Achieving fair spectrum allocation for co-existing heterogeneous secondary user networks

Longfei Wu, Xiaojiang Du, Jie Wu, Bin Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The rapid growth of mobile network traffic has posed a serious challenge to the limited spectrum. The United States Federal Communications Commission (FCC) allowed the utilization of unused TV White Space (TVWS) by unlicensed secondary users (SUs). Particularly, the IEEE 802.19.1 standard is proposed to regulate the coexistence of dissimilar or independently operated SU networks and devices on the TV band. In this paper, we propose a fair spectrum allocation scheme for co-existing SU networks under the IEEE 802.19.1 system architecture. The entire heterogeneous wireless system is divided into two levels, and the spectrum allocation is formulated into a four-stage problem. Unlike previous allocation schemes that maximize the aggregated throughput, the aim of our scheme is to maximize the end user satisfactions within each SU network while maintaining fairness among and within the SU networks. Extensive simulations demonstrate the effectiveness of our spectrum allocation scheme.

Original languageEnglish
Title of host publication2017 26th International Conference on Computer Communications and Networks, ICCCN 2017
ISBN (Electronic)9781509029914
DOIs
StatePublished - 14 Sep 2017
Event26th International Conference on Computer Communications and Networks, ICCCN 2017 - Vancouver, Canada
Duration: 31 Jul 20173 Aug 2017

Publication series

Name2017 26th International Conference on Computer Communications and Networks, ICCCN 2017

Conference

Conference26th International Conference on Computer Communications and Networks, ICCCN 2017
Country/TerritoryCanada
CityVancouver
Period31/07/173/08/17

Keywords

  • Fairness
  • Spectrum allocation
  • TV white space

Fingerprint

Dive into the research topics of 'Achieving fair spectrum allocation for co-existing heterogeneous secondary user networks'. Together they form a unique fingerprint.

Cite this