Académique Documents
Professionnel Documents
Culture Documents
I. I NTRODUCTION
The licensed frequency bands have gradually become a
scare resource due to the growing demand and usage of wireless systems as well as the fixed allocation policy. However,
the utilization of such spectrum bands is low. The FCCs Spectrum Policy Task Force reports in [1] that at any given time and
location, only 15% - 85% of the spectrum is utilized. Thus,
DSA technique [2] is envisioned as an emerging technology to
improve the spectrum utilization. The DSA technology allows
a secondary (unlicensed) system to utilize a licensed spectrum
when it is not occupied by its owned primary (licensed)
system. Such utilization however must guarantee not causing
degradation in service to the primary system by protecting the
primary system from interference.
There has been recent research on dynamic spectrum access
and allocation schemes to enhance the efficiency of spectrum utilization. Weiss et.al in [3] discuss spectrum pooling
approach to overlay a unlicensed system on an existing licensed system without sacrificing the primary transmission
quality or requiring any changes to the licensed system. In
[4], Gerihofer et.al consider the coexistence of Bluetooth
Primary BS
(Mobile WiMAX / OFDMA)
0.9
Secondary BS
5
0.8
0.7
PU
Fig. 1.
PU
SU
SU
Sub Channels
10
0.6
0.5
15
0.4
20
0.3
0.2
25
0.1
30
Fig. 2.
10
15
OFDM Symbols
20
25
30
.
(number of symbols), respectively, hence
= Nnsym
In our scheme, it is assumed that either the DSA- secondary system is scheduled precisely or it implements perfect
spectrum sensing so that it can access each subframe accurately at the access point shown in Fig. 3. Detailed discussion
on such scheduling and sensing mechanisms is considered as
Nsub Subchannels
access ratio %
S
consecutive
resource
blocks
OFDMA Subframe
- Vertical Striping
Scheduling
Fig. 3.
access period
DSA access point
n OFDM symbols
the future work. In the next subsections, we present the optimization problem that maximizes the normalized throughput
gained by the DSA- scheme while guaranteeing the harmful
interference constraints set by the primary system.
1) Expected Normalized Throughput of the DSA- Scheme:
From the statistics model of the primary spectrum usage,
we can derive the cumulative probability distribution for the
occupancy of the S consecutive OFDMA resource blocks of
the duration ratio ,
which can be exploited by our proposed
DSA- scheme, in the time domain [0, T ] as:
1
cdff (
, ) =
pdf(i, )
(1)
Nsym
iS
Hence, we can easily formulate the expected access prob)) that the secondary system can opportunistiability (pdsa (
cally exploit the available primary spectrum by our DSA-
scheme in the time domain as follows:
1 T
) =
(1 cdff (
, )) d
pdsa (
T 0
1
1 T
pdf(i, ) d
(2)
1
=
T 0
Nsym
iS
Nsym
0
iS
K
SU
k,j
ICCI
(i, )
(5)
k=1 iS
, )] max{E[Idsa
(
, )]} I,
E[Idsa (
[0, T ] (6)
ph (E[Idsa (
)] > I)
ph (E[Idsa (
, )] > I)d
(8)
T 0
Thus, the primary system can also avoid harmful interference by setting up a limit for harmful interference occurrence
by introducing a harmful probability threshold p
h , which requires the DSA- system to guarantee the following condition:
p
)] > I)
h
ph (E[Idsa (
(9)
= arg max
Tdsa (
)
(10)
T
Nsym
1
pdf(i, ) d
1
T
Nsym
0
iS
subject to:
[0, T ],
, )] I,
c1 : E[Idsa (
p
)] > I)
c2 : ph (E[Idsa (
and/or
(10a)
(10b)
= arg max
0.9
0.8
0.7
0.6
0.5
5 CBR/UDP PUs
10 CBR/UDP PUs
15 CBR/UDP PUs
20 CBR/UDP PUs
25 CBR/UDP PUs
30 CBR/UDP PUs
0.4
0.3
0.2
Fig. 4.
10
20
30
40
50
60
70
DSA access ratio: (%)
80
90
100
The normalized throughput (3) gained by the DSA- secondary system in the primary DL-subframe for different simulation scenarios is evaluated and shown in Fig. 5. It is seen that
20
18
16
Normalized DSA Throughput
14
12
10
8
6
5 CBR/UDP PUs
10 CBR/UDP PUs
15 CBR/UDP PUs
20 CBR/UDP PUs
25 CBR/UDP PUs
30 CBR/UDP PUs
4
2
0
Fig. 5.
10
20
30
40
50
60
70
DSA access ratio: (%)
80
90
100
6
4
2
0
2
4
5 CBR/UDP PUs
10 CBR/UDP PUs
15 CBR/UDP PUs
20 CBR/UDP PUs
25 CBR/UDP PUs
30 CBR/UDP PUs
6
8
10
10
20
30
40
50
60
70
DSA access ratio: (%)
80
90
100
8
7
6
5
4
3
2
1 FTP/TCP PUs
2 FTP/TCP PUs
3 FTP/TCP PUs
1
0
Fig. 7.
10
20
30
40
50
60
70
DSA access ratio: (%)
80
90
100
V. C ONCLUSION
In this paper, we have proposed a dynamic spectrum access
scheme (DSA- scheme) that allows a secondary system to
statistically and opportunistically access the whole spectrum