摘要
The rapid growth in demand for broadband wireless services coupled with the recent developmental work on wireless communications technology and the static allocation of the spectrum have led to the artificial scarcity of the radio spectrum. The traditional command and control model (Static allocation) of spectrum allocation policy allows for severe spectrum underutilization. Spectrum allocated to TV operators can potentially be shared by wireless data services, either when the primary service is switched off or by exploiting spatial reuse opportunities. This paper describes a hybrid access scheme based on CSMA/CA and TDMA MAC protocols for use in the TV bands. The approach allows secondary users (SU) to operate in the presence of the primary users (PU) and the OPNET simulation and modelling software has been used to model the performance of the scheme. An analysis of the results shows that, the proposed schemes protect the primary user from harmful Interference from the secondary user. In terms of delay, it was found that packet arrival rates, data rates and the number of secondary users have significant effects on delay.
The rapid growth in demand for broadband wireless services coupled with the recent developmental work on wireless communications technology and the static allocation of the spectrum have led to the artificial scarcity of the radio spectrum. The traditional command and control model (Static allocation) of spectrum allocation policy allows for severe spectrum underutilization. Spectrum allocated to TV operators can potentially be shared by wireless data services, either when the primary service is switched off or by exploiting spatial reuse opportunities. This paper describes a hybrid access scheme based on CSMA/CA and TDMA MAC protocols for use in the TV bands. The approach allows secondary users (SU) to operate in the presence of the primary users (PU) and the OPNET simulation and modelling software has been used to model the performance of the scheme. An analysis of the results shows that, the proposed schemes protect the primary user from harmful Interference from the secondary user. In terms of delay, it was found that packet arrival rates, data rates and the number of secondary users have significant effects on delay.