A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs
ICIT '06 Proceedings of the 9th International Conference on Information Technology
Dynamic spectrum access in WLAN channels: empirical model and its stochastic analysis
TAPAS '06 Proceedings of the first international workshop on Technology and policy for accessing spectrum
IEEE Transactions on Communications
Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks
IEEE Transactions on Mobile Computing
A measurement-based model for dynamic spectrum access in WLAN channels
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Bluetooth and WLAN coexistence: challenges and solutions
IEEE Wireless Communications
Analysis of IEEE 802.11e for QoS support in wireless LANs
IEEE Wireless Communications
Coexistence mechanisms for interference mitigation in the 2.4-GHz ISM band
IEEE Transactions on Wireless Communications
Cognitive Medium Access: Constraining Interference Based on Experimental Models
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Dynamic Spectrum Access in a Wireless LAN can enable a set of secondary users' devices to access unused spectrum, or whitespace, which is found between the transmissions of a set of primary users' devices. The primary design objectives for an efficient secondary user access strategy are to be able to "scavenge" spatio-temporally fragmented bandwidth while limiting the amount of interference caused to the primary users. In this paper, we propose a secondary user access strategy which is based on measurement and modeling of the whitespace as perceived by the secondary users in a WLAN. A secondary user continually monitors and models its surrounding whitespace, and then attempts to access the available spectrum so that the effective secondary throughput is maximized while the resulting interference to the primary users is limited to a pre-defined bound. We first develop analytical expressions for the secondary throughput and primary interference, and then perform ns2 based simulation experiments to validate the effectiveness of the proposed access strategy, and evaluate its performance numerically using the developed expressions.