著者
Hiroto Kuriki Keita Onose Ryota Kimura Ryo Sawai
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Communications Express (ISSN:21870136)
巻号頁・発行日
pp.2021ETL0036, (Released:2021-03-29)

In this letter, we propose and evaluate a new area-based primary protection method for dynamic spectrum access, in which a secondary system uses a frequency band assigned to a primary system while it keeps an aggregate interference below an acceptable level of the primary system. We consider that a location information of a primary system’s reception station (PRS) whose antenna boresight faces towards a moving primary transmission station is ambiguous. To accurately calculate the aggregate interferences from the secondary system to the PRS in such a situation, the proposed method predicts a range of the PRS’s antenna rotation. Our simulation results show that the proposed method can increase availability of the secondary system significantly in a practical urban scenario.
著者
Keita Onose Hiroto Kuriki Ryota Kimura Ryo Sawai
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Communications Express (ISSN:21870136)
巻号頁・発行日
pp.2021XBL0065, (Released:2021-04-02)

In this letter, we propose a new incumbent protection method that considers three-dimensional (3D) aspects of 5G beamforming characteristics in dynamic spectrum access (DSA). We show some computer simulation results in which fixed wireless access (FWA)-based primary system (PS) and 5G-based secondary system (SS) were assumed to be deployed in a 26 GHz band. The results show that the proposed method can increase allowable transmission power of the SS by considering the 3D beamforming aspects, and that PS and SS height deployment information can additionally bring benefits to the proposed method in terms of the allowable transmission power in DSA.
著者
Keita Onose Hiroto Kuriki Ryota Kimura Ryo Sawai
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE Communications Express (ISSN:21870136)
巻号頁・発行日
pp.2021ETL0037, (Released:2021-03-29)

In this letter, we propose an advanced incumbent protection method that considers three-dimensional aspects of 5G New Radio (NR) beamforming for dynamic spectrum access (DSA). The proposed method further introduces a concept of area-based protection to satisfy protection criteria for a primary system (PS) with inaccurate location information. We show some computer simulation results for deploying a 5G based secondary system (SS) in a millimeter-wave band which is primarily assigned to a fixed wireless access (FWA) based PS. The results demonstrate that the proposed method increases allowable transmission powers of the SS by up to 15 dB, compared to a conventional method.
著者
Takamasa OCHIAI Kohei MATSUEDA Takao KONDO Hiroaki TAKANO Ryota KIMURA Ryo SAWAI Fumio TERAOKA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Communications (ISSN:09168516)
巻号頁・発行日
vol.E102-B, no.8, pp.1649-1659, 2019-08-01

In LTE (Long Term Evolution) / LTE-Advanced (LTE-A) system, the user-plane for a user equipment (UE) is provided by tunneling, which increases header overhead, processing overhead, and management overhead. In addition, the LTE-A system does not support moving cells which are composed of a mobile Relay Node (RN) and UEs attached to the mobile RN. Although there are several proposals for moving cells in the LTE-A system and the 5G system, all of them rely on tunneling for the user-plane, which means that none of them avoid the tunneling overheads. This paper proposes MocLis, a moving cell support protocol based on a Locator/ID split approach. MocLis does not use tunneling. Nested moving cells are supported. Signaling cost for handover of a moving cell is independent of the number of UEs and nested RNs in the moving cell. A MocLis prototype, implemented in Linux, includes user space daemons and modified kernel. Measurements show that the attachment time and handover time are short enough for practical use. MocLis has higher TCP throughput than the tunneling based approaches.