Outage Probability Analysis of Cognitive Radio Networks Under Self-Coexistence Constraint

Size: px
Start display at page:

Download "Outage Probability Analysis of Cognitive Radio Networks Under Self-Coexistence Constraint"

Transcription

1 1 Outage Probability Analysis of Cognitive Radio Networks Under Self-Coexistence Constraint Syed Ali Raza Zaidi, Des. C. McLernon and Mounir Ghogho EEE,University of Leeds, LS2 9JT, Leeds,U.K. Abstract Cognitive radio networks (CRNs are envisioned to eradicate the artificial scarcity caused by today s stringent spectrum allocation policy. In this article, we develop a statistical framework to model the outage probability at any arbitrary primary/licensed user, while operating in the presence of a collocated secondary network/crn. A system model based on stochastic geometry (utilizing the theory of a Poisson point process is introduced to model the transmission/reception/detection uncertainty due to the random locations and topology of both primary and secondary users. The primary beacon enabled interweave spectrum sharing model is utilized for evaluating outage and interference at a typical primary receiver. It is shown that the self-coexistence constraint ignored in past studies plays a vital role in the determination of outage and interference. A statistical model for interference is developed to incorporate the self-coexistence constraint in terms of medium access probability (MAP. Our study also indicates that under the availability of multiple channels/sub-channels, outage probability also depends on the probability of picking the same channel. Optimal selection of MAP and channel selection probability is briefly discussed. Our analytical and simulation results further consolidate the argument that past studies which do not cater for the selfcoexistence constraint, over-estimate the interference. I. INTRODUCTION COGNITIVE radios (CRs, as the name implies, are intelligent, environment aware, agile and adaptive radios which are blessed with optimal decision making capabilities. Such intelligent radio networks are envisioned to eliminate the spectrum scarcity problem, which is essentially a consequence of inefficient spectrum utilization. Regulatory bodies such as the FCC and Ofcom have already reported that spectrum scarcity is artificial and can be avoided by intelligent and opportunistic radio resource utilization. In this regard, regulatory bodies are considering to relax the stringent spectrum allocation policy and introduce a dynamic spectrum access (DSA mechanism. In the recent past, there has been a lot of effort dedicated by both academia and industry to study the DSA mechanisms for intelligent/cognitive adaptive transceivers. Several academia-industry alliances like CogNeA, PHYDYAS and ARAGON are already investigating the wide range of possibilities for making CRs commercially viable. IEEE has also formed the workgroup to develop an air interface for DSA in the TV frequency band. CRs, often refered to as secondary terminals, are based on the principle of opportunistic exploitation of spectrum vacancies across space and time. However, the operational constraint on such radio devices is to ensure that they do not cause any harmful interference to the primary/licensed or legacy user. Nevertheless, even with the current state-of-the art DSA algorithms [1], it is not possible to completely avoid interference with the primary user. This dilemma has warranted the studies in the domain of statistical characterization of the interference encountered by a primary receiver in the presence of secondary nodes. Past studies [2], [3], [4] have developed the theoretical framework for modeling the interference at the primary receiver considering the presence of multiple secondary transmitters. However, to the best of our knowledge none of these studies consider the fundamental self-coexistence [5] constraint. Generally the term self-coexistence is employed to refer to the peaceful coexistence of CRs within a CRN. Hence, these studies over-estimate the interference encountered by a typical primary receiver. In this article, we extend past studies to develop a statistical framework for outage probability and interference at a typical primary receiver, not only catering for the self-coexistence constraint but also for the channel selection. In other words, when multiple primary and secondary users exist in the network, secondary nodes only pick the same channel/sub-channel as the primary with a certain probability. We demonstrate that the simplest possible way of catering for self-coexistence is to enforce the medium access control (MAC in the secondary network. Slotted ALOHA is perhaps the simplest and easiest to implement decentralized MAC scheme. In this paper, we show that even under such a simplistic MAC mechanism and with a high transmission probability, interference encountered by any arbitrary primary node is significantly less than what has been observed by the past studies. This stems from the fact that the number of interferers are significantly reduced under the self-coexistence constraint and hence the outage probability. It is also shown that the number of interferers can be further reduced by uniform random channel selection when the choice of multiple channels is available for transmission. II. PREVIOUS WORK AND OUR CONTRIBUTION In [4] Ghasemi et al. developed an interference model for cognitive ad hoc networks. He approximated the probability density function (PDF of interference by a shifted log-normal distribution and showed that it closely matched the exact distribution. In [2] Vu et al. developed an interference model for cognitive radio networks in the presence of a primary based beaconing scheme. Authors in [2] have derived average aggregate interference and outage. Scaling laws for the interference and outage were derived by Mitran [6], using an information

2 2 theoretic formulation. Hong et al. in [3] utilized an Alphastable distribution for modeling interference in cognitive radio networks. Contributions and Organization As previously discussed, to the best of our knowledge none of the studies on interference modeling for CRs include the self-coexistence constraint in the secondary network. In other words, previous studies over-estimate the interference encountered by the primary receiver and the outages incurred at the primary. So in this paper: (1 We consider a network model (Section III where the spatial distribution of primary and secondary nodes is characterized by the Poisson point process. We formalize the stochastic geometry based network model and the intuition behind such a model. Moreover, it is formally shown that in a multiple primary and multiple secondary nodes scenario, modeling of interference at a typical primary receiver is similar to the modeling of interference at a single primary receiver in the presence of multiple Poisson distributed secondary transmitters; (2 Based on the network and spectrum sharing model introduced in Section III, we develop the statistical framework for evaluating the outage probability of a typical primary receiver under the self-coexistence constraint, while utilizing uniform channel selection; (3 We then briefly discuss the optimal selection of MAP and channel selection probability (Section V. Based on this analysis, we observe the trade-off between the usefulness of the secondary network and the outage incurred at the primary receiver; (4 Lastly, we demonstrate the accuracy of our approach using Monte Carlo simulations and analytical results (Section VI. We also show that the interference at a typical primary receiver follows a fat tailed distribution. We demonstrate that under the self-coexistence constraint this fat tailed behavior can be significantly reduced. Moreover, the outage probability observed under the self-coexistence criteria is significantly less than the reported results in past studies. III. STOCHASTIC GEOMETRY BASED NETWORK MODEL A. Primary and Secondary Network Geometry In this paper, we consider infinite spatially collocated primary and secondary ad hoc networks (see Fig. 1. The spatial distribution of the nodes is captured using two collocated homogeneous Poisson point processes (HPPPs [7] i.e., Φ p and Φ s with intensities λ p and λ s respectively. In other words, the location of the nodes of the primary network constitute a HPPP Φ p, where λ p is the average number of the primary nodes per unit area. Similar statement can be made for the HPPP formed by the secondary nodes Φ s with intensity λ s. Note that the HPPP is a very well established statistical model for the spatial distribution of the nodes in ad hoc wireless networks [8]. Many studies in the past [4], [2] have utilized the HPPP for modeling the spatial distribution of the secondary network. Considering Φ i (B (i ɛ{s, p} 1 as a counting process defined over a bounded Borel set B, the number of nodes (i.e., points of Φ i in B have a Poisson distribution with a finite mean λ i v d (B for some constant λ i. v d (B is the Lebesgue measure defined on the measurable space [R d, B d ]. In other words, v d (B is the volume of a d dimensional bounded Borel set B. If B is a d dimensional sphere v d (B = b d r d, where r is the radius of the sphere and b d is the volume of the unit sphere in R d, then b d = π d /Γ(1+d/2with Γ(a = x a 1 exp( xdx. Note that by the Superposition Theorem [8], the overall network formed by both the primary and the secondary nodes also follows a HPPP. Furthermore, such a network model by construction satisfies the required regularity conditions of the HPPP [7], i.e., the HPPP Φ i is locally finite and simple. At a given instant, any arbitrary primary/secondary node can act either as a transmitter or a receiver. Hence the points x n of the HPPP Φ i formed by the primary/secondary networks can be marked by attaching the appropriate signifier. Such a point process is refered to as a Marked Poisson point process (MPPP. The marks are assumed to take the values in the space of marks M. It is beyond the scope of this paper to provide detailed discussion on the theory of the marked point processes. The interested reader is refered to [7] and [8] for the theoretical background. In order to simplify the theory, rather than considering the MPPP, we formulate this classification in an alternative but equivalent manner. Utilizing the Superposition theorem, the HPPP Φ i can be constructed by the superposition of two independent HPPPs Φ tx i and Φ rx i with intensity λ tx i and λ rx i respectively, such that λ i = λ tx i + λ rx i, with: λ tx i = λ i ρ and λ rx i = (1 ρλ i. (1 where ρ 1. Since the interference analysis is fundamentally concerned with the distribution of the transmitters, we can invoke the above-mentioned property to model the spatial distribution of the transmitters in the secondary network (HPPP Φ s with intensity λ tx i. B. Channel Model The large scale path-loss between any arbitrary transmitter y t ɛ Φ tx i and receiver y r ɛ Φ rx i is given by l( y r y t, where, l(. is a distance dependent path-loss function. Generally, the large scale path-loss is modeled by considering the power law function, i.e.,l(r = CR α R 1, where C is the frequency dependent constant, R is the distance between the transmitter and the receiver and α > 2 is the terrain or environment dependent path-loss exponent. Unfortunately, this type of power law path-loss function suffers from a singularity near zero. In other words, for distances of the order of R < 1, transmit power is amplified. This is, however, contrary to the physically observed phenomenon. Luckily, this problem does not arise while modeling interference in cognitive radio. The main reason behind this stems from the widely accepted regulatory principle, i.e., none of the cognitive radios inside the primary exclusion region of the primary can transmit during 1 We utilize the notation of i instead of s or p to avoid repetition, when both primary and secondary networks can be treated under the same framework.

3 3 the primary s communication session. In the case of ad hoc networks, the primary s exclusion region is defined by the disk of radius r e, centered at the primary transmitter. Hence the exclusion disk defines the interference footprint created by any other concurrent transmission. Alternatively, it is also possible to center the exclusion disk on the primary receiver rather than the primary transmitter. The detailed discussion on the primary exclusion region (also refered to as the primary guard zone can be found in [9]. It is worth highlighting that the primary s exclusion region is an important design parameter, which is indeed dictated by the maximum tolerable interference threshold, secondary node density, fading, environment dependent path-loss and the medium access control mechanism. Since the focus of this paper is inclined towards the study of interference as seen by a typical primary user from the collocated secondary network, the path-loss function is modified to accommodate the exclusion region as,l(r = CR α 1 r e R. Besides the path-loss attenuation. We consider that the channel effects due to multipath fading between any arbitrary transmitter y t ɛ Φ tx i and receiver y r ɛ Φ rx i can be modeled using a random variable G with the PDF f G (., cumulative distribution function (CDF F G (. and mean µ. We also consider that G is independent and identically distributed (i.i.d. both in the spatial and temporal domain (i.e., across different links in space and different symbols on the same link. Hence the overall impact of the communication channel is modeled using a random variable H = Gl(r. C. Spectrum Sensing Model for the Secondary Network The outage probability of a typical primary receiver is governed by the spectrum sharing mechanism. As mentioned earlier, past studies have explored several potential mechanisms for the secondary networks to dynamically access the spectrum. However, in this paper we restrict our discussion to the spectrum interweave mechanism. [1] and the references therein provide detailed discussion on the spectrum access mechanisms. As proposed by the FCC, each secondary user is obliged to detect the primary s presence in the licensed frequency band and hence refrain from transmitting during the primary s communication session. Many studies have investigated several potential algorithms to detect the presence of the primary. It is beyond the scope of this paper to elaborate the discussion on this topic. Interested readers may refer to [1] for an overview of the primary detection algorithms and spectrum sharing models [1]. In this paper, we consider a beacon/control channel based spectrum sensing model. The primary transmitter explicitly sends a control signal such as grant and inhibit when it leaves or enters the transmission mode. Such a scheme is also known as out of band sensing [4]. Numerous studies on the interference modeling [2], [4] have utilized this model. In this paper, we assume that beacon channel is interference free. In practice this is assured by the ad hoc network employing handshaking(cts/rts type mechanisms. In such a network all primary users which receive CTS from a primary in their contention domain, refrain to send their own beacon. Hence before initiating its communication a primary receiver can send inhibit beacon without suffering significant interference. IV. OUTAGE PROBABILITY ANALYSIS Consider a typical primary receiver x ɛ Φ rx p ; the interference encountered at this receiver determines its outage probability, P out = Pr{I x > I th } (2 where, I x is the aggregate interference power measured at x and I th is the maximum tolerable interference under which the primary can communicate while maintaining the required quality of service (QoS. The upper and lower bounds on the tolerable interference of the primary is defined by the regulatory bodies such as FCC. Essentially, FCC has proposed the use of the metric similar to I th refered to as Interference temperature. In practice, it is useful to consider a regulatory constraint of the form, P out Θ. Such a constraint is also useful in studying how network transmission capacity (TC scales with different parameters of the secondary access mechanisms. In order to establish the outage probability P out of the typical primary receiver, as indicated by (2, we need to evaluate the complementary CDF (CCDF of the interference (shot noise process at x I x = yɛφ I G xy l( x y P s (3 where, G xy is the channel gain between the primary receiver x and the secondary transmitter y, l(. accounts for the large scale path-loss and P s is the transmit power of the secondary node. We assume that the secondary nodes transmit with a constant power. It is, however, possible to consider the situation where the secondary nodes transmit with a power P s with PDF f PS (. and CDF F ps (. under the same framework. At this juncture, it is worth registering that not all the secondary transmitters will contribute towards the aggregate interference, i.e., only those secondary transmitters which at minimum satisfy all of the following conditions to qualify as potential contributors. Condition 1: Only the secondary transmitters outside the exclusion region of the typical primary receiver can potentially transmit and cause harmful interference (the effect of the exclusion region is incorporated into the path-loss model. Condition 2: Condition 1, is not sufficient to characterize the secondary transmitter as a potential contributor, rather only those secondary transmitters that lie outside the exclusion region and cannot detect the inhibit beacon from the primary will continue transmitting and cause interference to the primary receiver. Past studies such as [4], [2] have developed the theoretical framework for modeling aggregate interference at the primary receiver considering a single primary transmitter with the above two constraints. Nevertheless, these studies ignore the fundamental self-coexistence constraint of cognitive radios (CRs in the secondary network. In particular, even if every secondary transmitter always has data to transmit to some secondary receiver, not all of them can transmit at the same time. This constraint stems from the fact that, if all the secondary transmitters transmit data all the time none of them will be successful in their transmission. In practice, this is assured by the MAC mechanism employed at the secondary transmitter.

4 4 An additional channel selection constraint further reduces the number of interferers and hence the outage probability. Hence beside condition (1 and (2 two additional constraints which a secondary transmitter should satisfy to qualify as a potential interferer are: Condition 3: (Channel selection constraint Considering, an ad hoc network where multiple channels are available, any arbitrary secondary transmitter contributes towards the interference at the primary receiver in its vicinity, if it satisfies both condition (1 and (2 and randomly picks the same channel as the primary to perform its communication with a secondary receiver. Condition 4: (Self-coexistence constraint Beside condition 3, since the number of sub-channels is limited, multiple secondary transmitters can pick the same sub-channel (on which the primary is also communicating. They only transmit with probability in a fixed time-slot and defer the transmission with probability 1. The time slots are assumed to be synchronized. In essence, for multiple primary and secondary nodes, the medium access control mechanism lends itself as multi-band slotted ALOHA. In order to model the conditions 2-4, the HPPP of the secondary transmitters needs to be thinned. Using Slivnyak s theorem [7] then (3 becomes: I o = I x = yɛφ I G y l( y P s. (4 where, o denotes origin. Hence the problem is translated into a scenario where the network is centered at the primary receiver and the interference is encountered from all the secondary transmitters satisfying the aforementioned conditions located in the area R d \b(, r e (where b(x, y is ball of radius y centered at point x. Before applying the conditions 2-4 by performing the thinning operation, it is useful to translate the point process into the polar cordinates, hence using the Mapping theorem [7] the intensity of the HPPP Φ tx s is given as λ tx s (r = λ tx s dr d 1 b d. (5 Here, r is the distance between the secondary transmitter and the primary s receiver. In order to incorporate the detection process, the HPPP Φ tx s is further decomposed into two HPPPs, Φ det s Φ tx s, s.t. λ det s (r λ tx s (r Φ md s Φ tx s, s.t. λ md s (r λ tx s (r (6 Φ tx s = Φ md s Φ det s, and λ tx s (r = λ det s (r + λ md s (r where the Φ md s representing the transmitters which misdetected and is constructed using dependent thinning of Φ tx s. Assuming that primarys do not interfere with themselves and multiple control channels are available to transmit the beacon (in other words, the beacon channel does not suffer from interference so any secondary transmitter detects the beacon with probability 1 if the signal-to-noise ratio (SNR of the beacon channel from the primary receiver to secondary transmitter is greater than some threshold SNR. Mathematically, 1 md (γ(r = { 1 γ(r < γ th γ(r γ th (7 where 1 md (γ(r is the indicator random variable, i.e. the detection process can be expressed as a Bernoulli trial with the probability of misdetection Pr{γ(r < γ th } and probability of detection 1 Pr{γ(r < γ th }. The SNR γ(r = P bl(rg N o, where N o is the noise power at the secondary transmitter and P b is the beacon transmission power. Note that the point process formed by such dependent thinning is non-homogeneous. The intensity of Φ md s is given as λ md s (r = λ tx s (r1 md (γ(r. In order to satisfy the channel selection constraint, Φ md s is further thinned using independent thinning, i.e. if probability of picking a channel from a pool of available channels is p ch. Φ md,ch s is constructed by p ch thinning, where each point of Φ md s is retained with probability p ch, and hence the intensity of the process becomes, λ md,ch s (r = λ md s (rp ch. Finally applying another independent thinning to accommodate the self-coexistence constraint we obtain the point process of interferers Φ I, with intensity λ I (r = λ md,ch s (r. Notice, selection of p ch and is an important design parameter and indeed the selection is based on the trade-off between the interference encountered that can be tolerated by the primary and usefulness of the secondary network. We will come back to this issue in later discussion. We adopt a very well established method of calculating the moment generating function (MGF and inverting it back to obtain the PDF of the interference f I (.. M I (s = E(exp(sI o = E(exp(s yɛφ I G y l( y P s, = E E G (exp(sg y l( y P s. (8 yɛφ I Using the definition of the Generating functional [8] for the Poisson point process, i.e.,g(f(x = exp ( R (1 f(xλ(dx, then (8 can be written d as: {ˆ }] M I (s = exp [ E G (1 exp(sp s Gl(rλ I (rdr. R d \b(,r e (9 It is not possible to obtain the closed-form expression for such an MGF. Hence using the method of cumulants introduced in [4], the n th cumulant is obtained as κ n = dn ln(m I (s/ds n. Due to the limited space we will not provide detailed derivation of κ n here, the interested reader is refered to [11]. Without any loss of generality it is assumed that P b,p s and C are all unity. The final expression obtained for κ n is, [ κ n = p ch dλ tx s b d EG low(n, γ thre d αn d re αn d + Eup G ( d α, γ ] thre d γ d α n th (1 where, γ th = γ th N o, EG low(n, a = a gn f G (gdg and E up G (n, a = a gn f G (gdg. Notice that the results of [4] become a special case and can be obtained if both the conditions 3-4 are relaxed, i.e.,,p ch,r e is 1 and d = 2. The PDF of the aggregate interference can be obtained from the cumulants using the Method of Moments [4]. Authors in [4] have employed a similar approach in the absence of conditions 3 and 4 to model the interference by the lognormal or shifted log-normal distribution. Note that it is well

5 5 established in the literature that the Gaussian approximation is not valid for interference due to its skewed and fat-tailed behavior [4]. The main problem with these distributions is that although they closely fit in the body, they do not fit accurately in the tail for all parameters. Moreover, the expressions for matching such moments (see [4] are quite complex. An alternative choice can be the log-logisitic distribution. However, it does not result in a good fit both in body and tail. It is possible to accurately fit the distribution using simulation and maximum likelihood estimate or L-moments type statistics. After conducting several experiments and goodness of fit testing, we found that the Gamma distribution is the best fit for the interference distribution. An added advantage with the Gamma distribution is that moment matching expressions lend themselves into a very simple form. Hence interference I Gamma(k, θ with k being the shape parameter and θ is the scale parameter with k = κ2 1 and θ = κ 2. (11 κ 2 κ 1 The outage probability of a typical primary receiver is then obtained as, ( P out = Γic κ 2 ( 1 κ, I th κ 1 κ 2 κ 2 /Γ 2 1 κ 2, (12 where Γ ic (a, b = x a 1 e x dx, is the upper incomplete b Gamma function. V. OPTIMAL CHANNEL SELECTION AND SELF-COEXISTENCE Due to space limitation, in this section we briefly discuss how the optimal values for the channel selection probability and transmission probability for the secondary transmitter can be determined. A. Channel Selection Probability Although, in this study we assumed that the secondary transmitter uniformly selects the channel from the pool of operational channels, in practice channel selection probability also depends on the historical information. In principle, channels will be picked uniformly amongst those channels for which the secondary transmitter has not received an inhibit beacon. This can be accommodated in the definition of p ch by considering it as a conditional probability, i.e., if M is the total number of channels, considering that N is the number of channels for which the beacon is received; the secondary transmitter picks a channel randomly from the remaining(m N channels. Notice that N depends on the connectivity properties and hence follows the Weibull distribution. Nevertheless p ch is conditionally uniform. B. Self-coexistence/Medium Access Probability The medium access probability which enforces the selfcoexistence constraint not only depends on the usefulness of the secondary networks but also depends on the tolerable interference of the primary receiver I th and its outage probability. When the primary s tolerable interference is of main concern, Markov s inequality or the Chernoff bound can be employed to determine the optimal value of p corresponding to the I th, e.g. P out κ1 I th given that P out Θ, we obtain ΘI th = κ 1, substituting the expression for κ 1 and by arithmetic manipulation the value of p can be determined. However, contradictory requirements arise from the usefulness of the secondary network and when this is of importance principles from ad hoc networks can be adopted and p can be determined as in [12]. VI. RESULTS AND DISCUSSION In this section, we highlight several insights obtained by performing Monte Carlo Simulations (which also validates the theoretical framework. Fig. 2 shows the PDF of the interference at a typical primary receiver. Results are obtained by executing a hundred thousand iterations for Exponential (corresponding to Rayleigh fading and Log-normal distributions. These histograms are plotted against the fitted Gamma distribution, obtained by evaluating the cumulants and using the Methods of Moments. Expressions for the upper and lower moments required to compute the cumulants are straightforward to calculate and thus not included here (due to limited space. Fig. 2 illustrates that both experimental and theoretical results closely match. In order, to test goodness of fit, a Chi2 test was also performed. Both simulation and experimental results shown here are obtained by considering following numeric values of the parameters: inital intensity of secondary transmitters λ tx s =.1, path-loss exponent α = 4, radius of exclusion region r e = 1. Normalized detection SNR threshold γ th = γ th N o = 4 db and dimension of network space d = 2. Choice of these parameters is arbitrary but we have used same parameters as in [4] in order to ensure that the results are comparable. The empirical CDF was obtained from a histogram and is plotted against theoretical results in Fig. 3. Note that the simulation results slightly deviate from the theoretical results for a high threshold because the order of outage probability is 1 4 or 1 5 while the number of iterations is 1 5. This can be improved by increasing number of iterations. Note that the PDF of the interference is skewed (mean > median > mode and has a fat-tailed behavior (Log-normal or Gamma distribution exhibit the fat tailed behavior in general. This fat tailed behavior implies that with non-negligible probability there will be some nearby secondary transmitters which will cause harmful interference to the primary receiver, hence leading to the outage of the primary. This fat tailed behavior is indeed highly undesirable. Several possible mechanisms can be adapted to get rid off this behavior. In general any mechanism which can reduce the uncertainty about the primary s presence can contribute towards reduction of the interference encountered at the primary. This indeed implies that agility of the cognitive radio needs to be improved. Amongst many alternatives, one simple way is to introduce the cooperation amongst secondary nodes. Such cooperation can reduce the uncertainty in detection encountered due to spatial or temporal variations of the channel between the secondary transmitter and primary receiver. Fig. 4 shows that under the coexistence and channel selection constraints, outage probability is significantly reduced and so is the fat-tailed behavior. Hence this validates that in practice many studies over-estimate the outages encountered by

6 6 the typical primary receiver. Moreover, as the medium access probability (MAP is reduced, a proportional reduction in outage is observed. Note that even for the high values of MAP =.8, outage is significantly less than the scenario where there is no self-coexistence constraint. Also from Fig. 4 it is obvious that in the presence of multiple channels where each channel is uniformly picked, the outage probability is further reduced. Hence any practical ad hoc network designed to satisfy both self-coexistence and channel-selection constraint can reap the benefit of opportunistic exploitation of spectrum, while possibly causing little or no harmful interference. Due to lack of space, we did not include the results where the interference threshold is fixed, while the normalized detection SNR threshold is varied. In such a scenario it is noticed that even for the high detection threshold, outage probability under the self-coexistence constraint is significantly lesser than the counter case. VII. CONCLUSION In this paper, we have developed a statistical model of the interference encountered by a typical primary receiver due to the secondary transmitters in a collocated secondary network. It is shown that the self-coexistence constraint which is not considered in past studies, plays a vital role in over all characterization of interference at a typical primary receiver. In particular, such a constraint can be accommodated by enforcing simplistic MAC mechanisms such as ALOHA. It is demonstrated that even under high medium access probability, interference is significantly reduced by enforcing such a constraint. Furthermore, simulation and analytical results also show that when multiple channels are available, with the uniform selection of channels, interference can be further reduced. It is also shown that selection of access probability is based on trade-off between the usefulness of the secondary network and tolerable interference by the primary receiver. Lastly, with the help of Monte Carlo simulations and an analytical framework, it is validated that by incorporating the self-coexistence in an interference model is significantly important and past studies which have ignored the selfcoexistence constraint over-estimate the interference caused by the secondary network. REFERENCES [1] A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, Breaking spectrum gridlock with cognitive radios: An information theoretic perspective, Proceedings of the IEEE, vol. 97, no. 5, pp , 29. [2] M. Vu, S. Ghassemzadeh, and V. Tarokh, Interference in a cognitive network with beacon, in IEEE Wireless Communications and Networking Conference, 28, pp [3] X. Hong, C. Wang, and J. Thompson, Interference Modeling of Cognitive Radio Networks, in IEEE Vehicular Technology Conference, VTC Spring, 28, pp [4] A. Ghasemi and E. Sousa, Interference aggregation in spectrum-sensing cognitive wireless networks, IEEE Journal of Selected Topics in Signal Processing, vol. 2, no. 1, pp , 28. [5] C. Cordeiro, K. Challapali, D. Birru, and S. Shankar, IEEE 82.22: An introduction to the first wireless standard based on cognitive radios, Journal of communications, vol. 1, no. 1, pp , 26. [6] P. Mitran, Interference scaling laws in cognitive networks, in Communications, 24th Biennial Symposium on, 28, pp [7] D. Stoyan, W. Kendall, J. Mecke, and D. Kendall, Stochastic geometry and its applications. Wiley New York, [8] M. Haenggi and R. K. Gant, Interference in Large Wireless Networks. Foundations and Trends in Networking, NOW Publisher, 28, vol. 3, no. 2. [9] M. Vu, N. Devroye, and V. Tarokh, The primary exclusive region in cognitive networks, IEEE Trans. on Wireless Comm, 28. [1] Q. Zhao and B. Sadler, A survey of dynamic spectrum access, IEEE Signal Processing Magazine, vol. 24, no. 3, pp , 27. [11] S. A. R. Zaidi, D. McLernon, and M. Ghogho, Transmission capacity analysis of cognitive radio networks, Technical Report available at: 21. [12] F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, An Aloha protocol for multihop mobile wireless networks, IEEE Transactions on Information Theory, vol. 52, no. 2, pp , 26. Figure 1. Y Primary s Exclusion Region r e Secondary Transmitter Secondary Receiver Primary Transmitter Primary Receiver X Outage Probability for α = 4, λ tx s =.1,d = 2 and re = 1. PDF of Interference f I (i PDF of Interference f I (i Normalized Interference x Simulation 3 Fitted Normalized Interference x 1 3 r e Simulation Fitted Exponential Log normal Figure 2. PDF of interference f int (.( Exponential (green and Lognormal fading (blue, = p ch = 1. Figure 3. -see(12. Outage Probability (P out Outage Probability (P out Exponential µ=1 Lognormal σ =6dB Simulation Theoretical Normalized Interference Threshold (I x 1 3 th Outage probability for α = 4, λ tx s =.1 and = p ch = =.8,p ch =1 =.5,p ch =1 =.8,p ch =.2 =.8,p ch =.1 = 1, p ch = Normalized Interference Threshold (I x 1 4 th Figure 4. Outage probability for α = 4, λ =.1,d = 2 and r e = 1 (dashed line for simulation and solid line is for theoretical results-see(12

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Mobility and Fading: Two Sides of the Same Coin

Mobility and Fading: Two Sides of the Same Coin 1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract

More information

Opportunistic cooperation in wireless ad hoc networks with interference correlation

Opportunistic cooperation in wireless ad hoc networks with interference correlation Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract

More information

Randomized Channel Access Reduces Network Local Delay

Randomized Channel Access Reduces Network Local Delay Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement

More information

On the Transmission Capacity of Wireless Multi-Channel Ad Hoc Networks with local FDMA scheduling

On the Transmission Capacity of Wireless Multi-Channel Ad Hoc Networks with local FDMA scheduling On the Transmission Capacity of Wireless Multi-Channel Ad Hoc Networks with local FDMA scheduling Jens P. Elsner, Ralph Tanbourgi and Friedrich K. Jondral Karlsruhe Institute of Technology, Germany {jens.elsner,

More information

Identifying Boundaries of Dominant Regions Dictating Spectrum Sharing Opportunities for Large Secondary Networks

Identifying Boundaries of Dominant Regions Dictating Spectrum Sharing Opportunities for Large Secondary Networks Identifying Boundaries of Dominant Regions Dictating Spectrum Sharing Opportunities for Large Secondary Networks Muhammad Aljuaid and Halim Yanikomeroglu Department of Systems and Computer Engineering

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4127 The Effect of Fading, Channel Inversion, and Threshold Scheduling on Ad Hoc Networks Steven Weber, Member, IEEE, Jeffrey G.

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Interference and Outage in Doubly Poisson Cognitive Networks

Interference and Outage in Doubly Poisson Cognitive Networks 1 Interference and Outage in Doubly Poisson Cognitive Networks Chia-han Lee and Martin Haenggi clee14,mhaenggi}@nd.edu Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556,

More information

Scaled SLNR Precoding for Cognitive Radio

Scaled SLNR Precoding for Cognitive Radio Scaled SLNR Precoding for Cognitive Radio Yiftach Richter Faculty of Engineering Bar-Ilan University Ramat-Gan, Israel Email: yifric@gmail.com Itsik Bergel Faculty of Engineering Bar-Ilan University Ramat-Gan,

More information

A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications Martin Haenggi, Senior Member, IEEE

A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications Martin Haenggi, Senior Member, IEEE 5500 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 12, DECEMBER 2008 A Geometric Interpretation of Fading in Wireless Networks: Theory Applications Martin Haenggi, Senior Member, IEEE Abstract In

More information

Scaling Laws of Cognitive Networks

Scaling Laws of Cognitive Networks Scaling Laws of Cognitive Networks Mai Vu, 1 Natasha Devroye, 1, Masoud Sharif, and Vahid Tarokh 1 1 Harvard University, e-mail: maivu, ndevroye, vahid @seas.harvard.edu Boston University, e-mail: sharif@bu.edu

More information

Scaling Laws of Cognitive Networks

Scaling Laws of Cognitive Networks Scaling Laws of Cognitive Networks Invited Paper Mai Vu, 1 Natasha Devroye, 1, Masoud Sharif, and Vahid Tarokh 1 1 Harvard University, e-mail: maivu, ndevroye, vahid @seas.harvard.edu Boston University,

More information

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information

More information

Interference Model for Spectrum Sensing with Power Control

Interference Model for Spectrum Sensing with Power Control 1 Interference Model for Spectrum Sensing with Power Control Yuandao Sun and Brian L. Mark Dept. of Electrical and Computer Engineering George Mason University, MS 1G5 4400 University Drive, Fairfax, VA

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

Natasha Devroye, Mai Vu, and Vahid Tarokh ] Cognitive Radio Networks. [Highlights of information theoretic limits, models, and design]

Natasha Devroye, Mai Vu, and Vahid Tarokh ] Cognitive Radio Networks. [Highlights of information theoretic limits, models, and design] [ Natasha Devroye, Mai Vu, and Vahid Tarokh ] Cognitive Radio Networks BRAND X PICTURES [Highlights of information theoretic limits, models, and design] In recent years, the development of intelligent,

More information

Cognitive Radio: From Theory to Practical Network Engineering

Cognitive Radio: From Theory to Practical Network Engineering 1 Cognitive Radio: From Theory to Practical Network Engineering Ekram Hossain 1, Long Le 2, Natasha Devroye 3, and Mai Vu 4 1 Department of Electrical and Computer Engineering, University of Manitoba ekram@ee.umanitoba.ca

More information

On the Primary Exclusive Region of Cognitive Networks

On the Primary Exclusive Region of Cognitive Networks 338 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 9 On the Primary Exclusive Region of Cognitive Networks Mai Vu, Natasha Devroye, and Vahid Tarokh Abstract We study a cognitive network

More information

The Primary Exclusive Region in Cognitive Networks

The Primary Exclusive Region in Cognitive Networks The Primary Exclusive Region in Cognitive Networks Mai Vu, Natasha Devroye, and Vahid Tarokh Harvard University, e-mail: maivu, ndevroye, vahid @seas.harvard.edu Invited Paper) Abstract In this paper,

More information

Cooperative communication with regenerative relays for cognitive radio networks

Cooperative communication with regenerative relays for cognitive radio networks 1 Cooperative communication with regenerative relays for cognitive radio networks Tuan Do and Brian L. Mark Dept. of Electrical and Computer Engineering George Mason University, MS 1G5 4400 University

More information

Gaussian Random Field Approximation for Exclusion Zones in Cognitive Radio Networks

Gaussian Random Field Approximation for Exclusion Zones in Cognitive Radio Networks Gaussian Random Field Approximation for Exclusion Zones in Cognitive Radio Networks Zheng Wang and Brian L. Mark Dept. of Electrical and Computer Engineering George Mason University, MS 1G5 4400 University

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints

A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints D. Torrieri M. C. Valenti S. Talarico U.S. Army Research Laboratory Adelphi, MD West Virginia University Morgantown, WV June, 3 the

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

Transmit Power Allocation for BER Performance Improvement in Multicarrier Systems

Transmit Power Allocation for BER Performance Improvement in Multicarrier Systems Transmit Power Allocation for Performance Improvement in Systems Chang Soon Par O and wang Bo (Ed) Lee School of Electrical Engineering and Computer Science, Seoul National University parcs@mobile.snu.ac.r,

More information

Spectral efficiency of Cognitive Radio systems

Spectral efficiency of Cognitive Radio systems Spectral efficiency of Cognitive Radio systems Majed Haddad and Aawatif Menouni Hayar Mobile Communications Group, Institut Eurecom, 9 Route des Cretes, B.P. 93, 694 Sophia Antipolis, France Email: majed.haddad@eurecom.fr,

More information

CONSIDER THE following power capture model. If

CONSIDER THE following power capture model. If 254 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 2, FEBRUARY 1997 On the Capture Probability for a Large Number of Stations Bruce Hajek, Fellow, IEEE, Arvind Krishna, Member, IEEE, and Richard O.

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Bandwidth-SINR Tradeoffs in Spatial Networks

Bandwidth-SINR Tradeoffs in Spatial Networks Bandwidth-SINR Tradeoffs in Spatial Networks Nihar Jindal University of Minnesota nihar@umn.edu Jeffrey G. Andrews University of Texas at Austin jandrews@ece.utexas.edu Steven Weber Drexel University sweber@ece.drexel.edu

More information

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection Mohammad Torabi Wessam Ajib David Haccoun Dept. of Electrical Engineering Dept. of Computer Science Dept. of Electrical

More information

where # denotes the number of elements in its operand set.

where # denotes the number of elements in its operand set. Stochastic Analysis of the Mean Interference for the RTS/CTS Mechanism Yi Zhong, Wenyi Zhang Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei,

More information

arxiv: v1 [cs.ni] 24 Apr 2012

arxiv: v1 [cs.ni] 24 Apr 2012 Stochastic Analysis of ean Interference for RTS/CTS echanism Yi Zhong and Wenyi Zhang Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 2327,

More information

Secondary Transmission Profile for a Single-band Cognitive Interference Channel

Secondary Transmission Profile for a Single-band Cognitive Interference Channel Secondary Transmission rofile for a Single-band Cognitive Interference Channel Debashis Dash and Ashutosh Sabharwal Department of Electrical and Computer Engineering, Rice University Email:{ddash,ashu}@rice.edu

More information

Spectrum Management and Cognitive Radios Alessandro Guidotti, XXIV ciclo

Spectrum Management and Cognitive Radios Alessandro Guidotti, XXIV ciclo Bologna, 24-25/01/2012 Spectrum Management and Cognitive Radios Alessandro Guidotti, XXIV ciclo DEIS Fondazione Ugo Bordoni Is spectrum lacking? Command & Control spectrum allocation model Static spectrum

More information

Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks

Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks Don Torrieri and Matthew C. Valenti U.S. Army Research Laboratory, Adelphi, MD, USA. West Virginia University, Morgantown, WV, USA. arxiv:1207.2825v5

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Interference Model for Cognitive Coexistence in Cellular Systems

Interference Model for Cognitive Coexistence in Cellular Systems Interference Model for Cognitive Coexistence in Cellular Systems Theodoros Kamakaris, Didem Kivanc-Tureli and Uf Tureli Wireless Network Security Center Stevens Institute of Technology Hoboken, NJ, USA

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

STOCHASTIC ANALYSIS OF RANDOM AD HOC NETWORKS WITH MAXIMUM ENTROPY DEPLOYMENTS

STOCHASTIC ANALYSIS OF RANDOM AD HOC NETWORKS WITH MAXIMUM ENTROPY DEPLOYMENTS STOCHASTIC ANALYSIS OF RANDOM AD HOC NETWORKS WITH MAXIMUM ENTROPY DEPLOYMENTS Thomas Bourgeois 1 and Shigeru Shimamoto 1 1 Graduate School of Global Information and Telecommunication Studies Waseda University,

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks 1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile

More information

Modeling of Shadow Fading Correlation in Urban Environments Using the Uniform Theory of Diffraction

Modeling of Shadow Fading Correlation in Urban Environments Using the Uniform Theory of Diffraction URSI-France Journées scientifiques 26/27 mars 203 L ÉLECTROMAGNÉTISME, 50- UNE SCIENCE EN PLEINE ACTION! Modeling of Shadow Fading in Urban Environments Using the Uniform Theory of Diffraction Xin ZENG

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

2100 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 4, APRIL 2009

2100 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 4, APRIL 2009 21 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 4, APRIL 29 On the Impact of the Primary Network Activity on the Achievable Capacity of Spectrum Sharing over Fading Channels Mohammad G. Khoshkholgh,

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Ahmed El Shafie and Tamer Khattab Wireless Intelligent Networks Center (WINC), Nile University, Giza, Egypt. Electrical

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Comparative Channel Capacity Analysis of a MIMO Rayleigh Fading Channel with Different Antenna Spacing and Number of Nodes

Comparative Channel Capacity Analysis of a MIMO Rayleigh Fading Channel with Different Antenna Spacing and Number of Nodes Comparative Channel Capacity Analysis of a MIMO Rayleigh Fading Channel with Different Antenna Spacing and Number of Nodes Anand Jain 1, Kapil Kumawat, Harish Maheshwari 3 1 Scholar, M. Tech., Digital

More information

Sensing-based Opportunistic Channel Access

Sensing-based Opportunistic Channel Access Sensing-based Opportunistic Channel Access Xin Liu Department of Computer Science University of California, Davis, CA 95616 Email: liu@cs.ucdavis.edu Sai Shankar N. Qualcomm Standards Engineering Dept.

More information

Revision of Lecture One

Revision of Lecture One Revision of Lecture One System blocks and basic concepts Multiple access, MIMO, space-time Transceiver Wireless Channel Signal/System: Bandpass (Passband) Baseband Baseband complex envelope Linear system:

More information

Coordinated Packet Transmission in Random Wireless Networks

Coordinated Packet Transmission in Random Wireless Networks Coordinated Pacet Transmission in Random Wireless Networs S Vana and M Haenggi Department of Electrical Engineering University of Notre Dame, Notre Dame, IN 46556 e-mail: (svana, mhaenggi@ndedu Abstract

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

On the Downlink SINR and Outage Probability of Stochastic Geometry Based LTE Cellular Networks with Multi-Class Services

On the Downlink SINR and Outage Probability of Stochastic Geometry Based LTE Cellular Networks with Multi-Class Services On the Downlink SINR and of Stochastic Geometry Based LTE Cellular Networks with Multi-Class Services 1 Shah Mahdi Hasan, Md. Abul Hayat and 3 Md. Farhad Hossain Department of Electrical and Electronic

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS RASHMI SABNUAM GUPTA 1 & KANDARPA KUMAR SARMA 2 1 Department of Electronics and Communication Engineering, Tezpur University-784028,

More information

Narrow- and wideband channels

Narrow- and wideband channels RADIO SYSTEMS ETIN15 Lecture no: 3 Narrow- and wideband channels Ove Edfors, Department of Electrical and Information technology Ove.Edfors@eit.lth.se 2012-03-19 Ove Edfors - ETIN15 1 Contents Short review

More information

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Antara Hom Chowdhury, Yi Song, and Chengzong Pang Department of Electrical Engineering and Computer

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Cognitive Radio Techniques

Cognitive Radio Techniques Cognitive Radio Techniques Spectrum Sensing, Interference Mitigation, and Localization Kandeepan Sithamparanathan Andrea Giorgetti ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xxi 1 Introduction

More information

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,

More information

PERFORMANCE ANALYSIS OF UNDERLAY SECONDARY NETWORKS USING BINARY SCHEDULING ALGORITHM

PERFORMANCE ANALYSIS OF UNDERLAY SECONDARY NETWORKS USING BINARY SCHEDULING ALGORITHM Performance Analysis of Underlay Secondary,. P.Caroline Priyanka Evelyne,et al,.. International Journal of Technology and Engineering System (IJTES) Vol 8. No.1 Jan-March 2016 Pp.115-121 gopalax Journals,

More information

Fig.1channel model of multiuser ss OSTBC system

Fig.1channel model of multiuser ss OSTBC system IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio

More information

Modeling and Mitigation of Interference in Multi-Antenna Receivers

Modeling and Mitigation of Interference in Multi-Antenna Receivers Modeling and Mitigation of Interference in Multi-Antenna Receivers Aditya Chopra September 16, 2011 1 about me Member of the Wireless Networking and Communications Group at The University of Texas at Austin

More information

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment

More information

Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks

Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks Matthew C. Valenti, West Virginia University Joint work with Kiran Venugopal and Robert Heath, University of Texas Under funding

More information

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands

More information

Spring 2017 MIMO Communication Systems Solution of Homework Assignment #5

Spring 2017 MIMO Communication Systems Solution of Homework Assignment #5 Spring 217 MIMO Communication Systems Solution of Homework Assignment #5 Problem 1 (2 points Consider a channel with impulse response h(t α δ(t + α 1 δ(t T 1 + α 3 δ(t T 2. Assume that T 1 1 µsecs and

More information

Analytical Expression for Average SNR of Correlated Dual Selection Diversity System

Analytical Expression for Average SNR of Correlated Dual Selection Diversity System 3rd AusCTW, Canberra, Australia, Feb. 4 5, Analytical Expression for Average SNR of Correlated Dual Selection Diversity System Jaunty T.Y. Ho, Rodney A. Kennedy and Thushara D. Abhayapala Department of

More information

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems Research

More information

Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio

Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio Xiaoyu Wang, Alexander Wong, and Pin-Han Ho Department of Electrical and Computer Engineering Department of Systems

More information

Adaptive Rate Transmission for Spectrum Sharing System with Quantized Channel State Information

Adaptive Rate Transmission for Spectrum Sharing System with Quantized Channel State Information Adaptive Rate Transmission for Spectrum Sharing System with Quantized Channel State Information Mohamed Abdallah, Ahmed Salem, Mohamed-Slim Alouini, Khalid A. Qaraqe Electrical and Computer Engineering,

More information

P. Mohana Shankar. Fading and Shadowing. in Wireless Systems. ^ Springer

P. Mohana Shankar. Fading and Shadowing. in Wireless Systems. ^ Springer P. Mohana Shankar Fading and Shadowing in Wireless Systems ^ Springer Contents 1 Overview 1 1.1 Outline 1 References 5 2 Concepts of Probability and Statistics 7 2.1 Introduction 7 2.2 Random Variables,

More information

Analysis of Interference in Cognitive Radio Networks with Unknown Primary Behavior

Analysis of Interference in Cognitive Radio Networks with Unknown Primary Behavior EEE CC 22 - Cognitive Radio and Networks Symposium Analysis of nterference in Cognitive Radio Networks with Unknown Primary Behavior Chunxiao Jiang, Yan Chen,K.J.RayLiu and Yong Ren Department of Electrical

More information

An Accurate and Efficient Analysis of a MBSFN Network

An Accurate and Efficient Analysis of a MBSFN Network An Accurate and Efficient Analysis of a MBSFN Network Matthew C. Valenti West Virginia University Morgantown, WV May 9, 2014 An Accurate (shortinst) and Efficient Analysis of a MBSFN Network May 9, 2014

More information

Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks

Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks Optimum Threshold for SNR-based Selective Digital Relaying Schemes in Cooperative Wireless Networks Furuzan Atay Onat, Abdulkareem Adinoyi, Yijia Fan, Halim Yanikomeroglu, and John S. Thompson Broadband

More information

Stochastic Modelling of Downlink Transmit Power in Wireless Cellular Networks

Stochastic Modelling of Downlink Transmit Power in Wireless Cellular Networks Stochastic Modelling of Downlink Transmit Power in Wireless Cellular Networks Boris Galkin, Jacek Kibiłda and Luiz A. DaSilva CONNECT, Trinity College Dublin, Ireland, E-mail: {galkinb,kibildj,dasilval}@tcd.ie

More information

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints 1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

System Analysis of Relaying with Modulation Diversity

System Analysis of Relaying with Modulation Diversity System Analysis of elaying with Modulation Diversity Amir H. Forghani, Georges Kaddoum Department of lectrical ngineering, LaCIM Laboratory University of Quebec, TS Montreal, Canada mail: pouyaforghani@yahoo.com,

More information

Interweave Cognitive Networks with Co-operative Sensing

Interweave Cognitive Networks with Co-operative Sensing Interweave Cognitive Networks with Co-operative Sensing S Kusaladharma and C Tellambura, Fellow, IEEE Department of Electrical and Computer Engineering University of Alberta, Edmonton, Alberta T6G 2V4,

More information

Optimization of Coded MIMO-Transmission with Antenna Selection

Optimization of Coded MIMO-Transmission with Antenna Selection Optimization of Coded MIMO-Transmission with Antenna Selection Biljana Badic, Paul Fuxjäger, Hans Weinrichter Institute of Communications and Radio Frequency Engineering Vienna University of Technology

More information

RECOMMENDATION ITU-R P Acquisition, presentation and analysis of data in studies of tropospheric propagation

RECOMMENDATION ITU-R P Acquisition, presentation and analysis of data in studies of tropospheric propagation Rec. ITU-R P.311-10 1 RECOMMENDATION ITU-R P.311-10 Acquisition, presentation and analysis of data in studies of tropospheric propagation The ITU Radiocommunication Assembly, considering (1953-1956-1959-1970-1974-1978-1982-1990-1992-1994-1997-1999-2001)

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam. ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2010 Lecture 19 Today: (1) Diversity Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

More information

Power Allocation Strategy for Cognitive Radio Terminals

Power Allocation Strategy for Cognitive Radio Terminals Power Allocation Strategy for Cognitive Radio Terminals E. Del Re, F. Argenti, L. S. Ronga, T. Bianchi, R. Suffritti CNIT-University of Florence Department of Electronics and Telecommunications Via di

More information

BER and PER estimation based on Soft Output decoding

BER and PER estimation based on Soft Output decoding 9th International OFDM-Workshop 24, Dresden BER and PER estimation based on Soft Output decoding Emilio Calvanese Strinati, Sébastien Simoens and Joseph Boutros Email: {strinati,simoens}@crm.mot.com, boutros@enst.fr

More information

Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic

Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic MEE10:68 Optimal Power Control in Cognitive Radio Networks with Fuzzy Logic Jhang Shih Yu This thesis is presented as part of Degree of Master of Science in Electrical Engineering September 2010 Main supervisor:

More information

On Multiple Users Scheduling Using Superposition Coding over Rayleigh Fading Channels

On Multiple Users Scheduling Using Superposition Coding over Rayleigh Fading Channels On Multiple Users Scheduling Using Superposition Coding over Rayleigh Fading Channels Item Type Article Authors Zafar, Ammar; Alnuweiri, Hussein; Shaqfeh, Mohammad; Alouini, Mohamed-Slim Eprint version

More information

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Won-Yeol Lee and Ian F. Akyildiz Broadband Wireless Networking Laboratory School of Electrical and Computer

More information

Propagation Channels. Chapter Path Loss

Propagation Channels. Chapter Path Loss Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication

More information

MIMO Receiver Design in Impulsive Noise

MIMO Receiver Design in Impulsive Noise COPYRIGHT c 007. ALL RIGHTS RESERVED. 1 MIMO Receiver Design in Impulsive Noise Aditya Chopra and Kapil Gulati Final Project Report Advanced Space Time Communications Prof. Robert Heath December 7 th,

More information

Dynamic Subchannel and Bit Allocation in Multiuser OFDM with a Priority User

Dynamic Subchannel and Bit Allocation in Multiuser OFDM with a Priority User Dynamic Subchannel and Bit Allocation in Multiuser OFDM with a Priority User Changho Suh, Yunok Cho, and Seokhyun Yoon Samsung Electronics Co., Ltd, P.O.BOX 105, Suwon, S. Korea. email: becal.suh@samsung.com,

More information

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China

More information