1 / 61

Vahid Tarokh Harvard University

Theoretic Fundamentals, Regulatory issues, Physical Limitations, and the Future of Opportunistic Transmission. Vahid Tarokh Harvard University. Introduction. The Goal. The Goal = Providing Wireless Services. Example of Services. Information Services. Software Distribution.

brita
Download Presentation

Vahid Tarokh Harvard University

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Theoretic Fundamentals, Regulatory issues, Physical Limitations, and the Future of Opportunistic Transmission Vahid Tarokh Harvard University

  2. Introduction

  3. The Goal The Goal = Providing Wireless Services

  4. Example of Services InformationServices SoftwareDistribution EntertainmentTelevision InteractiveGames Education Services ElectronicShopping FoodMart Services • Traditionally voice had been the main application, but many other services are arising. • Emerging wireless broadband applications require both spectrum and advanced techniques to increase bandwidth efficiency.

  5. Impact of Services • Historically by providing services, telecommunication engineers have had a huge impact on society and economy. • New services enable new non-telecom industries and improve efficiency of existing ones. • They may help with development of freedom and democracy

  6. A Successful Example • Newsweek reports that cell-phones have made 5 major impact on the world http://www.newsweek.com/2010/11/10/how-the-cell-phone-is-changing-the-world.html • Exposing Secrets - The repression and horror happening in North Korea leaks out by cell phone. • Advancing Democracy - Cell phones present a problem for oppressive regimes everywhere. • Enabling Commerce - Enabling a common method of banking using a cell phone where there are no banks. • Distributing Medecine - A new project in Africa, called Stop Stock-Outs enables activisits to report which drugs are out of stock. • Waging War - How the Taliban have forced local cell-phone-service providers to shut down their towers at night stopping locals from reporting Taliban movements to Coalition forces.

  7. Communications Help Economy and Human/Political Development • Kerala to send SMS alerts for vaccination of babies • South African Students Receiving Maths Lessons by Mobile Phones • Kenyan farmers use SMS to beat climate-driven price uncertainty. • Saving Mothers' Lives With Health Tips Via Phone Source: http://www.textually.org/textually/archives/2011/04/028310.htm • Mobile Internet played an important role in Arab Uprising and the Iranian anti-government protests.

  8. Communications Enhances Freedom • Videos collected by mobile phones expose government and their brutality against citizens. • Providing more services communications can lead to a more “information flat world”, where everyone will access the information that they need and contribute to information gathering and distribution as much as they could. • This will make suppression of the truth much harder. • Thus providing more services is a great idea. • But obviously this needs spectrum

  9. Spectrum

  10. Scarcity of Spectrum • Most frequency bands up to 6 GHz (and beyond) have FCC allocations for multiple users.

  11. Scarcity of Spectrum Source cnn.com Feb 21, 2012

  12. Spectrum Crunch Source money.cnn.com Feb 21, 2012

  13. Outline • Shortage of good spectrum may appear as a problem, but this may not be the case: • measurements show that at anytime more than 90% of these resources are not used. • Idea: Intelligent radios may allow better use (sharing) of the spectrum.

  14. Spectrum Sharing • This motivated a push for sharing the unused but dedicated spectrum for providing new services. • Is this a new idea? • Geographical reuse of spectrum has been around for a long time. • Is this a good idea? • How aggressively must it be pursued/allowed? • Is it technically feasible? • How much intelligence is needed in the radio? • How regulatory bodies are dealing with it? • Does it have a future?

  15. Existing Spectrum Sharing Examples • Spectrum Sharing is nothing new: • The ISM band allows sharing of spectrum • Many successful application exists (e.g. garage door openers, etc.) • Perhaps the most successful application is WiFi. • UWB • A February 14, 2002 Report and Order by the FCC authorizes the unlicensed use of UWB in the range of 3.1 to 10.6 GHz. The FCC power spectral density emission limit for UWB emitters operating in the UWB band is -41.3 dBm/MHz. • This is the same limit that applies to unintentional emitters in the UWB band, the so called Part 15 limit. However, the emission limit for UWB emitters can be significantly lower (as low as -75 dBm/MHz) in other segments of the spectrum. • UWB has not had much commercial success yet.

  16. Wi-Fi • Another example of wireless broadband services is Wi-Fi. • Wi-Fi has had • enormous success • and this is expected • to continue on into future: please see the old forecast  • Range is an issue.

  17. Existing Spectrum Sharing Examples • MVDDS (Multichannel Video and Data Distribution Service) • This terrestrial based wireless transmission method reuses Direct Broadcast Satellite (DBS) frequencies for distribution of multichannel video and data over large distances. • licensed for use in the United States by the FCC. • Ruled that 10% increase in rain outages would not be harmful • The underlying spectrum is in the 12.2 - 12.7 GHz range.

  18. Spectrum Sharing Paradigms • Exclusive access: • One system has exclusive access to the spectrum. • Horizontal Sharing (Equal right access): • All systems have the same regulatory status and may access the spectrum on an equal footing. (e.g. usage of the ISM bands by WLAN and Bluetooth) • Vertical Sharing (Prioritized spectrum access): • A primary system. • Secondary systems can share only if they do not generate harmful interference for the primary • All of these schemes have existed for some time.

  19. Spectrum Sharing Models Spectrum sharing with other (legacy or other novel) systems. Spectrum sharing Pre-established priorities for all involved systems. Horizontal sharing with coordination Vertical sharing Horizontal sharing without coordination Secondary system has to control its emissions to prevent interference towards primary system. All involved systems share the spectrum based on a set of rules (spectrum etiquette). Little can be done To avoid interference

  20. Cognitive Radios? • Then What is so new about cognitive radios? • Perhaps it all depends on what cognitive radio means….

  21. Cognitive Radios

  22. Cognitive Radios • A Cognitive radio is an intelligent wireless communication system that: • is aware of its environment, • learns from the environment, and • adapts its internal states in real-time

  23. Vertical Sharing • Following problems need to be addressed: • need to identify the spectral “white spaces’’ • need to adapt to the restrictions identified. • need to be smart in reducing the harmful interference to other systems while increasing their own transmission rates • Cognitive Radios are being discussed from several perspectives. • Their success will depend on: • Fundamental Limits • Finding methods to achieve these limits • How conservative the regulatory rules are, and • Economics and business models

  24. Fundamental Limits on Cognitive Radios

  25. Scenario: Cognitive Radio [DMT] Traditional Cognitive Radios

  26. Potentials of Cognitive Radios [DMT] Can these potentials be actually realized?

  27. Interference Between Cognitive Devices The previous result gives some promise in potential of secondary users not having harmful effects on the primary user capacity. However, even if we can address the issue of interference between primary and cognitive networks, we will still have potential interference between various cognitive networks operating on available white spaces. In other words, if because of availability of free spectrum many secondary systems emerge, can these systems support any reasonable data rate?

  28. Throughput Scaling From point of view of scaling laws (growth order), of ad hoc networks: “cognitive networks achieve throughput scaling of a homogeneous network”, [WDVCT]: Randomly distributed n primary users, and m secondary users with m = nβwith β > 1 Specifically, the primary network achieves the sum throughput of order n0.5 and, for any δ, the secondary network achieves the sum throughput of order m0.5- δwith an arbitrarily small fraction of outage. These results are only of theoretical interest.

  29. Co-existence of Secondary Networks It has been proved [VT] that under the assumption of a cap on the interference caused by secondary network to primary receivers the secondary networks are single hop and transmissions transmit either (i) with constant transmit power, and (ii) with transmit power scaled according to the distance to a designated primary transmitter, then as the number of secondary networks N  ∞ , the secondary receivers can achieve at least a non-vanishing throughput. This shows that cognitive radios are at least scalable for single hop networks. Another option is not to allow too many secondary networks.

  30. Co-existence of Secondary Networks The FCC proposes that some form of contention protocol be employed to reduce the interference between co-existing cognitive networks but does not specify such a protocol. If the number of cognitive networks in a region grows large, this may not be very efficient and may produce capacity losses. The general problem of allocation of available white spaces to various cognitive networks in order to optimize the capacity is a. computationally hard (NP-hard) problem. We will next study proposals for various secondary networks to co-exist.

  31. Existing Approaches • Methods based on Iterative Water-filling (IW): • High computational complexity. • Convergence to configurations which are far from optimal. • Methods based on graph coloring: • Computationally expensive • Too much message passing among the agents. • Complex cooperation protocols. • A Method (GADIA) inspired by Glauber Dynamics in statistical physics [BT] that attempt to maximize the Rosenthal potential.

  32. Performance • The GADIA algorithm converges to equilibrium exponentially fast. • The GADIA algorithm achieves about 98% of the optimal Shannon capacity. • GADIA has much lower complexity (about 3 orders of magnitude lower) and converges faster that the existing Iterative Water-filling algorithm.

  33. Conclusions • Theoretical Analysis indicates that under idealized assumptions at least for some scenarios of interest, cognitive radios may have some promise. • There is a lot more to investigate particularly if the idealized assumptions are removed • The main question is that how much of these gains remain • in realistic situations, and • under the regulatory restrictions.

  34. Regulatory Issues

  35. FCC Regulatory Issues • The FCC has released the band 3650-3700 MHz for cognitive transmission. • Fixed Satellite Services and federal government stations are currently transmitting in this band. • Certain geographical areas around these transmitters are not allowed for secondary transmission. • Otherwise secondary transmissions are allowed (by the FCC) subject to • 25W per 25 MHz bandwidth for fixed stations • 1W per 25 MHz bandwidth for mobile stations

  36. TV White Spaces • Another band of interest is given in notice of rule making ET Docket 04-186. • These are TV Broadcast bands (6 MHz channels designated channels 2 to 69 in the VHF and UHF portions of the radio spectrum. • 54-72 MHz, 76-88 MHz, 174-216 MHz and 470-806 MHz. • Other existing devices in some of this band include wireless microphones.

  37. TV White Spaces • Secondary transmission in this band has witnessed a lot of politics/resistance. • Finally, the FCC has announced on Nov. 4, 2008 a set of rules for secondary devices to operate in TV bands while reducing the interference to primary users. • This has caused some interest in network solutions and consumer devices for these bands.

  38. FCC Rules • All devices, except personal/portable devices operating in client mode, must include a geo-location capability and provisions to access over the Internet a database of protected radio services and the locations and channels that may be used by the unlicensed devices at each location. • The unlicensed devices must first access the database to obtain a list of the permitted channels before operating. • The database will be established and administered by a third party • The third party (Spectrum Bridge) was selected through an open process to solicit interested parties in 2011.

  39. FCC Rules • Fixed devices may operate on any channel between 2 and 51, except channels 3, 4 and 37, and subject to a number of conditions such as a restriction against co-channel operation or operating adjacent to TV channels. • Fixed devices may operate at up to 4 Watts EIRP. • Personal portable devices may operate on any unoccupied channel between 21 and 51, except channel 37. • Personal portable devices may operate at up to 100 mW of power, except that operation on adjacent channels will be limited to 40 mW.

  40. FCC Rules • Fixed and personal/portable devices must also have a capability to sense TV broadcasting and wireless microphone signals as a further means to minimize potential interference. • Wireless microphones will be protected in a variety of ways. The locations where wireless microphones are used, such as entertainment venues and for sporting events, can be registered in the database and will be protected as for other services. In addition, channels from 2 – 20 will be restricted to fixed devices. • In addition, in 13 major markets where certain channels between 14 and 20 are used for land mobile operations, channels between 21 and 51 are left free of new unlicensed devices.

  41. FCC Rules • All fixed devices must register their locations in the database. • In addition, fixed devices must transmit identifying information to make it easier to identify them if they are found to interfere. Furthermore, fixed and personal/portable devices operating independently must provide identifying information to the TV bands database. • All devices must include power control so that they use the minimum power necessary to accomplish communications. • All white space equipment must be certified by the FCC Laboratory. • FCC permits applications for certification of devices that do not include the geo-location and database access capabilities, and instead rely on spectrum sensing to avoid causing harmful interference, subject to a much more rigorous set of tests by the FCC Laboratory.

  42. Conclusions • A fixed device must employ both geo-location, database access and spectrum sensing capabilities that enable the device to listen for and identify the presence of signals from other transmitters. • A personal/portable device must either be under the control of a fixed device or a personal/portable device that employs geo-location, database access and spectrum sensing or employ geo location/database access and spectrum sensing itself. • These devices will be required to sense, at levels >= -114 dBm, signals of other services.

  43. Assessing The Rules

  44. Summary For reducing interference the FCC proposed methods are based on Transmit power limitations/power control Geo-location enabled devices Geographic databases Career sensing Beacon detection Combinations of these methods

  45. Geo-Location Enabled Devices In this method of interference reduction, secondary users must be endowed by GPS (or similar geo-location systems) with at least 300m accuracy. Primary users location is known to the secondary users (using a geographic database) and buffer regions around the primary users are specified where secondary user transmissions are not allowed in certain bands. Geo-location and also FCC power limits are safe but conservative: May make more sense to allow different power limits in various bands based on the location of the secondary user.

  46. Career Sensing Secondary devices sense the channel and based on the activity level decide if it is busy or not. FCC: -114 dBm power means the channel is busy. A B Failure Causes Interference Career Sensing C D

  47. Career Sensing It is obvious that -114 dBm is not the optimum threshold for detecting a busy channel. If this threshold is not correctly selected it limits the efficiency of cognitive devices, thus Optimum threshold for detection must be computed although: Typically the underlying ambient noise std бis not known The distribution of the primary signal is not known. The busy channel threshold must be selected based on geographic region (and the underlying primary systems) at least for devices using geo-location and databases. Similar conclusion can be made for beacon detection. Here we have to be also careful about transmission strategy.

  48. Assumptions • Assumptions: • Ambient noise is Gaussian with zero mean and an estimate of б can be obtained • Primary transmission power is Pp. • For career sensing, the primary signal is Gaussian with mean zero and variance Pp. • These are reasonable assumptions if each secondary user scans and averages the channel for some reasonable time (during both idle and busy periods).

  49. Issues Computation of CCT (Clear channel threshold) for deciding on idle channels and associated detection strategies for both sensing and beacon based systems is a straightforward exercise in detection theory. Questions: Given a peak power Ps and average transmit power Pav for the secondary user, what is the best secondary user transmission strategy that minimizes the interference to primary receivers? The answer is non-trivial and is given by the following theorem.

  50. Results • Theorem [KGMT]: • The best transmit strategy (one that minimizes interference to primary users for a fixed average and peak transmission power) for career sensing based or beacon detection based cognitive radios are identical: • The cognitive radio must transmit at full power Ps when detection reliability (LLR between clear channel and busy channel hypotheses) is above a certain transmission threshold (TT) [different than CCT] and refrain from transmission otherwise. This TT depends on • detection being beacon based or career sensing based • average transmit power Pav • Average idle time of primary transmitter. • Thus even when CCT is correctly set based on location, one should operate based on TT (again set based on location).

More Related