1st International ICST Workshop on Technology and Policy for Accessing Spectrum

Research Article

Reliable open spectrum communications through proactive spectrum access

  • @INPROCEEDINGS{10.1145/1234388.1234393,
        author={Prashanth Aravinda   Kumar Acharya and Sumit  Singh and Haitao Zheng},
        title={Reliable open spectrum communications through proactive spectrum access},
        proceedings={1st International ICST Workshop on Technology and Policy for Accessing Spectrum},
        publisher={ACM},
        proceedings_a={TAPAS},
        year={2006},
        month={8},
        keywords={},
        doi={10.1145/1234388.1234393}
    }
    
  • Prashanth Aravinda Kumar Acharya
    Sumit Singh
    Haitao Zheng
    Year: 2006
    Reliable open spectrum communications through proactive spectrum access
    TAPAS
    ACM
    DOI: 10.1145/1234388.1234393
Prashanth Aravinda Kumar Acharya1,*, Sumit Singh2,*, Haitao Zheng1,*
  • 1: Department of Computer Science, University of California, Santa Barbara, CA 93106 U.S.A
  • 2: Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106 U.S.A
*Contact email: acharya@cs.ucsb.edu, sumit@ece.ucsb.edu, htzheng@cs.ucsb.edu

Abstract

Open Spectrum systems offer an attractive solution to the reuse of under-utilized licensed spectrum. Existing proposals take a reactive sense-and-avoid approach to impulsively reconfigure spectrum usage without any knowledge of future dynamics. We propose a proactive spectrum access approach where secondary users utilize past observations to build predictive models on spectrum availability, and intelligently plan channel usage to maximize utilization and minimize disruptions to primary users. Based on the characteristics of TV-broadcast, we develop a simple availability metric and apply a usability filter to eliminate unreliable channels with heavy and frequent appearance of primary users. Our experimental results show that the proactive approach can significantly reduce the number of disruptions. We also observe a clear tradeoff between the disruption rate and the throughput at secondary users. By varying the usability filter threshold, we can to control this tradeoff according to the constraints of primary users and the application requirements at secondary users.