Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,727 Hits in 4.4 sec

Channel probing for opportunistic access with multi-channel sensing

Keqin Liu, Qing Zhao
2008 2008 42nd Asilomar Conference on Signals, Systems and Computers  
Index Terms-Multi-channel opportunistic access, restless multi-armed bandit, Whittle's index, indexability  ...  We consider an opportunistic communication system consisting of multiple independent channels with time-varying states.  ...  MULTI-CHANNEL OPPORTUNISTIC ACCESS AND RESTLESS BANDIT FORMULATION Consider N independent Gilbert-Elliot channels, each with transmission rate B i (i = 1, · · · , N ).  ... 
doi:10.1109/acssc.2008.5074369 fatcat:avirl4a42fh2pezm4flqnf6ejq

Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain?

Yang Liu, Mingyan Liu, Jing Deng
2013 IEEE Journal on Selected Areas in Communications  
Abstract: We evaluate the performance of an opportunistic multi-channel medium access control protocol and compare it to that of the corresponding single-channel MAC (S-MAC) and a nonopportunistic multi-channel  ...  We do this in three different settings: (1) an ideal scenario where no control channel is used and no sensing delay is incurred, (2) a more realistic scheme where users compete for access on a control  ...  This means that a user only needs to reserve the control channel for channel sensing/probing purposes but not for data transmission.  ... 
doi:10.1109/jsac.2013.131122 fatcat:eqdszy5omvaarmdv2e2yqksyny

Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem

Panlong Yang, Bowen Li, Jinlong Wang, Xiang-Yang Li, Zhiyong Du, Yubo Yan, Yan Xiong
2015 IEEE Transactions on Wireless Communications  
Assuming perfect channel statistics, several studies have applied optimal stopping theory to derive control strategy for sequential sensing/probing based opportunistically accessing (s-SPA), exploiting  ...  In opportunistic channel access, the user needs to make real time decisions on when and which channel to access with uncertainty.  ...  accessing rule for opportunistic channel accessing.  ... 
doi:10.1109/twc.2015.2424413 fatcat:75rzqtdjajhwbk3g2o4rhdhf24

A Restless Bandit Formulation of Opportunistic Access: Indexablity and Index Policy

Keqin Liu, Qing Zhao
2008 2008 5th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops  
With limited sensing, a user can only sense and access a subset of channels and accrue rewards determined by the state of the sensed channels.  ...  Index Terms-Opportunistic access, optimal channel probing, restless multi-armed bandit, Whittle's index policy, indexability. 978-1-4244-2563-1/08/$25.00 ©2008 IEEE Authorized licensed use limited to:  ...  Theorems 1-3 given below summarize the results on the indexability and Whittle's index policy for multi-channel opportunistic access.  ... 
doi:10.1109/sahcnw.2008.12 fatcat:iflmbf2fivgave3atqsacvejya

Opportunistic packet Scheduling and Media Access control for wireless LANs and multi-hop ad hoc networks

Jianfeng Wang, Hongqiang Zhai, Yuguang Fang
2004 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733)  
In the wireless LANs or mobile ad hoc networks, a node with multi-packets in its queue waiting for delivery to several neighboring nodes may choose to schedule a candidate receiver with good channel condition  ...  Motivated by this observation, we introduce the Opportunistic packet Scheduling and Media Access control (OSMA) protocol to exploit high quality channel condition under certain fairness constraints.  ...  Framework of OSMA In this section, we provide a general framework for opportunistic packet scheduling and media access control with imperfect channel information.  ... 
doi:10.1109/wcnc.2004.1311365 dblp:conf/wcnc/WangZF04 fatcat:msvrdtf6gbeafeliwa5kimlt6q

Distributed Cognitive Sensing for Time Varying Channels: Exploration and Exploitation

Song Gao, Lijun Qian, Dhadesugoor R. Vaman, Zhu Han
2010 2010 IEEE Wireless Communication and Networking Conference  
Spectrum under-utilization calls for the open and dynamic spectrum access mechanism, which allows the unlicensed user equipped with cognitive radios to opportunistically sense and access the spectrum that  ...  A coordination scheme for the multi-user case is also presented and the effectiveness is also demonstrated by the simulation results.  ...  In [10] , a distributed channel sensing and access policy base on multi-armed bandit problem is presented for cognitive users to opportunistically exploit the available channels under statistical assumption  ... 
doi:10.1109/wcnc.2010.5506393 dblp:conf/wcnc/GaoQVH10 fatcat:m7djoqyifzdyjpi7ntazn6le5i

Concurrent-MAC

Ghazale Hosseinabadi, Nitin Vaidya
2013 Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13  
A station gaining access to the channel, schedules a set of its neighbors for concurrent transmissions.  ...  This paper presents the design and performance evaluation of Concurrent-MAC, a MAC protocol for increasing concurrent transmissions in multi-AP wireless LANs.  ...  Probe Phase Enabling Concurrent Transmissions Channel access mechanism of Concurrent-MAC is shown in Figure 2 .  ... 
doi:10.1145/2500423.2504582 dblp:conf/mobicom/HosseinabadiV13 fatcat:u2xutvqblbhslmsbwqcqsucjsi

Cooperative and opportunistic transmission for wireless ad hoc networks

Qian Zhang, Qing Chen, Fan Yang, Xuemin Shen, Zhisheng Niu
2007 IEEE Network  
In ad hoc networks fading environments provide the opportunity to exploit variations in channel conditions, and transmit to the user with the currently "best" channel.  ...  For opportunistic transmission that exploits time diversity, it is observed that the inequality in channel contention due to the hidden terminal phenomenon tends to result in energy inefficiency.  ...  Opportunistic Scheduling with Multi-User Diversity The fundamental rationality for leveraging multi-user diversity lies in that, in practice, the channel between any senderreceiver pair is independent  ... 
doi:10.1109/mnet.2007.314533 fatcat:tpbqvhfinba2dm33pm4hcimm4y

Adaptive cross-layer protocol design for opportunistic WLANs over TVWS

Mohammad J. Abdel-Rahman, Harish Kumar Shankar, Marwan Krunz
2014 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN)  
In this paper, we propose a QoS-aware parallel sensing/probing architecture, called QASPA, which exploits inherent channel and user diversities exhibited by the wireless system.  ...  This is due to the unpredictable nature of spectrum availability combined with the fluctuations of channel quality.  ...  Scheduling of Sensing/Probing Processes for HP Flows In [2] , an access point and spectral band selection scheme, called MAWS, is proposed.  ... 
doi:10.1109/dyspan.2014.6817835 dblp:conf/dyspan/Abdel-RahmanSK14 fatcat:qu3vb3goybdrnop3opbye5bs6y

Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors

Tao Shu, Marwan Krunz
2009 Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09  
In this paper, we exploit channel diversity for opportunistic spectrum access (OSA).  ...  Our approach uses channel quality as a second criterion (along with the idle/busy status of the channel) in selecting channels to use for opportunistic transmission.  ...  Thus, it is possible for a CR to exploit this multi-channel diversity by opportunistically selecting a good channel for transmission.  ... 
doi:10.1145/1614320.1614325 dblp:conf/mobicom/ShuK09 fatcat:bir3wdlnmzdgvhr3acvv2ryspm

Observation vs statistics: Near optimal online channel access in cognitive radio networks

Bowen Li, Panlong Yang, Jinlong Wang, Qihui Wu, Xiang-Yang Li, Yunhao Liu
2012 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)  
Further, we design a computational efficient channel access policy, integrating optimal stopping theory and multi-armed bandit policy effectively.  ...  The computational complexity is reduced from O(KN K ) to O(K), where N is the number of channels, and K is the maximum number of sensing/probing times in each procedure.  ...  With appropriate sensing order, observations can be leveraged for opportunistic access and reduce the computational overhead.  ... 
doi:10.1109/mass.2012.6502548 dblp:conf/mass/LiYWWLL12 fatcat:kmy2he5wivgkvnnzg65wyszdka

Multi-user Diversity for IEEE 802.11 Infrastructure Wireless LAN [chapter]

Sung Won Kim
2006 Lecture Notes in Computer Science  
Multi-user diversity based opportunistic scheduling is a modern view communication over fading wireless channels, whereby, unlike rate adaptation based schemes, channel variations are exploited rather  ...  This paper proposes a multi-user diversity scheme for IEEE 802.11 infrastructure wireless LAN to enhance the throughput.  ...  The channel access number of the opportunistic mode divided by total channel access number in the proposed method is compared with FAIR in Fig. 5 .  ... 
doi:10.1007/11802167_23 fatcat:vefzejo2u5hyrfpof7mfbjbw74

Sequential opportunistic spectrum access with imperfect channel sensing

Tao Shu, Marwan Krunz
2013 Ad hoc networks  
In this paper, we exploit channel diversity for opportunistic spectrum access (OSA).  ...  Our approach uses instantaneous channel quality as a second criterion (along with the idle/busy status of the channel) in selecting channels to use for opportunistic transmission.  ...  Thus, it is possible for a CR to exploit this multi-channel diversity by opportunistically selecting a good channel for transmission 1 .  ... 
doi:10.1016/j.adhoc.2012.09.004 fatcat:ynk5zx5d2rayrnl7kxpnqfelxq

To stay or to switch: Multiuser dynamic channel access

Yang Liu, Mingyan Liu
2013 2013 Proceedings IEEE INFOCOM  
However, unlikely many prior works in this area, including channel probing and switching policies for a single user to exploit spectral diversity, and probing and access policies for multiple users over  ...  In this paper we study opportunistic spectrum access (OSA) policies in a multiuser multichannel random access setting, where users perform channel probing and switching in order to obtain better channel  ...  access network like IEEE 802.11, with the following modifications related to dynamic and opportunistic channel access.  ... 
doi:10.1109/infcom.2013.6566917 dblp:conf/infocom/LiuL13 fatcat:dxz43gp2szagjjtosqktrsagke

Resource Allocation in Spectrum Deployment for Cognitive Third-party Users

Arikatla Jaya Lakshmi, G. N. Swamy, M. N. Giri Prasad
2021 International Journal of Advanced Computer Science and Applications  
Jamming approach generates a periodic jamming signal for TSU in sensing of free spectrum.  ...  The spectrum sharing and utilization of other user available spectrum is an optimal solution, which has outcome with a new mode of communication called cognitive network.  ...  In [15] Formal paraphrase the sensing of opportunistic spectrum by a primary user in the mobility scenario is presented with authentic access to spectrum usage.  ... 
doi:10.14569/ijacsa.2021.0121164 fatcat:skc4qkoxbjdfdomu6pwn2zjj3q
« Previous Showing results 1 — 15 out of 5,727 results