scispace - formally typeset
Search or ask a question
Proceedings Article•DOI•

Cognitive radio for flexible mobile multimedia communications

Joseph Mitola1•
15 Nov 1999-pp 3-10
TL;DR: This paper characterizes the potential contributions of cognitive radio to spectrum pooling and outlines an initial framework for formal radio-etiquette protocols.
Abstract: Wireless multimedia applications require significant bandwidth, some of which will be provided by third-generation (3G) services. Even with substantial investment in 3G infrastructure, the radio spectrum allocated to 3G will be limited. Cognitive radio offers a mechanism for the flexible pooling of radio spectrum using a new class of protocols called formal radio etiquettes. This approach could expand the bandwidth available for conventional uses (e.g. police, fire and rescue) and extend the spatial coverage of 3G in a novel way. Cognitive radio is a particular extension of software radio that employs model-based reasoning about users, multimedia content, and communications context. This paper characterizes the potential contributions of cognitive radio to spectrum pooling and outlines an initial framework for formal radio-etiquette protocols.

Content maybe subject to copyright    Report

Citations
More filters
Journal Article•DOI•
TL;DR: The novel functionalities and current research challenges of the xG networks are explained in detail, and a brief overview of the cognitive radio technology is provided and the xg network architecture is introduced.

6,608 citations

Journal Article•DOI•
TL;DR: An overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access (OSA) is presented, and the three basic components of OSA are discussed.
Abstract: Compounding the confusion is the use of the broad term cognitive radio as a synonym for dynamic spectrum access. As an initial attempt at unifying the terminology, the taxonomy of dynamic spectrum access is provided. In this article, an overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access (OSA). The three basic components of OSA are discussed. Spectrum opportunity identification is crucial to OSA in order to achieve nonintrusive communication. The basic functions of the opportunity identification module are identified

2,819 citations

Journal Article•DOI•
01 Jul 2009
TL;DR: In this article, spectrum management functionalities such as spectrum sensing, spectrum sharing and spectrum decision, and spectrum mobility are introduced from the viewpoint of a network requiring distributed coordination, and a particular emphasis is given to distributed coordination between CR users through the establishment of a common control channel.
Abstract: Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. CR networks, equipped with the intrinsic capabilities of the cognitive radio, will provide an ultimate spectrum-aware communication paradigm in wireless communications. CR networks, however, impose unique challenges due to the high fluctuation in the available spectrum as well as diverse quality-of-service (QoS) requirements. Specifically, in cognitive radio ad hoc networks (CRAHNs), the distributed multi-hop architecture, the dynamic network topology, and the time and location varying spectrum availability are some of the key distinguishing factors. In this paper, intrinsic properties and current research challenges of the CRAHNs are presented. First, novel spectrum management functionalities such as spectrum sensing, spectrum sharing, and spectrum decision, and spectrum mobility are introduced from the viewpoint of a network requiring distributed coordination. A particular emphasis is given to distributed coordination between CR users through the establishment of a common control channel. Moreover, the influence of these functions on the performance of the upper layer protocols, such as the network layer, and transport layer protocols are investigated and open research issues in these areas are also outlined. Finally, a new direction called the commons model is explained, where CRAHN users may independently regulate their own operation based on pre-decided spectrum etiquette.

1,334 citations

Journal Article•DOI•
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

1,294 citations

Journal Article•DOI•
TL;DR: The technical challenges that have to be met when implementing the interesting new technology of spectrum pooling are described, which represents the coexistence of two mobile radio systems within the same frequency range.
Abstract: This article describes the technical challenges that have to be met when implementing the interesting new technology of spectrum pooling. This notion represents the coexistence of two mobile radio systems within the same frequency range. It enables the secondary utilization of already licensed frequency bands as aimed at by several regulatory authorities worldwide. The goal of spectrum pooling is to enhance spectral efficiency by overlaying a new mobile radio system on an existing one without requiring any changes to the actual licensed system. Several demanding tasks originate from this idea. Some of them have been solved in recent research projects. Others are subject to ongoing investigations. Here, the state of the art in spectrum pooling is presented.

1,268 citations

References
More filters
Journal Article•DOI•
TL;DR: The results show that the ACS outperforms other nature-inspired algorithms such as simulated annealing and evolutionary computation, and it is concluded comparing ACS-3-opt, a version of the ACS augmented with a local search procedure, to some of the best performing algorithms for symmetric and asymmetric TSPs.
Abstract: This paper introduces the ant colony system (ACS), a distributed algorithm that is applied to the traveling salesman problem (TSP). In the ACS, a set of cooperating agents called ants cooperate to find good solutions to TSPs. Ants cooperate using an indirect form of communication mediated by a pheromone they deposit on the edges of the TSP graph while building solutions. We study the ACS by running experiments to understand its operation. The results show that the ACS outperforms other nature-inspired algorithms such as simulated annealing and evolutionary computation, and we conclude comparing ACS-3-opt, a version of the ACS augmented with a local search procedure, to some of the best performing algorithms for symmetric and asymmetric TSPs.

7,596 citations

Book•
01 Mar 1994
TL;DR: The unity of science was celebrated by Planck, Einstein, and Bohr as mentioned in this paper who gave a last smile to the three greats -Curie, Mendeleev, Kramers, and Yukawa.
Abstract: Science smiles three greats - Planck, Einstein, Bohr the unity of science More greats - Curie, Mendeleev, Kramers, Yukawa more of Bohr and Einstein words of greeting challenges scientists facing the great issues - perspectives on policy a last smile

1,308 citations

Book•
01 Jan 1985

452 citations


"Cognitive radio for flexible mobile..." refers background in this paper

  • ...If the offerer does not post one, the cognitive radios using the band could create one using a peer network in which the first user becomes the network control station (e.g., JTIDS [ 9 ])....

    [...]

Journal Article•DOI•
Joseph Mitola1•
TL;DR: Analysis of the topological properties of the software radio architecture yields a layered distributed virtual machine reference model and a set of architecture design principles that may be useful in defining interfaces among hardware, middleware, and higher level software components that are needed for cost-effective software reuse.
Abstract: As the software radio makes its transition from research to practice, it becomes increasingly important to establish provable properties of the software radio architecture on which product developers and service providers can base technology insertion decisions. Establishing provable properties requires a mathematical perspective on the software radio architecture. This paper contributes to that perspective by critically reviewing the fundamental concept of the software radio, using mathematical models to characterize this rapidly emerging technology in the context of similar technologies like programmable digital radios. The software radio delivers dynamically defined services through programmable processing capacity that has the mathematical structure of the Turing machine. The bounded recursive functions, a subset of the total recursive functions, are shown to be the largest class of Turing-computable functions for which software radios exhibit provable stability in plug-and-play scenarios. Understanding the topological properties of the software radio architecture promotes plug-and-play applications and cost-effective reuse. Analysis of these topological properties yields a layered distributed virtual machine reference model and a set of architecture design principles for the software radio. These criteria may be useful in defining interfaces among hardware, middleware, and higher level software components that are needed for cost-effective software reuse.

386 citations


"Cognitive radio for flexible mobile..." refers background in this paper

  • ...The architecture and computational aspects of the ideal software radio have been defined formally [2]....

    [...]

DOI•
28 Jul 1994
TL;DR: The Knowledge Query and Manipulation Language (KQML) as mentioned in this paper is a new language and protocol for exchanging information and knowledge, which can be used as a language for an application program to interact with an intelligent system or for two or more intelligent systems to share knowledge.
Abstract: This paper describes the design of and experimentation with the Knowledge Query and Manipulation Language (KQML), a new language and protocol for exchanging information and knowledge. This work is part a larger effort, the ARPA Knowledge Sharing Effort which is aimed at developing techniques and methodology for building large-scale knowledge bases which are sharable and reusable. KQML is both a message format and a message-handling protocol to support run-time knowledge sharing among agents. KQML can be used as a language for an application program to interact with an intelligent system or for two or more intelligent systems to share knowledge in support of cooperative problem solving. KQML focuses on an extensible set of performatives, which defines the permissible operations that agents may attempt on each other’s knowledge and goal stores. The performatives comprise a substrate on which to develop higher-level models of inter-agent interaction such as contract nets and negotiation. In addition, KQML provides a basic architecture for knowledge sharing through a special class of agent called communication facilitators which coordinate the interactions of other agents The ideas which underlie the evolving design of KQML are currently being explored through experimental prototype systems which are being used to support several testbeds in such areas as concurrent engineering, intelligent design and intelligent planning and scheduling.

245 citations