0% found this document useful (0 votes)
30 views38 pages

Spectrum Access and Sharing

This chapter from the book "Cognitive Radio Communications and Networks: Principles and Practice" discusses different methods of spectrum sharing and secondary spectrum access. It describes how international and national regulatory bodies allocate and assign spectrum bands and outlines various approaches to spectrum sharing, including unlicensed sharing, licensed sharing, and secondary spectrum access. Real-time secondary spectrum access can involve negotiated access between primary and secondary users or opportunistic access by secondary users when primary users are absent.

Uploaded by

Aamir Habib
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views38 pages

Spectrum Access and Sharing

This chapter from the book "Cognitive Radio Communications and Networks: Principles and Practice" discusses different methods of spectrum sharing and secondary spectrum access. It describes how international and national regulatory bodies allocate and assign spectrum bands and outlines various approaches to spectrum sharing, including unlicensed sharing, licensed sharing, and secondary spectrum access. Real-time secondary spectrum access can involve negotiated access between primary and secondary users or opportunistic access by secondary users when primary users are absent.

Uploaded by

Aamir Habib
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Cognitive Radio Communications and Networks: Principles and Practice

By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)


1
Chapter 5
Spectrum Access and Sharing
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
2
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
3
QoS Provisioning
Opportunistic Access
Overlay Approach
Underlay Approach
Chapter Summary
Outline
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
4
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
5
Radio Spectrum is the medium upon which
wireless communications is realized.
Only portions of spectrum are suitable for
mobile communications
Spectrum Allocation &
Assignment
3-30 Hz
Extremely low
frequency (ELF)
30-300 GHz
Extremely high
frequency (EHF)
Not desirable: low
bandwidth, long
propagation range
Not desirable: short
propagation range, line-
of-sight communication
30-3000 MHz
Desirable: High bandwidth,
reasonable propagation
range
Radio Frequency range
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
6
International Regulatory bodies, such as ITU, harmonize
usage of spectrum through spectrum allocation
(dedicating bands to specific applications: mobile &
personal communication, Radar & military bands,
Satellite comm. Band etc)
Regional or national regulatory bodies, such as FCC,
assign the bands to service providers (such as AT&T,
Verizon etc)
Each service provider acquires a license for its assigned
band
A limited portion of spectrum is unlicensed, such as 2.4
GHz ISM band over which WiFi operates
Spectrum Allocation &
Assignment
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
7
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
8
There are 3 physical dimensions to share the
spectrum
Spectrum Sharing: Definition
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
9
Several ways of classifying spectrum sharing:
Licensed spectrum sharing
Horizontal (several systems with similar access right)
Vertical (several systems with a hierarchical access
right)
MAC (single system, TDMA/FDMA/SDMA etc)
Unlicensed spectrum sharing
Horizontal
Single system (Random access, CSMA)
Next page a general classification
Spectrum Sharing: Definition
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
10
Spectrum Sharing: Definition
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
11
Definition of spectrum sharing:
Spectrum sharing is the simultaneous usage of a
specific radio frequency band in a specific
geographical area by a number of independent
entities, leveraged through mechanisms other than
traditional multiple- and random-access techniques.
Spectrum Sharing: Definition
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
12
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
13
No license is required for a system transmitting on
dedicated unlicensed band
Obviously still transmit power limits and transmission
masks are defined to prevent interfering to adjacent bands
Examples:
2.4 GHz ISM band: IEEE 802.11 b/g/n and Bluetooth
5 GHz UNII band: IEEE 802.11a and HyperLAN
Advantage:
Less regulatory hurdles, shorter time to market, more
innovative solutions (Ex: success of WiFi)
Drawback:
No interference mitigation mechanism (Ex: Microwave
Oven operates on the same 2.4 GHz band!)
Even among the similar systems: WiFi example next page
Unlicensed Spectrum Sharing
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
14
Example 1: Consider a WLAN hotspot with N
stations (STA)
STAs use p-persistence CSMA (if channel idle, transmit
with probability p, or wait with probability q=1-p)
Packets at each STA: Poisson process with mean G
packet/time slot
The probability of generating k packets at slot t:
Assume D
n
(t) packets remained from previous time
slots
Probability of STA n remain silent in next time slot:
!
) (
k
e G
k P
G k
t

=
Unlicensed Spectrum Sharing
) 0 ( ) 1 )]( ( )} 0 ( 1 [{ ) (
, t n t n s
P p t D P t P + + =
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
15
Example: Consider a WLAN hotspot with N stations (STA)
(Contd)
For simplicity of analysis assume D
n
(t)=D(t)
The probability of collision:
Replacing all parameters, we get
An increasing function of load G and number of nodes N
Have you tried checking your e-mail in a conference
meeting?
[ [

|
|
.
|

\
|
=
N N
n s n s collision
t P
N
t P t P
1
, ,
) (
1
) ( 1 ) (
Unlicensed Spectrum Sharing
))) ( 1 ( ( ))] ( 1 ( [ 1 ) (
1
t D q pe N t D q pe t P
G N G
collision
+ + + + + =

Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
16
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
17
Consider a horizontal licensed spectrum sharing:
A pool of spectrum that can be accessed by several RANs
If the peak traffic load of the majority of RANs occur
simultaneously, shortage of spectrum will happen at those
times
Conversely, during low traffic load times, most of resources
will remain unutilized
Hence, correlation of traffic pattern of RANs (in time) is
an important factor in efficiency of spectrum sharing
Traffic prediction models can help
Ex: Auto Regressive (AR), Moving Average (MA), ARMA etc
Refer to Ex. 2, Ch 05
Another perspective, is from cost-revenue trade-off:
Contd Next slide
Licensed Spectrum Sharing
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
18
Cost-Revenue Trade-off in licensed spectrum
sharing:
Assume revenue from a unit of shared spectrum is R
s
Cost of borrowing a unit of shared spectrum is C
b
Initial stock of spectrum at RAN m is N
m
unit
Accumulated revenue at this time is W
m
(0)
For period i:
Cost=(D
m
-N
m
)C
b
Revenue=D
m
R
s
The accumulated revenue:
Licensed Spectrum Sharing
b m m
m
m
m
m
s m m m
C N D
N
D
N
D
R D W i W ) (
1
1
) 0 ( ) (

+ =
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
19
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
20
SSA is a vertical (licensed) spectrum sharing
License holder of the band operates as the primary
system
Secondary users are allowed to access the licensed band
of primary, complying with certain requirements
Cognitive Radio (CR) is an enabling technology to
implement SSA
A recent example is FCCs decision to allow secondary
access to TV white spaces
Two approaches:
Overlay SSA
Only access the band IF the primary is absent
Underlay SSA
Secondary users can access the band when the primary is
transmitting, BUT the received interference by primary receivers
should be below a threshold
Secondary Spectrum Access
(SSA)
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
21
Outline
Spectrum Allocation & Assignment
Spectrum Sharing: Definition
Unlicensed Spectrum Sharing
Licensed Spectrum Sharing
Secondary Spectrum Access (SSA)
Real Time SSA
Negotiated Access
Contd next page
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
22
When there exists an interaction
mechanism between primary and
secondary networks
Interaction can include information on available
or idle primary spectral ranges (for overlay
scheme) or received interference (for underlay
scheme)
To facilitate such negotiations, dedicated
signaling channel should be developed
Cognitive Pilot Channel (CPC) is one such
channel
Refer to Ex. 4 Ch 05
Real-Time SSA: Negotiated
Access
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
23
Can QoS be guaranteed in this
scheme?
Recall the collision problem of unlicensed
spectrum sharing (Ex. 1, Ch. 05)
Consider the below channel set up
Real-Time SSA: Negotiated
Access
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
24
Goal:
Real-Time SSA: Negotiated
Access
{ }
) 1 log(
, 0 ) (
, 0
. .
) (
, ,
2
, ,
,
1
, ,
1
, ,
1
, ,
,
,
,
n j n j i
n i n i
n i
N
n
n i n i g
N
n
n i i QoS
N
n
n i n i g
p
h p
g p
R
where
g p E
R R
t s
g p E Minimize
n i
n i
n i
+
+ =
s
)
`

=
=
=
o
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
25
It can be shown to satisfy this optimization problem,
we should have (Details in Ch 05)
Intuition: If your transmission is making more
interference than your direct communication, do not
transmit (or in this case, do not allow secondary to
transmit)
This inequality, also depends on the level of QoS to be
guaranteed (R
QoS,i
) (see next slide)
There is a need for negotiation: primary and
secondary should exchange channel information as
well as QoS requests
Real-Time SSA: Negotiated
Access
) 1 )( 1 (
/ /
, 2 , 1 , 2 , 1
2 , 1 ,
>
w R w R
n n n n
QoS n QoS n
e e h h g g
o o
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
26
If R
QoS
is
too high,
depending
on the
direct and
cross
channel
gains, QoS
guarantee
might be
infeasible.
Real-Time SSA: Negotiated
Access
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
27
QoS Provisioning
Opportunistic Access
Overlay Approach
Underlay Approach
Chapter Summary
Outline
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
28
In some scenarios, primary-secondary
negotiation is not feasible
Recall the case secondary access to TV bands,
authorized by FCC
Another example: if primary system is a RADAR
In that case, secondary should opportunistically
access the licensed band
Recall Overlay is one possibility: only transmit
when primary signal is not detected in a band
Secondary should shape its transmitting
signal to avoid collision with primarys signal
Opportunistic Access: Overlay
Approach
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
29
Multi-carrier modulation is a powerful
tool to this end
OFDM, Multi-carrier CDMA (see below, details in
Ch 05)
Opportunistic Access: Overaly
Approach
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
30
QoS Provisioning
Opportunistic Access
Overlay Approach
Underlay Approach
Chapter Summary
Outline
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
31
Another opportunistic SSA method is
underlay
Recall underlay ensures the received
interference of primary remain below a
threshold
Consider:
Opportunistic Access: Underlay
Approach
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
32
Goal:
Opportunistic Access: Underlay
Approach
i
N
n
n i n i n i h g
i inst
N
n
n i n i n i n i
i avg
N
n
n i n i n i n i h g
N
n
n i h g
h g
i ER
P h g p E
and
h h g p
h h g p E
t s
R E Max C
n i n i
n i n i
n i n i
n i n i
max,
1
, , , ,
,
1
, , , ,
,
1
, , , , ,
1
, ,
,
,
) , (
) , (
) , (
. .
,
, ,
, ,
, ,
, ,
s
)
`

I s
I s
(

)
`

=
=
=
=
Average interference
limit
or
Instantaneous
interference limit
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
33
It can be shown that Average interference limit is
superior than instantaneous interference limit
From primary point of view, one might think instantaneous
interference limit will better protect the primary receivers
Instantaneous= at any instant of time!
However, it turns out that using an average interference
limit, the secondary transmits with a higher power when
channel quality permits (though not exactly the same
concept, recall channel condition from negotiated access)
Also when channel is not desirable (low attenuation from
secondary transmitter to primary receiver) secondary
transmits with less power
On average, we achieve a better performance
Also, check out Ch05, for details of optimal transmission
power in each case
Opportunistic Access: Underlay
Approach
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
34
QoS Provisioning
Opportunistic Access
Overlay Approach
Underlay Approach
Chapter Summary
Outline
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
35
Chapter 5 Summary
Due to increasing demand for radio
spectrum, we need to adopt spectrum
sharing mechanisms
Cognitive Radio is the enabling technology
for Secondary Spectrum Access
Spectrum sharing can be achieved in time,
frequency and/or space dimensions
Several classifications of spectrum sharing
solutions exists
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
36
Chapter 5 Summary
Spectrum sharing can be performed
over licensed or unlicensed bands
Unlicensed bands allow
systems/devices to utilize those
bands without requiring a spectrum
license
Unlicensed spectrum encourages
innovative solutions but offers no
interference mitigation mechanism
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
37
Chapter 5 Summary
If an interaction mechanism between primary and
secondary users exists, negotiated SSA can be
deployed
In negotiated SSA, QoS guarantee is potentially
feasible (depends on factors such as channel gains
and requested QoS level)
If negotiated SSA is not an option, opportunistic
secondary access can be exploited.
In opportunistic SSA, spectrum sharing can be overlay
(no primary in the band) or underlay (simultaneous
with primary but limiting the interference)
Cognitive Radio Communications and Networks: Principles and Practice
By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009)
38
Chapter 5 Summary
For overlay scheme, spectrum
aggregation techniques, such as
multi-carrier modulation, is required
In underlay scheme, average or
instantaneous interference limits can
be satisfied
It turns out that average interference
limit outperforms instantaneous
interference limit

You might also like