2012
DOI: 10.1109/mwc.2012.6272421
|View full text |Cite
|
Sign up to set email alerts
|

Worldwide trends in regulation of secondary access to white spaces using cognitive radio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(32 citation statements)
references
References 3 publications
0
32
0
Order By: Relevance
“…Throughout this paper, we assume that the N source-destination pairs are coordinated e.g. through a common spectrum database [23], [24], which guarantees that all the source nodes can orderly access their shared spectrum without signal interference. The design of a specific spectrum sharing policy [25] should consider both the spectrum efficiency and sharing fairness between different user pairs, which is beyond the scope of this paper.…”
Section: A System Model and Problem Formulationmentioning
confidence: 99%
“…Throughout this paper, we assume that the N source-destination pairs are coordinated e.g. through a common spectrum database [23], [24], which guarantees that all the source nodes can orderly access their shared spectrum without signal interference. The design of a specific spectrum sharing policy [25] should consider both the spectrum efficiency and sharing fairness between different user pairs, which is beyond the scope of this paper.…”
Section: A System Model and Problem Formulationmentioning
confidence: 99%
“…Frequencies used by the licensed system as well as unused frequencies can be seen from the database. Spectrum databases are currently heavily supported in many terrestrial scenarios, including TV white space operation [20]. When the secondary system needs to transmit, it requires spectrum from the spectrum broker that is governing the database, and available band is given for it.…”
Section: Database Approachmentioning
confidence: 99%
“…In case that the secondary user is using the spectrum and a primary user starts operating, then the secondary user is obliged to immediately vacate the channel in order to avoid causing interference to the primary user. To ensure this, the UK regulator, Ofcom and Federal Communication Commission (FCC) in the United States, have proposed three methods to be used by secondary users: beacons, sensing and geo-location with database [7]. When beacons are used as a controlling method, secondary users will only start transmitting if they have already received a beacon signal recognizing the vacant channel.…”
Section: Introductionmentioning
confidence: 99%