Spectrum Virtualization Layer

نویسندگان

  • Kun Tan
  • Yong He
  • Haichen Shen
  • Jiansong Zhang
  • Yongguang Zhang
چکیده

This paper presents an architecture to support dynamic spectrum access (DSA) in general wireless networks. Our architecture advocates a new spectrum virtualization layer (SVL), directly below the wireless physical layer (PHY or baseband processing). We call it Layer 0.5. SVL presents a virtual baseband to traditional wireless PHY, which is designed for a fixed contiguous spectrum band with fixed width. When spectrum allocation changes under DSA, SVL performs real-time reshaping of baseband signals so that the baseband of traditional wireless PHY maps to the current physical spectrum band allocation, which can be of different width, or even in separate non-contiguous bands. All operations inside SVL are agnostic and transparent to upper PHY, making it possible to enable DSA without changing the traditional PHY designs. We have implemented a prototype of SVL on a software radio platform and demonstrated the flexibility and effectiveness of SVL in supporting DSA. We believe this is the right architecture model for enabling DSA for general wireless networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Implications of Different Virtualization Approaches for Secure Cyber Architectures

Virtualization is increasingly being used as a component in designing secure cyber architectures. The proposed applications include strong isolation, monitoring, fault tolerance, execution replay, etc. However, there are various virtualization approaches which differ in their security implications, proper applications, overheads, requirements, and most importantly threat models. Firstly, virtua...

متن کامل

Virtualization Based Security Framework (vBASE)

In general, computer security aims at providing confidentiality, integrity and availability to computing systems. Traditionally, researchers in the fields of computer security have used software and hardware mechanisms for implementing security in computing systems. Software only security approaches typically deal with application level and Operating System (OS) level security mechanisms. Thoug...

متن کامل

GPP virtualization: A comparison of software and hardware techniques for x86 virtualization

Initially, virtual machine (VM) meant a software abstraction with the looks of a computer system’s hardware. Now, VM can be seen as a layered abstraction over various places in the system including following levels of virtualization: hardware–level, operating system–level, and high–level language VMs. Hardware–level approach was the first attempt to implement virtualization. Several hardware VM...

متن کامل

MagiXen: Combining Binary Translation and Virtualization

Virtualization is emerging as an important technology in future systems, providing an extra layer of abstraction between the hardware and operating system. Previous work on virtualization has focused on the partitioning, isolation, and encapsulation features of virtual machines and their use for different applications, but mainly in the context of a specific processor architecture. In this pape...

متن کامل

Virtualization for Morphable Multi-Cores

In recent years we have observed a shift in processor architectures towards chips with multiple cores, thus avoiding the power and complexity walls. The increasing number of cores is leading to major challenges such as processor configuration and management of such complex hardware. In order to achieve a better match between the hardware and the demands of different applications and their phase...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011