Upload
maxine-oneill
View
23
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space. Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United States Army Research Laboratory IEEE Communications Magazine 2007 Speaker: Chun Hsu 許君. Outline. Introduction - PowerPoint PPT Presentation
Citation preview
Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space
Stefan Geirhofer and Lang Tong, Cornell UniversityBrian M. Sadler, United States Army Research Laboratory
IEEE Communications Magazine 2007Speaker: Chun Hsu 許君
1
Outline Introduction Sensing Methods: An Experimental Testbed Modeling White Space: A Statistical Approach Deriving Access Schemes: A Practical Example Conclusion Comments
2
Introduction Spectrum scarcity is not a result of heavy usage of the
spectrum; it is merely due to the inefficiency of the static frequency allocation.
Dynamic spectrum access (DSA) resolves this paradox by opening frequency bands to secondary users, provided that interference to the actual licensee is kept insignificant.
The majority of research, so far, has focused on DSA in the spatial domain.
3
Introduction – Hierarchical Access Model
This article focuses on applying this concept in the time domain by exploiting idle
periods between bursty transmissions of multi-access communication channels
addresses WLAN as an example of practical importance.
Hierarchical Access Model The basic idea is to open licensed spectrum to secondary users
and limit the interference perceived by primary users. Based on Hierarchical Access Model, they design the
cognitive radio so that both systems are orthogonal.
4
Introduction – Motivating example (1/2)
5
a) Complex baseband signal of an 802.11b-WLAN supporting a Skype conference call
b) enlarged view of two subsequent packet transmissions
Introduction – Motivating example (1/2)
The existence of sufficient white space raises the questions: How to exploit this resource in practice? How complicated is a model that provides adequate prediction
performance? Given a model, how do we apply it to derive practical access
schemes for the secondary system? Are such schemes amenable to a real-time implementation,
possibly on a battery powered device with processing limitations?
6
Sensing Methods – Testbed
7
VSA, Vector Signal Analyser: do signal measurement and characterization
Sensing Methods – Sensing Strategies
The strategies for detecting busy and idle periods can be classified according to whether the primary user’s transmission standard is known. Energy-based detection Feature-based detection
improve the detection performance by exploiting standard specifics.
For the 802.11b, we can find the start of packets by locking onto the synchronization preamble of the transmitted packets.
By decoding the LENGTH field within the preamble, we can find the exact packet duration.
8
Modeling White Space Based on the data collected from testbed, they develop a
statistical model that allows us to predict the channel’s behavior. Two components: The states of the channel and their transition behavior How long the system resides in each of the states
9
No packet transmission
Modeling White Space - Occupancy Durations
The sojourn time in the TRANSMIT state is primarily affected by the traffic characteristics and the scheduler employed in the adapter cards and the wireless router.
IDLE state either due to the contention window or a truly free channel This suggests a mixture distribution. the contention period shows an almost uniformly distributed
sojourn time a free state exhibits heavy-tailed behavior that is well
approximated by a generalized Pareto distribution.
10
Modeling White Space - Goodness-of-fit analysis for constant payload UDP traffic
11
Hyper-Erlang provide a viable approximation to fat-tailed distribution which leads to the self-similar traffic.
Modeling White Space – goodness-of-fit analysis for Non-stationary traffic
12
Significant Level α
The Kolmogorov-Smirnov test (KS-test) tries to determine if two datasets differ significantly.
Bluetooth/WLAN Coexistence The coexistence between Bluetooth and WLAN in the
unlicensed ISM band is of significant practical concern, because mutual interference can severely limit the performance
of both systems. ISM band around 2.4GHz
Adaptive Frequency Hopping The sensing and classification of channels according to their
interference. The adaptation of the hopping sequence such that “bad”
channels are avoided whenever possible.
13
Bluetooth 1.0-1.1
14
Collisions resulting from random frequency hopping Adapting to the environment
2.412 CH1
2.472 CH13
2.484 CH14(JPN)
Bluetooth 1.2 and beyond 1.2 - Adaptive Frequency Hopping
15
Collisions avoided using Adaptive Frequency Hopping
2.412 CH1
2.472 CH13
2.484 CH14(JPN)
Enhanced Hopping Scheme At the beginning of each slot, the current channel is
sensed. If the presence of a WLAN packet is detected, no transmission
takes place since this inevitably would lead to a collision. If no WLAN packet is detected, a collision still can occur if the
WLAN becomes active during the subsequent slot. By initiating a transmission only with a certain probability γ <=1, even
if the channel is sensed idle. The probability of collision depends on the WLAN traffic
characteristics. we employ our model to find the probability that conditioned on the
channel having been idle for k slots. By obtaining this probability, we can design γ such that collisions with
the WLAN occur with a probability smaller than some interference constraint.
16
Performance evaluation
17
Conclusion We addressed the problem of dynamically accessing
spectrum in the time domain by taking advantage of white space.
The proposed model statistically captures the medium access of the WLAN but remains tractable enough to be used for deriving practical access schemes for the secondary user.
As an example, we have illustrated how our model could be used to enhance the coexistence between WLAN and Bluetooth in the unlicensed ISM band.
18
Comments The Heuristic Scheme is not defined clearly in this paper. The general scheme should be taken into consideration to
compare with the Heuristic Scheme in the simulation of collision probability.
19