TY - GEN
T1 - Dynamic spectrum access protocol without power mask constraints
AU - Salameh, Haythem Bany
AU - Krunz, Marwan
AU - Younis, Ossama
PY - 2009
Y1 - 2009
N2 - In this work, we investigate a statistical approach for dynamic spectrum access and radio resource management (RRM) in opportunistic cognitive radio (CR) networks. We propose a distributed MAC protocol for such networks that enables unlicensed users to dynamically utilize the available spectrum while limiting the imposed interference on primary (PR) users. Our proposed protocol is novel in three aspects. First, it does not require CR users to coordinate with PR users. Second, it does not assume any predefined CR-to-PR power mask, and thus can exploit the available spectrum more efficiently. Third, it provides the PR users with a statistical guarantee on the fraction of time that their reception may be corrupted by CR users. To avoid corrupting PR user receptions, the protocol computes the maximum power that a CR transmission can use based on current network conditions. We show how to compute this maximum power by deriving models for the PR-to-CR and PR-to-PR interference. Simulation experiments illustrate that our MAC protocol can satisfy the statistical guarantee for PR users under various user deployment models and traffic loads.
AB - In this work, we investigate a statistical approach for dynamic spectrum access and radio resource management (RRM) in opportunistic cognitive radio (CR) networks. We propose a distributed MAC protocol for such networks that enables unlicensed users to dynamically utilize the available spectrum while limiting the imposed interference on primary (PR) users. Our proposed protocol is novel in three aspects. First, it does not require CR users to coordinate with PR users. Second, it does not assume any predefined CR-to-PR power mask, and thus can exploit the available spectrum more efficiently. Third, it provides the PR users with a statistical guarantee on the fraction of time that their reception may be corrupted by CR users. To avoid corrupting PR user receptions, the protocol computes the maximum power that a CR transmission can use based on current network conditions. We show how to compute this maximum power by deriving models for the PR-to-CR and PR-to-PR interference. Simulation experiments illustrate that our MAC protocol can satisfy the statistical guarantee for PR users under various user deployment models and traffic loads.
UR - http://www.scopus.com/inward/record.url?scp=70349668643&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349668643&partnerID=8YFLogxK
U2 - 10.1109/INFCOM.2009.5062158
DO - 10.1109/INFCOM.2009.5062158
M3 - Conference contribution
AN - SCOPUS:70349668643
SN - 9781424435135
T3 - Proceedings - IEEE INFOCOM
SP - 2322
EP - 2330
BT - IEEE INFOCOM 2009 - The 28th Conference on Computer Communications
T2 - 28th Conference on Computer Communications, IEEE INFOCOM 2009
Y2 - 19 April 2009 through 25 April 2009
ER -