Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United.

Slides:



Advertisements
Similar presentations
IEEE DRAFT RECOMMENDED PRACTICE Clause 14: Collaborative Coexistence Mechanism – IEEE and Steve Shellhammer (Symbol Technologies)
Advertisements

Doc.: IEEE /080r1 Submission January 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas,
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
MULTI-BAND CSMA/CA- BASED COGNITIVE RADIO NETWORKS Jo Woon Chong, Youngchul Sung, and Dan Keun Sung School of EECS KAIST IWCMC
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Coexistence Mechanism Using Dynamic Fragmentation for Interference Mitigation between Wi-Fi and Bluetooth David S. L. Wei Joint Work with Alex Chia-Chun.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
Medium Access Control Sublayer
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
BMWnet Wshnt.kuas.edu.tw Mesh Networks Prof. W.S. Hwang.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Lecture #2 Chapter 14 Wireless LANs.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Utility Based Scheduling in Cognitive Radio Networks Term Project CmpE-300 Analysis of Algorithms Spring 2009 Computer Engineering, Boğaziçi University,
by P. Sriploy, M. Uthansakul and R. Wongsan
Doc.: IEEE /206 Submission Slide 1 July 2000 Loraine, Micro Linear Corp. HRb performance requirements: PHY Overhead & Data Rate July 2000 Jerry.
Mingyuan Yan, Shouling Ji, and Zhipeng Cai Presented by: Mingyuan Yan.
Simulation Of A Cooperative Protocol For Common Control Channel Implementation Prepared by: Aishah Thaher Shymaa Khalaf Supervisor: Dr.Ahmed Al-Masri.
Cognitive Radio Networks
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Device-to-Device Communication in Cellular Networks Speaker: Tsung-Han Chiang Date: Feb. 24,
Tarun Bansal, Bo Chen and Prasun Sinha
Advanced Spectrum Management in Multicell OFDMA Networks enabling Cognitive Radio Usage F. Bernardo, J. Pérez-Romero, O. Sallent, R. Agustí Radio Communications.
Residual Energy Aware Channel Assignment in Cognitive Radio Sensor Networks Wireless Communications and Networking Conference (WCNC), 2011 IEEE Xiaoyuan.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
BLUETOOTH THROUGHPUT IMPROVEMENT USING A SLAVE TO SLAVE PICONET FORMATION By Christophe Lafon and Tariq S Durrani Institute for Communications & Signal.
Cognitive Radio: Next Generation Communication System
Static Spectrum Allocation
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Cognitive Radio
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
CHANNEL AWARE MEDIUM ACCESS CONTROL IN COGNITIVE RADIO NETWORKS
Doc.: IEEE sru Submission March 2011 Shoichi Kitazawa, ATRSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Chapter 15 Wireless LANs 15.# 1
Spectrum Sensing In Cognitive Radio Networks
WLAN.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
An Analytical Study of Wireless Error Models for Bluetooth Networks Hao-Hsiang Hung and Ling-Jyh Chen Academia Sinica.
Doc.: IEEE /00144r0 Submission 3/01 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Dialog with FCC Nada.
Doc.: IEEE /482r0 Submission October 2001 Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /117 Submission 11/99 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks MAC Performance Evaluation.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Ashish Rauniyar, Soo Young Shin IT Convergence Engineering
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
Experimental Evaluation of Co-existent LTE-U and Wi-Fi on ORBIT Problem DefinitionExperimental Procedure Results Observation WINLAB Conclusion Samuel
MAC Protocols for Sensor Networks
TELFOR 2015, Belgrade, Serbia, November Spectrum Sensing for the Unlicensed Band Cognitive Radio Nenad Milošević, Zorica Nikolić, Filip Jelenković,
A discussion on channel sensing techniques By James Xu.
MAC Protocols for Sensor Networks
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Communication Networks: Technology & Protocols
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Cognitive Radio Based 5G Wireless Networks
Enhancing the capacity of Spectrum Sharing in Cognitive Radio Network
Channel Allocation (MAC)
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Cognitive Radio Networks
SP Spatial Sharing among BSSs: Resolution to CID 143
Video Streaming over Cognitive radio networks
Presentation transcript:

Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United States Army Research Laboratory IEEE Communications Magazine 2007 Speaker: Chun Hsu 許君 1

Outline  Introduction  Sensing Methods: An Experimental Testbed  Modeling White Space: A Statistical Approach  Deriving Access Schemes: A Practical Example  Conclusion  Comments 2

Introduction  Spectrum scarcity is not a result of heavy usage of the spectrum; it is merely due to the inefficiency of the static frequency allocation.  Dynamic spectrum access (DSA) resolves this paradox by opening frequency bands to secondary users, provided that interference to the actual licensee is kept insignificant.  The majority of research, so far, has focused on DSA in the spatial domain. 3

Introduction – Hierarchical Access Model  This article focuses on  applying this concept in the time domain by exploiting idle periods between bursty transmissions of multi-access communication channels  addresses WLAN as an example of practical importance.  Hierarchical Access Model  The basic idea is to open licensed spectrum to secondary users and limit the interference perceived by primary users.  Based on Hierarchical Access Model, they design the cognitive radio so that both systems are orthogonal. 4

Introduction – Motivating example (1/2) 5 a) Complex baseband signal of an b-WLAN supporting a Skype conference call b) enlarged view of two subsequent packet transmissions

Introduction – Motivating example (1/2)  The existence of sufficient white space raises the questions:  How to exploit this resource in practice?  How complicated is a model that provides adequate prediction performance?  Given a model, how do we apply it to derive practical access schemes for the secondary system?  Are such schemes amenable to a real-time implementation, possibly on a battery powered device with processing limitations? 6

Sensing Methods – Testbed 7 VSA, Vector Signal Analyser: do signal measurement and characterization

Sensing Methods – Sensing Strategies  The strategies for detecting busy and idle periods can be classified according to whether the primary user’s transmission standard is known.  Energy-based detection  Feature-based detection  improve the detection performance by exploiting standard specifics.  For the b, we can find the start of packets by locking onto the synchronization preamble of the transmitted packets.  By decoding the LENGTH field within the preamble, we can find the exact packet duration. 8

Modeling White Space  Based on the data collected from testbed, they develop a statistical model that allows us to predict the channel’s behavior. Two components:  The states of the channel and their transition behavior  How long the system resides in each of the states 9 No packet transmission

Modeling White Space - Occupancy Durations  The sojourn time in the TRANSMIT state is primarily affected by the traffic characteristics and the scheduler employed in the adapter cards and the wireless router.  IDLE state  either due to the contention window or a truly free channel  This suggests a mixture distribution.  the contention period shows an almost uniformly distributed sojourn time  a free state exhibits heavy-tailed behavior that is well approximated by a generalized Pareto distribution. 10

Modeling White Space - Goodness-of-fit analysis for constant payload UDP traffic 11 Hyper-Erlang provide a viable approximation to fat-tailed distribution which leads to the self-similar traffic.

Modeling White Space – goodness-of-fit analysis for Non- stationary traffic 12 Significant Level α The Kolmogorov-Smirnov test (KS-test) tries to determine if two datasets differ significantly.

Bluetooth/WLAN Coexistence  The coexistence between Bluetooth and WLAN in the unlicensed ISM band is of significant practical concern,  because mutual interference can severely limit the performance of both systems.  ISM band around 2.4GHz  Adaptive Frequency Hopping  The sensing and classification of channels according to their interference.  The adaptation of the hopping sequence such that “bad” channels are avoided whenever possible. 13

Bluetooth Collisions resulting from random frequency hopping Adapting to the environment CH CH CH14(JPN)

Bluetooth 1.2 and beyond Adaptive Frequency Hopping 15 Collisions avoided using Adaptive Frequency Hopping CH CH CH14(JPN)

Enhanced Hopping Scheme  At the beginning of each slot, the current channel is sensed.  If the presence of a WLAN packet is detected, no transmission takes place since this inevitably would lead to a collision.  If no WLAN packet is detected, a collision still can occur if the WLAN becomes active during the subsequent slot.  By initiating a transmission only with a certain probability γ <=1, even if the channel is sensed idle.  The probability of collision depends on the WLAN traffic characteristics.  we employ our model to find the probability that conditioned on the channel having been idle for k slots.  By obtaining this probability, we can design γ such that collisions with the WLAN occur with a probability smaller than some interference constraint. 16

Performance evaluation 17

Conclusion  We addressed the problem of dynamically accessing spectrum in the time domain by taking advantage of white space.  The proposed model statistically captures the medium access of the WLAN but remains tractable enough to be used for deriving practical access schemes for the secondary user.  As an example, we have illustrated how our model could be used to enhance the coexistence between WLAN and Bluetooth in the unlicensed ISM band. 18

Comments  The Heuristic Scheme is not defined clearly in this paper.  The general scheme should be taken into consideration to compare with the Heuristic Scheme in the simulation of collision probability. 19