Transmission Power and Capacity of Secondary Users in a Dynamic Spectrum Access Network

Author(s):  
Xiaohua Li ◽  
Juite Hwu ◽  
Fan Ng
2018 ◽  
Vol 12 (18) ◽  
pp. 2243-2252 ◽  
Author(s):  
Anirudh Agarwal ◽  
Ranjan Gangopadhyay ◽  
Shivangi Dubey ◽  
Soumitra Debnath ◽  
Mohd Asif Khan

Author(s):  
Hui Sun ◽  
Han Han

Dynamic spectrum Access (DSA)is used to make use of the spectrum in wireless network. In most situations, control channel is a common approach to negotiation between secondary users. But, based on this feature, the attacker can destroy the communication network only influence the control center. So, in this paper, two methods without control channel are simulated in Qualent platform. The results prove that those methods are available, and the Receiver-directed channel selection is more match to the regular control channel standards in throughput.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7855
Author(s):  
Amr Amrallah ◽  
Ehab Mahmoud Mohamed ◽  
Gia Khanh Tran ◽  
Kei Sakaguchi

Modern wireless networks are notorious for being very dense, uncoordinated, and selfish, especially with greedy user needs. This leads to a critical scarcity problem in spectrum resources. The Dynamic Spectrum Access system (DSA) is considered a promising solution for this scarcity problem. With the aid of Unmanned Aerial Vehicles (UAVs), a post-disaster surveillance system is implemented using Cognitive Radio Network (CRN). UAVs are distributed in the disaster area to capture live images of the damaged area and send them to the disaster management center. CRN enables UAVs to utilize a portion of the spectrum of the Electronic Toll Collection (ETC) gates operating in the same area. In this paper, a joint transmission power selection, data-rate maximization, and interference mitigation problem is addressed. Considering all these conflicting parameters, this problem is investigated as a budget-constrained multi-player multi-armed bandit (MAB) problem. The whole process is done in a decentralized manner, where no information is exchanged between UAVs. To achieve this, two power-budget-aware PBA-MAB) algorithms, namely upper confidence bound (PBA-UCB (MAB) algorithm and Thompson sampling (PBA-TS) algorithm, were proposed to realize the selection of the transmission power value efficiently. The proposed PBA-MAB algorithms show outstanding performance over random power value selection in terms of achievable data rate.


2015 ◽  
Vol 8 (1) ◽  
pp. 140-148
Author(s):  
Chen Guizhen ◽  
Ding Enjie ◽  
Wang Gang ◽  
Xue Xue

This paper proposes a dynamic spectrum access system for underground wireless communication——a dynamic spectrum sharing system under interference temperature constrains. It can make the best of spectrum resources and improve the utilization efficiency. Then, a multi-dimensional Markov chain is used to model the system. On the basis, the secondary users’ performance under interference temperature constrains is obtained. As two important performance indexes to measure secondary users’ performance, cognitive users’ interrupting probability and blocking probability are calculated. Finally, cognitive users’ performance under different users’ access is analyzed, and the performances in dynamic spectrum access system and overlay access system are compared. Simulation results indicate that the dynamic spectrum sharing access system under interference temperature constrains is superior to the overlay access system and helpful to improve the spectrum sharing system in coal mines.


Author(s):  
Natarajan Meghanathan

A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed users. A cognitive radio network (CRN) is composed of both the secondary users with CR-enabled radios and the primary users whose radios need not be CR-enabled. In this chapter, the authors provide an exhaustive analysis of the issues and the state-of-the-art literature solutions available with regards to the following four layers of the TCP/IP protocol layer stack, in the context of CRNs: physical layer (spectrum sensing), medium access control, routing, and transport layers. We discuss the various techniques/mechanisms/protocols that have been proposed for each of these four layers, in the context of CRNs. In addition to the above, we discuss in detail several security attacks that could be launched on CRNs and the countermeasure solutions that have been proposed to avoid or mitigate them. This chapter serves as a good comprehensive review and analysis of all the critical aspects for CRNs, and would lay a strong foundation for someone to further delve onto any particular aspect in greater depth.


Sign in / Sign up

Export Citation Format

Share Document