Research Article
Reconfigurations Selection in Cognitive, Beyond 3G, Radio Infrastructures
@INPROCEEDINGS{10.1109/CROWNCOM.2006.363468, author={P. Demestichas and G. Dimitrakopoulos and K. Tsagkaris and K. Demestichas and J. Adamopoulou}, title={Reconfigurations Selection in Cognitive, Beyond 3G, Radio Infrastructures}, proceedings={1st International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications}, publisher={IEEE}, proceedings_a={CROWNCOM}, year={2007}, month={5}, keywords={Cognitive networks B3G wireless infrastructures Utility Learning and Adaptation Autonomic computing Seamless mobility}, doi={10.1109/CROWNCOM.2006.363468} }
- P. Demestichas
G. Dimitrakopoulos
K. Tsagkaris
K. Demestichas
J. Adamopoulou
Year: 2007
Reconfigurations Selection in Cognitive, Beyond 3G, Radio Infrastructures
CROWNCOM
IEEE
DOI: 10.1109/CROWNCOM.2006.363468
Abstract
B3G (beyond the 3rd generation) wireless infrastructures can be efficiently realized by exploiting cognitive networking concepts. Cognitive, wireless access, infrastructures can dynamically configure their transceivers with the appropriate radio access technologies (RATs) and spectrum, in order to, reactively or proactively, adapt to the environment requirements and conditions. Reconfiguration decisions call for advanced management functionality. This paper provides such management functionality by addressing a pertinent problem, called "RAT and spectrum selection, QoS assignment and traffic distribution" (RSQT). Our work contributes in four main areas. First, we formally define and solve a fully distributed problem version, which is very important for the management of a particular reconfigurable element. Second, we propose robust learning and adaptation, strategies for estimating (discovering) the performance potentials of alternate reconfigurations. Third, we give a computationally efficient solution to the problem of exploiting the performance potentials of reconfigurations and thus selecting the best ones. Finally, we present results that expose the behavior and efficiency of our schemes