The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] spectrum underlay(2hit)

1-2hit
  • Medium Access Control Design for Cognitive Radio Networks: A Survey

    Nhan NGUYEN-THANH  Anh T. PHAM  Van-Tam NGUYEN  

     
    PAPER

      Vol:
    E97-B No:2
      Page(s):
    359-374

    Designing a medium access control (MAC) protocol is a key for implementing any practical wireless network. In general, a MAC protocol is responsible for coordinating users in accessing spectrum resources. Given that a user in cognitive radio(CR) networks do not have priority in accessing spectrum resources, MAC protocols have to perform dynamic spectrum access (DSA) functions, including spectrum sensing, spectrum access, spectrum allocation, spectrum sharing and spectrum mobility, beside conventional control procedure. As a result, designing MAC protocols for CR networks requires more complicated consideration than that needed for conventional/primary wireless network. In this paper, we focus on two major perspectives related to the design of a CR-MAC protocol: dynamic spectrum access functions and network infrastructure. Five DSA functions are reviewed from the point of view of MAC protocol design. In addition, some important factors related to the infrastructure of a CR network including network architecture, control channel management, the number of radios in the CR device and the number of transmission data channels are also discussed. The remaining challenges and open research issues are addressed for future research to aim at obtaining practical CR-MAC protocols.

  • Interactive Admission and Power Control Protocol for Cooperative Spectrum Underlay in Distributed Cognitive Radio Networks

    Young-Keum SONG  Dongwoo KIM  

     
    PAPER-Network

      Vol:
    E94-B No:10
      Page(s):
    2785-2795

    In this paper, we present a distributed and interactive admission and power control protocol for spectrum underlay environments. The protocol enables distributed primary users (PUs) to estimate and adjust the level of tolerable interference as their transmitting powers evolve to a given signal-to-interference-plus-noise ratio (SINR) target. The protocol also guides the powers of distributed secondary users (SUs) to achieve their own targets while restricting the transmitting powers from SUs so as not to interfere with the PUs. This restriction of interference from SUs to PUs is an essential part of cognitive radio networks (CRNs) and is facilitated by sending a warning tone from PUs to SUs in the proposed protocol. The SUs that have frequently received the warning tones turn off their transmitters and so autonomously drop from the system. This paper proves that, under the proposed interactive protocol, every PU finally achieves its target if it is originally feasible without SUs and the transmit powers of remaining SUs converge to a fixed point. The proposed method protects PUs perfectly in the sense that all the PUs reach their targets after power control. Numerical investigation shows how safely PUs are protected and how well SUs are admitted as a function of protocol parameters, the frequency of warning tones, the number of SUs to be admitted and the number of active PUs.