Cognitive Radio Networks by Ahmed Khattab Dmitri Perkins & Magdy Bayoumi
Author:Ahmed Khattab, Dmitri Perkins & Magdy Bayoumi
Language: eng
Format: epub
Publisher: Springer New York, New York, NY
Recent works exploited the bidirectional nature of some primary networks to enable SUs to infer the existence or the absence of a neighboring primary receiver [6, 7]. However, such schemes do not provide a way to measure the cumulative interference at the primary receiver. Another potential approach to collect information about nearby primary receivers is to detect the local oscillator leakage power emitted by the RF front-end of the primary receivers. Since such leakage power is typically weak, implementing a reliable detector is challenging. As per existing transceiver technologies, primary receiver detection through tracking the RF leakage power is only feasible for the detection of TV receivers. A more detailed discussion of the related work was presented in Chap. 3. Alternatively, cognitive user cooperation could be used to improve the accuracy of spectrum sensing. Collecting the spectrum sensing information from multiple cognitive radio nodes minimizes the uncertainty about the spectral opportunities. However, such cooperative techniques significantly reduce the goodput of the CRN due to the associated overhead traffic required for node cooperation and further complicate the CRN design (e.g., it might necessitates the need for an overlay subnetwork that is only responsible for coordinating the cooperation process). We conclude that there does not exist a practical—yet accurate—way to measure the interfere at the primary receivers based on today’s sensing technologies.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6846)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6845)
Running Windows Containers on AWS by Marcio Morales(6373)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5073)
Combating Crime on the Dark Web by Nearchos Nearchou(4648)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4621)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3980)
Python for Security and Networking - Third Edition by José Manuel Ortega(3898)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3558)
Learn Wireshark by Lisa Bock(3536)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
