Capacity analysis of multicast transmission schemes in a spectrum-sharing scenario

نویسندگان

  • Jianbo Ji
  • Wen Chen
چکیده

In this study, the authors consider the asymptotic capacity of wireless multicast and unicast transmission schemes in a spectrum-sharing system. In these schemes, a secondary access point (SAP) utilises the licensed spectrum of an active primary user (PU) to send a common information to multiple secondary users simultaneously, as long as the interference power inflicted on the PU is less than a predefined threshold. At the SAP, interference channel-state information between the SAP and the PU is used to calculate the maximum allowable SAP transmit power to limit the interference. The authors derive the average capacity of these schemes based on extreme value theory. From the derived asymptotic capacities, the insights to the capacity behaviour can be drawn.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Transmission Schemes for Spectrum Sharing Systems: Trade-offs and Performance Analysis

Adaptive Transmission Schemes for Spectrum Sharing Systems: Trade-offs and Performance Analysis Zied Bouida, PhD. Concordia University, 2015 Cognitive radio (CR) represents a key solution to the existing spectrum scarcity problem. Under the scenario of CR, spectrum sharing systems allow the coexistence of primary users (PUs) and secondary users (SUs) in the same spectrum as long as the interfer...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Hybrid Spectrum Sharing with Cooperative Secondary User Selection in Cognitive Radio Networks

In this paper, we propose a cooperative hybrid spectrum sharing protocol by jointly considering interweave (opportunistic) and underlay schemes. In the proposed protocol, secondary users can access the licensed spectrum along with the primary system. Our network scenario comprises a single primary transmitter-receiver (PTx-PRx) pair and a group of M secondary transmitter-receiver (STx-SRx) pair...

متن کامل

On the capacity of Rayleigh-fading correlated spectrum sharing networks

Recently, substantial attention has been paid to improve the spectral efficiency of communication setups using different spectrum sharing techniques. This paper aims to study the capacity of Rayleigh-fading spectrum sharing channels in the case where there is correlation between the fading channels. Assuming perfect channel state information, the channel capacity is obtained under both adaptive...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IET Communications

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2012