首页> 外文会议>IEEE Vehicular Technology Conference;Vehicular Technology Conference >Identifier Based Greedy Approach for Mitigating Harmful Interference
【24h】

Identifier Based Greedy Approach for Mitigating Harmful Interference

机译:基于标识符的缓解有害干扰的贪婪方法

获取原文

摘要

There has long been a conundrum on how to decrease harmful interference while encouraging the denser use of radio spectrum. The traditional way to mitigate interference is through conservative ex-ante (and, to some extent ex-post) power limits and enforcement methods. However, this conservative approach does not allow room for flexibility or coordination among radio systems, systems that are now more capable of minimizing interference than radio systems from even a decade ago. Exacerbating the problem is the continuing increase in device deployment and growing heterogeneity in network types, which together may soon strain the current interference management and enforcement processes. In this paper, we will explore how identification of devices could be used to ease interference. Identification for devices might already exist in the form of station id, IP, MAC, IMSI and FCC ID. However, in a more distributed and heterogeneous model, creating a more ubiquitous identification structure could be beneficial for mitigating harmful interference. By doing so we can keep track of devices/antennas and their operation modes (i.e., technical parameters), which, beyond interference mitigation, could also benefit enforcement, billing, spectrum sharing and security issues. In this paper, we show the application of granular identification of devices together with a greedy algorithm for improving interference management among heterogeneous networks.
机译:在鼓励密集使用无线电频谱的同时,长期以来一直是如何降低有害干扰的难题。减轻干扰的传统方式是通过保守的前蚂蚁(以及在某种程度上的前后)电源限制和执法方法。然而,这种保守方法不允许无线电系统之间的灵活性或协调空间,现在从十年前更能最小化干扰的系统。加剧问题是网络类型中的设备部署和生长异质性的继续增加,这些类型在一起可能很快应对当前的干扰管理和执法过程中断。在本文中,我们将探讨如何使用设备识别来缓解干扰。设备的识别可能已经存在于站ID,IP,Mac,IMSI和FCC ID的形式中。然而,在一个更分散和异质的模型中,创造更普遍的识别结构可能有利于缓解有害干扰。通过这样做,我们可以跟踪设备/天线及其操作模式(即,技术参数),除了干扰缓解之外,还可能会受益强制执行,计费,频谱共享和安全问题。在本文中,我们展示了与一种贪婪算法一起应用设备的粒度识别,以改善异构网络中干扰管理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号