2008
DOI: 10.1007/s11277-008-9477-2
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Mesh Network Under Interference from Primary User

Abstract: In a commonly accepted usage scenario, a cognitive radio appears as a secondary user of certain spectrum which is licensed to another, primary system. A prominent example of cognitive system is a mesh network operating under the interference from primary system. For such a scenario, we propose techniques for efficient secondary usage of spectrum, which rely on the adaptive array antenna in order to reduce the interference between the primary and the cognitive system. In order to keep the hardware complexity as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0
2

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 5 publications
0
6
0
2
Order By: Relevance
“…In this paper, best-effort interference mitigation is adopted in the sense that no hard IT constraint is assumed, even if the primary CSIT is available, which is similar to [7], [15], [16]. This is justifiable, for example, when the CBS lies outside a primary exclusion area or guard zone, or the maximum CBS transmit power is designed based on a worst-case PU interference scenario.…”
Section: System Modelmentioning
confidence: 99%
“…In this paper, best-effort interference mitigation is adopted in the sense that no hard IT constraint is assumed, even if the primary CSIT is available, which is similar to [7], [15], [16]. This is justifiable, for example, when the CBS lies outside a primary exclusion area or guard zone, or the maximum CBS transmit power is designed based on a worst-case PU interference scenario.…”
Section: System Modelmentioning
confidence: 99%
“…Therefore, before starting their communication, the secondary transmitters can estimate their interference toward the primary receivers by using the received power (detected during primary transmission) from a primary transmitter toward the secondary receivers. The actual method for the estimation of the interference power from the secondary transmitters toward a primary receiver is detailed in [12]. The method introduced in [12] counts on the channel reciprocity which can be violated when considering mobility as well as different interference conditions at two end-points.…”
Section: Target Scenariomentioning
confidence: 99%
“…The actual method for the estimation of the interference power from the secondary transmitters toward a primary receiver is detailed in [12]. The method introduced in [12] counts on the channel reciprocity which can be violated when considering mobility as well as different interference conditions at two end-points. The lack of channel reciprocity results in the degradation of spatial opportunity as the secondary transmitter underestimates the interference and starts transmission, which consequently violates the target quality at primary receiver or overestimates the interference and does not start transmission itself.…”
Section: Target Scenariomentioning
confidence: 99%
“…The WIMAX network increases relays in the propagation path, forming a access link (Access Link) from users to the relay and the relay access link (Relay Link) from users to the base station, which has advantages with low cost, high bandwidth, wide coverage, and it is a new direction in technical aspects of the 802.16 standard [5][6][7].…”
Section: Introductionmentioning
confidence: 99%