0% found this document useful (0 votes)
62 views21 pages

Opportunistic Spectrum Acces S in Cognitive Radio Networks

The document discusses opportunistic spectrum access in cognitive radio networks. It aims to improve spectrum utilization efficiency by allowing unlicensed secondary users to access licensed spectrum when it is not being used by licensed primary users, as long as certain constraints are met. Three basic access schemes for secondary users are described: virtual transmission, sensing point, and vacation. The document analyzes and compares the performance of these schemes under constraints like bounded collision probability. It also discusses extensions like applying the schemes to systems with multiple primary and secondary users.

Uploaded by

Krishna Moorthy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views21 pages

Opportunistic Spectrum Acces S in Cognitive Radio Networks

The document discusses opportunistic spectrum access in cognitive radio networks. It aims to improve spectrum utilization efficiency by allowing unlicensed secondary users to access licensed spectrum when it is not being used by licensed primary users, as long as certain constraints are met. Three basic access schemes for secondary users are described: virtual transmission, sensing point, and vacation. The document analyzes and compares the performance of these schemes under constraints like bounded collision probability. It also discusses extensions like applying the schemes to systems with multiple primary and secondary users.

Uploaded by

Krishna Moorthy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Opportunistic Spectrum Acces

s in Cognitive Radio Networks


(Well known) Motivations for Cognit
ive Radio Networks
Wireless Sensor Network

• Spectrum scarcity.
AP
• More wireless services. Smart House

Public Safety Station tower

• Inefficient static spectrum AP

Smart House

allocation.
Wireless Sensor Network
Cellular tower
WiMAX Base Station

• Existence of a large TV tower Smart House

amount of under-utilized
Wireless Sensor Network
Wireless Sensor Network
AP

spectrum. Smart Car

• Advantage of flexible and Smart House

Traditional Static Spectrum Allocation

cognitive spectrum
access scheme needed:
cognitive radio.
100MHz 10GHz
Opportunistic Spectrum Access
• Design Objectives: Primary User

 Non-intrusiveness
 Spectral efficiency
 Cost efficiency
House

 Decentralized Secondary User


Radio tower

AP
Three basic access schemes
PU Xmit Virtual Xmit Sensing Point
SU Xmit Vacation
Overlapping time

PU:

Collision! Success
SU: VX

Collision! Success
SU: KS

Collision! Success
SU: VAC

PU -- primary user (licensee of the channel)


SU -- secondary user (cognitive ratio)
Problem Formulation
• Assumptions:
 Exponentially distributed idle period
 General primary busy period distribution
 Perfect sensing
 Knowledge of average idle time/busy time

• Constraint Metrics:
 Bounded collision probability
 Bounded overlapping time
max C 2
• Optimization problem:
s .t .
P1c   , or,
P1  
r
Fundamental limits of opportunistic
spectrum access

• Primary channel with exponentially distributed idle peri


od
• Bounded collision probability constraints
• Maximum achievable throughput of a secondary user

C2   
 --- collision probability bound
 --- percentage of idle time (by primary users)
Comparison of VX and VAC
Comparison of VX and KS
Observations
• VX, VAC and KS schemes have indistinguishabl
e throughput performance, under collision proba
bility constraint;

• The smaller the packet length, the larger the thro


ughput.

• The result can be extended to systems with multi


ple primary users and multiple secondary users
(treat all secondary users as a “super” secondar
y user)
Fixed length packet wins
• Under the collision probability constraint, the secondary u
ser achieves the maximum throughput when it transmits fi
xed length packets
Overhead Consideration

• Optimal packet length achieves trade-off


between overhead and collision probability
Relation between two constraint metrics
Multi-band multiple secondary syst
ems
• No synchronization between secondary us
ers and primary users
• No control channel for secondary users
• Collision probability constraint
• Perfect sensing
Two sensing strategies
Random-Sensing All-Channel-Sensing

Vacation Vacation

Randomly
Sensing All
choose a
channel
Channel to sense

Virtual Y Y
Busy? Virtual All channel
Transmit
Transmit busy
N
N
Transmit a
packet
Randomly
choose an
idle channel

Transmit a
packet
Simulation result for Multi-band co
mpetitive systems
Smart Antenna Technique Applied i
n Cognitive Radio Networks
• Design Objective:
 Maximize the QoS of SUs while protecting PUs
 Design MAC Protocols to take advantages of smart ante
nna technologies
• System Setup:
 One primary Tx (PT), one primary Rx (PR)
 One cognitive Tx (CT) , one cognitive Rx (CR)
 PT and CT transmit simultaneously to PR and CR, respe
ctively
• Performance metric:
 talk-able zone of CR
System Model

Cognitive Rx
 cp
d cc
 cc
d pc
d cp
Cognitive Tx
Primary Rx
 pp
d pp
 pc

Primary Tx yp  hppsp  hcpsc  np


ys  hccsc  hpcsp  nc

hij  d w v (), i, j  p, c
ij
H
i i
Optimal Beamforming Problem with
Constraints
min max | Gc ( ci ) |
wc  cp    ci  cp  

s.t.
| Gc ( cc ) | 1
| Gc ( cj ) | 1 / 2,  cj  [ cc   ,  cc   ]
G c ( )  w H
c v ( )
v( ) : array manifold

• Can be solved efficiently by convex optimization


method
A Typical Beamforming pattern of a
Secondary TX
Beamforming Pattern of Cognitive Tx
0

-10

-20
|Gs(2i)| in dB

-30

-40

-50

-60

-70
Cognitive Rx Primary Rx
-80
0 50 100 150 200 250 300 350
2i
Integration of MAC/PHY design in
Cognitive Radio Networks
• Design Objective:
 Under the collision probability constraint, i
ncrease the capacity of secondary users
 A cross-layer approach
• Channel models
 Rich scattering environment: Rayleigh fading MI
SO channel from CT to CR and PR
 Rayleigh SISO fading channel from PT to PR an
d CR
Received signal model
• Idea:
– when overlapping happens, primary user can decode i
ts signal as long as the interference power from secon
dary user is very small.
– Transmit beamforming helps in this scenario, since it c
an mitigate the interference to primary users;
• Collision probability:
v1
P1c  P2c  I cp : Interference from CT to PR
l2  v 2
I 0 : Interference threshold
P  P1  Pr[ I cp  I 0 ]
c
1*
c

You might also like