WO2010056179A1 - A method and apparatus for controlling access to a radio resource - Google Patents

A method and apparatus for controlling access to a radio resource Download PDF

Info

Publication number
WO2010056179A1
WO2010056179A1 PCT/SE2009/050303 SE2009050303W WO2010056179A1 WO 2010056179 A1 WO2010056179 A1 WO 2010056179A1 SE 2009050303 W SE2009050303 W SE 2009050303W WO 2010056179 A1 WO2010056179 A1 WO 2010056179A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
wireless node
radio resource
node
access
Prior art date
Application number
PCT/SE2009/050303
Other languages
French (fr)
Inventor
Peter Larsson
Yngve SELÉN
Mikael Prytz
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to JP2011536281A priority Critical patent/JP5389937B2/en
Priority to US13/129,061 priority patent/US8665790B2/en
Priority to EP09788510A priority patent/EP2345273A1/en
Publication of WO2010056179A1 publication Critical patent/WO2010056179A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to a method and a device for controlling access to radio resources.
  • the present invention relates to control of radio resources in a radio system allowing opportunistic spectrum access.
  • radio resources that, e.g. under a license, are owned by one party - the primary party - may also be used by others (secondary users) for purposes (secondary use) that do not fall within the operation (primary use) of the primary party. Consequently, a secondary user may use radio resources owned by the primary party without having a license and without having made an explicit agreement with the primary party.
  • a requirement for accessing radio resources as a secondary user is that the primary party should not be exposed to harmful interference caused by the secondary use. Therefore a secondary user is allowed to transmit over radio resources owned by the primary party only if it can be ensured that the primary party is, for all practical purposes, not affected.
  • a secondary user In order to determine when a secondary user can transmit without negatively affecting the primary user some kind of mechanism must be provided. Thus, secondary users should be allowed and the mechanism should enable secondary users to access primary users' spectrum when no primary user's communication quality is (substantially) affected.
  • One approach for assessing the (instantaneous) primary usage of spectrum is to perform sensing, i.e., using sensors (radio receivers) with the goal of measuring the presence of primary transmissions. If a sensing result does not indicate primary usage the measured spectrum may be utilized for secondary access. This type of mechanism is often denoted sensing- based opportunistic spectrum access. The overall objective, simply stated, is to increase capacity as well as individual user throughput.
  • the wireless nodes are enabled to exchange information with adjacent nodes.
  • distant nodes out of range for direct communication can be communicated with by forwarding data over multiple hops.
  • a spectrum access blocking message is sent, to other nodes in the vicinity of the node thereby enabling blocking of the radio resource in a geographical area in which the other usage is detected. This means that the radio resource is blocked in that area from being accessed by other users than the primary user.
  • the blocking message can be distributed in any suitable manner and can be tailored for the application at hand.
  • a hop/distance dependent field is updated for each hop and a node is adapted to forward the message in response to the field.
  • a decrementable field is decremented for each hop and a node abstain from spectrum access if the counter field is non-negative and keep forwarding the message as long as the counter field is positive.
  • the hop/distance dependent field is reset to a starting value whenever a node has detected a primary user for a particular radio resource such as a radio channel.
  • the starting value can also be set to a non-fixed value. Such a non-fixed starting value can for example be set in accordance with a received signal strength.
  • the spectrum access is blocked for a particular time.
  • the time can be set in the blocking message or the system can have a default blocking time set.
  • the spectrum blocking method as described herein can be used as an information message which users in the radio system can use to determine which radio resources to access.
  • Fig. 1 is a view illustrating a spectrum access blocking message
  • - Fig. 2 is a view illustrating a first scenario
  • - Fig. 3 is a view illustrating a second scenario
  • - Fig. 4 is a view illustration functional blocks of a node
  • Fig. 5 is a flowchart depicting some procedural steps performed by a wireless node.
  • a node detects solely or jointly with other nodes the use of a radio resource, e.g. that a user such as a primary user or another user occupies a particular radio resource and in particular a channel (or even multiple channels) in a radio system.
  • a message that can be termed a Spectrum access blocking message (SAB message) is generated and disseminated in the radio system:
  • the SAB message can in accordance with one embodiment include fields indicating the channel under consideration and/or a distance field, e.g. a down-countable field and/or a corresponding time limit for which the blocking is valid for.
  • a node receiving the SAB message can in accordance with one embodiment be adapted to update a distance field based on a pre-determined distributed distance limiting rule, or, if the respective node also detected a primary user or another user on the corresponding resource (and did not itself yet send a related SAB message), then reset the counter to its original value and time limit or a non-fixed value that for example can depend on the received signal strength, and forward it further to adjacent nodes until the field reaches a predetermined value. Thanks to the reset of the counter value the union of the areas needed to be protected from spectrum access by individual nodes is protected.
  • a node receiving the SAB message can be adapted to be prevented from accessing the corresponding resource if the distance field indicates that the blocking is active.
  • An additional precondition can be that a blocking time limit has not been met.
  • a spectrum access blocking message that blocks some area around a node which has detected primary usage can have various formats. Some examples are illustrated in Figure 1.
  • the blocking message can comprise a field 101 indicating that it comprises spectrum blocking information.
  • the message can comprise a field 103 indicating the identity of the originating node.
  • the message can comprise an updatable field 105 indicating the distance the message has traveled.
  • the message can comprise a field 107 indicating a message identification.
  • the message can comprise a field 109 indicating the time for which the blocking is valid.
  • the message can comprise a field 111 indicating which radio resources/channels that are blocked.
  • each piece of information (or a message with many smaller pieces of information) can be tagged with a sequence number or a time tag enabling a receiving node to determine whether the message has already been forwarded by the node, if it is still valid or not (the blocking message may be too old according to the time stamp), or if a message blocking the same resource(s) was recently sent by the receiving node.
  • a message is only forwarded if the message is decided to be valid.
  • the flooding of this information should preferably be accomplished with some localization constraints.
  • Various types of information can be used for the updatable distance field, such as hop-count, estimated cumulative node- to-node distance, etc.
  • Hops As one example, one may specify that the request message may be sent at most TV hops by setting a hop counter in the message to N which is counted downwards for each hop. When the hop counter reaches zero no further forwarding is performed. This is a simple but fairly coarse approach, as the hops may be of different lengths.
  • Cumulative estimated distance One could also base a distance value in the distance field on estimated distances. This may be derived from the received power level, knowledge of the transmit power, and assumptions of the propagation conditions to estimate the distance a message is transmitted. A counter representing the permitted distance for the flooded message can then be updated, for example be counted downwards until reaching or passing zero after which no further forwarding is allowed.
  • Distributing the SAB message to many nodes can be accomplished in several ways, for example by:
  • the message follows a predetermined broadcast tree path.
  • the tree may have been established through a preceding sensing phase.
  • Broadcasting using a broadcast tree can generally be made more reliable than Flooding, but requires overhead by setting up the tree.
  • the aspect of reliability is manifold.
  • a broadcast tree can be defined such that the probability of message collision (i.e. the instantaneous Signal to Noise Ratio (SNR) is too low to support the used data rate) is low, or the links defined in the tree use acknowledgement on correctly received data and a number of retransmissions take place if the forwarding fails.
  • SNR Signal to Noise Ratio
  • Broadcast trees can be determined in different ways.
  • a tree may be computed based on the Bellman Ford algorithm, see e.g. the book “Flows in Networks” by Ford Fulkerson using some metric as input such as hop, estimated hop-distance, estimated path loss, estimated inverse rate, etc.
  • Fig. 2 an exemplary scenario with six nodes in the own system further illustrating the method and nodes 1 - 6 as described herein is depicted. Also, there are some other users 10 and 11 from another (or several other) system(s) present in Fig. 2. In this case node 1 has detected (falsely or accurately) that there is some type of communication ongoing, over some resources, in another system, and intends to block use of these resources by itself and nearby nodes in the own system. Node 1 blocks the resources internally and sends a SAB message with the hop counter value set to 2 using flooding. Nodes 2, 3 and 4 are within reach of node 1 and receive the SAB message.
  • Node 1 receives the forwarded SAB message from nodes 2, 3 and 4, but recognizes the same message that it transmitted and does not take any further action.
  • Nodes 3 and 4 are within reach and receive the forwarded SAB message from one another. However, they recognize the message as a message they have already received and acted upon, and do not take any further action.
  • Node 5 receives the SAB message from node 4 and registers the blocked channels internally. It then decreases the hop counter to the value 0 and notes that the message should not be forwarded any further.
  • node 6, within reach of node 5 does not receive the SAB message and is free to consider use of the channel. This makes sense, because node 6 is distant enough from node 1 so the resource may be available at the node 6 location.
  • Fig. 3 another exemplary scenario with six nodes in the own system, numbered 1 to 6 and connected in a broadcast routing tree according to the figure is shown. Also, there are some other users from another (or several other) system(s). In this case node 1 has detected (falsely or accurately) that there is some type of communication ongoing in another system, and intends to block use of these resources by itself and nearby nodes in the own system. Node 1 blocks the resources internally and sends a SAB message with the hop counter value set to 2 to its neighboring nodes in the broadcast tree. Nodes 2, 3 and 4 receive the SAB message.
  • each correctly received message can be acknowledged (ACKed) as depicted in Fig. 3.
  • Fig. 4 functional blocks of a node 400 capable of executing functionalities in accordance with one exemplary embodiment described herein are shown.
  • the node can thus in accordance with one embodiment comprise the following:
  • TRX Transmit and receive unit 401 for transmitting and receiving data.
  • Sensing and detection unit A unit 403 capable of calculating an estimate of the probability of usage of a resource, based upon at least an own measurement.
  • SAB message extractor A unit 405 for identifying a message as a SAB message, for extracting the information on blocked channels and pass that information on to the control unit (which keeps track on which channels are blocked) and/or to the SAB message forwarding unit 409.
  • ACK/NAK A unit 407, which can ACK or NAK received SAB messages to ensure reliable SAB message delivery.
  • the SAB message forwarding unit 409 is adapted to decide whether a received SAB message should be forwarded or not and gives such a message the correct format and updates relevant fields (such as hop counter or similar) before passing it to the TRX unit 401.
  • the SAB message construction unit 41 1 is a unit adapted to construct a new SAB message given information on which channels to block, for how long, etc., from the Control unit 415.
  • the broadcast tree database unit 413 is a unit adapted to keep track of neighboring nodes, for example, in one or more forwarding tables if the messages are transmitted in a broadcasting tree.
  • the control unit 415 is adapted to control the SAB functionality.
  • the unit 415 can for example be adapted to keep track of which channels are currently blocked, to decide whether new SAB messages should be constructed, to activate the TRX unit and Sensing and detection unit whenever a sensing should be performed, etc.
  • the Control unit 415 keeps track on when to perform sensing (for example, according to a periodic scheme). When it is time to perform a sensing, the Control unit 415 activates the TRX unit 401 and the Sensing and detection unit 403. Based on information from the TRX unit 401 the Sensing and detection unit 403 forms an estimate of the probability of a channel being used and forwards this to the Control unit 415. If the Control unit 415 decides based upon at least this probability that a channel should be blocked, it sends information to the SAB message construction unit 411 so that it can form a SAB message (possibly using information from the Broadcast tree database unit). This SAB message is then sent to the TRX unit 40 land transmitted.
  • Example of operation B The TRX unit 401 receives a message. This message is passed on to the SAB message extractor 405, which identifies the message as a SAB message and extracts the information on which channels to block and for how long. In accordance with one scenario the SAB message extractor 405 sends a message to the ACK unit 407, which ACKs (or NAKs, if the message was not correctly received) the received SAB message. The information extracted by the SAB message extractor 405 is sent to the Control unit 415, which registers the blocked channels with the intention that the device, prior to utilizing any channels, checks with the Control unit 415 which channels are blocked and avoids using these.
  • the SAB message information is also sent from the SAB message extractor 405 to the SAB message forwarding unit 407 which decides whether the message should be forwarded or not. If the message should be forwarded, the SAB message forwarding unit 407 updates the message fields, and sends the message to the TRX unit 401 for forwarding.
  • a wireless node for controlling access to a radio spectrum in a radio system is provided.
  • the wireless node is in contact with and exchange information with other wireless nodes of the radio system.
  • the wireless node can perform the following procedural steps.
  • First in a step 501 the wireless node detects use of a radio resource by a user in the radio system.
  • the wireless node transmits a message for blocking access to the detected radio resource to at least one other wireless node of the radio system. Based on such a message blocking access, a wireless node controls access to a radio resource, in a step 505.
  • Using the method and radio system node in a radio system will provide a very simple and distributed approach to block users in the vicinity of a user who has detected a primary user (at some resource), from causing interference to the primary user by accessing its spectrum.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

In a radio system where wireless nodes are in contact, the wireless nodes are enabled to exchange information with adjacent nodes. In addition, in one embodiment distant nodes out of range for direct communication can be communicated with by forwarding data over multiple hops. When a user, in particular a primary user, is detected by a node, a spectrum access blocking message is sent, to other nodes in the vicinity of the node thereby enabling blocking of the radio resource in a geographical area in which the other usage is detected. This means that the radio resource is blocked in that area from being accessed by other users than the primary user. The blocking message can be distributed in any suitable manner and can be tailored for the application at hand.

Description

METHOD AND APPARATUS FOR CONTROLLING ACCESS TO A RADIO RESOURCE
TECHNICAL FIELD
The present invention relates to a method and a device for controlling access to radio resources. In particular the present invention relates to control of radio resources in a radio system allowing opportunistic spectrum access.
BACKGROUND
Recent research has shown that usage of the radio spectrum is often fairly inefficient. One key factor in this is the current spectrum licensing regime. That is, some part of the radio spectrum is licensed to a party, such as an operator of a radio communications system, who is given an exclusive right to use this part of the radio spectrum. For example, even though significant parts of the useful spectrum is licensed, several measurements (see, e.g. T. Erpek, K. Steadman, D. Jones, "Spectrum Occupancy Measurements: Dublin, Ireland, Collected On April 16-18, 2007", Shared Spectrum Company Report, 2007) indicate that some parts of this spectrum are highly underutilized. Therefore, a more flexible use of the radio spectrum has become a research intensive subject within which the aim is at optimizing, i.e. maximizing, the usage of the available radio spectrum.
To address the above-indicated issues, the FCC (Federal Communications Commission) took, in 2005, an initiative to open up for so-called secondary use of the spectrum. That is, radio resources that, e.g. under a license, are owned by one party - the primary party - may also be used by others (secondary users) for purposes (secondary use) that do not fall within the operation (primary use) of the primary party. Consequently, a secondary user may use radio resources owned by the primary party without having a license and without having made an explicit agreement with the primary party. A requirement for accessing radio resources as a secondary user is that the primary party should not be exposed to harmful interference caused by the secondary use. Therefore a secondary user is allowed to transmit over radio resources owned by the primary party only if it can be ensured that the primary party is, for all practical purposes, not affected.
In order to determine when a secondary user can transmit without negatively affecting the primary user some kind of mechanism must be provided. Thus, secondary users should be allowed and the mechanism should enable secondary users to access primary users' spectrum when no primary user's communication quality is (substantially) affected. One approach for assessing the (instantaneous) primary usage of spectrum is to perform sensing, i.e., using sensors (radio receivers) with the goal of measuring the presence of primary transmissions. If a sensing result does not indicate primary usage the measured spectrum may be utilized for secondary access. This type of mechanism is often denoted sensing- based opportunistic spectrum access. The overall objective, simply stated, is to increase capacity as well as individual user throughput. Existing approaches are discussed and evaluated in http://www.academvpublisher.com/icm/vol02/no02/jcm02027182.pdf and http;//www.eecs.berkeley.edu/~sahai/Papers/ICC06_final.pdf.
Briefly, it can be said that collaborative sensing is built on the idea that collecting multiple sensors' information leads to increased probability of detection and reduced false-alarm probability.
Also a distributed algorithm for collaborative adaptive sensing of fields in an underwater environment is presented in http://perso.eleves.bretagne.ens- cachan.fr/~huguenin/UUST07 pistributedSampling.pdf. The idea is in part to, in a distributed manner, form clusters of nodes which jointly process gathered information and control the position of nodes for improved sampling of the field. However, none of the above referenced methods enables protection of a larger area from undesired (interfering) secondary spectrum access. Hence there is a need for an improved method for controlling radio resources in a radio system allowing opportunistic spectrum access.
SUMMARY
It is an object of the present invention to overcome or at least reduce some of the problems associated with the existing methods of controlling opportunistic spectrum access in a radio system.
This object is obtained by the present invention as set out in the appended claims. Hence, in a radio system where wireless nodes are in contact, the wireless nodes are enabled to exchange information with adjacent nodes. In addition in one embodiment distant nodes out of range for direct communication can be communicated with by forwarding data over multiple hops. When a user, in particular a primary user, is detected by a node, a spectrum access blocking message is sent, to other nodes in the vicinity of the node thereby enabling blocking of the radio resource in a geographical area in which the other usage is detected. This means that the radio resource is blocked in that area from being accessed by other users than the primary user. The blocking message can be distributed in any suitable manner and can be tailored for the application at hand.
In accordance with one embodiment a hop/distance dependent field is updated for each hop and a node is adapted to forward the message in response to the field. For example a decrementable field is decremented for each hop and a node abstain from spectrum access if the counter field is non-negative and keep forwarding the message as long as the counter field is positive.
In accordance with one embodiment the hop/distance dependent field is reset to a starting value whenever a node has detected a primary user for a particular radio resource such as a radio channel. The starting value can also be set to a non-fixed value. Such a non-fixed starting value can for example be set in accordance with a received signal strength.
In accordance with one embodiment the spectrum access is blocked for a particular time. The time can be set in the blocking message or the system can have a default blocking time set.
In accordance with one embodiment when the invention is used in a radio system where there is no primary user the spectrum blocking method as described herein can be used as an information message which users in the radio system can use to determine which radio resources to access.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will now be described in more detail by way of non-limiting examples and with reference to the accompanying drawings, in which:
- Fig. 1 is a view illustrating a spectrum access blocking message,
- Fig. 2 is a view illustrating a first scenario,
- Fig. 3 is a view illustrating a second scenario, - Fig. 4 is a view illustration functional blocks of a node, and
- Fig. 5 is a flowchart depicting some procedural steps performed by a wireless node.
DETAILED DESCRIPTION
In accordance with the present invention, a node detects solely or jointly with other nodes the use of a radio resource, e.g. that a user such as a primary user or another user occupies a particular radio resource and in particular a channel (or even multiple channels) in a radio system. In response to such detection a message that can be termed a Spectrum access blocking message (SAB message) is generated and disseminated in the radio system: The SAB message can in accordance with one embodiment include fields indicating the channel under consideration and/or a distance field, e.g. a down-countable field and/or a corresponding time limit for which the blocking is valid for.
A node receiving the SAB message can in accordance with one embodiment be adapted to update a distance field based on a pre-determined distributed distance limiting rule, or, if the respective node also detected a primary user or another user on the corresponding resource (and did not itself yet send a related SAB message), then reset the counter to its original value and time limit or a non-fixed value that for example can depend on the received signal strength, and forward it further to adjacent nodes until the field reaches a predetermined value. Thanks to the reset of the counter value the union of the areas needed to be protected from spectrum access by individual nodes is protected.
A node receiving the SAB message can be adapted to be prevented from accessing the corresponding resource if the distance field indicates that the blocking is active. An additional precondition can be that a blocking time limit has not been met.
A spectrum access blocking message that blocks some area around a node which has detected primary usage can have various formats. Some examples are illustrated in Figure 1. Hence the blocking message can comprise a field 101 indicating that it comprises spectrum blocking information. The message can comprise a field 103 indicating the identity of the originating node. The message can comprise an updatable field 105 indicating the distance the message has traveled. The message can comprise a field 107 indicating a message identification. The message can comprise a field 109 indicating the time for which the blocking is valid. The message can comprise a field 111 indicating which radio resources/channels that are blocked.
To limit unnecessary forwarding of messages, each piece of information (or a message with many smaller pieces of information) can be tagged with a sequence number or a time tag enabling a receiving node to determine whether the message has already been forwarded by the node, if it is still valid or not (the blocking message may be too old according to the time stamp), or if a message blocking the same resource(s) was recently sent by the receiving node. In accordance with one embodiment a message is only forwarded if the message is decided to be valid.
As the detection mainly has local relevance, the flooding of this information should preferably be accomplished with some localization constraints. Various types of information can be used for the updatable distance field, such as hop-count, estimated cumulative node- to-node distance, etc.
Hops: As one example, one may specify that the request message may be sent at most TV hops by setting a hop counter in the message to N which is counted downwards for each hop. When the hop counter reaches zero no further forwarding is performed. This is a simple but fairly coarse approach, as the hops may be of different lengths.
Cumulative estimated distance: One could also base a distance value in the distance field on estimated distances. This may be derived from the received power level, knowledge of the transmit power, and assumptions of the propagation conditions to estimate the distance a message is transmitted. A counter representing the permitted distance for the flooded message can then be updated, for example be counted downwards until reaching or passing zero after which no further forwarding is allowed.
Distributing the SAB message to many nodes can be accomplished in several ways, for example by:
- Broadcasting: The message follows a predetermined broadcast tree path. The tree may have been established through a preceding sensing phase.
- Flooding: Any user overhearing a new message will consider forwarding it. Broadcasting using a broadcast tree can generally be made more reliable than Flooding, but requires overhead by setting up the tree. The aspect of reliability is manifold. For example, a broadcast tree can be defined such that the probability of message collision (i.e. the instantaneous Signal to Noise Ratio (SNR) is too low to support the used data rate) is low, or the links defined in the tree use acknowledgement on correctly received data and a number of retransmissions take place if the forwarding fails.
Broadcast trees can be determined in different ways. A tree may be computed based on the Bellman Ford algorithm, see e.g. the book "Flows in Networks" by Ford Fulkerson using some metric as input such as hop, estimated hop-distance, estimated path loss, estimated inverse rate, etc.
In Fig. 2 an exemplary scenario with six nodes in the own system further illustrating the method and nodes 1 - 6 as described herein is depicted. Also, there are some other users 10 and 11 from another (or several other) system(s) present in Fig. 2. In this case node 1 has detected (falsely or accurately) that there is some type of communication ongoing, over some resources, in another system, and intends to block use of these resources by itself and nearby nodes in the own system. Node 1 blocks the resources internally and sends a SAB message with the hop counter value set to 2 using flooding. Nodes 2, 3 and 4 are within reach of node 1 and receive the SAB message. Each of them decreases the hop counter by 1 to the value 1 , registers the blocked channels internally, and forwards the SAB message using flooding. Node 1 receives the forwarded SAB message from nodes 2, 3 and 4, but recognizes the same message that it transmitted and does not take any further action. Nodes 3 and 4 are within reach and receive the forwarded SAB message from one another. However, they recognize the message as a message they have already received and acted upon, and do not take any further action. Node 5 receives the SAB message from node 4 and registers the blocked channels internally. It then decreases the hop counter to the value 0 and notes that the message should not be forwarded any further. Thus, node 6, within reach of node 5, does not receive the SAB message and is free to consider use of the channel. This makes sense, because node 6 is distant enough from node 1 so the resource may be available at the node 6 location.
In Fig. 3 another exemplary scenario with six nodes in the own system, numbered 1 to 6 and connected in a broadcast routing tree according to the figure is shown. Also, there are some other users from another (or several other) system(s). In this case node 1 has detected (falsely or accurately) that there is some type of communication ongoing in another system, and intends to block use of these resources by itself and nearby nodes in the own system. Node 1 blocks the resources internally and sends a SAB message with the hop counter value set to 2 to its neighboring nodes in the broadcast tree. Nodes 2, 3 and 4 receive the SAB message. Each of them decreases the hop counter by 1 to the value 1, registers the blocked channels internally, and forwards the SAB message to their neighboring nodes (but not back to node 1). Node 5 receives the SAB message from node 4 and registers the blocked channels internally. It then decreases the hop counter to the value 0 and notes that the message should not be forwarded any further. Thus, node 6, although connected to node 5, does not receive the SAB message and is free to consider use of the channel (this makes sense, because node 6 is far enough from node 1 so the resource may be available at the node 6 location). Optionally, each correctly received message can be acknowledged (ACKed) as depicted in Fig. 3.
In Fig. 4 functional blocks of a node 400 capable of executing functionalities in accordance with one exemplary embodiment described herein are shown. The node can thus in accordance with one embodiment comprise the following:
TRX: Transmit and receive unit 401 for transmitting and receiving data.
Sensing and detection unit: A unit 403 capable of calculating an estimate of the probability of usage of a resource, based upon at least an own measurement. SAB message extractor: A unit 405 for identifying a message as a SAB message, for extracting the information on blocked channels and pass that information on to the control unit (which keeps track on which channels are blocked) and/or to the SAB message forwarding unit 409.
ACK/NAK: A unit 407, which can ACK or NAK received SAB messages to ensure reliable SAB message delivery.
SAB message forwarding unit: The SAB message forwarding unit 409 is adapted to decide whether a received SAB message should be forwarded or not and gives such a message the correct format and updates relevant fields (such as hop counter or similar) before passing it to the TRX unit 401.
SAB message construction unit: The SAB message construction unit 41 1 is a unit adapted to construct a new SAB message given information on which channels to block, for how long, etc., from the Control unit 415.
Broadcast tree database: The broadcast tree database unit 413 is a unit adapted to keep track of neighboring nodes, for example, in one or more forwarding tables if the messages are transmitted in a broadcasting tree.
Control: The control unit 415 is adapted to control the SAB functionality. The unit 415 can for example be adapted to keep track of which channels are currently blocked, to decide whether new SAB messages should be constructed, to activate the TRX unit and Sensing and detection unit whenever a sensing should be performed, etc.
Example of operation A:
The Control unit 415 keeps track on when to perform sensing (for example, according to a periodic scheme). When it is time to perform a sensing, the Control unit 415 activates the TRX unit 401 and the Sensing and detection unit 403. Based on information from the TRX unit 401 the Sensing and detection unit 403 forms an estimate of the probability of a channel being used and forwards this to the Control unit 415. If the Control unit 415 decides based upon at least this probability that a channel should be blocked, it sends information to the SAB message construction unit 411 so that it can form a SAB message (possibly using information from the Broadcast tree database unit). This SAB message is then sent to the TRX unit 40 land transmitted.
Example of operation B: The TRX unit 401 receives a message. This message is passed on to the SAB message extractor 405, which identifies the message as a SAB message and extracts the information on which channels to block and for how long. In accordance with one scenario the SAB message extractor 405 sends a message to the ACK unit 407, which ACKs (or NAKs, if the message was not correctly received) the received SAB message. The information extracted by the SAB message extractor 405 is sent to the Control unit 415, which registers the blocked channels with the intention that the device, prior to utilizing any channels, checks with the Control unit 415 which channels are blocked and avoids using these. The SAB message information is also sent from the SAB message extractor 405 to the SAB message forwarding unit 407 which decides whether the message should be forwarded or not. If the message should be forwarded, the SAB message forwarding unit 407 updates the message fields, and sends the message to the TRX unit 401 for forwarding.
In Fig. 5 a flowchart depicting some of the procedural steps performed by a wireless node as described above is shown. Thus, a wireless node for controlling access to a radio spectrum in a radio system is provided. The wireless node is in contact with and exchange information with other wireless nodes of the radio system. The wireless node can perform the following procedural steps. First in a step 501 the wireless node detects use of a radio resource by a user in the radio system. Next in a step 503 the wireless node transmits a message for blocking access to the detected radio resource to at least one other wireless node of the radio system. Based on such a message blocking access, a wireless node controls access to a radio resource, in a step 505.
Using the method and radio system node in a radio system will provide a very simple and distributed approach to block users in the vicinity of a user who has detected a primary user (at some resource), from causing interference to the primary user by accessing its spectrum.

Claims

1. A wireless node (400) for use in a radio system, the wireless node being enabled to exchange information with other wireless nodes of the radio system, the wireless node being characterized by:
- means (403) for detecting use of a radio resource,
- means (401, 411) for transmitting a message for blocking access to the detected radio resource to at least one other wireless node of the radio system.
2. The wireless node according to claim 1, wherein means for detecting use of a radio resource is adapted to detect use by a primary user.
3. The wireless node according to claim 1 or 2, wherein the wireless node is adapted to transmit the message for blocking access to other nodes in the vicinity of the node thereby enabling blocking of the radio resource in a geographical area around the location(s) in which the usage of a radio resource is detected.
4. The wireless node according to any of claims 1 - 3, wherein the wireless node is adapted to forward a message for blocking access over multiple hops.
5. The wireless node according to claim 4, further comprising means for updating a hop/distance dependent field.
6. The wireless node according to claim 4 or 5, further comprising means for resetting a hop/distance dependent field to a starting value whenever a node has detected a use for a particular radio resource.
7. The wireless node according to claim 6, wherein the starting value is set dynamically.
8. The wireless node according to any of claims 1 - 7, wherein the wireless node is adapted to block access for a particular time.
9. The wireless node according to claim 8, wherein the wireless node is adapted to set a time field in the message for blocking access.
10. The wireless node according to any of claims 1 - 9, wherein the wireless node is adapted to check messages for blocking access when determining which radio resource(s) to access.
1 1. A method of controlling radio resource access in a wireless node for use in a radio system, the wireless node exchanging information with other wireless nodes of the radio system, the method characterized by the steps of
- detecting (501) use of a radio resource,
- transmitting (503) a message for blocking access to the detected radio resource to at least one other wireless node of the radio system.
12. The method according to claim 11, wherein the detected use of a radio resource is detected use by a primary user.
13. The method according to claim 11 or 12, wherein the message for blocking access is transmitted to other nodes in the vicinity of the node thereby enabling blocking of the radio resource in a geographical area around the location(s) in which the usage of a radio resource is detected.
14. The method according to any of claims 11 - 13, wherein the message for blocking access is forwarded over multiple hops.
15. The method according to claim 14, further comprising the step of updating a hop/distance dependent field.
16. The method according to claim 14 or 15, further comprising the step of resetting a hop/distance dependent field to a starting value whenever a use of a particular radio resource is detected.
17. The method according to claim 16, wherein the starting value is set dynamically.
18. The method according to any of claims 11 - 17, wherein a blocked access is set to a particular time.
19. The method according to claim 18, wherein the time is set in the message for blocking access.
20. The method according to any of claims 11 - 19, further comprising the step of checking messages for blocking access when determining which radio resource(s) to access.
PCT/SE2009/050303 2008-11-14 2009-03-23 A method and apparatus for controlling access to a radio resource WO2010056179A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2011536281A JP5389937B2 (en) 2008-11-14 2009-03-23 Method and apparatus for controlling access to radio resources
US13/129,061 US8665790B2 (en) 2008-11-14 2009-03-23 Method and apparatus for controlling access to a radio resource
EP09788510A EP2345273A1 (en) 2008-11-14 2009-03-23 A method and apparatus for controlling access to a radio resource

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11457908P 2008-11-14 2008-11-14
US61/114,579 2008-11-14

Publications (1)

Publication Number Publication Date
WO2010056179A1 true WO2010056179A1 (en) 2010-05-20

Family

ID=41347797

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2009/050303 WO2010056179A1 (en) 2008-11-14 2009-03-23 A method and apparatus for controlling access to a radio resource

Country Status (4)

Country Link
US (1) US8665790B2 (en)
EP (1) EP2345273A1 (en)
JP (1) JP5389937B2 (en)
WO (1) WO2010056179A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9252896B2 (en) * 2012-12-10 2016-02-02 Qualcomm Incorporated Efficient means of broadcast and relaying information between wireless terminals

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1104964A1 (en) * 1999-12-02 2001-06-06 Sony International (Europe) GmbH Instant messaging

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3534597B2 (en) * 1997-12-12 2004-06-07 三菱電機株式会社 Mobile wireless data transmission system
JP3770586B2 (en) * 2000-12-27 2006-04-26 株式会社東芝 Wireless communication method and wireless communication apparatus
JP3443094B2 (en) * 2000-12-27 2003-09-02 株式会社東芝 Wireless communication method and wireless communication device
US7352728B2 (en) * 2002-03-07 2008-04-01 Koninklijke Philips Electronics N.V. Fast channel switching scheme for IEEE 802.11 WLANs
US7606193B2 (en) * 2003-01-30 2009-10-20 Atheros Communications, Inc. Methods for implementing a dynamic frequency selection (DFS) feature for WLAN devices
JP2004274192A (en) 2003-03-06 2004-09-30 Sony Corp Wireless ad-hoc communication system, terminal, processing method for the terminal and program for the terminal to implement the method
JP2005222271A (en) * 2004-02-05 2005-08-18 Matsushita Electric Ind Co Ltd Ordering system and navigation device
US7546086B2 (en) * 2004-05-07 2009-06-09 Telefonaktiebolaget L M Ericsson (Publ) Ad-hoc messaging between wireless devices
JP4814336B2 (en) * 2005-10-26 2011-11-16 クゥアルコム・インコーポレイテッド Use of resource utilization messages in multi-carrier MAC to achieve fairness
JP4364194B2 (en) 2005-12-16 2009-11-11 株式会社東芝 Wireless communication system, wireless channel monitoring device, and wireless communication method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1104964A1 (en) * 1999-12-02 2001-06-06 Sony International (Europe) GmbH Instant messaging

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"IEEE Std. 802.11h - 2003;IEEE Std 802.11h-2003 (Amendment to IEEE Std 802.11, 1999 Edn. (Reaff 2003)) ED - Anonymous", IEEE STANDARD; [IEEE STANDARD], IEEE, PISCATAWAY, NJ, USA, 1 January 2003 (2003-01-01), pages 1 - 59, XP017601965, ISBN: 978-0-7381-3819-0 *
GUIDO R HIERTZ ET AL: "IEEE 802.11s - Mesh Deterministic Access", WIRELESS CONFERENCE, 2008. EW 2008. 14TH EUROPEAN, IEEE, PISCATAWAY, NJ, USA, 22 June 2008 (2008-06-22), pages 1 - 8, XP031320053, ISBN: 978-3-8007-3102-2 *
See also references of EP2345273A1 *

Also Published As

Publication number Publication date
US8665790B2 (en) 2014-03-04
JP5389937B2 (en) 2014-01-15
JP2012509008A (en) 2012-04-12
EP2345273A1 (en) 2011-07-20
US20110216710A1 (en) 2011-09-08

Similar Documents

Publication Publication Date Title
US9001674B2 (en) Method of sensing
JP4583430B2 (en) Wireless communication system
Bazzi et al. Enhancing cooperative driving in IEEE 802.11 vehicular networks through full-duplex radios
CN102301680B (en) Methods and apparatus for communicating in a wireless system
JP2014112850A5 (en)
JP2009507428A (en) Client device auxiliary location data acquisition method
US9066319B2 (en) Method of sensing in a radio system employing opportunistic spectrum access
CN101026508A (en) Method and apparatus for transferring information on station in wireless mesh network
Hemalatha et al. Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET
US8665790B2 (en) Method and apparatus for controlling access to a radio resource
CN102711099A (en) Safety routing method and system capable of resisting interference attacks
Yalçın An artificial intelligence‐based spectrum sensing methodology for LoRa and cognitive radio networks
KR20100131615A (en) System and method for advancing data reliability in buried type wireless network
US20160254979A1 (en) Communication system, common service control apparatus, data transmission method, and non-transitory computer readable medium
Milic et al. Adaptation of the breadth first search algorithm for cut-edge detection in wireless multihop networks
CN110572796B (en) Failure node detection method, device and related equipment
JP5842091B2 (en) Power line carrier communication system, master station, slave station
Escheikh et al. Opportunistic MAC layer design with stochastic Petri Nets for multimedia ad hoc networks
JP2007088818A (en) Selfish node detection node, network system and selfish node detection method
JP2004186865A (en) Wireless data collecting system
CN104394076B (en) Message delivery method between a kind of multinode
KR20190097574A (en) Mesh network system in asymmetric wireless output environment
Wang et al. On Carrier Sensing Accuracy and Range Scaling Laws in Nakagami Fading Channels
JP2014216993A (en) Radio communication apparatus
CN101026853B (en) Method, system and base station for detecting existing region for available business system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09788510

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2009788510

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011536281

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 13129061

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE