WO2008072082A2 - Method and system for stable throughput of cognitive radio with relaying capabilities - Google Patents
Method and system for stable throughput of cognitive radio with relaying capabilities Download PDFInfo
- Publication number
- WO2008072082A2 WO2008072082A2 PCT/IB2007/004052 IB2007004052W WO2008072082A2 WO 2008072082 A2 WO2008072082 A2 WO 2008072082A2 IB 2007004052 W IB2007004052 W IB 2007004052W WO 2008072082 A2 WO2008072082 A2 WO 2008072082A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transmitter
- packets
- receiver
- channel
- primary
- Prior art date
Links
- 230000001149 cognitive effect Effects 0.000 title claims abstract description 90
- 238000000034 method Methods 0.000 title claims description 30
- 238000004891 communication Methods 0.000 claims abstract description 22
- 230000005540 biological transmission Effects 0.000 claims description 44
- 238000005562 fading Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 11
- 230000003595 spectral effect Effects 0.000 claims description 6
- 230000000694 effects Effects 0.000 description 14
- 238000001228 spectrum Methods 0.000 description 9
- 238000005457 optimization Methods 0.000 description 8
- 230000008901 benefit Effects 0.000 description 6
- 238000005259 measurement Methods 0.000 description 4
- 230000005654 stationary process Effects 0.000 description 4
- 230000003247 decreasing effect Effects 0.000 description 3
- 230000006735 deficit Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 239000000872 buffer Substances 0.000 description 2
- 230000001186 cumulative effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005315 distribution function Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 238000010561 standard procedure Methods 0.000 description 2
- 208000032369 Primary transmission Diseases 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000002853 ongoing effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000002459 sustained effect Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/02—Selection of wireless resources by user or terminal
Definitions
- Embodiments of the present application relate to the field of cognitive radio principle for communication systems.
- Exemplary embodiments relate to a method and system for providing a stable throughput of cognitive radio with relaying capabilities.
- cognitive radio prescribes the coexistence of licensed (or primary) and unlicensed (secondary or cognitive) radio nodes on the same bandwidth. While the first group is allowed to access the spectrum any time, the second seeks opportunities for transmission by exploiting the idle periods of primary nodes, as described in more detail in S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005, the entire content of which is incorporated herein by reference. The main requirement is that the activity of secondary nodes should be "transparent" to the primary, so as not to interfere with the licensed use of the spectrum.
- the radio channel is modeled as either busy (i.e., the primary user is active) or available (i.e., the primary user is idle) according to a Markov chain.
- Information theoretic study of cognitive radios at the physical layer that take into account the asymmetry between primary and secondary users are presented in: N. Devroye, P. Mitran and V. Tarokh, "Achievable rates in cognitive radio," IEEE Trans. Inform. Theory, vol. 52, no. 5, pp. 1813-1827, May 2006; A. Jovicic and P. Viswanath, "Cognitive radio: an information-theoretic perspective," available on-line at http://lanl.arxiv.org/PS cache/cs/pdf/0604/0604107.pdf; S.
- a cognitive network where two source-destination links, a primary link and a secondary link, share the same spectral resource has been recently investigated in the landmark paper by Devroye et al. and in Jovicic et al. from an information theoretic standpoint.
- a cognitive transmitter is assumed to have perfect prior information about the signal transmitted by a primary transmitter (see also P. Mitran, N. Devroye and V. Tarokh, "On compound channels with side information at the transmitter," IEEE Trans. Inform. Theory, vol. 52, no. 4, pp. 1745-1755, April 2006, the entire content of which is incorporated herein by reference).
- aspects of the exemplary embodiments are directed to increasing an average throughput of a secondary link of a cognitive radio system and ensuring stability of the system.
- a cognitive radio system includes: a first transmitter in communication with a first receiver via a wireless channel, for receiving a plurality of first packets, and for transmitting the first packets to the first receiver via the channel; and a second transmitter in communication with a second receiver and the first receiver via the channel, for receiving a plurality of second packets, for receiving the plurality of first packets from the first transmitter, and for transmitting the second packets to the second receiver via the channel.
- the second transmitter is configured to detect an idle state of the channel. Upon detecting the idle state of the channel, the second transmitter is configured selectively to transmit at least one of the second packets to the second receiver or to relay at least one of the first packets to the first receiver.
- the second transmitter may be configured selectively to transmit the at least one of the second packets or to relay the at least one of the first packets based on a detected state of a transmission of the at least one of the first packets to the first receiver from the first transmitter.
- the second transmitter may be configured to relay the at least one of the first packets if the transmission of the at least one of the first packets is detected to be unsuccessful.
- the second transmitter may be configured to refrain from relaying the at least one of the first packets if the transmission of the at least one of the first packets is detected to be successful.
- the first transmitter may be configured to acknowledge an acceptance of the at least one of the first packets by the second transmitter.
- the first transmitter may be configured to refrain from re-transmitting the at least one of the first packets if the transmission of the at least one of the first packets is detected to be unsuccessful and the first transmitter has acknowledged the acceptance of the at least one of the first packets by the second transmitter.
- the second transmitter may have a transmission power, and the second transmitter may be configured to ensure a service stability of the first transmitter by controlling the transmission power.
- the second transmitter may be configured to ensure a service stability of the first transmitter in selectively transmitting the at least one of the second packets to the second receiver or relaying the at least one of the first packets to the first receiver.
- a method of operating a cognitive radio system includes: directing a plurality of first packets to a first transmitter for transmission to a first receiver over a wireless channel, and to a second transmitter; directing a plurality of second packets to the second transmitter for transmission to a second receiver over the channel; transmitting at least one of the first packets from the first transmitter to the first receiver; detecting at the second transmitter an idle state of the channel; and, upon the detection of the idle state of the channel, selectively transmitting at least one of the second packets from the second transmitter to the second receiver or relaying the at least one of the first packets from the second transmitter to the first receiver.
- the step of selectively transmitting the at least one of the second packets or relaying the at least one of the first packets may be based upon a detected state of the transmission of the at least one of the first packets to the first receiver.
- the first transmitter may correspond to a licensed user of the channel and the second transmitter corresponds to an unlicensed user of the channel.
- FIG. 1 is a diagram of a system configuration according to an exemplary embodiment
- FIG. 2 is a graph showing a maximum power allowed to a secondary user versus an arrival rate to a primary user in the system configuration of FIG. 1;
- FIG. 3 is a graph showing a sensitivity of the average arrival rate to the primary user versus a detection error probability component in the system configuration of FIG. 1;
- FIG. 4a is a graph showing upper bounds of a throughput-maximizing power allowed to the secondary user versus an arrival rate to the primary user in the system configuration of FIG. 1;
- FIG. 4b is a graph showing a maximal throughput of the secondary user versus the arrival rate to the primary user in the network configuration of FIG. 1;
- FIG. 5 is a diagram of a system configuration according to another exemplary embodiment
- FIG. 6a is a graph showing a maximal power allowed to a secondary user versus an arrival rate to a primary user in the system configuration of FIG. 5;
- FIG. 6b is a graph showing a service probability of the secondary user versus the arrival rate to the primary user in the system configuration of FIG. 5;
- FIG. 6c is a graph showing a maximal throughput of the secondary user and the arrival rate to the primary user in the system configuration of FIG. 5;
- FIG. 7 is a graph showing a maximal throughput of the secondary user in the network configuration of FIG. 5.
- Embodiments described herein relate to a scenario with two single-user links, one licensed to use the spectral resource (primary) and one unlicensed (secondary or cognitive).
- the cognitive radio principle the activity of the secondary link is required not to interfere with the performance of the primary. Therefore, it is understood herein that the cognitive link accesses the channel only when sensed idle.
- the exemplary embodiments consider: 1) random packet arrivals; 2) sensing errors due to fading at the secondary link; and 3) power allocation at a secondary transmitter based on long-term measurements.
- the maximum stable throughput of the cognitive link (in packets/slot) is derived for a fixed throughput selected by the primary link.
- the secondary transmitter is configured to act as a "transparent" relay for the primary link.
- packets that are not received correctly by the intended destination may be decoded successfully by the secondary transmitter. The latter can then queue and forward these packets to the intended receiver.
- Stable throughput of the secondary link with relaying may be derived under the same (or similar) conditions as noted above.
- certain features (or benefits) of relaying may depend on the topology (e.g., average channel powers) of the network.
- the cognitive interference channel as shown in FIG. 1 is further explored by accounting for measurement errors relating to a primary transmitter 14 and random packet arrivals.
- the primary transmitter 14 and a secondary transmitter 24 are equipped with respective queues 12, 22 of a certain size (e.g., an infinite size) and time is slotted.
- the secondary transmitter (or node) 24 is able to infer the timing of the primary link from the received signal during the observation phase.
- the cognitive node 24 senses channel 30 and, if detected idle, transmits a packet (if it has any in queue 22).
- Detection of the primary activity may incur in (or encounter) errors due to impairments on the wireless fading channel 30, thus causing possible interference from the secondary link 20 to the primary link 10. Since the cognitive principle is based on the idea that the presence of the secondary link 20 should be "transparent" to the primary link 10, appropriate countermeasures (e.g., power control) is adopted at the secondary node 24.
- appropriate countermeasures e.g., power control
- stability of the system i.e., fmiteness of the queues 12, 22 in the system at all times
- the maximum average throughput that the secondary link 20 can sustain while guaranteeing stability of the system is determined.
- a secondary transmitter 54 provides a relaying capability (see, for example, FIG. 5).
- the direct channel on the primary link 40 is weak (or weaker) with respect to the channel from the primary transmitter 44 to the secondary transmitter 54.
- having packets relayed by the secondary transmitter 54 can help emptying the queue 42 of the primary transmitter 44, thus creating transmitting opportunities for the secondary.
- relaying of primary packets by the cognitive transmitter 54 increases the stable throughput of the secondary link 50 (for a fixed selected throughput of the primary link 40).
- a single- link primary communication 10 is active and a secondary (cognitive) single link 20 is interested in employing the spectral resource 30 whenever available.
- the system encompasses both physical layer parameters and MAC dynamics as follows.
- Both primary and secondary transmitting nodes 14, 24 have a buffer 12, 22 of a certain capacity (e.g., an infinite capacity) to store incoming packets. Time is slotted and transmission of each packet takes one slot (all packets have the same number of bits).
- the packet arrival processes at each node are independent and stationary with mean ⁇ ? [packets/slot] for the primary user 14 and ⁇ s [packets/slot] for the cognitive 24 (see FIG. 1). Due to impairments on the radio channel 30 (fading, for example), a packet can be received in error by the intended destination, which requires retransmission.
- ACK ACKnowledgement
- NACK Not-ACKnowledgment
- the primary link 10 employs the channel 30 whenever it has some packets to transmit in its queue 12.
- the secondary (cognitive) transmitter 24 senses the channel 30 in each slot and, if it detects an idle slot, transmits a packet (if there is any) from its queue 22.
- the slot is sufficiently long so as to allow an appropriate detection time interval for the cognitive node 24.
- the secondary transmitter 24 may incur in (or encounter) errors while detecting the presence of the primary user 14.
- the MAC layer will be configured to allow the secondary node to act as a relay for the primary user (see, for example, FIG. 5).
- radio propagation between any pair of nodes is assumed to be affected by independent stationary Rayleigh flat-fading channels /?,(t) with E[ ⁇ h t ⁇ t)
- 2 ] 1 (t denotes time and runs over time-slots).
- 2 is P[
- 2 ⁇ x] 1 - exp(-x).
- the channel is constant in each slot (block-fading).
- the average channel power gain (due to shadowing and path loss) is denoted as ⁇ t , where i reads " P " for the primary connection, " S “ for the secondary, " SP “ for the channel between secondary transmitter and primary receiver and " PS " for the channel between primary transmitter and secondary transmitter.
- the power transmitted by the secondary node (when active) is P s ⁇ 1.
- transmission of a given packet is considered successful if the instantaneous received signal-to-noise ratio (SNR) ⁇ t ⁇ ⁇ (t)
- 2 P 1 is above a given threshold ⁇ t , that is fixed given the choice of the transmission mode. Therefore, the probability of outage (unsuccessful packet reception) on the primary or secondary link reads (i equals " P " or " S ")
- the primary and secondary links can employ transmission modes with different signal-to-noise ratio requirements, ⁇ p ⁇ ⁇ s .
- the cognitive node is able to correctly detect the transmission of the primary user if the instantaneous SNR ⁇ PS ⁇ h PS
- 2 is larger than a threshold a (recall that P p 1 ) . It follows that the probability of error in the detection process is
- the secondary transmitter is able to select its transmission power P s ⁇ 1 based on the statistics of the channels ( ⁇ p , ⁇ s , ⁇ ps , ⁇ SP ) and the system parameters ⁇ a, ⁇ P , ⁇ s , ⁇ p ) towards the following two (potentially) conflicting goals:
- the "transparency" of the cognitive node to the primary user is here defined in terms of stability of the queue of the primary user. That is, as a result of the activity of the secondary, the primary node is guaranteed that its queue will remain stable. On the contrary, in certain embodiments, no constraints are imposed on the increase in the average delay experience by the primary. As such, certain embodiments are suitable for delay-insensitive applications;
- the system parameter ⁇ p is part of the prior knowledge available at the secondary link about the primary communication.
- the throughput ⁇ p selected by the primary link can be estimated by observing the fraction of idle slots, and measuring the ACK/ NACK messages sent by the secondary receiver.
- the described embodiments below relate to the maximum throughput (i.e., average arrival rate) ⁇ s that can be sustained by the secondary node for a given (fixed) throughput ⁇ p , provided that the system remains stable.
- the primary user selects its own arrival rate ⁇ p , ignoring the presence of a secondary node. It is then the task of the cognitive user to select its transmission mode (for example, the power P s ) in order to exploit as much as possible the idle slots left available by the primary activity while not affecting stability of the system.
- Stability is defined as the state where all the queues in the system are stable.
- a queue is said to be stable if and only if the probability of being empty remains nonzero for time t that grows to infinity:
- the average departure rate ⁇ t is defined as the maximum stable throughput of the /th queue.
- the system from the point of view of the primary transmitter is considered.
- the primary link is unaware of the presence of a secondary node willing to use the bandwidth whenever available. Therefore, as far as the primary node is concerned, the system consists of a single queue (its own), characterized by a stationary departure rate (due to the stationarity of the channel fading process h p (t) ) with
- the rate //TM x is the maximum stable throughput as "perceived" by the primary user.
- the primary user is allowed to select any rate X p that satisfies:
- the cognitive node senses the channel at each slot and, if it measures no activity from the primary, it starts transmitting with power P s ⁇ 1 (provided that there is at least one packet in queue). However, due to errors in the detection process, the secondary node starts (or may start) transmitting (with the same power P s ) even in slots occupied by the primary transmission with probability P 6 (see Equation (2)) (again, provided that there is at least one packet in its queue). This causes interference to the communication on the primary link, which in turns reduces the actual throughput of the primary.
- P s ⁇ 1 provided that there is at least one packet in queue
- Proposition 1 Given the channel parameters ( ⁇ p , ⁇ ps , ⁇ SP ) and system parameters (a, ⁇ P , ⁇ P ):
- the Loynes' theorem cannot be directly employed to investigate stability of the system.
- a transformed system referred to as dominant. This has the same stability properties as the original system and, at the same time, presents non-interacting queues.
- the dominant system can be constructed by modifying the original setting described herein as follows. If Q s (t) - 0 , the secondary node transmits "dummy" packets whenever it senses an idle channel, thus continuing to possibly interfere with the primary user irrespective of whether its queue is empty or not.
- this dominant system is stable if and only if the original system is.
- the queues of the dominant system have always larger size than the ones of the original system (thus if the dominant system is stable, the original is stable).
- the probability of sending a "dummy" packet in the dominant system is zero and the two systems are indistinguishable (therefore, if the dominant system is unstable, the original is unstable).
- the departure rates are stationary processes, and thus Loynes 1 theorem is applicable to draw conclusions about the stability of the original system.
- a large value for probability P e is selected here , for example, to guarantee a better visualization of the results shown in FIG. 2. It will be appreciated by one skilled in the art that the performance of the scheme for other values of the parameters can be qualitatively inferred from the presented results.
- Proposition 2 Given the channel parameters ( ⁇ P ,y s ,y PS , ⁇ SP ) and system parameters (a, ⁇ p , ⁇ s , ⁇ p ), under the understanding that the stability of the queue of the primary user is preserved ("transparency" of the cognitive node), the maximum stable throughput of the cognitive user is obtained by solving the following optimization problem:
- Equation (7) The optimization problem as set forth in Equation (8) requires a one-dimensional search and can be solved by using standard methods, such as those described in D. P. Bertsekas, Nonlinear programming, Athena Scientific, 2003, the entire content of which is incorporated herein by reference.
- P fa a non-zero probability of false alarm
- a result is a scaling of the achievable throughput ⁇ s ⁇ P s ) in Equation (9) by 1 - P fa . Further details regarding Proposition 2 above are presented later.
- FIG. 4a shows both the upper bound (see Equation (6)) (dashed lines) and the throughput-maximizing power P s
- FIG. 4b shows the corresponding maximum throughput ⁇ s .
- Equation (9) the maximum throughput ⁇ s decreases linearly (or substantially linearly) with ⁇ p as long as the optimal P s equals 1.
- the maximum stable throughput //TM x (l) in Equation (5) is shown, accounting for the case where no sensing errors occur at the cognitive link.
- the secondary node is allowed to forward packets of the primary user that have not been successfully received by the intended destination.
- the system is designed so as not to violate the cognitive radio principle that prescribes secondary nodes to be "invisible" to the primary (see, for example, FIG. 5 for an illustration of the system).
- FIG. 5 for an illustration of the system.
- the propagation channel from the primary transmitter 44 to the secondary transmitter 54 ( ⁇ ps ) is advantageous with respect to the direct channel channel ⁇ p , having packets relayed by the secondary 54 can help emptying the queue 42 of the primary 44. This creates transmitting opportunities for the secondary. It will be appreciated by one skilled in the art that the increased number of available slots for the cognitive node 54 has to be shared between transmission of own packets and relayed packets. Assessing the features (or benefits) of this modified structure is then not trivial and will be described in more detail below.
- the MAC layer model presented in Sec. II is modified in order to account for the added relaying capability at the secondary node 54.
- the main assumptions e.g., infinite buffers, slotted transmission, stationarity of the arrival processes, channel sensing by the secondary node with detection error probability P e in Equation (2)
- the only differences concern the transmission strategy of the cognitive node and details concerning the exchange of ACK/ NACK messages.
- the cognitive node 54 has two queues, queue 52 collecting its own packets (Q s (t) ) and queue 51 containing packets received by the primary transmitters to be relayed to the primary destination ( Q ps (t) ).
- a packet transmitted by the primary node 44 can in fact be erroneously received by the intended destination, e.g., receiver 46, (that signals the event with a NACK message) but correctly received by the secondary transmitter 54 (that sends an ACK message).
- the primary source 44 drops the packet from its queue 42, as if correctly received by the destination 46, and the secondary 54 puts it in its queue 51 Q ps (t) .
- This a small deviation from the cognitive radio principle of transparency of the secondary user to the primary: in fact, because of the secondary activity, the primary might receive two acknowledgments for the same packet.
- the secondary node 54 whenever the secondary node 54 senses an idle slot (and it does so with error probability P e in Equation (2)), it transmits a packet from queue 51 Q ps (t)
- the secondary node 54 is able to select its transmission power P s ⁇ 1 and the probability ⁇ based on the statistics of the channels ( ⁇ p , ⁇ s , ⁇ SP , ⁇ PS ) and the system parameters (a, ⁇ p , ⁇ s , ⁇ p ) towards the following goals: (i) retaining the stability of the queue of the primary node ("transparency" of the cognitive node); (ii) maximizing its own stable throughput . [0068] B.
- the primary user is oblivious to the activity of the secondary. Therefore, as in the case of no relaying, it selects an average rate in the range set forth in Equation (4) (see Sec. HI(B) above).
- the maximum power P s that the cognitive node is allowed to transmit in order to guarantee stability of the queue of the primary is derived below.
- Proposition 3 Given the channel parameters ( ⁇ p , ⁇ ps , ⁇ sp ) and system parameters (a, ⁇ p , ⁇ P ):
- relaying enhances the average departure rate of the primary (by ⁇ p ), thus increasing the range of primary user throughputs at which the cognitive node is allowed to transmit at full power.
- Proposition 4 Given the channel parameters ( ⁇ p , ⁇ PS , ⁇ SP , ⁇ s ) and system parameters (a, ⁇ p , ⁇ s , ⁇ p ), under the assumption that the stability of the queue of the primary user is preserved ("transparency" of the cognitive node), the maximum stable throughput of the cognitive user is defined by the following optimization problem max ⁇ s (P s )
- Equation (13) the first constraint limits the transmitted power, according to the results in Proposition 3, so as to ensure the stability of the queue of the primary Q P (t) .
- the optimization problem (13) might not have feasible points for some ⁇ p due to the constraint on the stability of Q PS (t) , i.e., on ⁇ .
- a possible solution to this problem could be to let the secondary transmitter accept only a fraction, say 0 ⁇ / ⁇ 1 of the packets successfully received by the primary (and erroneously decoded at the intended destination).
- An optimization problem similar to (13) could be set up in this case, whereby the secondary has the degree of freedom of choosing power P s and probabilities ⁇ and /..
- FIGS. 6a, 6b and 6c show the optimal power P s , the optimal probability ⁇ and the maximum stable throughput ⁇ s obtained from Proposition 4 versus the throughput selected by the primary node ⁇ p .
- the average channel gain to and from the "relay" are 6dB better than the direct primary link ⁇ p .
- queue 51 Q PS (t) in this case is always stabilizable, i.e., the optimal probability ⁇ resulting from
- Equation (13) is less than one in the range of interest.
- FIG. 6c compares the maximum throughput for the no-relaying case (Proposition 2) and for the relaying case (Proposition 1), showing the relevant advantages of relaying for sufficiently large ⁇ p .
- FIG. 7 Whenever there is a good channel ⁇ PS to the secondary transmitter 54 and a weak direct channel ⁇ p , most of the traffic is redirected to the secondary. On one hand, this helps increasing the available slots for transmission by the secondary. On the other hand, if not supported by a sufficiently good channel from the secondary transmitter 54 to the primary destination 46, ⁇ sp , the secondary is not able to deliver the extra traffic coming from the primary. Therefore, the optimization problem (13) does not have any feasible solution, and the throughput of the secondary node is zero. A solution to this problem could be the implementation of the technique explained above, whereby the secondary only accepts a fraction of packets from the primary.
- a cognitive interference channel comprising one licensed (primary) link and one unlicensed (secondary or cognitive) link
- the activity of the secondary link has been considered “transparent" to the primary if it does not affect stability of the queue of the latter.
- unavoidable errors in sensing the activity of the primary link have been shown to limit the maximum stable throughput achievable by the secondary link.
- a modification of the original cognitive interference channel has been proposed, where the secondary transmitter acts as a "transparent" relay for the traffic of the primary. Numerical results show that the advantages of such a solution (may) depend on the topology of the network.
- O C D (t) is the complement of O D (t);
- the signal-to-interference-plus-noise ratio (SINR) at the primary receiver reads:
- O 5 (t) is the event of a successful transmission by the secondary user (to its own receiver), whose probability is 1 -P OU( 5 (see Equation (I));
- a 5 ( ⁇ ) denotes the event that slot t is available for transmission by the cognitive node. Since the queue of the primary user is stationary by construction, the slot availability process for the cognitive node (defined by A 5 ( ⁇ )) is stationary (see Rao et al.). Moreover, due to the considered MAC model, the probability of availability corresponds to the probability of having zero packets in the queue of the primary user (Little's theorem, as described in D. Bertsekas and R. Gallager, Data networks, Prentice-Hall 1987, the entire content of which is incorporated herein by reference):
- Equation (21) depend on the transmission power P s in opposite ways, the first decreasing and the second increasing for increasing P s .
- Equation (9) By plugging eqns. (20), (1) and (17) in Equation (21), algebraic computations result in Equation (9), which is shown to be concave in P s .
- Proposition 2 is a direct consequence of Proposition 1 and Loynes' theorem.
- Equation (22) differs from the case of no relaying (see Equation (1) ) in that here transmission by the primary node is considered successful when the packet is correctly received either by the intended destination (with probability exp(- ⁇ P l ⁇ P )) or by cognitive node (with probability exp(- ⁇ p / ⁇ PS )). Accordingly, X p (t) is a stationary process with mean
- Equation (22) the average departure rate at the primary in the considered relaying scenario reads as Equation (15), having defined A ⁇ p as in Equation (10).
- Equation (15) the average departure rate at the primary in the considered relaying scenario reads as Equation (15), having defined A ⁇ p as in Equation (10).
- Equation (15) the average departure rate at the primary in the considered relaying scenario reads as Equation (15), having defined A ⁇ p as in Equation (10).
- Equation (17) we conclude that cooperation leads to an additive increase of the throughput of the primary user which is independent of P s .
- the latter condition reflects the fact that the delivery rate ⁇ p r '(P s ) measures the packets departing from the primary, not the traffic actually relayed to the destination. From the discussion above, Proposition 3 follows.
- Equation (24) a ⁇ ⁇ P (see Sec. II).
- Optimizing the stable throughput of the cognitive node amounts to maximizing ⁇ s (P s , ⁇ ) with respect to ⁇ and P 5 since from the Lo ynes' theorem ⁇ s ⁇ ⁇ s ⁇ P s , ⁇ ).
- the maximum achievable throughput ⁇ s (P s , ⁇ ) (27) is a decreasing function of ⁇ . Therefore, in order to maximize ⁇ s (P s , ⁇ ) , ⁇ is set equal to its minimum value (see Equation (26)), thus obtaining ⁇ s ⁇ ⁇ s (P s ), where ⁇ s (P s ) is in Equation (14). From the discussion above, Proposition 4 follows.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009539825A JP2011508463A (en) | 2006-12-11 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relay capability |
GB0911630A GB2457635B (en) | 2006-12-11 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relaying capabilities |
CN2007800452204A CN101627586B (en) | 2006-12-11 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relaying capabilities |
AT07859156T ATE483300T1 (en) | 2006-12-11 | 2007-12-21 | METHOD AND SYSTEM FOR STABLE PERFORMANCE OF COGNITIVE RADIO WITH RELAY CAPABILITIES |
KR1020127003328A KR101368075B1 (en) | 2007-12-21 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relaying capabilities |
DE602007009571T DE602007009571D1 (en) | 2006-12-11 | 2007-12-21 | PROCESS AND SYSTEM FOR STABLE THROUGHPUT OF COGNITIVE RADIO WITH RELAYABILITIES |
EP07859156A EP2103058B1 (en) | 2006-12-11 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relaying capabilities |
KR1020097014210A KR101187527B1 (en) | 2007-12-21 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relaying capabilities |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US87414506P | 2006-12-11 | 2006-12-11 | |
US60/874,145 | 2006-12-11 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008072082A2 true WO2008072082A2 (en) | 2008-06-19 |
WO2008072082A3 WO2008072082A3 (en) | 2008-08-21 |
Family
ID=39493890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2007/004052 WO2008072082A2 (en) | 2006-12-11 | 2007-12-21 | Method and system for stable throughput of cognitive radio with relaying capabilities |
Country Status (8)
Country | Link |
---|---|
US (1) | US8144723B2 (en) |
EP (1) | EP2103058B1 (en) |
JP (1) | JP2011508463A (en) |
CN (1) | CN101627586B (en) |
AT (1) | ATE483300T1 (en) |
DE (1) | DE602007009571D1 (en) |
GB (1) | GB2457635B (en) |
WO (1) | WO2008072082A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010005838A3 (en) * | 2008-07-11 | 2010-03-11 | Qualcomm Incorporated | Peer-to-peer device identification and cognitive communication |
KR101212171B1 (en) | 2009-05-06 | 2012-12-13 | 인하대학교 산학협력단 | Method And Apparatus for Allocating Radio Resource |
US10993231B2 (en) | 2017-05-18 | 2021-04-27 | Electronics And Telecommunications Research Institute | Method and device for operation based on multiple channels in sensor network |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8509158B2 (en) * | 2005-09-26 | 2013-08-13 | The Directv Group, Inc. | Reconfigurable notched spectrum for wireless data transmission |
US20090275286A1 (en) * | 2008-04-30 | 2009-11-05 | Motorola, Inc. | Utilization of cognitive radios with mobile virtual private network (mvpn) solutions |
US9198142B2 (en) * | 2008-06-04 | 2015-11-24 | Futurewei Technologies, Inc. | Transmit power control for dynamic spectrum access |
US8711912B2 (en) * | 2008-07-10 | 2014-04-29 | Agency For Science, Technology And Research | Method, device and computer readable medium for determining whether transmission signals are present in received signals |
CN101771476B (en) * | 2009-01-06 | 2013-04-24 | 华为技术有限公司 | Frequency spectrum access method and device of secondary users in cognitive radio |
WO2010111635A1 (en) * | 2009-03-27 | 2010-09-30 | Regents Of The University Of Minnesota | Transmit opportunity detection |
US8213868B2 (en) * | 2009-04-17 | 2012-07-03 | Lingna Holdings Pte., Llc | Exploiting multiple antennas for spectrum sensing in cognitive radio networks |
US8160004B2 (en) * | 2009-06-30 | 2012-04-17 | Motorola Solutions, Inc. | Method for optimizing spatial diversity gain of a set of nodes used for cooperative sensing |
US20120224526A1 (en) * | 2009-11-18 | 2012-09-06 | Nec Corporation | Relay apparatus, and relay method and program |
CN101800623B (en) * | 2010-01-29 | 2012-08-15 | 华中科技大学 | Throughput-maximized cognitive radio system |
WO2011127087A1 (en) | 2010-04-06 | 2011-10-13 | University Of Notre Dame Du Lac | Sequence detection methods, devices, and systems for spectrum sensing in dynamic spectrum access networks |
US8442067B2 (en) * | 2010-08-30 | 2013-05-14 | International Business Machines Corporation | Using gathered system activity statistics to determine when to schedule a procedure |
GB2492324A (en) * | 2011-06-22 | 2013-01-02 | Toshiba Res Europ Ltd | Using cognitive radio for relaying in a wireless communication network |
CN102355729B (en) * | 2011-06-29 | 2014-03-12 | 中国人民解放军理工大学 | Maximum throughput resource distribution method in cooperative and cognitive single-input multiple-output (SIMO) network |
US9054760B2 (en) * | 2011-09-25 | 2015-06-09 | Interdigital Patent Holdings, Inc. | Wireless data transmission including assist signals |
CN103269488B (en) * | 2013-04-23 | 2016-07-06 | 上海交通大学 | Based on maximum and speed collaborative communication method in cognition wireless network |
US9552222B2 (en) | 2015-06-04 | 2017-01-24 | International Business Machines Corporation | Experience-based dynamic sequencing of process options |
CN106358215A (en) * | 2016-08-31 | 2017-01-25 | 上海交通大学 | Data caching based relay network cooperation method |
CN106603140B (en) * | 2016-12-12 | 2019-07-16 | 哈尔滨工程大学 | The optimal relay cooperative transmission method of wireless energy acquisition cognitive radio |
US10778280B2 (en) | 2017-12-06 | 2020-09-15 | Electronics And Telecommunications Research Institute | Operation method of communication node in network supporting low power communication |
US11196512B2 (en) * | 2018-06-29 | 2021-12-07 | Qualcomm Incorporated | Resolving decodability for subsequent transmissions whose throughput exceeds a threshold |
US10789801B2 (en) * | 2018-07-27 | 2020-09-29 | Hart Intercivic, Inc. | Election voting system using printed vote records |
CN113347728B (en) * | 2021-06-23 | 2022-12-06 | 西安邮电大学 | Method and device for optimizing throughput of backscatter network and storage medium |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2591467B2 (en) * | 1994-04-18 | 1997-03-19 | 日本電気株式会社 | Access method |
AU2002345190A1 (en) * | 2001-06-28 | 2003-03-03 | King's College London | Electronic data communication system |
GB0316692D0 (en) * | 2003-07-17 | 2003-08-20 | Koninkl Philips Electronics Nv | Enhanced multi-path for mimo devices |
US20050058153A1 (en) * | 2003-09-15 | 2005-03-17 | John Santhoff | Common signaling method |
US8699525B2 (en) * | 2004-09-10 | 2014-04-15 | Interdigital Technology Corporation | Method for sending an acknowledgement to an ingress mesh point in a mesh network and a medium access control frame format |
US20060084444A1 (en) * | 2004-10-20 | 2006-04-20 | Nokia Corporation | System and method utilizing a cognitive transceiver for ad hoc networking |
JP4531581B2 (en) * | 2005-02-09 | 2010-08-25 | 株式会社エヌ・ティ・ティ・ドコモ | Control device in wireless communication transmitting / receiving device and wireless communication transmitting / receiving method |
US7746815B2 (en) * | 2005-09-23 | 2010-06-29 | Samsung Electronics Co., Ltd | Hybrid forwarding apparatus and method for cooperative relaying in an OFDM network |
US8509790B2 (en) * | 2006-01-31 | 2013-08-13 | Tommas Jess Christensen | Multi-speed mesh networks |
CN100471093C (en) * | 2006-04-13 | 2009-03-18 | 电子科技大学 | Chain circuit building method in cognitive radio field |
CN100373980C (en) * | 2006-04-26 | 2008-03-05 | 电子科技大学 | Parallel frequency spectrum distribution method for preventing interference in cognitive radio system |
-
2007
- 2007-12-11 US US12/001,480 patent/US8144723B2/en not_active Expired - Fee Related
- 2007-12-21 DE DE602007009571T patent/DE602007009571D1/en active Active
- 2007-12-21 CN CN2007800452204A patent/CN101627586B/en not_active Expired - Fee Related
- 2007-12-21 EP EP07859156A patent/EP2103058B1/en not_active Not-in-force
- 2007-12-21 GB GB0911630A patent/GB2457635B/en not_active Expired - Fee Related
- 2007-12-21 JP JP2009539825A patent/JP2011508463A/en active Pending
- 2007-12-21 WO PCT/IB2007/004052 patent/WO2008072082A2/en active Application Filing
- 2007-12-21 AT AT07859156T patent/ATE483300T1/en not_active IP Right Cessation
Non-Patent Citations (18)
Title |
---|
A. JOVICIC; P. VISWANATH, COGNITIVE RADIO: AN INFORMATION-THEORETIC PERSPECTIVE, Retrieved from the Internet <URL:lanl.arxiv.org/PS cache/cs/pdf/0604/0604107.pdf> |
A. SAHAI; N. HOVEN; R. TANDRA: "Some fundamental limits on cognitive radio", PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, October 2004 (2004-10-01) |
C. CORDEIRO; K. CHALLAPALI; D. BIRRU; SAI SHANKAR N: "IEEE 802.22: the first worldwide wireless standard based on cognitive radio", PROC. IEEE DYSPAN, 2005, pages 328 - 337, XP010855130, DOI: doi:10.1109/DYSPAN.2005.1542649 |
D. BERTSEKAS; R. GALLAGER: "Data networks", 1987, PRENTICE-HALL |
G. GANESAN; Y. LI: "Cooperative spectrum sensing in cognitive radio networks", PROC. DYSPAN, 2005, pages 137 - 143 |
J. NEEL; J. REED; R. GILLES: "The Role of Game Theory in the Analysis of Software Radio Networks", PROC. SDR FORUM TECHNICAL CONFERENCE, 2002 |
KYOUNGHWAN LEE; A. YENER: "On the achievable rate of three-node cognitive hybrid wireless networks", PROC. INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, vol. 2, 2005, pages 1313 - 1318, XP010888150, DOI: doi:10.1109/WIRLES.2005.1549602 |
M. SHARIF; B. HASSIBI: "On the capacity ofMIMO broadcast channels with partial side information", IEEE TRANS. INFORM. THEORY, vol. 51, no. 2, February 2005 (2005-02-01), pages 506 - 522, XP011125852, DOI: doi:10.1109/TIT.2004.840897 |
N. DEVROYE; P. MITRAN; V. TAROKH: "Achievable rates in cognitive radio", IEEE TRANS. INFORM. THEORY, vol. 52, no. 5, May 2006 (2006-05-01), pages 1813 - 1827 |
P. MITRAN; N. DEVROYE; V. TAROKH: "On compound channels with side information at the transmitter", IEEE TRANS. INFORM. THEORY, vol. 52, no. 4, April 2006 (2006-04-01), pages 1745 - 1755 |
R. M. LOYNES: "The stability of a queue with non- independent inter-arrival and service times", PROC. CAMBRIDGE PHILOS. SOC., vol. 58, 1962, pages 497 - 520 |
R. RAO; A. EPHREMIDES: "On the stability of interacting queues in a multi-access system", IEEE TRANS. INFORM. THEORY, vol. 34, September 1988 (1988-09-01), pages 918 - 930 |
RAO; W. LUO; A. EPHREMIDES ET AL.: "Stability of interacting queues in random-access systems", IEEE TRANS. INFORM. THEORY, vol. 45, no. 5, July 1999 (1999-07-01), pages 1579 - 1587, XP011027396 |
S. A. JAFAR; S. SRINIVASA, CAPACITY LIMITS OF COGNITIVE RADIO WITH DISTRIBUTED AND DYNAMIC SPECTRAL ACTIVITY, Retrieved from the Internet <URL:arxiv.org/abs/cs.IT/0509077> |
S. HAYKIN: "Cognitive radio: brain-empowered wireless communications", IEEE JOURNAL ON SELECTED AREAS COMMUN., vol. 23, no. 2, February 2005 (2005-02-01), pages 201 - 220, XP011126474, DOI: doi:10.1109/JSAC.2004.839380 |
S. M. MISHRA; A, SAHAI; R. W. BRODERSEN: "Cooperative sensing among cognitive radio", PROC. IEEE ICC, 2006 |
Y. CHEN; Q. ZHAO; A. SWAMI: "Joint design and separation principle for opportunistic spectrum access", PROC. ASILOMAR CONF. ON SIGNALS, SYSTEMS AND COMPUTERS, 2006 |
Y. XING; R. CHANDRAMOULI; S. MANGOLD; S. SHANKAR N: "Dynamic spectrum access in open spectrum wireless networks", IEEE JOUM. SELECTED AREAS COMMUN., vol. 24, 3 March 2006 (2006-03-03), pages 626 - 637 |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010005838A3 (en) * | 2008-07-11 | 2010-03-11 | Qualcomm Incorporated | Peer-to-peer device identification and cognitive communication |
EP2365726A1 (en) * | 2008-07-11 | 2011-09-14 | Qualcomm Incorporated | Peer-to-peer device identification and cognitive communication |
JP2011527857A (en) * | 2008-07-11 | 2011-11-04 | クゥアルコム・インコーポレイテッド | Peer-to-peer device identification and cognitive communication |
KR101315231B1 (en) * | 2008-07-11 | 2013-10-10 | 퀄컴 인코포레이티드 | Peer-to-peer device identification and cognitive communication |
KR101325660B1 (en) * | 2008-07-11 | 2013-11-05 | 퀄컴 인코포레이티드 | Peer-to-peer device identification and cognitive communication |
JP2013243777A (en) * | 2008-07-11 | 2013-12-05 | Qualcomm Inc | Peer-to-peer device identification and cognitive communication |
US8964653B2 (en) | 2008-07-11 | 2015-02-24 | Qualcomm Incorporated | Peer-to-peer device identification and cognitive communication |
US9900866B2 (en) | 2008-07-11 | 2018-02-20 | Qualcomm Incorporated | Peer-to-peer device identification and cognitive communication |
KR101212171B1 (en) | 2009-05-06 | 2012-12-13 | 인하대학교 산학협력단 | Method And Apparatus for Allocating Radio Resource |
US10993231B2 (en) | 2017-05-18 | 2021-04-27 | Electronics And Telecommunications Research Institute | Method and device for operation based on multiple channels in sensor network |
Also Published As
Publication number | Publication date |
---|---|
US20080160927A1 (en) | 2008-07-03 |
US8144723B2 (en) | 2012-03-27 |
EP2103058A2 (en) | 2009-09-23 |
DE602007009571D1 (en) | 2010-11-11 |
EP2103058B1 (en) | 2010-09-29 |
JP2011508463A (en) | 2011-03-10 |
GB2457635A (en) | 2009-08-26 |
GB2457635B (en) | 2011-03-30 |
WO2008072082A3 (en) | 2008-08-21 |
CN101627586A (en) | 2010-01-13 |
GB0911630D0 (en) | 2009-08-12 |
CN101627586B (en) | 2012-08-15 |
ATE483300T1 (en) | 2010-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2103058B1 (en) | Method and system for stable throughput of cognitive radio with relaying capabilities | |
Simeone et al. | Stable throughput of cognitive radios with and without relaying capability | |
US10708787B2 (en) | Mesh islands | |
Simeone et al. | Cooperation and cognitive radio | |
JP3066328B2 (en) | Wireless communication method and wireless communication system | |
US8238262B2 (en) | Method for sending acknowledgement messages within a wireless communication network | |
US8724651B2 (en) | Radio network system, radio communication method, and radio communication device | |
Devaraj et al. | Adaptive cluster‐based heuristic approach in cognitive radio networks for 5G applications | |
US9125083B2 (en) | Multiple access communication | |
Jamal | Design and Performance of Wireless Cooperative Relaying | |
Mittal et al. | RTSS/CTSS: Mitigation of exposed terminals in static 802.11-based mesh networks | |
Gambini et al. | Packet-wise vertical handover for unlicensed multi-standard spectrum access with cognitive radios | |
Bao et al. | Stable throughput and delay performance in cognitive cooperative systems | |
Yi et al. | A new cooperative communication MAC strategy for wireless ad hoc networks | |
Gambini et al. | Cognitive radio with secondary packet-by-packet vertical handover | |
Bao et al. | Stable throughput analysis of multi-user cognitive cooperative systems | |
KR101187527B1 (en) | Method and system for stable throughput of cognitive radio with relaying capabilities | |
Mishra et al. | Systematic review of congestion handling techniques for 802.11 wireless networks | |
Chakraborty et al. | Evaluating transport protocol performance over a wireless mesh backbone | |
Escrig | DMT optimal cooperative protocols with destination-based selection of the best relay | |
Simeone et al. | Stability analysis of the cognitive interference channel | |
Zhang et al. | Topology-transparent reservation time division multiple access protocol with MIMO links in multihop ad hoc networks | |
El Shafie et al. | Maximum throughput of a secondary user cooperating with an energy-aware primary user | |
Simeone et al. | Stable throughput of cognitive radios with relaying capability | |
Hamza et al. | Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780045220.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07859156 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase |
Ref document number: 2009539825 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 0911630 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20071221 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 0911630.2 Country of ref document: GB |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007859156 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020097014210 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020127003328 Country of ref document: KR |