• Title/Summary/Keyword: underlay scheme

Search Result 27, Processing Time 0.022 seconds

Throughput Maximization for Cognitive Radio Users with Energy Constraints in an Underlay Paradigm

  • Vu, Van-Hiep;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.79-84
    • /
    • 2017
  • In a cognitive radio network (CRN), cognitive radio users (CUs) should be powered by a small battery for their operations. The operations of the CU often include spectrum sensing and data transmission. The spectrum sensing process may help the CU avoid a collision with the primary user (PU) and may save the energy that is wasted in transmitting data when the PU is present. However, in a time-slotted manner, the sensing process consumes energy and reduces the time for transmitting data, which degrades the achieved throughput of the CRN. Subsequently, the sensing process does not always offer an advantage in regards to throughput to the CRN. In this paper, we propose a scheme to find an optimal policy (i.e., perform spectrum sensing before transmitting data or transmit data without the sensing process) for maximizing the achieved throughput of the CRN. In the proposed scheme, the data collection period is considered as the main factor effecting on the optimal policy. Simulation results show the advantages of the optimal policy.

Statistically Controlled Opportunistic Resource Block Sharing for Femto Cell Networks

  • Shin, Dae Kyu;Choi, Wan;Yu, Takki
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.469-475
    • /
    • 2013
  • In this paper, we propose an efficient interference management technique which controls the number of resource blocks (or subcarriers) shared with other cells based on statistical interference levels among cells. The proposed technique tries to maximize average throughput of a femto cell user under a constraint on non-real time control of a femto cell network while guaranteeing a target throughput value of a macro cell user. In our proposed scheme, femto cells opportunistically use resource blocks allocated to other cells if the required average user throughput is not attained with the primarily allocated resource blocks. The proposed method is similar to the underlay approach in cognitive radio systems, but resource block sharing among cells is statistically controlled. For the statistical control, a femto cell sever constructs a table storing average mutual interference among cells and periodically updates the table. This statistical approach fully satisfies the constraint of non-real time control for femto cell networks. Our simulation results show that the proposed scheme achieves higher average femto user throughput than conventional frequency reuse schemes for time varying number of users.

Spectrum Sharing-Based Multi-Hop Decode-and-Forward Relay Networks under Interference Constraints: Performance Analysis and Relay Position Optimization

  • Bao, Vo Nguyen Quoc;Thanh, Tran Thien;Nguyen, Tuan Duc;Vu, Thanh Dinh
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.266-275
    • /
    • 2013
  • The exact closed-form expressions for outage probability and bit error rate of spectrum sharing-based multi-hop decode-and-forward (DF) relay networks in non-identical Rayleigh fading channels are derived. We also provide the approximate closed-form expression for the system ergodic capacity. Utilizing these tractable analytical formulas, we can study the impact of key network parameters on the performance of cognitive multi-hop relay networks under interference constraints. Using a linear network model, we derive an optimum relay position scheme by numerically solving an optimization problem of balancing average signal-to-noise ratio (SNR) of each hop. The numerical results show that the optimal scheme leads to SNR performance gains of more than 1 dB. All the analytical expressions are verified by Monte-Carlo simulations confirming the advantage of multihop DF relaying networks in cognitive environments.

Continuous Control Message Exchange in Distributed Cognitive Radio Networks

  • Arega, Zerabruk G.;Kim, Bosung;Roh, Byeong-hee
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.206-209
    • /
    • 2014
  • Control message exchange is major job for cognitive radio to exist and use spectrum opportunistically. For this control message exchange they need a common control channel (CCC). Once this channel is affected by a primary user, communication stops until new CCC is setup. This takes substantial time and if they could not get free channel, this halt continues for long time. To prevent such cease of communication, we propose a combination of two networks, namely WLAN and UWB, to let the communication continue. In our proposed idea if the CCC of a certain CR in WLAN is affected, the CR changes its network from WLAN to UWB and keeps the communication because UWB cannot be affected by PU. In the proposed idea every cognitive radio has two transceivers; one for the overlay network (WLAN) and another UWB network. If a primary user is detected in the spectrum of a cognitive radio, it continues exchanging control messages under the UWB network and in parallel negotiates for a new CCC using the WLAN network. This idea solves the communication interruption until new CCC is setup.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

Analysis of Energy Efficiency Considering Device-to-Device (D2D) Communications in Cellular Networks (셀룰러 네트워크에서 D2D 통신을 고려한 에너지 효율성 분석)

  • Jung, Minchae;Choi, Sooyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.7
    • /
    • pp.571-579
    • /
    • 2013
  • This paper proposes an energy-efficient mode selection and power allocation scheme in device-to-device (D2D) communication system as an underlay coexistence with cellular networks. We analyze the energy efficiency which is defined as the summation of the energy efficiencies for all devices. The proposed scheme consists of two steps. First, we calculate the transmission power maximizing the energy efficiency for all possible modes of each device. Although the proposed power cannot maximize the system capacity, we prove that the proposed transmission power is the optimal power which maximizes the energy efficiency. In the second step, we select a mode which has the maximal energy efficiency among all possible mode combinations of the devices. Then we can jointly obtain the transmission power and the mode which can maximize the energy efficiency. The proposed scheme has the optimal performance with respect to the energy efficiency and outperforms the conventional schemes.

Device-to-Device Communication Underlaying Cellular Networks: Connection Establishment and Interference Avoidance

  • Xu, Shaoyi;Wang, Haiming;Chen, Tao;Peng, Tao;Kwak, Kyung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.203-228
    • /
    • 2012
  • It is expected that device-to-device (D2D) communication is allowed to underlay future cellular networks such as IMT-Advanced for spectrum efficiency. This article studies the mechanisms of D2D communication and interference avoidance when the D2D subsystem reuses uplink resources and downlink spectrums with a cellular system, respectively. We firstly propose an effective scheme to establish and maintain D2D communication. Moreover, a novel method to deal with the resource allocation and interference avoidance issues by utilizing the network peculiarity of a hybrid network to share the uplink resource is proposed. Most research focuses on reusing the uplink spectrums, but how to share the downlink frequency bands is seldom addressed. To share the downlink spectrums and avoid the interference to the primary cellular devices, a labeled time slots based mechanism is proposed. Implementation details are described in a real cellular system and simulation results prove that satisfying performance can be achieved by using the proposed mechanisms.