Cognitive Radio Networks by Ahmed Khattab Dmitri Perkins & Magdy Bayoumi
Author:Ahmed Khattab, Dmitri Perkins & Magdy Bayoumi
Language: eng
Format: epub
Publisher: Springer New York, New York, NY
Recent works exploited the bidirectional nature of some primary networks to enable SUs to infer the existence or the absence of a neighboring primary receiver [6, 7]. However, such schemes do not provide a way to measure the cumulative interference at the primary receiver. Another potential approach to collect information about nearby primary receivers is to detect the local oscillator leakage power emitted by the RF front-end of the primary receivers. Since such leakage power is typically weak, implementing a reliable detector is challenging. As per existing transceiver technologies, primary receiver detection through tracking the RF leakage power is only feasible for the detection of TV receivers. A more detailed discussion of the related work was presented in Chap. 3. Alternatively, cognitive user cooperation could be used to improve the accuracy of spectrum sensing. Collecting the spectrum sensing information from multiple cognitive radio nodes minimizes the uncertainty about the spectral opportunities. However, such cooperative techniques significantly reduce the goodput of the CRN due to the associated overhead traffic required for node cooperation and further complicate the CRN design (e.g., it might necessitates the need for an overlay subnetwork that is only responsible for coordinating the cooperation process). We conclude that there does not exist a practical—yet accurate—way to measure the interfere at the primary receivers based on today’s sensing technologies.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7921)
Grails in Action by Glen Smith Peter Ledbrook(7889)
Azure Containers Explained by Wesley Haakman & Richard Hooper(7225)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(7224)
Running Windows Containers on AWS by Marcio Morales(6758)
Kotlin in Action by Dmitry Jemerov(5302)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5281)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4997)
Combating Crime on the Dark Web by Nearchos Nearchou(4861)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4552)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4499)
The Age of Surveillance Capitalism by Shoshana Zuboff(4126)
Python for Security and Networking - Third Edition by José Manuel Ortega(4110)
Learn Wireshark by Lisa Bock(3922)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3771)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3576)
DevSecOps in Practice with VMware Tanzu by Parth Pandit & Robert Hardt(3440)
Blockchain Basics by Daniel Drescher(3435)
Windows Ransomware Detection and Protection by Marius Sandbu(3434)