool Resource (CPR) literature. Finally, to capture local resource usage patterns and, consequently, provide more realistic estimates of conflict situations, we enhance the classical rule-based ABM approach by using Machine Learning (ML) techniques. Via ML algorithms, we refine the internal models of agents in an ABM. Thus, the agents' internal models allow them to choose more suitable responses to changes in the environment

    Spectrum Matching in Licensed Spectrum

    Get PDF
    Spectrum sharing is one of the promising solutions to meet the spectrum demand in 5G networks that results from the emerging services like machine to machine and vehicle to infrastructure communication. The idea is to allow a set of entities access the spectrum whenever and wherever it is unused by the licensed users. In the proposed framework, different spectrum provider (SP) networks with surplus spectrum available may rank the operators requiring the spectrum, called spectrum users (SUs) hereafter, differently in terms of their preference to lease spectrum, based for example on target business market considerations of the SUs. Similarly, SUs rank SPs depending on a number of criteria, for example based on coverage and availability in a service area. Ideally, both SPs and SUs prefer to provide/get spectrum to/from the operator of their first choice, but this is not necessarily always possible due to conflicting preferences. We apply matching theory algorithms with the aim to resolve the conflicting preferences of the SPs and SUs and quantify the effect of the proposed matching theory approach on establishing preferred (spectrum) provider-user network pairs. We discuss both one-to-one and many-to-one spectrum sharing scenarios and evaluate the performance using Monte Carlo simulations. The results show that comprehensive gains in terms of preferred matching of the provider-user network pairs can be achieved by applying matching theory for spectrum sharing as compared to uncoordinated spectrum allocation of the available spectrum to the SUs

    Spectrum Sharing and SAS-CBSD Interface Simulation

    Get PDF
    Spectrum Sharing technologies enables more dynamic spectrum management regulation and framework to provide capacity for the ever-increasing demand of mobile data traffic. This thesis reviewed the background and current state of the development of Spectrum Sharing approaches. TVWS, LSA and CBRS were examined in detail as the most representative solutions. The thesis compared architectural similarities and differences between LSA and CBRS. The thesis reviewed SAS-CBSD interface protocol and continued with a practical validation of SAS-CBSD interface specification. By implementing the interface in Python, interface simulation was conducted via the assistance of automation scripts. The thesis concluded that the SAS-CBSD interface is functioning as designed, noting that ESC will further extend the spectrum access dynamism. The thesis also pointed out the need to specify SAS-relevant data models for database API standardization
    • 

    corecore