Spelling suggestions: "subject:"spectrumsharing"" "subject:"spectrum.starting""
51 |
A CMA-FRESH Whitening Filter for Blind Interference RejectionJauhar, Ahmad Shujauddin 16 October 2018 (has links)
The advent of spectrum sharing has increased the need for robust interference rejection methods. The Citizens Broadband Radio Service (CBRS) band is soon to be occupied by LTE waveforms and License Assisted Access (LAA) will have LTE signals coexisting with other signals in the 5 GHz band. In anticipation of this need, we present a method for interference rejection of cyclostationary signals, which can also help avoid interference through better detection of low power co-channel signals. The method proposed in this thesis consists of a frequency-shift (FRESH) filter which acts as a whitening filter, canceling the interference by exploiting its cyclostationarity. It learns the cyclostationary characteristics of the interferer blindly, through a property restoration algorithm which aims to drive the spectrum to white noise. The property restoration algorithm, inspired by the constant modulus algorithm (CMA), is applied to each frequency bin to determine the optimal coefficients for the proposed CMA FRESH whitening filter (CFW). The performance of the CFW in interference rejection is compared to a time-invariant version, and proposed use cases are analyzed. The use cases consist of the rejection of a high powered, wider bandwidth interferer which is masking the signal-of-interest (SOI). The interferer is rejected blindly, with no knowledge of its characteristics. We analyzed signal detection performance in the case that the SOI is another user with much lower power, for multiple types of SOIs ranging from BPSK to OFDM. We also deal with the case that the SOI is to be received and demodulated; we recover it and compare resulting bit error rates to state of the art FRESH filters. The results show significantly better signal detection and recovery. / Master of Science / Wireless communication is complicated by the fact that multiple radios may be attempting to transmit at the same frequency, time and location concurrently. This scenario may be a due to malicious intent by certain radios (jamming), or mere confusion due to a lack of knowledge that another radio is transmitting in the same channel. The latter scenario is more common due to congested wireless spectrum, as the number of devices increases exponentially. In either case, interference results. We present a novel interference rejection method in this work, one that is blind to the properties of the interferer and adapts to cancel it. It follows the philosophy of property restoration as extolled by the constant modulus algorithm (CMA) and is a frequency shift (FRESH) filter, hence the name. The process of restoring the wireless spectrum to white noise is what makes it a whitening filter, and is also how it adapts to cancel interference. Such a filter has myriad possible uses, and we examine the use case of rejecting interference to detect or recover the signal-of-interest (SOI) that we are attempting to receive. We present performance results in both cases and compare with conventional time-invariant filters and state of the art FRESH filters.
|
52 |
Transmitter Authentication in Dynamic Spectrum SharingKumar, Vireshwar 02 February 2017 (has links)
Recent advances in spectrum access technologies, such as software-defined radios, have made dynamic spectrum sharing (DSS) a viable option for addressing the spectrum shortage problem. However, these advances have also contributed to the increased possibility of "rogue" transmitter radios which may cause significant interference to other radios in DSS. One approach for countering such threats is to employ a transmitter authentication scheme at the physical (PHY) layer. In PHY-layer authentication, an authentication signal is generated by the transmitter, and embedded into the message signal. This enables a regulatory enforcement entity to extract the authentication signal from the received signal, uniquely identify a transmitter, and collect verifiable evidence of a rogue transmission that can be used later during an adjudication process. There are two primary technical challenges in devising a transmitter authentication scheme for DSS: (1) how to generate and verify the authentication signal such that the required security and privacy criteria are met; and (2) how to embed and extract the authentication signal without negatively impacting the performance of the transmitters and the receivers in DSS. With regard to dealing with the first challenge, the authentication schemes in the prior art, which provide privacy-preserving authentication, have limited practical value for use in large networks due to the high computational complexity of their revocation check procedures. In this dissertation, the novel approaches which significantly improve scalability of the transmitter authentication with respect to revocation, are proposed. With regard to dealing with the second challenge, in the existing PHY-layer authentication techniques, the authentication signal is embedded into the message signal in such a way that the authentication signal appears as noise to the message signal and vice versa. Hence, existing schemes are constrained by a fundamental tradeoff between the message signal's signal to interference and noise ratio (SINR) and the authentication signal's SINR. In this dissertation, the novel approaches which are not constrained by the aforementioned tradeoff between message and authentication signals, are proposed. / Ph. D. / Recent advances in spectrum access technologies, such as software-defined radios, have made dynamic spectrum sharing (DSS) a viable option for addressing the spectrum shortage problem. However, these advances have also contributed to the increased possibility of “rogue” transmitter radios which may cause significant interference to other radios in DSS. One approach for countering such threats is to employ a <i>transmitter authentication</i> scheme at the physical (PHY) layer. In PHY-layer authentication, an authentication signal is generated by the transmitter, and embedded into the message signal. This enables a regulatory enforcement entity to extract the authentication signal from the received signal, uniquely identify a transmitter, and collect verifiable evidence of a rogue transmission that can be used later during an adjudication process. There are two primary technical challenges in devising a transmitter authentication scheme for DSS: (1) how to generate and verify the authentication signal such that the required security and privacy criteria are met; and (2) how to embed and extract the authentication signal without negatively impacting the performance of the transmitters and the receivers in DSS. With regard to dealing with the first challenge, the authentication schemes in the prior art, which provide privacy-preserving authentication, have limited practical value for use in large networks due to the high computational complexity of their revocation check procedures. In this dissertation, the novel approaches which significantly improve scalability of the transmitter authentication with respect to revocation, are proposed. With regard to dealing with the second challenge, in the existing PHY-layer authentication techniques, the authentication signal is embedded into the message signal in such a way that the authentication signal appears as noise to the message signal and vice versa. Hence, existing schemes are constrained by a fundamental tradeoff between the message signal’s signal to interference and noise ratio (SINR) and the authentication signal’s SINR. In this dissertation, the novel approaches which are not constrained by the aforementioned tradeoff between message and authentication signals, are proposed.
|
53 |
Resource Allocation in Underlay and Overlay Spectrum SharingLv, Jing 20 January 2015 (has links) (PDF)
As the wireless communication technologies evolve and the demand of wireless services increases, spectrum scarcity becomes a bottleneck that limits the introduction of new technologies and services. Spectrum sharing between primary and secondary users has been brought up to improve spectrum efficiency.
In underlay spectrum sharing, the secondary user transmits simultaneously with the primary user, under the constraint that the interference induced at the primary receiver is below a certain threshold, or a certain primary rate requirement has to be satisfied. Specifically, in this thesis, the coexistence of a multiple-input single-output (MISO) primary link and a MISO/multiple-input multiple-output (MIMO) secondary link is studied. The primary transmitter employs maximum ratio transmission (MRT), and single-user decoding is deployed at the primary receiver. Three scenarios are investigated, in terms of the interference from the primary transmitter to the secondary receiver, namely, weak interference, strong interference and very strong interference, or equivalently three ranges of primary rate requirement. Rate splitting and successive decoding are deployed at the secondary transmitter and receiver, respectively, when it is feasible, and otherwise single-user decoding is deployed at the secondary receiver. For each scenario, optimal beamforming/precoding and power allocation at the secondary transmitter is derived, to maximize the achievable secondary rate while satisfying the primary rate requirement and the secondary power constraint. Numerical results show that rate splitting at the secondary transmitter and successive decoding at the secondary receiver does significantly increase the achievable secondary rate if feasible, compared with single-user decoding at the secondary receiver.
In overlay spectrum sharing, different from underlay spectrum sharing, the secondary transmitter can utilize the knowledge of the primary message, which is acquired non-causally (i.e., known in advance before transmission) or causally (i.e., acquired in the first phase of a two-phase transmission), to help transmit the primary message besides its own message. Specifically, the coexistence of a MISO primary link and a MISO/MIMO secondary link is studied. When the secondary transmitter has non-causal knowledge of the primary message, dirty-paper coding (DPC) can be deployed at the secondary transmitter to precancel the interference (when decoding the secondary message at the secondary receiver), due to the transmission of the primary message from both transmitters. Alternatively, due to the high implementation complexity of DPC, linear precoding can be deployed at the secondary transmitter. In both cases, the primary transmitter employs MRT, and single-user decoding is deployed at the primary receiver; optimal beamforming/precoding and power allocation at the secondary transmitter is obtained, to maximize the achievable secondary rate while satisfying the primary rate requirement and the secondary power constraint. Numerical results show that with non-causal knowledge of the primary message and the deployment of DPC at the secondary transmitter, overlay spectrum sharing can achieve a significantly higher secondary rate than underlay spectrum sharing, while rate loss occurs with the deployment of linear precoding instead of DPC at the secondary transmitter.
When the secondary transmitter does not have non-causal knowledge of the primary message, and still wants to help with the primary transmission in return for the access to the spectrum, it can relay the primary message in an amplify-and-forward (AF) or a decode-and-forward (DF) way in a two-phase transmission, while transmitting its own message. The primary link adapts its transmission strategy and cooperates with the secondary link to fulfill its rate requirement. To maximize the achievable secondary rate while satisfying the primary rate requirement and the primary and secondary power constraints, in the case of AF cooperative spectrum sharing, optimal relaying matrix and beamforming vector at the secondary transmitter is obtained; in the case of DF cooperative spectrum sharing, a set of parameters are optimized, including time duration of the two phases, primary transmission strategies in the two phases and secondary transmission strategy in the second phase. Numerical results show that with the cooperation from the secondary link, the primary link can avoid outage effectively, especially when the number of antennas at the secondary transceiver is large, while the secondary link can achieve a significant rate.
Power is another precious resource besides spectrum. Instead of spectrum efficiency, energy-efficient spectrum sharing focuses on the energy efficiency (EE) optimization of the secondary transmission. The EE of the secondary transmission is defined as the ratio of the achievable secondary rate and the secondary power consumption, which includes both the transmit power and the circuit power at the secondary transmitter. For simplicity, the circuit power is modeled as a constant. Specifically, the EE of a MIMO secondary link in underlay spectrum sharing is studied. Three transmission strategies are introduced based on the primary rate requirement and the channel conditions. Rate splitting and successive decoding are deployed at the secondary transmitter and receiver, respectively, when it is feasible, and otherwise single-user decoding is deployed at the secondary receiver. For each case, optimal transmit covariance matrices at the secondary transmitter are obtained, to maximize the EE of the secondary transmission while satisfying the primary rate requirement and the secondary power constraint. Based on this, an energy-efficient resource allocation algorithm is proposed. Numerical results show that MIMO underlay spectrum sharing with EE optimization can achieve a significantly higher EE compared with MIMO underlay spectrum sharing with rate optimization, at certain SNRs and with certain circuit power, at the cost of the achievable secondary rate, while saving the transmit power. With rate splitting at the secondary transmitter and successive decoding at the secondary receiver if feasible, a significantly higher EE can be achieved compared with the case when only single-user decoding is deployed at the secondary receiver.
Moreover, the EE of a MIMO secondary link in overlay spectrum sharing is studied, where the secondary transmitter has non-causal knowledge of the primary message and employs DPC to obtain an interference-free secondary link. Energy-efficient precoding and power allocation is obtained to maximize the EE of the secondary transmission while satisfying the primary rate requirement and the secondary power constraint. Numerical results show that MIMO overlay spectrum sharing with EE optimization can achieve a significantly higher EE compared with MIMO overlay spectrum sharing with rate optimization, at certain SNRs and with certain circuit power, at the cost of the achievable secondary rate, while saving the transmit power. MIMO overlay spectrum sharing with EE optimization can achieve a higher EE compared with MIMO underlay spectrum sharing with EE optimization. / Aufgrund der rasanten Entwicklung im Bereich der drahtlosen Kommunikation und der ständig steigenden Nachfrage nach mobilen Anwendungen ist die Knappheit von Frequenzbändern ein entscheidender Engpass, der die Einführung neuer Funktechnologien behindert. Die gemeinsame Benutzung von Frequenzen (Spektrum-Sharing) durch primäre und sekundäre Nutzer ist eine Möglichkeit, die Effizienz bei der Verwendung des Spektrums zu verbessern.
Bei der Methode des Underlay-Spektrum-Sharing sendet der sekundäre Nutzer zeitgleich mit dem primären Nutzer unter der Einschränkung, dass für den primären Nutzer die erzeugte Interferenz unterhalb eines Schwellwertes liegt oder gewisse Anforderungen an die Datenrate erfüllt werden. In diesem Zusammenhang wird in der Arbeit insbesondere die Koexistenz von Mehrantennensystemen untersucht. Dabei wird für die primäre Funkverbindung der Fall mit mehreren Sendeantennen und einer Empfangsantenne (MISO) angenommen. Für die sekundäre Funkverbindung werden mehrere Sendeantennen und sowohl eine als auch mehrere Empfangsantennen (MISO/MIMO) betrachtet. Der primäre Sender verwendet Maximum-Ratio-Transmission (MRT) und der primäre Empfänger Einzelnutzerdecodierung. Für den sekundären Nutzer werden außerdem am Sender eine Datenratenaufteilung (rate splitting) und am Empfänger entweder eine sukzessive Decodierung – sofern sinnvoll – oder andernfalls eine Einzelnutzerdecodierung verwendet.
Im Unterschied zur Methode des Underlay-Spektrum-Sharing kann der sekundäre Nutzer beim Verfahren des Overlay-Spektrum-Sharing die Kenntnis über die Nachrichten des primären Nutzers einsetzen, um die Übertragung sowohl der eigenen als auch der primären Nachrichten zu unterstützen. Das Wissen über die Nachrichten erhält er entweder nicht-kausal, d.h. vor der Übertragung, oder kausal, d.h. während der ersten Phase einer zweistufigen Übertragung. In der Arbeit wird speziell die Koexistenz von primären MISO-Funkverbindungen und sekundären MISO/MIMO-Funkverbindungen untersucht. Bei nicht-kausaler Kenntnis über die primären Nachrichten kann der sekundäre Sender beispielsweise das Verfahren der Dirty-Paper-Codierung (DPC) verwenden, welches es ermöglicht, die Interferenz durch die primären Nachrichten bei der Decodierung der sekundären Nachrichten am sekundären Empfänger aufzuheben. Da die Implementierung der DPC mit einer hohen Komplexität verbunden ist, kommt als Alternative auch eine lineare Vorcodierung zum Einsatz. In beiden Fällen verwendet der primäre Transmitter MRT und der primäre Empfänger Einzelnutzerdecodierung. Besitzt der sekundäre Nutzer keine nicht-kausale Kenntnis über die primären Nachrichten, so kann er als Gegenleistung für die Mitbenutzung des Spektrums dennoch die Übertragung der primären Nachrichten unterstützen. Hierfür leitet er die primären Nachrichten mit Hilfe der Amplify-And-Forward-Methode oder der Decode-And-Forward-Methode in einer zweitstufigen Übertragung weiter, währenddessen er seine eigenen Nachrichten sendet. Der primäre Nutzer passt seine Sendestrategie entsprechend an und kooperiert mit dem sekundären Nutzer, um die Anforderungen an die Datenrate zu erfüllen.
Nicht nur das Spektrum sondern auch die Sendeleistung ist eine wichtige Ressource. Daher wird zusätzlich zur Effizienz bei der Verwendung des Spektrums auch die Energieeffizienz (EE) einer sekundären MIMO-Funkverbindung für das Underlay-Spektrum-Sharing-Verfahren analysiert. Wie zuvor wird für den sekundären Nutzer am Sender eine Datenratenaufteilung (rate splitting) und am Empfänger entweder eine sukzessive Decodierung oder eine Einzelnutzerdecodierung betrachtet. Weiterhin wird die EE einer sekundären MIMO-Funkverbindung für das Overlay-Spektrum-Sharing-Verfahren untersucht. Dabei nutzt der sekundäre Nutzer die nicht-kausale Kenntnis über die primären Nachrichten aus, um mittels DPC eine interferenzfreie sekundäre Funkverbindung zu erhalten.
|
54 |
Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart GridParvez, Imtiaz 22 October 2018 (has links)
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency.
To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario.
In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices.
To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches.
|
55 |
Random Subcarrier Allocation in OFDM-Based Cognitive Radio Networks and Hyper Fading ChannelsEkin, Sabit 1981- 14 March 2013 (has links)
Advances in communications technologies entail demands for higher data rates. One of the popular solutions to fulfill this requirement was to allocate additional bandwidth, which unfortunately is not anymore viable due to spectrum scarcity. In addition, spectrum measurements around the globe have revealed the fact that the available spectrum is under-utilized. One of the most remarkable solutions to cope with the under-utilization of radio-frequency (RF) spectrum is the concept of cognitive radio (CR) with spectrum sharing features, also referred to as spectrum sharing systems. In CR systems, the main implementation issue is spectrum sensing because of the uncertainties in propagation channel, hidden primary user (PU) problem, sensing duration and security issues. Hence, the accuracy and reliability of the spectrum sensing information may inherently be suspicious and questionable.
Due to the imprecise spectrum sensing information, this dissertation investigates the performance of an orthogonal frequency-division multiplexing (OFDM)-based CR spectrum sharing communication system that assumes random allocation and absence of the PU's channel occupation information, i.e., no spectrum sensing is employed to acquire information about the availability of unused subcarriers or the PU's activity. In addition, no cooperation occurs between the transmitters of the PUs and secondary users (SUs). The main benefit of random subcarrier utilization is to uniformly distribute the amount of SUs' interference among the PUs' subcarriers, which can be termed as interference spreading. The analysis and performance of such a communication set-up provides useful insights and can be utilized as a valid benchmark for performance comparison studies in CR spectrum sharing systems that assume the availability of spectrum sensing information.
In the first part this dissertation, due to the lack of information about PUs' activities, the SU randomly allocates the subcarriers of the primary network and collide with the PUs' subcarriers with a certain probability. The average capacity of SU with subcarrier collisions is employed as performance measure to investigate the proposed random allocation scheme for both general and Rayleigh channel fading models. In the presence of multiple SUs, the multiuser diversity gain of SUs is also investigated. To avoid the subcarrier collisions at the SUs due to the random allocation scheme and to obtain the maximum sum rate for SUs based on the available subcarriers, an efficient centralized sequential algorithm based on the opportunistic scheduling and random allocation (utilization) methods is proposed to ensure the orthogonality of assigned subcarriers.
In the second part of this dissertation, in addition to the collisions between the SUs and PUs, the inter-cell collisions among the subcarriers of SUs (belonging to different cells) are assumed to occur due to the inherent nature of random access scheme. A stochastic analysis of the number of subcarrier collisions between the SUs' and PU's subcarriers assuming fixed and random number of subcarriers requirements for each user is conducted. The performance of the random scheme in terms of capacity and capacity (rate) loss caused by the subcarrier collisions is investigated by assuming an interference power constraint at PU to protect its operation.
Lastly, a theoretical channel fading model, termed hyper fading channel model, that is suitable to the dynamic nature of CR channel is proposed and analyzed. To perform a general analysis, the achievable average capacity of CR spectrum sharing systems over the proposed dynamic fading environments is studied.
|
56 |
OPTIMIZED FUZZY BASED POWER CONTROL STRATEGY IN COGNITIVE RADIO NETWORKS IN MULTI FADING PROPAGATION ENVIRONMENTSBejjenki, Praneeth Kumar, Goraya, Muneeb Ahmed, Moid, Syed Fovad January 2013 (has links)
In this thesis we have considered a cognitive radio network (CRN) with a pair of primary user (PU) and secondary user (SU) in spectrum sharing networks in path-loss and without path-loss propagation environments under identically distributed m-Nakagami fading channel. The thesis consists of three parts. In the first part we propose an optimized Takagi-Sugeno Fuzzy Inference System (FIS) based power control strategy in cognitive radio networks (CRN) in spectrum sharing network in without path-loss propagation environment. The second part proposes an optimized Takagi-Sugeno FIS based power control strategy in cognitive radio networks in spectrum sharing network in path-loss propagation environment. For without path-loss propagation environment the proposed FIS takes the interference channel gain ratio between SU transmitter (CUtx) and PU receiver (PUrx) and Signal to Noise Ratio (SNR) towards PU transmitter (PUtx) as antecedents and outputs the power scaling factor for SU. For path-loss propagation environment the proposed FIS takes the relative distance ratio between CUtx and PUrx and SNR towards PUtx as antecedents and outputs the power scaling factor for SU. The output power scaling factor is used to vary the transmit power of SU such that it does not degrade the quality of service (QoS) of PU link. The third part presents an implementation of orthogonal frequency division multiplexing (OFDM) transmission technique in CRN. The OFDM technique has intellectual attractive features like coping with the inter symbol interference (ISI), while providing increasing spectral efficiency and improved performance. This can be used in emergency conditions where transmission requires reliability and high data rate. The OFDM transmission technique is applied towards SU transmitter in CRN, which enables SU to utilize the spectrum efficiently under various fading environments. Spectrum sharing networks in with and without path-loss propagation environments and OFDM transmission were tested for bit error rate (BER) performance after fading effects from m-Nakagami fading channel. We conclude that by applying Takagi-Sugeno Fuzzy Inference System (FIS) based power control strategy we can improve the BER performance of PU when compared with no power control strategy and with other fuzzy based power control technique. OFDM transmission technique gives us better data rate and slightly improved BER in CRN hence making it suitable for use in emergency conditions. / mobile: 0735032048 (Muneeb Goraya)
|
57 |
Overview of the Telemetry Network System (TMNS) RF Data Link LayerKaba, James, Connolly, Barbara 10 1900 (has links)
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2012 / Town and Country Resort & Convention Center, San Diego, California / As the integrated Network Enhanced Telemetry (iNET) program prepares for developmental flights tests, refinements are being made to the Radio Access Network Standard that ensures interoperability of networked radio components. One key aspect of this interoperability is the definition of Telemetry Network System (TmNS) RF Data Link Layer functionality for conducting efficient communications between radios in a TDMA (Time Division Multiple Access) channel sharing scheme. This paper examines the overall structure of the TmNS RF Data Link Layer and provides an overview of its operation. Specific topics include Medium Access Control (MAC) scheduling and framing in the context of a burst-oriented TDMA structure, link layer encryption, the priority-enabled Automatic Repeat reQuest (ARQ) protocol, high-level network packet and link control message encapsulation, payload segmentation and reassembly, and radio Link Layer Control Messaging.
|
58 |
Dynamic Spectrum Sharing in Cognitive Radio and Device-to-Device SystemsJanuary 2017 (has links)
abstract: Cognitive radio (CR) and device-to-device (D2D) systems are two promising dynamic spectrum access schemes in wireless communication systems to provide improved quality-of-service, and efficient spectrum utilization. This dissertation shows that both CR and D2D systems benefit from properly designed cooperation scheme.
In underlay CR systems, where secondary users (SUs) transmit simultaneously with primary users (PUs), reliable communication is by all means guaranteed for PUs, which likely deteriorates SUs’ performance. To overcome this issue, cooperation exclusively among SUs is achieved through multi-user diversity (MUD), where each SU is subject to an instantaneous interference constraint at the primary receiver. Therefore, the active number of SUs satisfying this constraint is random. Under different user distributions with the same mean number of SUs, the stochastic ordering of SU performance metrics including bit error rate (BER), outage probability, and ergodic capacity are made possible even without observing closed form expressions. Furthermore, a cooperation is assumed between primary and secondary networks, where those SUs exceeding the interference constraint facilitate PU’s transmission by relaying its signal. A fundamental performance trade-off between primary and secondary networks is observed, and it is illustrated that the proposed scheme outperforms non-cooperative underlay CR systems in the sense of system overall BER and sum achievable rate.
Similar to conventional cellular networks, CR systems suffer from an overloaded receiver having to manage signals from a large number of users. To address this issue, D2D communications has been proposed, where direct transmission links are established between users in close proximity to offload the system traffic. Several new cooperative spectrum access policies are proposed allowing coexistence of multiple D2D pairs in order to improve the spectral efficiency. Despite the additional interference, it is shown that both the cellular user’s (CU) and the individual D2D user's achievable rates can be improved simultaneously when the number of D2D pairs is below a certain threshold, resulting in a significant multiplexing gain in the sense of D2D sum rate. This threshold is quantified for different policies using second order approximations for the average achievable rates for both the CU and the individual D2D user. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2017
|
59 |
Enabling CBRS experimentation and ML-based Incumbent Detection using OpenSASCollaco, Oren Rodney 03 July 2023 (has links)
In 2015, Federal Communications Commission (FCC) enabled shared commercial use of the 3.550-3.700 GHz band. A framework was developed to enable this spectrum-sharing capa- bility which included an automated frequency coordinator called Spectrum Access System (SAS). This work extends the open source SAS based on the aforementioned FCC SAS framework developed by researchers at Virginia Tech Wireless group, with real-time envi- ronment sensing capability along with intelligent incumbent detection using Software-defined Radios (SDRs) and a real-time graphical user interface. This extended version is called the OpenSAS. Furthermore, the SAS client and OpenSAS are extended to be compliant with the Wireless Innovation Forum (WINNF) specifications by testing the SAS-CBRS Base Station Device (CBSD) interface with the Google SAS Test Environment. The Environment Sensing Capability (ESC) functionality is evaluated and tested in our xG Testbed to verify its ability to detect the presence of users in the CBRS band. An ML-based feedforward neural net- work model is employed and trained using simulated radar waveforms as incumbent signals and captured 5G New Radio (NR) signals as a non-incumbent signal to predict whether the detected user is a radar incumbent or an unknown user. If the presence of incumbent radar is detected with an 85% or above certainty, incumbent protection is activated, terminating CBSD grants causing damaging interference to the detected incumbent. A 5G NR signal is used as a non-incumbent user and added to the training dataset to better the ability of the model to reject non-incumbent signals. The model achieves a maximum validation accuracy of 95.83% for signals in the 40-50 dB Signal-to-Noise Ratio (SNR) range. It achieves an 85.35% accuracy for Over the air (OTA) real-time tests. The non-incumbent 5G NR signal rejection accuracy is 91.30% for a calculated SNR range of 10-20 dB. In conclusion, this work advances state of the art in spectrum sharing systems by presenting an enhanced open source SAS and evaluating the newly added functionalities. / Master of Science / In 2015, Federal Communications Commission (FCC) enabled shared commercial use of the 3.550-3.700 GHz band. A framework was developed to enable this spectrum-sharing capability which included an automated frequency coordinator called Spectrum Access System (SAS). The task of the SAS is to make sure no two users use the same spectrum in the same location causing damaging interference to each other. The SAS is also responsible for prioritizing the higher tier users and protecting them from interference from lower tier users. This work extends the open source SAS based on the aforementioned FCC SAS framework developed by researchers at Virginia Tech Wireless group, with real-time environment sensing capability along with intelligent incumbent detection using Software-defined Radios (SDRs) and a real-time graphical user interface. This extended version is called the OpenSAS. Furthermore, the SAS client and OpenSAS are extended to be compliant with the Wireless Innovation Forum (WINNF) specifications by testing the SAS-CBRS Base Station Device (CBSD) interface with the Google SAS Test Environment. The Environment Sensing Capability (ESC) functionality is evaluated and tested in our xG Testbed to verify its ability to detect the presence of users in the CBRS band. The ESC is used to detect incumbent users (the highest tier) that do not inform the SAS about their use of the spectrum. An ML-based feedforward neural net- work model is employed and trained using simulated radar waveforms as incumbent signals and captured 5G New Radio (NR) signals as a non-incumbent signal to predict whether the detected user is a radar incumbent or an unknown user. If the presence of incumbent radar is detected with an 85% or above certainty, incumbent protection is activated, terminating CBSD grants causing damaging interference to the detected incumbent. A 5G NR signal is used as a non-incumbent user and added to the training dataset to better the ability of the model to reject non-incumbent signals. The model achieves a maximum validation accuracy of 95.83% for signals in the 40-50 dB Signal to-Noise Ratio (SNR) range. It achieves an 85.35% accuracy for Over the air (OTA) real-time tests. The non-incumbent 5G NR signal rejection accuracy is 91.30% for a calculated SNR range of 10-20 dB. In conclusion, this work advances state of the art in spectrum sharing systems by presenting an enhanced open source SAS and evaluating the newly added functionalities.
|
60 |
Medium Access Control in Cognitive Radio NetworksBian, Kaigui 29 April 2011 (has links)
Cognitive radio (CR) is seen as one of the enabling technologies for realizing a new regulatory spectrum management paradigm, viz. opportunistic spectrum sharing (OSS). In the OSS paradigm, unlicensed users (a.k.a. secondary users) opportunistically operate in fallow licensed spectrum on a non-interference basis to licensed users (a.k.a. incumbent or primary users). Incumbent users have absolute priority in licensed bands, and secondary users must vacate the channel where incumbent user signals are detected. A CR network is composed of secondary users equipped with CRs and it can coexist with incumbent users in licensed bands under the OSS paradigm. The coexistence between incumbent users and secondary users is referred to as incumbent coexistence, and the coexistence between CR networks of the same type is referred to as self-coexistence.
In this dissertation, we address three coexistence-related problems at the medium access control (MAC) layer in CR networks: (1) the rendezvous (control channel) establishment problem, (2) the channel assignment problem in an ad hoc CR network, and (3) the spectrum sharing problem between infrastructure-based CR networks, i.e., the 802.22 wireless regional area networks (WRANs). Existing MAC layer protocols in conventional wireless networks fail to adequately address the key issues concerning incumbent and self coexistence that emerge in CR networks. To solve the rendezvous establishment problem, we present a systematic approach, based on quorum systems, for designing channel hopping protocols that ensure a pair of CRs to "rendezvous" within an upper-bounded time over a common channel that is free of incumbent user signals. In a single radio interface, ad hoc CR network, we propose a distributed channel assignment scheme that assigns channels at the granularity of "segments" for minimizing the channel switching overhead. By taking into account the coexistence requirements, we propose an inter-network spectrum sharing protocol that enables the sharing of vacant TV white space among coexisting WRANs. Our analytical and simulation results show that these proposed schemes can effectively address the aforementioned MAC layer coexistence problems in CR networks. / Ph. D.
|
Page generated in 0.123 seconds