Spectrum Pooling in MmWave Networks: Opportunities, Challenges, and Enablers

Download
2016-11-01
Boccardi, Federico
Shokri-Ghadikolaei, Hossein
Fodor, Gabor
Erkip, Elza
Fischione, Carlo
Kountouris, Marios
Popovski, Petar
Zorzi, Michele
Motivated by the specific characteristics of mmWave technologies, we discuss the possibility of an authorization regime that allows spectrum sharing between multiple operators, also referred to as spectrum pooling. In particular, considering user rate as the performance measure, we assess the benefit of coordination among networks of different operators, study the impact of beamforming at both base stations and user terminals, and analyze the pooling performance at different frequency carriers. We also discuss the enabling spectrum mechanisms, architectures, and protocols required to make spectrum pooling work in real networks. Our initial results show that, from a technical perspective, spectrum pooling at mmWave has the potential to use the resources more efficiently than traditional exclusive spectrum allocation to a single operator. However, further studies are needed in order to reach a thorough understanding of this matter, and we hope that this article will help stimulate further research in this area.
IEEE COMMUNICATIONS MAGAZINE

Suggestions

Utility analysis and computer simulation of RFID technologies in the supply chain applications of production systems
Bolatlı, Yurtseven; Eren, Pekin Erhan; Department of Information Systems (2009)
In this thesis, the feasibility of deploying RFID technologies in the case of “lowvolume high-value” products is considered by focusing on the production processes of a real company. First, the processes of the company are examined and associated problems are determined. Accordingly, a simulation of the current situation is constructed by using the discrete event simulation technique, in order to obtain an accurate model. In addition to modeling the current situation, this simulation model provides a flexib...
Evaluation of priority dependent and time scheduled MAC layer protocols for ad-hoc networks
Erdeğer, İsmail; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2015)
Ad-hoc networks have very unique features, such as dynamic topologies, relatively limited bandwidth and wireless signal propagation schemes, which present various challenges for wireless communication. In this thesis, control mechanisms for channel access scheduling and topology in ad-hoc networks are evaluated, which utilize the information from two-hop neighborhood to cope with the communication difficulties in ad-hoc networks. Channel assignment is one of the most important topics for ad-hoc networks. Ch...
Immune system based distributed node and rate selection in wireless sensor networks
Atakan, Baris; Akan, Ozguer B. (2006-12-13)
Wireless sensor networks (WSNs) are event-based systems that rely on the collective effort of dense deployed sensor nodes. Due to the dense deployment, since sensor observations are spatially correlated with respect to spatial location of sensor nodes, it may not be necessary for every sensor node to transmit its data. Therefore, due to the resource constraints of sensor nodes it is needed to select the minimum number of sensor nodes to transmit the data to the sink. Furthermore, to achieve the application-...
Network-wide energy efficiency in wireless networks with multiple access points
Ozel, Omur; Uysal, Elif (2013-10-01)
This paper presents a distributed mechanism for improving the overall energy efficiency of a wireless network where users can control their uplink transmit power targeted to the multiple access points in the network. This mechanism lets the network achieve a trade-off between energy efficiency and spectral efficiency through the use of suitably designed utility functions. A user's utility is a function of throughput and average transmission power. Throughput is assumed to be a sigmoidal function of signal-t...
Secure Wireless Powered and Cooperative Jamming D2D Communications
Chu, Zheng; Nguyen, Huan X; Le, Tuan Anh; Karamanoglu, Mehmet; EVER, ENVER; Yazıcı, Adnan (2017-10-01)
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for ...
Citation Formats
F. Boccardi et al., “Spectrum Pooling in MmWave Networks: Opportunities, Challenges, and Enablers,” IEEE COMMUNICATIONS MAGAZINE, pp. 33–39, 2016, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/68477.