Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management 2011
DOI: 10.1145/2093256.2093302
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive methodology for opportunistic spectrum access based on residual white space distribution

Abstract: Assuming that Secondary Users (SU) have channel occupancy data (channel idle and busy durations) of Primary Users (PU), this paper presents a methodology to fit primary channel occupancy data to a distribution. Then we show how SUs can opportunistically transmit in the white spaces based on residual white space distribution while keeping probability of interference (with the PUs) below a predefined threshold. We also present analytical formulation for the average throughput of the secondary user and validate i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Then, we simulate the PU channel occupancy patterns where OFF times are generated with HED distribution given in [8], [12]. When the channel become free from PU, the SU will access the channel using one of the sub-optimal policies.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Then, we simulate the PU channel occupancy patterns where OFF times are generated with HED distribution given in [8], [12]. When the channel become free from PU, the SU will access the channel using one of the sub-optimal policies.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…From (K + 1) th sensing instant, the SU always choose I * K as the channel sensing interval. In our simulation, we generated the channel occupancy model using two sets of HED parameters given in [8] and [12] (Light traffic -load < 0.1 and Medium traffic -load ∈ [0.3,0.5]).…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…SUs can use various methods to estimate PU traffic characteristics and predict when the PU might appear. A review of the literature finds that there are very few MACs which provide disruption QoS (e.g., [20], [21], [22]). The continued development and verification of protocols that provide disruption QoS may spur wider industry acceptance of spectrum sharing.…”
Section: B Disruption Qosmentioning
confidence: 99%