Open access

Achievable Throughput Comparison of Sensing-Based and Interference-Constrained Transmissions in Cognitive Radio Networks

Written By

Gosan Noh and Daesik Hong

Published: 01 November 2009

DOI: 10.5772/7832

From the Edited Volume

Cognitive Radio Systems

Edited by Wei Wang

Chapter metrics overview

1,932 Chapter Downloads

View Full Metrics

1. Introduction

Cognitive radio has been introduced in order to solve the spectrum scarcity problem (Haykin 2005). Although having limited radio resources, we need lots of spectrum to deploy newly developed wireless applications. Meanwhile, a large portion of allocated spectrum is identified as unused by an actual radio spectrum measurement. Thus, a new access scheme which allows spectrum sharing between different wireless systems referred as dynamic spectrum access is required (Zhao & Sadler 2007). Dynamic spectrum access is based on cognitive radio technology which enables learning from and adapting to the external radio

environment.

As a way of spectrum sharing between licensed and unlicensed users, spectrum overlay approach is considered. In spectrum overlay networks, a primary network has a license for the exclusive use of the allocated spectrum. In contrast, a secondary network has lower access priority. While the primary users access the licensed spectrum wherever and whenever they want, the secondary users access the spectrum on condition that the transmission of the primary network is sufficiently protected, i.e., the interference to the primary network should be less than a predefined threshold.

There are two ways for satisfying the protection condition: Sensing-based and interference-constrained transmissions. In sensing-based transmission, as a means of avoiding interference, the secondary users sense the spectrum before they start transmission (Liang et al. 2007; Kim et al.). Only if the secondary users detect the white space, they can access the spectrum. Even during the transmission, if the primary user uses the spectrum, the secondary user has to stop transmission. In interference-constrained transmission, on the contrary, the secondary users are allowed to transmit during the primary user transmission (Gastpar 2007). However, the transmit power should be adjusted not to interfere the primary user transmission.

In this chapter, we compare the two transmission schemes in terms of achievable throughput of the secondary user and provide a criterion for the transmission mode selection of sensing-based transmission and interference-constrained transmission.

The rest of this chapter is organized as follows. Section 2 presents the system model for the sensing-based and interference-constrained transmissions. Throughput analyses for both of the schemes are followed in Section 3. The simulation results are shown in Section 4. In Section 5, the conclusion is drawn.

Advertisement

2. System Model

A coexistence scenario of spectrum overlay between primary and secondary networks is depicted in Fig. 1. Primary and secondary networks are deployed in the overlapping regions and use the same frequency band. In Fig. 1, there are pairs of transmitter and receiver for the primary and secondary networks. We define channel gains between each pair of transmitter and receiver as e (from the primary transmitter to the primary receiver) and g (from the secondary transmitter to the secondary receiver). We also define the channel gains representing the interference between primary and secondary networks as f (from the secondary transmitter to the primary receiver) and h (from the primary transmitter to the secondary receiver).

Figure 1.

A coexistence scenario of primary and secondary networks. Primary and secondary networks are over-deployed and interfere with each other.

The basic concept of spectrum overlay approach is to unlock licensed spectrum to secondary users. Secondary users can access the licensed spectrum on condition that their interference to primary users is limited. Possible solutions for this problem are sensing-based transmission and interference-constrained transmission. The difference of two schemes is based on the support for the simultaneous transmission.

In sensing-based transmission, the secondary user should sense the existence of the primary user in the licensed spectrum before transmission. Through the transmission, whenever the primary user accesses the licensed spectrum, the secondary user is required to stop transmitting and vacate the spectrum. Each secondary user frame is divided into a sensing slot and a data transmission slot. The time length that the secondary user senses the spectrum is sensing duration n D and the time length between the consecutive sensing durations is sensing period n P (Noh 2008).

In interference-constrained transmission, the secondary user can access while the primary user uses the spectrum. However, the power of the secondary user should be lessen so as to the QoS of the primary user is guaranteed. Without loss of generality, we employ a restriction that the interference power of the secondary transmitter measured at the primary receiver should be lower than a predetermined threshold.
Advertisement

3. Throughput Analysis

In this section, the achievable throughput of the secondary user by means of both sensing-based and interference-constrained transmission is presented and then compared in terms of location of terminals and the acceptable power level of the primary user.

Advertisement

3.1. Sensing-Based Transmission

The first thing to derive the secondary user throughput based on sensing-based transmission is evaluating the sensing accuracy. During the sensing duration, r ( n ) denotes the primary user signal received by the secondary user. Then, the detection problem can be written as

0 : r ( n ) = w ( n ) 1 : r ( n ) = p ( n ) + w ( n ) E1
for n = 0,..., n D 1 . 0 denotes the noise only hypothesis and 1 denotes the primary user signal plus noise hypothesis. p ( n ) is the primary user signal and w ( n ) is the noise (Liang et al. 2007). The primary user signal p ( n ) is assumed to be a zero-mean, complex-valued, circularly symmetric, white Gaussian random process with a variance σ p 2 . The complex-valued, circularly symmetric AWGN w ( n ) with a variance σ w 2 is independent of the primary user signal.

In order to detect the existence of a random signal such as p(n), an energy detector is applicable (Kay 1998). The decision rule is written as

T = n = 0 n D 1 | r ( n ) | 2 0 1 η E2

where T is the test statistic and η is the threshold.

Two probabilities are defined in conjunction with the detection procedure: false alarm probability and detection probability. False alarm probability P F A is the probability to decide 1 but 0 is true. Detection probability P D is the probability to decide 1 and it is true.

False alarm probability P F A is given by

P F A = Pr { T η ; 0 } = Q ( η 2 n D σ w 2 n D ) E3

where Q ( ) is the right-tail probability for the Gaussian random variable (Kay 1998). Detection probability P D is also given by

P D = Pr { T η ; 1 } = Q ( σ w 2 σ p 2 + σ w 2 ( Q 1 ( P F A ) n D σ p 2 σ w 2 ) ) E4

By rearranging (3) and (4) and canceling η , we have following relations:

P F A = Q ( n D γ p + ( 1 + γ p ) Q 1 ( P D ) ) E5
P D = Q ( 1 1 + γ p ( Q 1 ( P F A ) n D γ p ) ) E6

where γ p represents the signal-to-noise ratio (SNR) of the primary user, i.e., γ p = σ p 2 / σ w 2 . There is a tradeoff relationship between the false alarm probability and the detection probability. Lower false alarm probability gives the secondary user more chances to access the channel and higher detection probability guarantees the transmission of the primary user more strongly. However, realizing both the two goals are impossible. Hence, by using the tradeoff relationship above, the secondary user throughput can be derived. The secondary user succeeds in transmitting its data when there is no false alarm, where no false alarm means the primary user does not use the spectrum and the secondary user knows this information (Liang et al. 2007). The secondary user throughput of the sensing-based transmission is given by

C S B = P i d l e n P n D n P ( 1 P F A ) C 0 E7

such that ( 1 P D ) | f | 2 P s max λ , where λ is the interference threshold at the primary receiver. This constraint means that the expected interference from the secondary transmitter experienced at the primary receiver should be lower than a predetermined threshold. This constraint is required to protect the transmission of the primary user. However, in practical situations, we set as ( 1 P D ) | f | 2 P s max = λ so as to maximize the secondary user throughput. The reason comes from the fact that the monotonic increase of the detection probability (6). Thus we set the detection probability as P D = 1 λ / | f | 2 P s max . P i d l e is the probability that the primary user does not uses the spectrum, which is given as: P i d l e = μ / ( λ + μ ) . ( n P n D ) / n P represents the ratio of the transmission time to the total time. C 0 denotes the capacity of the secondary user without any interference. C 0 is given by

C 0 = log 2 ( 1 + γ s ) E8

where γ s is the SNR of the secondary user.

Advertisement

3.2. Interference-Constrained Transmission

The secondary user throughput based on interference-constrained transmission is presented. Interference-constrained transmission allows the secondary user simultaneous transmission with the primary user. In this case, however, the primary user transmission also should be protected by means of power control of the secondary user. If the interference of the secondary user experienced by the primary receiver is strong, the power of the secondary transmitter should be lessened. Thus, the secondary user power is controlled so as to its interference at the primary receiver is lower than a predetermined threshold, i.e., | f | 2 P s λ (Gastpar 2007). P s is the transmit power of the secondary user. Hence, the secondary user throughput of the interference-constrained transmission is given by

C IC = log 2 ( 1 + | g | 2 P s | h | 2 σ p 2 + σ w 2 ) E9

such that | f | 2 P s λ .

In order to maximize the secondary user throughput, the optimal strategy is that the interference power of the secondary user meets the threshold, i.e., | f | 2 P s = λ . By this principle, the throughput (9) is rewritten as

C IC = log 2 ( 1 + | g | 2 λ / | f | 2 | h | 2 σ p 2 + σ w 2 ) E10

Notice that there is an interference term in (10) which is comes from the primary transmitter and degrades the secondary user throughput.

Parameter Value
λ 0.2  kpkts/s
μ 0.6  kpkts/s
n D 30  samples
n P 300  samples
W 1  MHz

Table 1.

Common simulation parameters.

Advertisement

4. Simulation Results

In this section, the throughput performances of both the sensing-based and interference-constrained transmissions are evaluated by computer simulations. In a primary network, we assume that there is a primary transmitter and a primary receiver. Similarly, in a secondary network, there is a secondary transmitter and a secondary receiver.

We assume a cellular scenario where the primary network and the secondary network are over-deployed. Thus, we are interested in the distances between two terminals and base stations. The distance from the secondary transmitter to the primary receiver is denoted by l f . l f affects of the interference from the secondary user to the primary user. The distance from the secondary transmitter to the secondary receiver is denoted by l g . l g determines the signal quality of the secondary user. The distance from the primary transmitter to the secondary receiver is denoted by l h . l h affects of the interference from the primary user to the secondary user.

We consider the path loss and short-term fading as a channel model. Path loss exponent is assumed to be 4. In addition, Rayleigh block fading is assumed, where each of channel gain is circularly symmetric complex-Gaussian random variable. Hence, the channel gain f is decomposed into the path loss component and the Rayleigh fading component, i.e., f = ( l f / l 0 ) α / 2 f ^ , where l 0 denotes a unit distance and f ^ denotes a zero mean complex-Gaussian random variable or unit variance. Similarly, g and h are also decomposed into g = ( l g / l 0 ) α / 2 g ^ and h = ( l h / l 0 ) α / 2 h ^ , respectively.

The primary user follows Markovian traffic, with arrival rate λ = 0.2  kpkts/s and service rate μ = 0.6  kpkts/s . Thus, the time portion that the primary user is in idle state is given as P i d l e = 0.75 . For sensing-based transmission, we assumed an energy detector with the sensing duration n D = 30  samples and the sensing period n P = 300  samples . The system bandwidth is given by W = 1  MHz . We assume a full-traffic model, where the secondary user always has traffic to transmit. These common parameters are summarized in Table 1. Under the sensing-based transmission, the secondary user throughput as a function of the SNR of the primary user is depicted in Fig. 2. It is observed that the secondary user throughput increases with the increase with the SNR of the primary user. As the SNR increases, the energy detection becomes more accurate and enhances the throughput of sensing-based transmission. In addition, The secondary user throughput increases with λ . With higher λ , the interference limit of the primary user is relaxed, the secondary user can transmit with higher power, and the throughput is enhanced.

Oppositely, under the interference-constrained transmission, the secondary user throughput as a function of the SNR of the primary user is shown in Fig. 3. Notice that the secondary user throughput decreases with the increase with the SNR of the primary user. Differently from the sensing-based transmission, as the SNR of the primary user increases, the interference from the primary transmitter greatly degrades the secondary user throughput as in (10). Similar to that of the sensing-based transmission, it is observed that the secondary user throughput increases with λ .

We then compare the throughput performance of the sensing-based transmission with the interference-constrained transmission in Fig. 4, Fig. 5, and Fig. 6.

Fig. 4 depicts the secondary user throughput of both the sensing-based and the interference-constrained transmission as a function of the interference threshold of the primary receiver. The secondary user throughput increases with the increase of λ in both schemes. However, there is a crossing point at about λ = 0.05 . In low λ region, the sensing-based transmission achieves higher throughput, but in the high λ region, the interference-constrained transmission outperforms the other.

Figure 2.

Secondary user throughput of sensing-based transmission vs. the SNR of the primary user. The throughput of the secondary user increases with the SNR of the primary user and the interference threshold for the primary user.

Figure 3.

Secondary user throughput of interference-constrained transmission vs. the SNR of the primary user. The throughput of the secondary user decreases with the SNR of the primary user but increases with the interference threshold for the primary user.

Figure 4.

Throughput comparison of the sensing-based and interference-constrained transmissions vs. the interference threshold of the primary receiver. The throughput of the sensing-based scheme is saturated as the threshold gets higher without saturation.

Figure 5.

Throughput comparison of the sensing-based and interference-constrained transmissions vs. the distance ratio l f / l g . The throughput is saturated in the sensing-based scheme while the throughput is sharply increasing in the interference-constrained scheme.

Figure 6.

Throughput comparison of the sensing-based and interference-constrained transmissions vs. the distance ratio l h / l g . The throughput by the sensing-based scheme decreases while that by the interference-constrained scheme increases.

Fig. 5 shows the secondary user throughput as a function of the distance ratio l f / l g . As l f / l g increases, the primary receiver becomes farther from the secondary transmitter. Then, the spectrum opportunity of the secondary user increases and the throughput is also increased. However, the throughput is saturated in the sensing-based scheme while the throughput is sharply increasing in the interference-constrained scheme. Thus, the effect of the interference threshold is more sensitive to the interference-constrained transmission.

Fig. 6 shows the secondary user throughput as a function of the distance ratio l h / l g . Notice that as l h / l g increases, the throughput by the sensing-based scheme decreases while that by the interference-constrained scheme increases. If the primary transmitter goes farther from the secondary receiver, it becomes difficult to sense the primary user and the throughput degrades in the sensing-based scheme but the interference decreases and the throughput is enhanced in the interference-constrained scheme.

Advertisement

7. Conclusion

We have discussed the achievable throughput of both the sensing-based and interference-constrained transmission in cognitive radio networks. The derivations of both schemes are presented and their throughput performances have been compared in various environments via computer simulations. In conclusion, the sensing-based scheme is advantageous when the interference threshold is tight and the primary and secondary users are relatively close. Oppositely, the interference-constrained scheme is better when the interference threshold is loose and the primary transmitter and receiver are located far from the secondary user.

References

  1. 1. Gastpar M. 2007 On capacity under receive and spatial spectrum-sharing constraints.. IEEE Trans. Wireless Communications 6 2 649 658 , Feb. 2007
  2. 2. Haykin S. 2005 Cognitive radio: Brain-empowered wireless communications,. IEEE Communications Mag., 23 2 201 220 , Feb. 2005
  3. 3. Kay S. M. 1998 Fundamentals of Statistical Signal Processing: Detection Theory, Prentice-Hall, Upper Saddle River, NJ
  4. 4. Kim S. Lee J. Wang H. Hong D. Sensing Performance of Energy Detector with Correlated Multiple Antennas.. IEEE Signal Processing Letters, Accepted for publication.
  5. 5. Liang Y. C- Zeng Y. Peh E. Hoang A. T. 2008 Sensing-throughput tradeoff for cognitive radio networks.. IEEE Trans. Wireless Communications 7 4 1326 1337 , Apr. 2008
  6. 6. Noh G. Lee J. Wang H. Kim S. Hong D. 2008 A new spectrum sensing scheme using cyclic prefix for cognitive radio systems. Proceedings of IEEE Vehicular Technology Conference, 1891 1895 , May 2008
  7. 7. Zhao Q. Sadler B. M. 2007 A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Mag., 24 3 79 89 , May 2007

Written By

Gosan Noh and Daesik Hong

Published: 01 November 2009