Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Quality of service assessment of opportunistic spectrum access: a medium access control approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Pawelczak, P. ; Wroclaw Univ. of Technol., Wroclaw ; Pollin, S. ; Hoi-Sheung So ; Bahai, A.
more authors

Opportunistic spectrum access (OSA) is a promising new spectrum management approach that will allow coexistence of both licensed and opportunistic users in each spectrum band, potentially decreasing the spectrum licensing costs for both classes of users. However, this has significant implications on the QoS experienced by the licensed and opportunistic spectrum users. In this article we investigate how tolerant to secondary user activity a licensed user should be so as to provide dependable communication with sufficient QoS to an opportunistic user. We also look at key multichannel MAC features for such OSA networks proposed in the literature, and discuss how the design of control channel management affects the QoS of opportunistic users as a function of the tolerance of licensed users. We quantify the trade-off between dependability of the OSA network and the dependability of licensed users. The main conclusion is that opportunistic users can indeed achieve good QoS, as long as the licensed users are not highly active. For example, in one of the scenarios we studied, opportunistic users can achieve a delay below 100 ms if licensed user activity stays below 30 percent.

Published in:

Wireless Communications, IEEE  (Volume:15 ,  Issue: 5 )