scispace - formally typeset
Search or ask a question
Author

Suzan Bayhan

Bio: Suzan Bayhan is an academic researcher from University of Twente. The author has contributed to research in topics: Cognitive radio & Wireless. The author has an hindex of 16, co-authored 83 publications receiving 1254 citations. Previous affiliations of Suzan Bayhan include Boğaziçi University & Technical University of Berlin.


Papers
More filters
Journal ArticleDOI
TL;DR: An overview of the REM concept is presented in various dimensions ranging from its architecture and stored information to REM construction techniques as well as REM quality metrics.
Abstract: Latest regulations on TV white space communications and emerging trends of spectrum access through geolocation databases relax the regulatory constraints on Cognitive Radios (CRs). Geolocation databases are designed to store information related to incumbents, and CRs are envisioned to consult this database before spectrum access. Spectrum occupancy and related environment information can be constructed using these geolocation databases. In that regard, Radio Environment Map (REM) is a promising tool that provides a practical means for the realization of cognitive radio networks (CRNs). It constructs a comprehensive map of the CRN by utilizing multi-domain information from geolocation databases, characteristics of spectrum use, geographical terrain models, propagation environment, and regulations. REMs contribute to cognition engines by building long-term knowledge via processing spectrum measurements collected from sensors to estimate the state of locations where there is no measurement data. In addition, REM utilizes feedback from the CRs and can apply various learning tools. The vision is to design CRNs such that CRs, though being simple devices without advanced cognitive functionalities, can become cognitive via REMs and operate in an efficient manner. In this paper, an overview of the REM concept is presented in various dimensions ranging from its architecture and stored information to REM construction techniques as well as REM quality metrics.

222 citations

Journal ArticleDOI
TL;DR: This work defines and proposes a femtocell-based cognitive radio architecture for enabling multitiered opportunistic access in next-generation broadband wireless systems and provides experimental results to illustrate a general proof of concept for this new modality.
Abstract: We define and propose a femtocell-based cognitive radio architecture for enabling multitiered opportunistic access in next-generation broadband wireless systems. This architecture combines the conventional femtocell idea with an infrastructure-based overlay cognitive network paradigm. The cognitive femtocell concept leads to simpler and easier proliferation of cognitive radio into practical systems. We highlight the drawbacks and advantages of the proposed network structure with a discussion on research directions for cognitive femtocell architecture. We also provide experimental results to illustrate a general proof of concept for this new modality.

196 citations

Journal ArticleDOI
TL;DR: This paper proposes a polynomial-time heuristic algorithm, i.e., the energy-efficient heuristic scheduler (EEHS), which allocates each idle frequency to the CR that attains the highest energy efficiency at this frequency.
Abstract: With growing concern about environmental issues and an emerging green communications paradigm, cognitive radio (CR) networks (CRNs) have to be considered from the energy efficiency perspective. In this paper, we focus on scheduling in CRNs, in which a cognitive base station (CBS) makes frequency allocations to the CRs at the beginning of each frame. A cognitive scheduler must consider the diversity among CRs' queues and channel capacities in terms of number of bits and the channel switching cost from one frequency to another. Taking all these into account, we formulate the scheduling problem as an energy efficiency maximization problem, which is a nonlinear integer programming (NLP) problem and is thereby hard to solve. We seek alternate computationally easier solutions. To this aim, we propose a polynomial-time heuristic algorithm, i.e., the energy-efficient heuristic scheduler (EEHS), which allocates each idle frequency to the CR that attains the highest energy efficiency at this frequency. Next, we reformulate the original problem first as a throughput maximization problem subject to energy consumption restrictions and then as an energy consumption minimization problem subject to minimum throughput guarantees. These two schedulers also have the power to provide fairness in resource allocation. We analyze the energy efficiency and successful transmission probability of the proposed schedulers under both contiguous and fragmented spectrum scenarios. Performance studies show that, compared with a pure opportunistic scheduler with a throughput maximization objective, proposed schedulers can attain almost the same throughput performance with better energy efficiency.

122 citations

Journal ArticleDOI
TL;DR: An extensive performance analysis of the proposed methods under various numbers of SUs, average channel SNR, and channel sampling frequency reveals that all proposals with an energy minimization perspective provide significant energy savings compared with a pure transmission-time maximization technique.
Abstract: Spectrum sensing is an important aspect of cognitive radio networks (CRNs). Secondary users (SUs) should periodically sense the channels to ensure primary-user (PU) protection. Sensing with cooperation among several SUs is more robust and less error prone. However, cooperation also increases the energy spent for sensing. Considering the periodic nature of sensing, even a small amount of savings in each sensing period leads to considerable improvement in the long run. In this paper, we consider the problem of energy-efficient (EE) spectrum sensing scheduling with satisfactory PU protection. Our model exploits the diversity of SUs in their received signal-to-noise ratio (SNR) of the primary signal to determine the sensing duration for each user/channel pair for higher energy efficiency. We model the given problem as an optimization problem with two different objectives. The first objective is to minimize the energy consumption, and the second objective is to minimize the spectrum sensing duration to maximize the remaining time for data transmission. We solve both problems using the outer linearization method. In addition, we present two suboptimal but efficient heuristic methods. We provide an extensive performance analysis of our proposed methods under various numbers of SUs, average channel SNR, and channel sampling frequency. Our analysis reveals that all proposals with an energy minimization perspective provide significant energy savings compared with a pure transmission-time maximization (TXT) technique.

84 citations

Proceedings ArticleDOI
30 Sep 2015
TL;DR: The proposed ring model is used and it is shown that flooding can be constrained within a very small neighbourhood to achieve most of the gains which come from areas where the growth rate is relatively low, i.e., the net- work edge.
Abstract: Scoped-flooding is a technique for content discovery in a broad networking context. This paper investigates the effects of scoped-flooding on various topologies in information- centric networking. Using the proposed ring model, we show that flooding can be constrained within a very small neighbourhood to achieve most of the gains which come from areas where the growth rate is relatively low, i.e., the net- work edge. We also study two flooding strategies and com- pare their behaviours. Given that caching schemes favour more popular items in competition for cache space, popular items are expected to be stored in diverse parts of the network compared to the less popular items. We propose to exploit the resulting divergence in availability along with the routers' topological properties to fine tune the flooding radius. Our results shed light on designing efficient con- tent discovery mechanism for future information-centric net- works.

61 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An estimation of the global electricity usage that can be ascribed to Communication Technology between 2010 and 2030 suggests that CT electricity usage could contribute up to 23% of the globally released greenhouse gas emissions in 2030.
Abstract: This work presents an estimation of the global electricity usage that can be ascribed to Communication Technology (CT) between 2010 and 2030. The scope is three scenarios for use and production of consumer devices, communication networks and data centers. Three different scenarios, best, expected, and worst, are set up, which include annual numbers of sold devices, data traffic and electricity intensities/efficiencies. The most significant trend, regardless of scenario, is that the proportion of use-stage electricity by consumer devices will decrease and will be transferred to the networks and data centers. Still, it seems like wireless access networks will not be the main driver for electricity use. The analysis shows that for the worst-case scenario, CT could use as much as 51% of global electricity in 2030. This will happen if not enough improvement in electricity efficiency of wireless access networks and fixed access networks/data centers is possible. However, until 2030, globally-generated renewable electricity is likely to exceed the electricity demand of all networks and data centers. Nevertheless, the present investigation suggests, for the worst-case scenario, that CT electricity usage could contribute up to 23% of the globally released greenhouse gas emissions in 2030.

644 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a review of methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years, including spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more.
Abstract: The power of any kind of network approach lies in the ability to simplify a complex system so that one can better understand its function as a whole. Sometimes it is beneficial, however, to include more information than in a simple graph of only nodes and links. Adding information about times of interactions can make predictions and mechanistic understanding more accurate. The drawback, however, is that there are not so many methods available, partly because temporal networks is a relatively young field, partly because it is more difficult to develop such methods compared to for static networks. In this colloquium, we review the methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years. This includes the spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more. We also discuss future directions.

526 citations

Journal ArticleDOI
TL;DR: This colloquium reviews the methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years, which includes the spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more.
Abstract: The power of any kind of network approach lies in the ability to simplify a complex system so that one can better understand its function as a whole. Sometimes it is beneficial, however, to include more information than in a simple graph of only nodes and links. Adding information about times of interactions can make predictions and mechanistic understanding more accurate. The drawback, however, is that there are not so many methods available, partly because temporal networks is a relatively young field, partly because it more difficult to develop such methods compared to for static networks. In this colloquium, we review the methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years. This includes the spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more. We also discuss future directions.

513 citations

Journal ArticleDOI
TL;DR: The trial phase of the system mounting LTE-A technology onboard Helikites to serve users on the ground yielded very encouraging results, and showed that such a system could offer a longer lasting solution, provided that inefficiency in powering the radio frequency equipment in the Helikite can be overcome.
Abstract: Providing "connectivity from the sky" is the new innovative trend in wireless communications. High and low altitude platforms, drones, aircrafts, and airships are being considered as candidates for deploying wireless communications complementing the terrestrial communication infrastructure. In this article we report the detailed account of the design and implementation challenges of an aerial network consisting of LTE-Advanced (LTE-A) base stations. In particular, we review achievements and innovations harnessed by an aerial network composed of Helikite platforms. Helikites can be raised in the sky to bring Internet access during special events and in the aftermath of an emergency. The trial phase of the system mounting LTE-A technology onboard Helikites to serve users on the ground yielded very encouraging results, and showed that such a system could offer a longer lasting solution, provided that inefficiency in powering the radio frequency equipment in the Helikite can be overcome.

377 citations