Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Measurement-Based Bandwidth Scavenging in Wireless Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Plummer, A. ; Johns Hopkins Univ. Appl. Phys. Lab., Laurel, MD, USA ; Taghizadeh, M. ; Biswas, S.

Dynamic Spectrum Access can enable a secondary user in a cognitive network to access unused spectrum, or whitespace, found between primary user transmissions in a wireless network. The key design objective for a secondary user access strategy is to "scavenge” the maximum amount of spatio-temporally fragmented whitespace while limiting the amount of disruption caused to the primary users. In this paper, we first measure and analyze the whitespace profiles of an 802.11 network (using ns-2 simulation) and a non-802.11 (CSMA)-based network (developed on TelosB Motes). Then we propose two novel secondary user access strategies, which are based on measurement and statistical modeling of the whitespace as perceived by the secondary users. Afterward, we perform simulation experiments to validate the effectiveness of the proposed access strategies under single and multiple secondary user scenarios, and evaluate their performance numerically using the developed analytical expressions. The results show that the proposed access strategies are able to consistently scavenge between 90 and 96 percent of the available whitespace capacity, while keeping the primary users disruption less than 5 percent.

Published in:

Mobile Computing, IEEE Transactions on  (Volume:11 ,  Issue: 1 )