Method for detecting cognitive user in opportunity spectrum sharing system

A spectrum sharing and cognitive user technology, which is applied in the detection field of cognitive users in the opportunistic spectrum sharing system, to achieve the effects of effective collision suppression, low probability of conflict, and efficient spectrum sharing

Inactive Publication Date: 2010-07-14
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The same problem exists in the single-user single-channel application environment and the multi-user competition single-channel environment. The basic idea of ​​the design scheme in different scenarios is the same, but necessary scheduling and coordination are required between multiple users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting cognitive user in opportunity spectrum sharing system
  • Method for detecting cognitive user in opportunity spectrum sharing system
  • Method for detecting cognitive user in opportunity spectrum sharing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] figure 1 It shows a frame structure example in which a single primary user occupies the authorized channel and a single secondary user detects the authorized channel and transmits data on the authorized channel. refer to figure 1 , the primary user's occupation of the authorized channel conforms to the exponential on-off traffic model. In this model, the primary user occupies the channel, that is, the average duration of opening is β 0 . The primary user does not occupy the channel, that is, the average duration of off is β i , the time taken by the primary user from occupying the channel to releasing the channel is t, which obeys the exponential distribution. Assuming that the frame length of the secondary user is T, t milliseconds before data transmission is used for detecting the channel of the primary user. When it is detected that the primary user does not exist, the secondary user data is transmitted within T-i time. During the data transmission process, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting a cognitive user in an opportunity spectrum sharing system, which relates to a design method for detecting a master user and sending data information frame length by the cognitive user (secondary user) in a system based on an opportunity spectrum access (OSA) technique in a cognitive network. The method comprises the following steps of: firstly, analyzing the testing frequency based the signal interference noise ratio of the secondary user; and secondly, defining the frame length of data transmission of the secondary user based on the testing frequency and the spectral optimization. A control channel is needed to be added in a single-channel multi-user scene, the selection and the scheduling of users are performed first, and then a method for detecting a single user is implemented. The basic thought of the method that the occupation condition of an authorized channel by the master user and the influence on the signal interference noise ratio (SINR) of the secondary user by the master user are analyzed, and thus the detection frequency and the transmission frame length of the secondary user are designed, and an optimizing and compromising scheme is found between the throughput of the secondary user and the collision probability with the master user.

Description

technical field [0001] The present invention generally relates to a cognitive network based opportunistic spectrum access (OSA) technology system and a cognitive user (secondary user) detection method for a primary user and a design method for sending data information frame length. The basic idea of ​​this method is to analyze the occupancy of the primary user on the licensed channel and the influence of the primary user on the signal-to-interference-noise ratio (SINR) of the secondary user, and design the detection frequency and transmission frame length of the secondary user based on this. Find an optimized and compromised solution between the collision probability with the main user. Background technique [0002] Opportunistic Spectrum Access (OSA) technology means that there is no need for cooperation between the primary and secondary users, and the secondary users use the spectrum resources of the primary user as they see fit. The primary user does not need to know the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W16/14H04W24/02
Inventor 孙君朱洪波
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products