• Title/Summary/Keyword: spectrum access

Search Result 389, Processing Time 0.025 seconds

Opportunistic Spectrum Access Based on a Constrained Multi-Armed Bandit Formulation

  • Ai, Jing;Abouzeid, Alhussein A.
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.134-147
    • /
    • 2009
  • Tracking and exploiting instantaneous spectrum opportunities are fundamental challenges in opportunistic spectrum access (OSA) in presence of the bursty traffic of primary users and the limited spectrum sensing capability of secondary users. In order to take advantage of the history of spectrum sensing and access decisions, a sequential decision framework is widely used to design optimal policies. However, many existing schemes, based on a partially observed Markov decision process (POMDP) framework, reveal that optimal policies are non-stationary in nature which renders them difficult to calculate and implement. Therefore, this work pursues stationary OSA policies, which are thereby efficient yet low-complexity, while still incorporating many practical factors, such as spectrum sensing errors and a priori unknown statistical spectrum knowledge. First, with an approximation on channel evolution, OSA is formulated in a multi-armed bandit (MAB) framework. As a result, the optimal policy is specified by the wellknown Gittins index rule, where the channel with the largest Gittins index is always selected. Then, closed-form formulas are derived for the Gittins indices with tunable approximation, and the design of a reinforcement learning algorithm is presented for calculating the Gittins indices, depending on whether the Markovian channel parameters are available a priori or not. Finally, the superiority of the scheme is presented via extensive experiments compared to other existing schemes in terms of the quality of policies and optimality.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Legal Reform Agenda for Open Spectrum Access (개방형 전파 사용을 위한 법 제도 개선 방안)

  • Lee, Hee Jung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.10
    • /
    • pp.995-1004
    • /
    • 2014
  • Due to the development of spectrum use technology and various services based on radio spectrum, the scarcity of spectrum has been heightened. In this circumstances both the efficiency and fairness of spectrum use need to be raised. Open spectrum access can be a useful approach for both goal. For the open spectrum access the legal institution needs to be reformed to enable it. From the starting point of spectrum use till the end of spectrum use there can be various issues of rights and obligations. So the legal institution for various legal status of spectrum use and establishment and continuous management of DB and fast and respectable dispute resolution mechanism is required.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

A Novel Definition of Spectrum Holes for Improved Spectrum Utilization Efficiency

  • Li, Xiaoqiang;Zhou, Qi;Dai, Hui;Zhang, Jie;Li, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.749-761
    • /
    • 2014
  • Improving spectrum utilization efficiency is a fundamental goal of dynamic spectrum access technology. The definition of spectrum holes determines how to detect and exploit them. Current definitions of spectrum holes are ineffective in exploiting spatial-temporal spectrum holes. In this paper, a novel definition of spectrum holes is proposed, in which throughput loss indicates the impact of secondary users on primary users. The definition specifies spectrum holes, unifies the impact of secondary users on primary users and is effective exploiting spatial-temporal spectrum holes. Theoretical analysis and numerical simulations show that the new definition proposed in this paper significantly improves the spectrum utilization efficiency.

Sensing Period Adaptation using the Cost Function in the Cognitive Radio Networks (인지 무선 네트워크에서 시스템 비용함수를 이용한 적응적 센싱주기)

  • Gao, Xiang;Park, Hyung-Kun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.2
    • /
    • pp.321-323
    • /
    • 2012
  • Cognitive radio has been recently proposed to dynamically access unused-spectrum. Since the spectrum availability for opportunistic access is determined by spectrum sensing, sensing is identified as one of the most crucial issues of cognitive radio networks. The PHY-layer sensing, as a part of spectrum sensing in cognitive radio, concerns the sensing mechanism to determine channel to be sensed and to access. One of the important issues in the PHY-layer sensing control is to find an available sensing period and trade-off between spectrum sensing and data transmission. In this paper, we show the relationship between spectrum sensing and data transmission according to the sensing period. We analyze and propose the new scheme to evaluate optimal sensing period.

Spectrum Management Models for Cognitive Radios

  • Kaur, Prabhjot;Khosla, Arun;Uddin, Moin
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.222-227
    • /
    • 2013
  • This paper presents an analytical framework for dynamic spectrum allocation in cognitive radio networks. We propose a distributed queuing based Markovian model each for single channel and multiple channels access for a contending user. Knowledge about spectrum mobility is one of the most challenging problems in both these setups. To solve this, we consider probabilistic channel availability in case of licensed channel detection for single channel allocation, while variable data rates are considered using channel aggregation technique in the multiple channel access model. These models are designed for a centralized architecture to enable dynamic spectrum allocation and are compared on the basis of access latency and service duration.

Joint resource optimization for nonorthogonal multiple access-enhanced scalable video coding multicast in unmanned aerial vehicle-assisted radio-access networks

  • Ziyuan Tong;Hang Shen;Ning Shi;Tianjing Wang;Guangwei Bai
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.874-886
    • /
    • 2023
  • A joint resource-optimization scheme is investigated for nonorthogonal multiple access (NOMA)-enhanced scalable video coding (SVC) multicast in unmanned aerial vehicle (UAV)-assisted radio-access networks (RANs). This scheme allows a ground base station and UAVs to simultaneously multicast successive video layers in SVC with successive interference cancellation in NOMA. A video quality-maximization problem is formulated as a mixed-integer nonlinear programming problem to determine the UAV deployment and association, RAN spectrum allocation for multicast groups, and UAV transmit power. The optimization problem is decoupled into the UAV deployment-association, spectrum-partition, and UAV transmit-power-control subproblems. A heuristic strategy is designed to determine the UAV deployment and association patterns. An upgraded knapsack algorithm is developed to solve spectrum partition, followed by fast UAV power fine-tuning to further boost the performance. The simulation results confirm that the proposed scheme improves the average peak signal-to-noise ratio, aggregate videoreception rate, and spectrum utilization over various baselines.

PERFORMANCE OF MYOPIC POLICY FOR OPPORTUNISTIC SPECTRUM SHARING

  • Lee, Yu-Tae
    • East Asian mathematical journal
    • /
    • v.27 no.1
    • /
    • pp.23-33
    • /
    • 2011
  • Due to underutilization of spectrum under current inefficient and static spectrum management policy, various kinds of opportunistic spectrum access (OSA) strategies have appeared. Myopic policy is a simple and robust OSA strategy with reduced complexity that maximizes immediate throughput. In this paper, we propose mathematical models to evaluate the throughput and the MAC delay of a myopic policy under saturation tra c conditions. Using the MAC delay distribution, we evaluate the packet delay of secondary users under nonsaturation conditions. Numerical results are given to show the performance of the myopic policy in cognitive radio networks.

MODELING AND ANALYSIS FOR OPPORTUNISTIC SPECTRUM ACCESS

  • Lee, Yu-Tae;Sim, Dong-Bo
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.5_6
    • /
    • pp.1295-1302
    • /
    • 2011
  • We present an analytic model of an unslotted opportunistic spectrum access (OSA) network and evaluate its performance such as interruption probability, service completion time, and throughput of secondary users. Numerical examples are given to show the performance of secondary users in cognitive networks. The developed modeling and analysis method can be used to evaluate the performance of various OSA networks.