Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Impact of Erroneous Transmission on Secondary Spectrum Access
KTH, School of Information and Communication Technology (ICT).
2011 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

The rapid development and deployment of wireless devices demand for the efficient spectrum usage to ensure quality of service. Thus, regulatory bodies opened new dimensions regarding the sharing of spectrum among the owners, keeping the respect of exclusive users as a primary objective. The main concern of secondary spectrum access is to protect primary licensed user from harmful interference of secondary devices. Accordingly, there are some rules to control interference aggregation to the primary victim, and this is accomplished by characterizing the aggregate interference.

Statistical models of interference aggregation have been considered in previous studied. But, in real systems, secondary users do not follow the rules all the time and there might be erroneous transmission due to different reasons. In this thesis we developed a statistical model of aggregate interference when we take erroneous transmissions into account. In addition, probability distribution of the aggregate interference is approximated through its cumulants. The derived approximation shows a good agreement with Monte Carlo simulation result in tail region under specific conditions.

It is also shown that even a single wrongdoer may dramatically degrade spectrum sharing opportunities particularly when it is relatively close to the primary receiver depending on the transmitted power to the victim receiver. Finally, impacts of erroneous transmission on the secondary access under variations in the density of opportunistic users and their probability of wrong transmission are investigated.

Place, publisher, year, edition, pages
2011. , 47 p.
Series
Trita-ICT-EX, 288
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:kth:diva-91850OAI: oai:DiVA.org:kth-91850DiVA: diva2:511390
Subject / course
Communications Systems
Educational program
Master of Science - Wireless Systems
Uppsok
Technology
Examiners
Available from: 2012-03-21 Created: 2012-03-21 Last updated: 2012-03-21Bibliographically approved

Open Access in DiVA

fulltext(875 kB)198 downloads
File information
File name FULLTEXT01.pdfFile size 875 kBChecksum SHA-512
0e5b57c56e2be2e61d78ed09c2dd01d5f3b13189e54089321cc4201b647599ad9b85fcb09ee5fd2c4d7fe2c76dc7aea5b25c60048d1fc88df5ac9cc1f8dd6522
Type fulltextMimetype application/pdf

By organisation
School of Information and Communication Technology (ICT)
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 198 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 132 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf