Cognitive Network Interference
Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately de...
Gespeichert in:
Veröffentlicht in: | IEEE journal on selected areas in communications 2011-02, Vol.29 (2), p.480-493 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 493 |
---|---|
container_issue | 2 |
container_start_page | 480 |
container_title | IEEE journal on selected areas in communications |
container_volume | 29 |
creator | Rabbachin, A Quek, T Q S Hyundong Shin Win, M Z |
description | Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks. |
doi_str_mv | 10.1109/JSAC.2011.110219 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_847339962</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5701700</ieee_id><sourcerecordid>861539726</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFbvgiDFi6fUmU2yH8cSqlaKHux92WwnktomdTdV_PduiHjwNAw87_DOw9glwhQR9N3T66yYckDsV476iI0wz1UCAOqYjUCmaaIkilN2FsIGALNM8RG7Ltq3pu7qT5o8U_fV-vfJounIV-SpcXTOTiq7DXTxO8dsdT9fFY_J8uVhUcyWiUs57xIp0BFYZUkClEJYEllpuaBKEUerc7fmpESu1oLTugRurSxJxW5ZqUuXjtntcHbv248Dhc7s6uBou7UNtYdglMA81ZKLSN78IzftwTexm1FZ_FFrwSMEA-R8G4Knyux9vbP-2yCY3pbpbZnelhlsxcjVEKmJ6A_PJWD8KP0BezVkKw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>847339962</pqid></control><display><type>article</type><title>Cognitive Network Interference</title><source>IEEE Electronic Library (IEL)</source><creator>Rabbachin, A ; Quek, T Q S ; Hyundong Shin ; Win, M Z</creator><creatorcontrib>Rabbachin, A ; Quek, T Q S ; Hyundong Shin ; Win, M Z</creatorcontrib><description>Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2011.110219</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Aggregates ; cognitive network interference ; cognitive radio ; detection-and-avoidance ; Fading ; Interference ; Numerical models ; Opportunistic spectrum access ; Protocols ; Random variables ; Shadow mapping ; Studies ; truncated-stable distribution ; Wireless networks</subject><ispartof>IEEE journal on selected areas in communications, 2011-02, Vol.29 (2), p.480-493</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</citedby><cites>FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5701700$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5701700$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rabbachin, A</creatorcontrib><creatorcontrib>Quek, T Q S</creatorcontrib><creatorcontrib>Hyundong Shin</creatorcontrib><creatorcontrib>Win, M Z</creatorcontrib><title>Cognitive Network Interference</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.</description><subject>Aggregates</subject><subject>cognitive network interference</subject><subject>cognitive radio</subject><subject>detection-and-avoidance</subject><subject>Fading</subject><subject>Interference</subject><subject>Numerical models</subject><subject>Opportunistic spectrum access</subject><subject>Protocols</subject><subject>Random variables</subject><subject>Shadow mapping</subject><subject>Studies</subject><subject>truncated-stable distribution</subject><subject>Wireless networks</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFbvgiDFi6fUmU2yH8cSqlaKHux92WwnktomdTdV_PduiHjwNAw87_DOw9glwhQR9N3T66yYckDsV476iI0wz1UCAOqYjUCmaaIkilN2FsIGALNM8RG7Ltq3pu7qT5o8U_fV-vfJounIV-SpcXTOTiq7DXTxO8dsdT9fFY_J8uVhUcyWiUs57xIp0BFYZUkClEJYEllpuaBKEUerc7fmpESu1oLTugRurSxJxW5ZqUuXjtntcHbv248Dhc7s6uBou7UNtYdglMA81ZKLSN78IzftwTexm1FZ_FFrwSMEA-R8G4Knyux9vbP-2yCY3pbpbZnelhlsxcjVEKmJ6A_PJWD8KP0BezVkKw</recordid><startdate>201102</startdate><enddate>201102</enddate><creator>Rabbachin, A</creator><creator>Quek, T Q S</creator><creator>Hyundong Shin</creator><creator>Win, M Z</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><scope>7TK</scope></search><sort><creationdate>201102</creationdate><title>Cognitive Network Interference</title><author>Rabbachin, A ; Quek, T Q S ; Hyundong Shin ; Win, M Z</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-761ce0a8ae700b66ae64ba26ef8e21a95cd2e8658d62edb02aa7be80004b9bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Aggregates</topic><topic>cognitive network interference</topic><topic>cognitive radio</topic><topic>detection-and-avoidance</topic><topic>Fading</topic><topic>Interference</topic><topic>Numerical models</topic><topic>Opportunistic spectrum access</topic><topic>Protocols</topic><topic>Random variables</topic><topic>Shadow mapping</topic><topic>Studies</topic><topic>truncated-stable distribution</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rabbachin, A</creatorcontrib><creatorcontrib>Quek, T Q S</creatorcontrib><creatorcontrib>Hyundong Shin</creatorcontrib><creatorcontrib>Win, M Z</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Neurosciences Abstracts</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rabbachin, A</au><au>Quek, T Q S</au><au>Hyundong Shin</au><au>Win, M Z</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cognitive Network Interference</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2011-02</date><risdate>2011</risdate><volume>29</volume><issue>2</issue><spage>480</spage><epage>493</epage><pages>480-493</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause harmful interference to primary users. Such a system would require secondary users to be cognitive-they must accurately detect and rapidly react to varying spectrum usage. Therefore, it is important to characterize the effect of cognitive network interference due to such secondary spectrum reuse. In this paper, we propose a new statistical model for aggregate interference of a cognitive network, which accounts for the sensing procedure, secondary spatial reuse protocol, and environment-dependent conditions such as path loss, shadowing, and channel fading. We first derive the characteristic function and cumulants of the cognitive network interference at a primary user. Using the theory of truncated-stable distributions, we then develop the statistical model for the cognitive network interference. We further extend this model to include the effect of power control and demonstrate the use of our model in evaluating the system performance of cognitive networks. Numerical results show the effectiveness of our model for capturing the statistical behavior of the cognitive network interference. This work provides essential understanding of interference for successful deployment of future cognitive networks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2011.110219</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0733-8716 |
ispartof | IEEE journal on selected areas in communications, 2011-02, Vol.29 (2), p.480-493 |
issn | 0733-8716 1558-0008 |
language | eng |
recordid | cdi_proquest_journals_847339962 |
source | IEEE Electronic Library (IEL) |
subjects | Aggregates cognitive network interference cognitive radio detection-and-avoidance Fading Interference Numerical models Opportunistic spectrum access Protocols Random variables Shadow mapping Studies truncated-stable distribution Wireless networks |
title | Cognitive Network Interference |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T02%3A24%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cognitive%20Network%20Interference&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Rabbachin,%20A&rft.date=2011-02&rft.volume=29&rft.issue=2&rft.spage=480&rft.epage=493&rft.pages=480-493&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2011.110219&rft_dat=%3Cproquest_RIE%3E861539726%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=847339962&rft_id=info:pmid/&rft_ieee_id=5701700&rfr_iscdi=true |