SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
DOI : 10.5121/ijmnct.2017.7201 1
SECONDARY USER UNDERCOVER COOPERATIVE
DYNAMIC ACCESS PROTOCOL FOR OVERLAY
COGNITIVE RADIO NETWORKS
A. Masri1
, Y. A. S. Dama1, 2
, N Eya2
, R. A. Abd-Alhameed2
, N. Odeh1
, F.Hasan1
,
A. Mousa1
, and J. M. Noras2
1
Dept. of Telecommunication Engineering, An-Najah National University, Nablus,
Palestine
2
School of Engineering and Informatics, University of Bradford, Bradford, UK
ABSTRACT
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is
proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result
of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated
with network scenarios.
Keywords
Cognitive Radio, Dynamic Spectrum Access, Resource Management, Cooperative Overlay.
1. INTRODUCTION
Recently a new regulatory model has been considered to open licensed (Primary) frequency
spectrum to unlicensed (Secondary) access, with the aims of improving spectrum utilization, and
freeing up space for new radio technologies. This new model requires the development of
Cognitive Radio (CR) devices that are able to access the primary bands without causing any
harmful interference to Primary Users (PUs). Several such schemes have been suggested, which
can be classified as Interweave, Underlay or Overlay access paradigms [1].
The Overlay access scheme authorizes secondary and primary concurrent access over the same
channel; the secondary power is split into two parts, one for the secondary access link and the
other part to relay or assist the primary communication [2, 3, 4, 5]. With the correct choice of the
power splitting ratio, the potential reduction in a PU’s Signal to Interference plus Noise Ratio
(SINR) due to the secondary user is exactly compensated by the relaying assistance power.
Although the overlay access paradigm can outperform other paradigms in terms of capacity, it
suffers from several practical limitations [3, 6, 7], of which the most stringent is that the
Secondary User (SU) has to maintain synchronization with the primary system to guarantee
seamless secondary co-existence within it. Such a synchronization requirement is already
achieved for the DVB-T Single Frequency Network (SFN) based Overlay CR in [4], where the
primary signal is sent via satellite to major transmitters which apply the required delays. Thus, a
potential secondary transmitter might also gain access to the primary signal, keeping time and
frequency synchronization with the primary transmitters and therefore join the primary network
using the Overlay scheme [8].
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
2
Recent work on the Overlay CR access paradigm in [1-4, 6, 7, 9, 10] assumes perfect
synchronization between secondary and primary users, and adopts the simple network scenario
shown in Fig. 1. In contrast, the recent work of Marsi et al. [5], proposed a distributed
synchronization protocol that ensures that secondary users are synchronized with the primary
transmissions: however, this is also applied in the ideal scenario of Fig. 1.
In the conventional overlay cognitive radio scheme, described above, SUs must allocate power to
compensate the interference caused by their presence so it may arise that the remaining power is
not adequate for reliable transmission of secondary data [2]. In such cases, the secondary is forced
to keep silent and lose a transmission opportunity. More generally, the conventional overlay
protocol offers no advantage to the primary system, which will make the existence of secondary
system within the primary system unattractive to primary regulators.
Based on the idea of synchronization work in [5], in this paper we propose a dynamic spectrum
access overlay protocol which we call the Secondary Undercover (SUC) protocol. We extend the
network scenario to contain several SUs that work together cooperatively in order to access the
primary band, not only without causing harmful interference to PUs, but also using relaying to
improve the primary system performance. We target secondary access to primary spectrum, in
which PUs utilize Hybrid Automatic Repeat Request (HARQ) and Orthogonal Frequency
Division Multiplexing with Cyclic Prefix (OFDM-CP).
The rest of this paper is organized as follows. Description of the system model is presented in
section two. In section three, we describe briefly the synchronization protocol, while in section
four we elaborate the Secondary Undercover protocol. We present the performance of our
proposal in section five, and finally, in section six draw some conclusions and propose future
work.
2. SYSTEM MODEL
Fig. 1 describes the basic network setup which represents the relation between pairs of SUs and
targeted PUs. We extend this setup to contain several SUs as in Fig. 2 and Fig. 4. All users are
assumed to be within the transmission range of each other and they are ordered in line of sight
with the primary users to simplify the model. The fading between the users is flat quasi-static
Rayleigh; using the per block-fading channel model, effective channel gains are
exponentially distributed. We assume that the active SU applies no rate control and uses a
transmission power of maximum value equal to . Moreover, a feedback channel exists between
SUs.
We adopt the overlay based HARQ protocol in Fig. 3 for the setup in Fig. 2, to obtain prior
knowledge about the PU's message [2], which is required to perform the overlay access. In
contrast to conventional overlay access, instead of letting each secondary transceiver compensate
for its interference by splitting its power and relaying the primary message, we propose a
different method in section four that takes into account the compensation process. PUs are
assumed to use OFDM-CP.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
3
Table 1
As a consequence of multipath mechanisms, the variations of the received signal power strength
will be characterized by path loss and shadowing effects. The signal is said to experience flat or
frequency selective fading, dependent upon the estimated delay spread value. The proposed
model was tested over different values of delay spread depending on the propagation
environment.
We could adopt the overlay based SFN DTV as in Fig. 4, in which the SUs obtain prior
knowledge about the primary data directly from the SFN DTV network. However, in this paper
we work within the more challenging setup using HARQ as in Fig. 2. Moreover, in this work we
do not address how the secondary receiver extracts its data from all received messages.
Next, we describe briefly the distributed synchronization protocol to be used as a basis for the
proposed access protocol.
3. SYNCHRONIZATION BETWEEN PRIMARY AND SECONDARY
TRANSCEIVERS
Table 1 describes the terminology used in this paper. The system model was described in section
2, and SUs are assumed to have access to a geolocation database which will provide location
information about the PU transmitter (usually a base station), but no information about
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
4
DataBase
Geolocation
SUi Starts listening to
NO
NO
YES
received?
Is NACKACK
received
PUs’ message exchange
received?
Is PU’s message
Wait for ACK/NACK
PU msg receive time
Store PU message
X
YES
SUi computes:
Initialization:
Protocol
PU MAC For each : Start
TACK, TMsg
dAi, Tm, Tw
tAi
rx =
ˆT = Tm − ∆T − (TpBi − TpBA)
SU waits ˆT then transmit
SUi
Fig. 5 Cooperative overlay protocol flow graph.
PU receiver [11]. In addition, has full knowledge about the PU's HARQ MAC protocol
information.
initiates the synchronization protocol by following the flow graph in Fig. 5, thus obtaining
the initialization parameters { , , , , } from the PU's MAC protocol and the
geolocation database. Subsequently, keeps listening for the primary channel to which it
would like access, checking if a PU's message is transmitted. If so, it will store this message and
record the start reception time , then wait for an ACK/NACK from the PU receiver.
PU ACK receive time
X
SUi deletes PU’s message
SUi computes:
2
TpBA
= TpAB
= (t0
2 − Tm − TACK − Tw) − (t0
1 + TMsg)
tBi
rx =
∆T = Tm − (tAi
rx − TpAi − tBi
rx − TACK)
t0
2 = tAi
rx − TpAi
TpBi = TpAB + ∆T
Fig. 6 Computations required by SUi before starting transmission.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
5
If an ACK is received then knows that there will be no retransmission of the stored message,
so deletes the stored message and performs the computations shown in Fig. 6. If a NACK is
received, then computes the time seconds that it should wait before starting its transmission
concurrently with the primary one, to guarantee synchronous reception on the PU receiver with
the message from the PU transmitter. This is true as long as we maintain a relative delay between
the secondary relaying symbol and primary symbol that does not exceed the duration of the cyclic
prefix of the primary transmitter signal [12].
: Through HARQ
hpp
hps
hsp
Mp
Mp
hss
PUA
tx
PUB
rx
SU1
tx
SU2
rx
Fig. 1 Network scenario with two primary and secondary pairs is presented. The dotted line indicates a
priori knowledge of the PU's message at the SU transmitter.
Using the simple network scenario in Fig. 1 and as one example scenario we assume that primary
transmitter is closer to SU transceiver than to the primary receiver , (i.e; >
), then Fig. 7 shows the simulated example scenario and how the SU is able to compute the
correct value of to guarantee synchronous reception with the primary signal on the primary
receiver. Next, we describe our cooperative dynamic access protocol.
Fig. 7 Transmission scenario using HARQ as the source of primary data for secondary system, without
using the SUC protocol and SU is responsible for interference compensation.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
6
3. SECONDARY USER UNDER COVER (SUC) PROTOCOL
As explained in the introduction, the conventional overlay cognitive radio access forces SUs to
split their power and thereby lose transmission opportunities [2]. In contrast, the SUC protocol
lets the SU transmit data using full power, while it delegates the interference compensation to
other SUs who cooperate to cover the secondary data transmission by relaying the known primary
message as shown in Fig. 2 and Fig. 4. In this way, any potential decrease in the PU’s SINR due
to secondary transmission is compensated. In fact, the PU’s SINR could be improved by
increasing the number of SUs in the system, which would make the existence of a secondary
system within the primary system preferable to primary regulators.
: Through HARQ : Secondary data : Primary relayed data
Mp Mp Mp
Mp
Mp
SU2 SU3
α2PsMp
PsMs
α3PsMp
PUB
rx
SUNPUA
txSU1
Mp
αNPsMp
Fig. 2 Extended network scenario with two PUs and multiple SUs is presented, using HARQ as the source
of primary data for secondary system.
In our protocol, we assume that SUs have a prior agreement about who will transmit secondary
data and who will be in support at each transmission opportunity. Fig. 8 presents the flow graph
of the SUC protocol.
YES
Protocol
For each : Start
YES
NO
transmit data?
NO
the synchronization protocol
Is there transmission
opportunity?
SU MAC
Protocol
Synchronization
Is it trun to
then relay primary data
SU computes
then transmits secondary data
SU computes using
SU waits seconds
SU waits seconds
SUi
SUi
PsMs
Ptx = (1 − β)Ps = αPs
αPsMp
ˆTi
ˆTi
ˆTi
Fig. 8 Flow graph for the Secondary Under Cover protocol.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
7
: Primary relayed data
: Through SFN DTV
: Secondary data
SFN DTV
αMp
SU2 SU3
α2PsMp
PsMs
α3PsMp
PUB
rx
SUNPUA
txSU1
Mp
αNPsMp
Mp
Mp
Mp MpMp
Mp
Ms
Fig. 4 Extended network scenario with two PUs and multiple SUs is presented, using SFN DTV as the
source of primary data for secondary system.
As SUs are located randomly, some will be close to and others will be far from the primary
receiver, whose exact location is not known. However, after computing , SUs can use this value
to estimate their distance from the primary receiver. This will let the SUs in support control and
thus minimize power while relaying the primary data: if is large, there is no need for full power
to transmit as the primary receiver is expected to be close by. If is small then higher power is
needed, the primary receiver being estimated to be far away. A simple relation to relate and the
required transmission power is as follows:
(1)
Where ϵ is the normalized value of and .
Considering secondary data transmission and how the secondary receiver will be able to extract
its own data from the primary data, we assume the usage of the Dirty Paper Coding (DPC)
technique by both SU transmitter and decoding by SU receiver [13, 14]. DPC is a technique for
efficient transmission of digital data through a channel subjected to some interference known to
the transmitter. The technique consists of pre-coding the data in order to cancel the effect caused
by the known interference, moreover, in information-theoretic terms; dirty-paper coding achieves
the channel capacity, without a power penalty and without requiring the receiver to gain
knowledge of the interference state. Next, we evaluate the performance of the SUC protocol.
4. PERFORMANCE EVALUATION
Given the system model described in section 2 with a network as in Fig. 2, we adopt the
transmission scenario of Fig 9, which is an extension of the scenario in Fig. 7. Considering a PU
failure probability of 10%, one can see how uses the opportunity of retransmission to
transmit with full power secondary data while other SUs, except for the SU receiver, relay the
primary data to cover during the transmission.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
8
Tx
Tx
NACK
NACK
reTxTx
Access
Concurrent
ACK
ACK
MpMp
Mp
Mp
Mp
Mp + Ms
SUi
tx PUA
tx PUB
rx
Fig. 3 Message transmission using HARQ protocol is presented between a primary pair (,),
While a is listening and trying to access the primary spectrum concurrently with the primary
retransmission, using an overlay access scheme. (,) are the PU's and SU's messages, respectively.
Fig. 9 Transmission scenario using HARQ as the source of primary data for secondary system, using the
SUC protocol for interference compensation.
Simulating the extended example scenarios in Fig. 2 with a 10% failure probability, we examine
two cases. In the FAR case, is farther from the primary receiver than from the primary
transmitter. On the other hand, in the CLOSE case, is closer to the primary receiver than to
the primary transmitter.
0 100 200 300 400 500 600 700 800 900 1000
0
0.2
0.4
0.6
0.8
1
(a) Time (sec)
0 100 200 300 400 500 600 700 800 900 1000
0
0.2
0.4
0.6
0.8
1
(b) Time (sec)
Fig.10 Simulation results for FAR transmission case (a) Reception time from PU’s transmission and (b)
Reception time from SU transmission.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
9
Fig. 9, presents a step by step simulation of the FAR case. Looking at the results in Fig. 10 and
Fig. 11, one can see how a SU can have the correct estimate of time required to achieve
synchronous reception at the PU receiver. With synchronization at the symbol level in time
combined with our practical assumptions as in section two, the relayed primary messages will
sum coherently with the original primary message from the primary transmitter at the primary
receiver. Thus an increase in SINR will be achieved at the primary receiver.
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
0
0.2
0.4
0.6
0.8
1
(a) Time (sec)
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
0
0.2
0.4
0.6
0.8
1
(b) Time (sec)
Fig. 11 Simulation results for CLOSE transmission case. (a) Reception time from PU’s transmission and (b)
Reception time from SU transmission.
5. CONCLUSIONS
In this paper we proposed a cooperative dynamic access overlay protocol for cognitive radio
networks. Our Secondary Under Cover (SUC) protocol overcomes some drawbacks of the
conventional overlay access scheme and makes it an advantage to have a secondary system
coexisting within the primary system, as this improves the primary SINR while simultaneously
enabling secondary data transmission. In SUC, secondary users do not need to split their power
while transmitting and the task of interference compensation is devolved to cooperating
secondary users.
0 0.5 1 1.5 2 2.5 3
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
ˆT (ms)
NormalizedPower
Fig. 12 The relation between the secondary transmission power and the distance from the primary receiver
estimated using.
International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017
10
0 5 10 15 20
14
16
18
20
22
24
26
28
30
Number of secondary users
PrimaryRxSINR(dB)
Fig. 13 The relation between the primary SINR and number of SUs in the network
REFERENCES
[1] Shin, K.G., Ann Arbor, Hyoil Kim, Min, A.W. and Kumar, A, “Cognitive radios for dynamic
spectrum access: from concept to reality”, Wireless Communications, IEEE, 17: 64 – 74, Dec 2010.
[2] A Masri, S. Tarapiah, and Y. Dama. “Secondary user power saving in overlay cognitive radio
networks”, International Journal of Computer Applications, 85:13–20, Jan 2014.
[3] S. Srinivasa and S. A. Jafar, “Cognitive radios for dynamic spectrum access - the throughput potential
of cognitive radio: A theoretical perspective”, Communications Magazine, IEEE, 45(5):73 – 79, 2007.
[4] J. Sachs, I. Maric, and A. Goldsmith. “Cognitive cellular systems within the tv spectrum”, In New
Frontiers in Dynamic Spectrum, 2010 IEEE Symposium, pages 1 – 12, Singapore, May 2010.
[5] A. Masri, Y. A. S. Dama, A. Musa and F. Hasan, "Distributed Synchronization Protocol for
Secondary Overlay Access in Cognitive Radio Networks”, Sixth International Conference on Internet
Technologies & Applications (IEEE ITA15 - EERT)”, at Wrexham, North Wales, UK, pp. 445-447,
2015.
[6] A. Jovicic and P. Viswanath, “Cognitive radio: an information theoretic perspective”, IEEE Trans.
Inf. Theory, page 3945 3958, 2009.
[7] A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, ”Breaking spectrum gridlock with cognitive radios:
an information theoretic perspective”, pages 894 – 914, 2009.
[8] A. Rico-Alvarino, C. Mosquera, and F. Gonzalez, “On the coexistence of primary, secondary
transmitters in a broadcast network”, In CogART 2011 Barcelona, Catalonia, Spain, 2011.
[9] R. A. Tannious and A. Nosratinia, ”Cognitive radio protocols based on exploiting HARQ
retransmissions”, IEEE Trans. Wirel. Commun., 9(9):2833 – 2841, 2010.
[10] R. D. Souza, “Reducing co-existence penalty of retransmission-based cognitive radio protocol”,
Electronic letters, 47(6):409 – 411, March 2011.
[11] H. R. Karimi, “Geolocation databases for white space devices in the uhf tv b,s: Specification of
maximum permitted emission levels”, In New Frontiers in Dynamic Spectrum Access Networks
(DySPAN), pages 443 – 454, 2011.
[12] M. Batariere, K. Baum, and T. Krauss, “Cyclic prefix length analysis for 4G OFDM systems”, in
IEEE Vehicular Technology Conference, VTC2004-Fall, 2004.
[13] M. Costa, "Writing on dirty paper”, in IEEE Trans. Information Theory 29 (3): 439–441, May 1983.
[14] C. T. K. Ng and A. Goldsmith, "Transmitter Cooperation in Ad-Hoc Wireless Networks: Does Dirty-
Paper Coding Beat Relaying? ", in IEEE Information Theory Workshop. San Antonio, Texas. pp.
277–282, October 2004.

More Related Content

What's hot

Impact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-CopyImpact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-CopyElmabruk Elgembari
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 

What's hot (17)

Impact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-CopyImpact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-Copy
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
B031201016019
B031201016019B031201016019
B031201016019
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 

Similar to Secondary User Cooperative Dynamic Access Protocol

Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...IJECEIAES
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksIRJET Journal
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentIRJET Journal
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
 
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...ijwmn
 
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...ijwmn
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Journals
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
Joint beamforming, power and channel allocation in multi user and multi-chann...
Joint beamforming, power and channel allocation in multi user and multi-chann...Joint beamforming, power and channel allocation in multi user and multi-chann...
Joint beamforming, power and channel allocation in multi user and multi-chann...Pvrtechnologies Nellore
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks IJECEIAES
 

Similar to Secondary User Cooperative Dynamic Access Protocol (20)

Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
 
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
 
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...S URVEY OF  L TE  D OWNLINK  S CHEDULERS A LGORITHMS IN  O PEN  A CCESS  S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
Joint beamforming, power and channel allocation in multi user and multi-chann...
Joint beamforming, power and channel allocation in multi user and multi-chann...Joint beamforming, power and channel allocation in multi user and multi-chann...
Joint beamforming, power and channel allocation in multi user and multi-chann...
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
journal_doublecol
journal_doublecoljournal_doublecol
journal_doublecol
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks Bio-inspired route estimation in cognitive radio networks
Bio-inspired route estimation in cognitive radio networks
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Secondary User Cooperative Dynamic Access Protocol

  • 1. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 DOI : 10.5121/ijmnct.2017.7201 1 SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COGNITIVE RADIO NETWORKS A. Masri1 , Y. A. S. Dama1, 2 , N Eya2 , R. A. Abd-Alhameed2 , N. Odeh1 , F.Hasan1 , A. Mousa1 , and J. M. Noras2 1 Dept. of Telecommunication Engineering, An-Najah National University, Nablus, Palestine 2 School of Engineering and Informatics, University of Bradford, Bradford, UK ABSTRACT A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios. Keywords Cognitive Radio, Dynamic Spectrum Access, Resource Management, Cooperative Overlay. 1. INTRODUCTION Recently a new regulatory model has been considered to open licensed (Primary) frequency spectrum to unlicensed (Secondary) access, with the aims of improving spectrum utilization, and freeing up space for new radio technologies. This new model requires the development of Cognitive Radio (CR) devices that are able to access the primary bands without causing any harmful interference to Primary Users (PUs). Several such schemes have been suggested, which can be classified as Interweave, Underlay or Overlay access paradigms [1]. The Overlay access scheme authorizes secondary and primary concurrent access over the same channel; the secondary power is split into two parts, one for the secondary access link and the other part to relay or assist the primary communication [2, 3, 4, 5]. With the correct choice of the power splitting ratio, the potential reduction in a PU’s Signal to Interference plus Noise Ratio (SINR) due to the secondary user is exactly compensated by the relaying assistance power. Although the overlay access paradigm can outperform other paradigms in terms of capacity, it suffers from several practical limitations [3, 6, 7], of which the most stringent is that the Secondary User (SU) has to maintain synchronization with the primary system to guarantee seamless secondary co-existence within it. Such a synchronization requirement is already achieved for the DVB-T Single Frequency Network (SFN) based Overlay CR in [4], where the primary signal is sent via satellite to major transmitters which apply the required delays. Thus, a potential secondary transmitter might also gain access to the primary signal, keeping time and frequency synchronization with the primary transmitters and therefore join the primary network using the Overlay scheme [8].
  • 2. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 2 Recent work on the Overlay CR access paradigm in [1-4, 6, 7, 9, 10] assumes perfect synchronization between secondary and primary users, and adopts the simple network scenario shown in Fig. 1. In contrast, the recent work of Marsi et al. [5], proposed a distributed synchronization protocol that ensures that secondary users are synchronized with the primary transmissions: however, this is also applied in the ideal scenario of Fig. 1. In the conventional overlay cognitive radio scheme, described above, SUs must allocate power to compensate the interference caused by their presence so it may arise that the remaining power is not adequate for reliable transmission of secondary data [2]. In such cases, the secondary is forced to keep silent and lose a transmission opportunity. More generally, the conventional overlay protocol offers no advantage to the primary system, which will make the existence of secondary system within the primary system unattractive to primary regulators. Based on the idea of synchronization work in [5], in this paper we propose a dynamic spectrum access overlay protocol which we call the Secondary Undercover (SUC) protocol. We extend the network scenario to contain several SUs that work together cooperatively in order to access the primary band, not only without causing harmful interference to PUs, but also using relaying to improve the primary system performance. We target secondary access to primary spectrum, in which PUs utilize Hybrid Automatic Repeat Request (HARQ) and Orthogonal Frequency Division Multiplexing with Cyclic Prefix (OFDM-CP). The rest of this paper is organized as follows. Description of the system model is presented in section two. In section three, we describe briefly the synchronization protocol, while in section four we elaborate the Secondary Undercover protocol. We present the performance of our proposal in section five, and finally, in section six draw some conclusions and propose future work. 2. SYSTEM MODEL Fig. 1 describes the basic network setup which represents the relation between pairs of SUs and targeted PUs. We extend this setup to contain several SUs as in Fig. 2 and Fig. 4. All users are assumed to be within the transmission range of each other and they are ordered in line of sight with the primary users to simplify the model. The fading between the users is flat quasi-static Rayleigh; using the per block-fading channel model, effective channel gains are exponentially distributed. We assume that the active SU applies no rate control and uses a transmission power of maximum value equal to . Moreover, a feedback channel exists between SUs. We adopt the overlay based HARQ protocol in Fig. 3 for the setup in Fig. 2, to obtain prior knowledge about the PU's message [2], which is required to perform the overlay access. In contrast to conventional overlay access, instead of letting each secondary transceiver compensate for its interference by splitting its power and relaying the primary message, we propose a different method in section four that takes into account the compensation process. PUs are assumed to use OFDM-CP.
  • 3. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 3 Table 1 As a consequence of multipath mechanisms, the variations of the received signal power strength will be characterized by path loss and shadowing effects. The signal is said to experience flat or frequency selective fading, dependent upon the estimated delay spread value. The proposed model was tested over different values of delay spread depending on the propagation environment. We could adopt the overlay based SFN DTV as in Fig. 4, in which the SUs obtain prior knowledge about the primary data directly from the SFN DTV network. However, in this paper we work within the more challenging setup using HARQ as in Fig. 2. Moreover, in this work we do not address how the secondary receiver extracts its data from all received messages. Next, we describe briefly the distributed synchronization protocol to be used as a basis for the proposed access protocol. 3. SYNCHRONIZATION BETWEEN PRIMARY AND SECONDARY TRANSCEIVERS Table 1 describes the terminology used in this paper. The system model was described in section 2, and SUs are assumed to have access to a geolocation database which will provide location information about the PU transmitter (usually a base station), but no information about
  • 4. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 4 DataBase Geolocation SUi Starts listening to NO NO YES received? Is NACKACK received PUs’ message exchange received? Is PU’s message Wait for ACK/NACK PU msg receive time Store PU message X YES SUi computes: Initialization: Protocol PU MAC For each : Start TACK, TMsg dAi, Tm, Tw tAi rx = ˆT = Tm − ∆T − (TpBi − TpBA) SU waits ˆT then transmit SUi Fig. 5 Cooperative overlay protocol flow graph. PU receiver [11]. In addition, has full knowledge about the PU's HARQ MAC protocol information. initiates the synchronization protocol by following the flow graph in Fig. 5, thus obtaining the initialization parameters { , , , , } from the PU's MAC protocol and the geolocation database. Subsequently, keeps listening for the primary channel to which it would like access, checking if a PU's message is transmitted. If so, it will store this message and record the start reception time , then wait for an ACK/NACK from the PU receiver. PU ACK receive time X SUi deletes PU’s message SUi computes: 2 TpBA = TpAB = (t0 2 − Tm − TACK − Tw) − (t0 1 + TMsg) tBi rx = ∆T = Tm − (tAi rx − TpAi − tBi rx − TACK) t0 2 = tAi rx − TpAi TpBi = TpAB + ∆T Fig. 6 Computations required by SUi before starting transmission.
  • 5. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 5 If an ACK is received then knows that there will be no retransmission of the stored message, so deletes the stored message and performs the computations shown in Fig. 6. If a NACK is received, then computes the time seconds that it should wait before starting its transmission concurrently with the primary one, to guarantee synchronous reception on the PU receiver with the message from the PU transmitter. This is true as long as we maintain a relative delay between the secondary relaying symbol and primary symbol that does not exceed the duration of the cyclic prefix of the primary transmitter signal [12]. : Through HARQ hpp hps hsp Mp Mp hss PUA tx PUB rx SU1 tx SU2 rx Fig. 1 Network scenario with two primary and secondary pairs is presented. The dotted line indicates a priori knowledge of the PU's message at the SU transmitter. Using the simple network scenario in Fig. 1 and as one example scenario we assume that primary transmitter is closer to SU transceiver than to the primary receiver , (i.e; > ), then Fig. 7 shows the simulated example scenario and how the SU is able to compute the correct value of to guarantee synchronous reception with the primary signal on the primary receiver. Next, we describe our cooperative dynamic access protocol. Fig. 7 Transmission scenario using HARQ as the source of primary data for secondary system, without using the SUC protocol and SU is responsible for interference compensation.
  • 6. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 6 3. SECONDARY USER UNDER COVER (SUC) PROTOCOL As explained in the introduction, the conventional overlay cognitive radio access forces SUs to split their power and thereby lose transmission opportunities [2]. In contrast, the SUC protocol lets the SU transmit data using full power, while it delegates the interference compensation to other SUs who cooperate to cover the secondary data transmission by relaying the known primary message as shown in Fig. 2 and Fig. 4. In this way, any potential decrease in the PU’s SINR due to secondary transmission is compensated. In fact, the PU’s SINR could be improved by increasing the number of SUs in the system, which would make the existence of a secondary system within the primary system preferable to primary regulators. : Through HARQ : Secondary data : Primary relayed data Mp Mp Mp Mp Mp SU2 SU3 α2PsMp PsMs α3PsMp PUB rx SUNPUA txSU1 Mp αNPsMp Fig. 2 Extended network scenario with two PUs and multiple SUs is presented, using HARQ as the source of primary data for secondary system. In our protocol, we assume that SUs have a prior agreement about who will transmit secondary data and who will be in support at each transmission opportunity. Fig. 8 presents the flow graph of the SUC protocol. YES Protocol For each : Start YES NO transmit data? NO the synchronization protocol Is there transmission opportunity? SU MAC Protocol Synchronization Is it trun to then relay primary data SU computes then transmits secondary data SU computes using SU waits seconds SU waits seconds SUi SUi PsMs Ptx = (1 − β)Ps = αPs αPsMp ˆTi ˆTi ˆTi Fig. 8 Flow graph for the Secondary Under Cover protocol.
  • 7. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 7 : Primary relayed data : Through SFN DTV : Secondary data SFN DTV αMp SU2 SU3 α2PsMp PsMs α3PsMp PUB rx SUNPUA txSU1 Mp αNPsMp Mp Mp Mp MpMp Mp Ms Fig. 4 Extended network scenario with two PUs and multiple SUs is presented, using SFN DTV as the source of primary data for secondary system. As SUs are located randomly, some will be close to and others will be far from the primary receiver, whose exact location is not known. However, after computing , SUs can use this value to estimate their distance from the primary receiver. This will let the SUs in support control and thus minimize power while relaying the primary data: if is large, there is no need for full power to transmit as the primary receiver is expected to be close by. If is small then higher power is needed, the primary receiver being estimated to be far away. A simple relation to relate and the required transmission power is as follows: (1) Where ϵ is the normalized value of and . Considering secondary data transmission and how the secondary receiver will be able to extract its own data from the primary data, we assume the usage of the Dirty Paper Coding (DPC) technique by both SU transmitter and decoding by SU receiver [13, 14]. DPC is a technique for efficient transmission of digital data through a channel subjected to some interference known to the transmitter. The technique consists of pre-coding the data in order to cancel the effect caused by the known interference, moreover, in information-theoretic terms; dirty-paper coding achieves the channel capacity, without a power penalty and without requiring the receiver to gain knowledge of the interference state. Next, we evaluate the performance of the SUC protocol. 4. PERFORMANCE EVALUATION Given the system model described in section 2 with a network as in Fig. 2, we adopt the transmission scenario of Fig 9, which is an extension of the scenario in Fig. 7. Considering a PU failure probability of 10%, one can see how uses the opportunity of retransmission to transmit with full power secondary data while other SUs, except for the SU receiver, relay the primary data to cover during the transmission.
  • 8. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 8 Tx Tx NACK NACK reTxTx Access Concurrent ACK ACK MpMp Mp Mp Mp Mp + Ms SUi tx PUA tx PUB rx Fig. 3 Message transmission using HARQ protocol is presented between a primary pair (,), While a is listening and trying to access the primary spectrum concurrently with the primary retransmission, using an overlay access scheme. (,) are the PU's and SU's messages, respectively. Fig. 9 Transmission scenario using HARQ as the source of primary data for secondary system, using the SUC protocol for interference compensation. Simulating the extended example scenarios in Fig. 2 with a 10% failure probability, we examine two cases. In the FAR case, is farther from the primary receiver than from the primary transmitter. On the other hand, in the CLOSE case, is closer to the primary receiver than to the primary transmitter. 0 100 200 300 400 500 600 700 800 900 1000 0 0.2 0.4 0.6 0.8 1 (a) Time (sec) 0 100 200 300 400 500 600 700 800 900 1000 0 0.2 0.4 0.6 0.8 1 (b) Time (sec) Fig.10 Simulation results for FAR transmission case (a) Reception time from PU’s transmission and (b) Reception time from SU transmission.
  • 9. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 9 Fig. 9, presents a step by step simulation of the FAR case. Looking at the results in Fig. 10 and Fig. 11, one can see how a SU can have the correct estimate of time required to achieve synchronous reception at the PU receiver. With synchronization at the symbol level in time combined with our practical assumptions as in section two, the relayed primary messages will sum coherently with the original primary message from the primary transmitter at the primary receiver. Thus an increase in SINR will be achieved at the primary receiver. 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 0 0.2 0.4 0.6 0.8 1 (a) Time (sec) 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 0 0.2 0.4 0.6 0.8 1 (b) Time (sec) Fig. 11 Simulation results for CLOSE transmission case. (a) Reception time from PU’s transmission and (b) Reception time from SU transmission. 5. CONCLUSIONS In this paper we proposed a cooperative dynamic access overlay protocol for cognitive radio networks. Our Secondary Under Cover (SUC) protocol overcomes some drawbacks of the conventional overlay access scheme and makes it an advantage to have a secondary system coexisting within the primary system, as this improves the primary SINR while simultaneously enabling secondary data transmission. In SUC, secondary users do not need to split their power while transmitting and the task of interference compensation is devolved to cooperating secondary users. 0 0.5 1 1.5 2 2.5 3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 ˆT (ms) NormalizedPower Fig. 12 The relation between the secondary transmission power and the distance from the primary receiver estimated using.
  • 10. International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol. 7, No.1/2, April 2017 10 0 5 10 15 20 14 16 18 20 22 24 26 28 30 Number of secondary users PrimaryRxSINR(dB) Fig. 13 The relation between the primary SINR and number of SUs in the network REFERENCES [1] Shin, K.G., Ann Arbor, Hyoil Kim, Min, A.W. and Kumar, A, “Cognitive radios for dynamic spectrum access: from concept to reality”, Wireless Communications, IEEE, 17: 64 – 74, Dec 2010. [2] A Masri, S. Tarapiah, and Y. Dama. “Secondary user power saving in overlay cognitive radio networks”, International Journal of Computer Applications, 85:13–20, Jan 2014. [3] S. Srinivasa and S. A. Jafar, “Cognitive radios for dynamic spectrum access - the throughput potential of cognitive radio: A theoretical perspective”, Communications Magazine, IEEE, 45(5):73 – 79, 2007. [4] J. Sachs, I. Maric, and A. Goldsmith. “Cognitive cellular systems within the tv spectrum”, In New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium, pages 1 – 12, Singapore, May 2010. [5] A. Masri, Y. A. S. Dama, A. Musa and F. Hasan, "Distributed Synchronization Protocol for Secondary Overlay Access in Cognitive Radio Networks”, Sixth International Conference on Internet Technologies & Applications (IEEE ITA15 - EERT)”, at Wrexham, North Wales, UK, pp. 445-447, 2015. [6] A. Jovicic and P. Viswanath, “Cognitive radio: an information theoretic perspective”, IEEE Trans. Inf. Theory, page 3945 3958, 2009. [7] A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, ”Breaking spectrum gridlock with cognitive radios: an information theoretic perspective”, pages 894 – 914, 2009. [8] A. Rico-Alvarino, C. Mosquera, and F. Gonzalez, “On the coexistence of primary, secondary transmitters in a broadcast network”, In CogART 2011 Barcelona, Catalonia, Spain, 2011. [9] R. A. Tannious and A. Nosratinia, ”Cognitive radio protocols based on exploiting HARQ retransmissions”, IEEE Trans. Wirel. Commun., 9(9):2833 – 2841, 2010. [10] R. D. Souza, “Reducing co-existence penalty of retransmission-based cognitive radio protocol”, Electronic letters, 47(6):409 – 411, March 2011. [11] H. R. Karimi, “Geolocation databases for white space devices in the uhf tv b,s: Specification of maximum permitted emission levels”, In New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pages 443 – 454, 2011. [12] M. Batariere, K. Baum, and T. Krauss, “Cyclic prefix length analysis for 4G OFDM systems”, in IEEE Vehicular Technology Conference, VTC2004-Fall, 2004. [13] M. Costa, "Writing on dirty paper”, in IEEE Trans. Information Theory 29 (3): 439–441, May 1983. [14] C. T. K. Ng and A. Goldsmith, "Transmitter Cooperation in Ad-Hoc Wireless Networks: Does Dirty- Paper Coding Beat Relaying? ", in IEEE Information Theory Workshop. San Antonio, Texas. pp. 277–282, October 2004.