Open Access is an initiative that aims to make scientific research freely available to all. To date our community has made over 100 million downloads. It’s based on principles of collaboration, unobstructed discovery, and, most importantly, scientific progression. As PhD students, we found it difficult to access the research we needed, so we decided to create a new Open Access publisher that levels the playing field for scientists across the world. How? By making research easy to access, and puts the academic needs of the researchers before the business interests of publishers.
We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including Nobel Prize winners and some of the world’s most-cited researchers. Publishing on IntechOpen allows authors to earn citations and find new collaborators, meaning more people see your work not only from your own field of study, but from other related fields too.
Cognitive radio has been introduced in order to solve the spectrum scarcity problem (Haykin 2005). Although having limited radio resources, we need lots of spectrum to deploy newly developed wireless applications. Meanwhile, a large portion of allocated spectrum is identified as unused by an actual radio spectrum measurement. Thus, a new access scheme which allows spectrum sharing between different wireless systems referred as dynamic spectrum access is required (Zhao & Sadler 2007). Dynamic spectrum access is based on cognitive radio technology which enables learning from and adapting to the external radio
As a way of spectrum sharing between licensed and unlicensed users, spectrum overlay approach is considered. In spectrum overlay networks, a primary network has a license for the exclusive use of the allocated spectrum. In contrast, a secondary network has lower access priority. While the primary users access the licensed spectrum wherever and whenever they want, the secondary users access the spectrum on condition that the transmission of the primary network is sufficiently protected, i.e., the interference to the primary network should be less than a predefined threshold.
There are two ways for satisfying the protection condition: Sensing-based and interference-constrained transmissions. In sensing-based transmission, as a means of avoiding interference, the secondary users sense the spectrum before they start transmission (Liang et al. 2007; Kim et al.). Only if the secondary users detect the white space, they can access the spectrum. Even during the transmission, if the primary user uses the spectrum, the secondary user has to stop transmission. In interference-constrained transmission, on the contrary, the secondary users are allowed to transmit during the primary user transmission (Gastpar 2007). However, the transmit power should be adjusted not to interfere the primary user transmission.
In this chapter, we compare the two transmission schemes in terms of achievable throughput of the secondary user and provide a criterion for the transmission mode selection of sensing-based transmission and interference-constrained transmission.
The rest of this chapter is organized as follows. Section 2 presents the system model for the sensing-based and interference-constrained transmissions. Throughput analyses for both of the schemes are followed in Section 3. The simulation results are shown in Section 4. In Section 5, the conclusion is drawn.
2. System Model
A coexistence scenario of spectrum overlay between primary and secondary networks is depicted in Fig. 1. Primary and secondary networks are deployed in the overlapping regions and use the same frequency band. In Fig. 1, there are pairs of transmitter and receiver for the primary and secondary networks. We define channel gains between each pair of transmitter and receiver as(from the primary transmitter to the primary receiver) and(from the secondary transmitter to the secondary receiver). We also define the channel gains representing the interference between primary and secondary networks as(from the secondary transmitter to the primary receiver) and(from the primary transmitter to the secondary receiver).
The basic concept of spectrum overlay approach is to unlock licensed spectrum to secondary users. Secondary users can access the licensed spectrum on condition that their interference to primary users is limited. Possible solutions for this problem are sensing-based transmission and interference-constrained transmission. The difference of two schemes is based on the support for the simultaneous transmission.
In sensing-based transmission, the secondary user should sense the existence of the primary user in the licensed spectrum before transmission. Through the transmission, whenever the primary user accesses the licensed spectrum, the secondary user is required to stop transmitting and vacate the spectrum. Each secondary user frame is divided into a sensing slot and a data transmission slot. The time length that the secondary user senses the spectrum is sensing durationand the time length between the consecutive sensing durations is sensing period(Noh 2008).
In interference-constrained transmission, the secondary user can access while the primary user uses the spectrum. However, the power of the secondary user should be lessen so as to the QoS of the primary user is guaranteed. Without loss of generality, we employ a restriction that the interference power of the secondary transmitter measured at the primary receiver should be lower than a predetermined threshold.
3. Throughput Analysis
In this section, the achievable throughput of the secondary user by means of both sensing-based and interference-constrained transmission is presented and then compared in terms of location of terminals and the acceptable power level of the primary user.
3.1. Sensing-Based Transmission
The first thing to derive the secondary user throughput based on sensing-based transmission is evaluating the sensing accuracy. During the sensing duration,denotes the primary user signal received by the secondary user. Then, the detection problem can be written as
for.denotes the noise only hypothesis anddenotes the primary user signal plus noise hypothesis.is the primary user signal andis the noise (Liang et al. 2007). The primary user signalis assumed to be a zero-mean, complex-valued, circularly symmetric, white Gaussian random process with a variance. The complex-valued, circularly symmetric AWGNwith a varianceis independent of the primary user signal.
In order to detect the existence of a random signal such as p(n), an energy detector is applicable (Kay 1998). The decision rule is written as
whereis the test statistic andis the threshold.
Two probabilities are defined in conjunction with the detection procedure: false alarm probability and detection probability. False alarm probabilityis the probability to decidebutis true. Detection probabilityis the probability to decideand it is true.
False alarm probabilityis given by
whereis the right-tail probability for the Gaussian random variable (Kay 1998). Detection probabilityis also given by
By rearranging (3) and (4) and canceling, we have following relations:
whererepresents the signal-to-noise ratio (SNR) of the primary user, i.e.,. There is a tradeoff relationship between the false alarm probability and the detection probability. Lower false alarm probability gives the secondary user more chances to access the channel and higher detection probability guarantees the transmission of the primary user more strongly. However, realizing both the two goals are impossible. Hence, by using the tradeoff relationship above, the secondary user throughput can be derived. The secondary user succeeds in transmitting its data when there is no false alarm, where no false alarm means the primary user does not use the spectrum and the secondary user knows this information (Liang et al. 2007). The secondary user throughput of the sensing-based transmission is given by
such that, whereis the interference threshold at the primary receiver. This constraint means that the expected interference from the secondary transmitter experienced at the primary receiver should be lower than a predetermined threshold. This constraint is required to protect the transmission of the primary user. However, in practical situations, we set asso as to maximize the secondary user throughput. The reason comes from the fact that the monotonic increase of the detection probability (6). Thus we set the detection probability as.is the probability that the primary user does not uses the spectrum, which is given as:.represents the ratio of the transmission time to the total time.denotes the capacity of the secondary user without any interference.is given by
whereis the SNR of the secondary user.
3.2. Interference-Constrained Transmission
The secondary user throughput based on interference-constrained transmission is presented. Interference-constrained transmission allows the secondary user simultaneous transmission with the primary user. In this case, however, the primary user transmission also should be protected by means of power control of the secondary user. If the interference of the secondary user experienced by the primary receiver is strong, the power of the secondary transmitter should be lessened. Thus, the secondary user power is controlled so as to its interference at the primary receiver is lower than a predetermined threshold, i.e.,(Gastpar 2007).is the transmit power of the secondary user. Hence, the secondary user throughput of the interference-constrained transmission is given by
In order to maximize the secondary user throughput, the optimal strategy is that the interference power of the secondary user meets the threshold, i.e.,. By this principle, the throughput (9) is rewritten as
Notice that there is an interference term in (10) which is comes from the primary transmitter and degrades the secondary user throughput.
Common simulation parameters.
4. Simulation Results
In this section, the throughput performances of both the sensing-based and interference-constrained transmissions are evaluated by computer simulations. In a primary network, we assume that there is a primary transmitter and a primary receiver. Similarly, in a secondary network, there is a secondary transmitter and a secondary receiver.
We assume a cellular scenario where the primary network and the secondary network are over-deployed. Thus, we are interested in the distances between two terminals and base stations. The distance from the secondary transmitter to the primary receiver is denoted by.affects of the interference from the secondary user to the primary user. The distance from the secondary transmitter to the secondary receiver is denoted by.determines the signal quality of the secondary user. The distance from the primary transmitter to the secondary receiver is denoted by.affects of the interference from the primary user to the secondary user.
We consider the path loss and short-term fading as a channel model. Path loss exponent is assumed to be 4. In addition, Rayleigh block fading is assumed, where each of channel gain is circularly symmetric complex-Gaussian random variable. Hence, the channel gainis decomposed into the path loss component and the Rayleigh fading component, i.e.,, wheredenotes a unit distance anddenotes a zero mean complex-Gaussian random variable or unit variance. Similarly,andare also decomposed intoand, respectively.
The primary user follows Markovian traffic, with arrival rateand service rate. Thus, the time portion that the primary user is in idle state is given as. For sensing-based transmission, we assumed an energy detector with the sensing durationand the sensing period. The system bandwidth is given by. We assume a full-traffic model, where the secondary user always has traffic to transmit. These common parameters are summarized in Table 1. Under the sensing-based transmission, the secondary user throughput as a function of the SNR of the primary user is depicted in Fig. 2. It is observed that the secondary user throughput increases with the increase with the SNR of the primary user. As the SNR increases, the energy detection becomes more accurate and enhances the throughput of sensing-based transmission. In addition, The secondary user throughput increases with. With higher, the interference limit of the primary user is relaxed, the secondary user can transmit with higher power, and the throughput is enhanced.
Oppositely, under the interference-constrained transmission, the secondary user throughput as a function of the SNR of the primary user is shown in Fig. 3. Notice that the secondary user throughput decreases with the increase with the SNR of the primary user. Differently from the sensing-based transmission, as the SNR of the primary user increases, the interference from the primary transmitter greatly degrades the secondary user throughput as in (10). Similar to that of the sensing-based transmission, it is observed that the secondary user throughput increases with.
We then compare the throughput performance of the sensing-based transmission with the interference-constrained transmission in Fig. 4, Fig. 5, and Fig. 6.
Fig. 4 depicts the secondary user throughput of both the sensing-based and the interference-constrained transmission as a function of the interference threshold of the primary receiver. The secondary user throughput increases with the increase ofin both schemes. However, there is a crossing point at about. In lowregion, the sensing-based transmission achieves higher throughput, but in the highregion, the interference-constrained transmission outperforms the other.
Fig. 5 shows the secondary user throughput as a function of the distance ratio. Asincreases, the primary receiver becomes farther from the secondary transmitter. Then, the spectrum opportunity of the secondary user increases and the throughput is also increased. However, the throughput is saturated in the sensing-based scheme while the throughput is sharply increasing in the interference-constrained scheme. Thus, the effect of the interference threshold is more sensitive to the interference-constrained transmission.
Fig. 6 shows the secondary user throughput as a function of the distance ratio. Notice that asincreases, the throughput by the sensing-based scheme decreases while that by the interference-constrained scheme increases. If the primary transmitter goes farther from the secondary receiver, it becomes difficult to sense the primary user and the throughput degrades in the sensing-based scheme but the interference decreases and the throughput is enhanced in the interference-constrained scheme.
We have discussed the achievable throughput of both the sensing-based and interference-constrained transmission in cognitive radio networks. The derivations of both schemes are presented and their throughput performances have been compared in various environments via computer simulations. In conclusion, the sensing-based scheme is advantageous when the interference threshold is tight and the primary and secondary users are relatively close. Oppositely, the interference-constrained scheme is better when the interference threshold is loose and the primary transmitter and receiver are located far from the secondary user.
Gosan Noh and Daesik Hong (November 1st 2009). Achievable Throughput Comparison of Sensing-Based and Interference-Constrained Transmissions in Cognitive Radio Networks, Cognitive Radio Systems, Wei Wang, IntechOpen, DOI: 10.5772/7832. Available from:
Over 21,000 IntechOpen readers like this topic
Help us write another book on this subject and reach those readers
A Novel PFC Circuit for Three-Phase Utilizing Single Switching Device
By Keiju Matsui and Masaru Hasegawa
We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.