1 / 15

An algorithm for dynamic spectrum allocation in shadowing environment and with communication

An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology Communications Laboratory. Instructor : Lic. Tech. Kalle Ruttik Supervisor : Professor Riku Jäntti. CONTENTS. Motivation

lilian
Download Presentation

An algorithm for dynamic spectrum allocation in shadowing environment and with communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology Communications Laboratory Instructor : Lic. Tech. Kalle Ruttik Supervisor : Professor Riku Jäntti

  2. CONTENTS • Motivation • Background work • System Model • Proposed algorithm • Power detection • Distributed power detection • Results • Conclusions • Future work

  3. MOTIVATION • Measurements show that the spectrum is underutilised (TV Broadcast) • Rightful owners leave it partially unused (temporarily,spatially) • Sporadically used spectrum could be accessed by other users too • This access is called Dynamic Spectrum Allocation (DSA) • DSA access : Efficient and Adaptive

  4. BACKGROUND WORK How much efficient DSA could be? • Accessibility control to the open spectrum • Applications of game theory on available frequency channels How much adaptive DSA could be? • Co-existence – Interference control • Two step decision • What is the worst case scenario?

  5. SYSTEM MODEL I • Three system components • Three critical power levels • Semi-mobile secondary users • The noise level is known • No deterministic components • Unknown coding and modulation • Power detection • δ,ε,ω are known and positive (WHY?) • Outage req. for primary users:

  6. SYSTEM MODEL II • Collaborative spectrum sensing benefits • Send measurements to the fusion centre • The fusion centre decides and broadcasts • Two schemes are studied • Centralized • Decentralized • Decentralized scheme is more challenging • less capacity and power requirement • cooperation between fusion and sensors for system wise optimization

  7. PROPOSED ALGORITHM I Power detection of the primary signal Output : decision threshold T1 Power identification of the primary signal Output : decision threshold T2 Where T1 and T2 depends on? First step : The primary signal is assumed to be absent if it at most δ dB above the noise level. Second step : The transmission does not probably generate interference if the primary signal is at most ε dB above the noise level.

  8. Block diagram PROPOSED ALGORITHM II • Obtain an estimate within [T1,T2] • Interference estimation • unknow attenuation • unknown distance to the transmitter • Worst case interference estimation RULE Initiate transmission provided the generated interference is negligible compared to the noise level

  9. What is the distribution of How do we fix POWER DETECTION The primary signal is assumed to be absent if it is at most δ dB above the noise level The distribution of the measured samples is assumed to be Gaussian: i.i.d To decide optimally we use Bayes test and Neymann-Pearson approach

  10. DISTRIBUTED POWER DETECTION Procedure Independent users sense the spectrum, calculate LLR and send it to the fusion • Centralized scheme • The complete LLR is communicated • The fusion adds the received LLRs and compares the result with a threshold • Centralized scheme is equivalent to a single sensor system with more • degrees of freedom when there is no shadowing. • Decentralized scheme • A single bit decision is transmitted to the fusion • Unlike centralized scheme two decision thresholds have to be set :

  11. RESULTS I DETECTION FOR SINGLE USER

  12. RESULTS II DETECTION WITH SHADOWING Due to the obstacles along the propagation path the signal level is not deterministic at a particular transmitter-receiver separation We assume that the signal level is distributed log-normally All the samples experience the same shadowing

  13. without shadowing with shadowing RESULTS III DISTRIBUTED DETECTION For single user the shadowing samples are correlated The user should consider the probability of deep fading Assume independent shadow fading among the secondary users The mean and the variance of the shadowing distribution is common for all The effect of shadowing could be averaged out Low threshold

  14. CONCLUSIONS • A three step algorithm for DSA access was proposed based on the generated • interference at the cell border • The first step was presented • The performance depends on the outage requirement, on the SNR and • on the number of power samples • For a single user in the presence of shadowing almost no spectrum reuse • The performance was greatly improved by collecting measurements made by • multiple independent users and jointly process them at a fusion centre • The performance was affected by the amount of information conveyed from • the sensors to the fusion • Two extremes were studying providing useful performance bounds for • any practical distributed detection scheme

  15. FUTURE WORK • Sequential distributed detection. • Under shadow fading numerical integration was used to evaluate the distribution • of the test statistic in the presence of primary signal. The log-normal distribution • could be upper bounded by strair function and analytical solutions could be • retrieved instead. • Correlated shadow fading could be considered • Joint optimization of the three algorithm steps

More Related