A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs
ICIT '06 Proceedings of the 9th International Conference on Information Technology
Dynamic spectrum access in WLAN channels: empirical model and its stochastic analysis
TAPAS '06 Proceedings of the first international workshop on Technology and policy for accessing spectrum
IEEE Transactions on Communications
Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks
IEEE Transactions on Mobile Computing
Design and analysis for an 802.11-based cognitive radio network
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
A measurement-based model for dynamic spectrum access in WLAN channels
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Bluetooth and WLAN coexistence: challenges and solutions
IEEE Wireless Communications
Analysis of IEEE 802.11e for QoS support in wireless LANs
IEEE Wireless Communications
Coexistence mechanisms for interference mitigation in the 2.4-GHz ISM band
IEEE Transactions on Wireless Communications
IEEE Transactions on Information Theory
Cognitive Medium Access: Constraining Interference Based on Experimental Models
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Opportunistic Spectrum Access in a pervasive computing system can enable a set of secondary user devices to access unused spectrum, or whitespace, found between the transmissions of a set of primary user devices. The design objective for an efficient secondary user access strategy is to be able to ''scavenge'' spatio-temporally fragmented bandwidth while limiting the amount of disruption caused to the primary user devices. In this paper, we propose an access strategy which is based on measurement and modeling of the whitespace as perceived by the secondary user devices. A secondary user device continually monitors and models its surrounding whitespace, and then accesses the available spectrum so that the effective secondary throughput is maximized while the resulting disruption to the primary user devices is limited to a pre-defined bound. We first develop analytical expressions for the secondary throughput and primary disruption, and then perform ns2 based simulation experiments to validate its effectiveness under various topologies, user traffic profiles, and secondary user populations.