Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-4hvwz Total loading time: 0 Render date: 2024-07-27T18:34:33.758Z Has data issue: false hasContentIssue false

8 - General Process for Database System Operation

from Part IV - Protection Processes for Incumbents and Peers

Published online by Cambridge University Press:  30 August 2017

Get access

Summary

Introduction

This chapter will describe how the tools and models discussed in the last chapters are collected and organized to develop a comprehensive admission control process for three-tier spectrum bands, such as a Spectrum Access System (SAS). This will include an inventory of the models needed to construct an admission control system, and a high level description of the stateful information needed to perform the functions that are required to support the spectrum management regime. By necessity and for clarity, there will be some overlap with the discussion of methods in prior chapters.

The concept of the admission control system is a simple transaction processing system with a persistent state. The main transactions processed by the admission control system are described in more detail in other chapters. In this chapter, we will examine the fundamental functions of any admission control system that supports three-tier spectrum, and make this discussion as independent of the specific regime as possible. Also, we will abstract the complex algorithms that are the heart of the admission control system processing and only consider their functionality, not their internal design or level of implementation.

Later in this book (Chapter 13), the specifics of the admission control system for the US implementation of the Citizens Broadband Radio Service (CBRS) SAS and rules will be developed in detail, on a message by message, and object by object basis. This design is only one possible implementation of the fundamental interaction needs that are developed in this chapter.

Major Admission Control System and Device Transactions

The transactions that are described in this chapter generally mirror those that will be described in greater detail in Chapter 13. The functional grouping of the admission control system device transactions capabilities are:

Inquiry Provide device with information regarding spectrum environment, but make no changes to spectrum usage.

Grant Request Request a spectrum grant, and make any necessary adjustments to peer or lower-tier users.

Authorization Provide continued authorization to utilize a spectrum grant for a fixed duration of time.

Relinquish Relinquish a spectrum grant, and adjust the aggregate interference to reflect this removal of a node.

Reclaim A higher-tier user declares right to spectrum, or is detected, and that right is invoked.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 Federal Communications Commission, Amendment of the Commission's Rules with Regard to Commercial Operation in the 3550–3650 MHz Band, GN Docket 12–354, Report and Order and Second Further Notice of Proposed Rulemaking and Order (2015). http://apps.fcc.gov/ edocs_public/attachmatch/FCC-15-47A1.pdf.
2 Federal Communications Commission, Amendment of the Commission's Rules with Regard to Commercial Operation in the 3550–3650 MHz Band, GN Docket 12–354 (2016). https://apps.fcc.gov/edocs_public/ attachmatch/FCC-16-55A1.pdf.
3 Spectrum Sharing Committee (SSC), Spectrum Access System Requirements (Wireless Innovation Forum, 2016).
4 Spectrum Sharing Committee (SSC), CBRS Operational and Functional Requirements, WINNF-15-S-0112 (Wireless Innovation Forum, 2016).
5 Spectrum Sharing Committee (SSC), CBRS Operational Security Technical Specification, WINNF-15-S-0071-V1.0.0 (Wireless Innovation Forum, 2016).
6 Spectrum Sharing Committee (SSC), CBRS Communications Security Technical Specification, 1st edn (Wireless Innovation Forum, 2016).

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×