8 research outputs found

    Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference

    Get PDF
    In this paper, we propose an adaptive Medium Access Control (MAC) protocol for full-duplex (FD) cognitive radio networks in which FD secondary users (SUs) perform channel contention followed by concurrent spectrum sensing and transmission, and transmission only with maximum power in two different stages (called the FD sensing and transmission stages, respectively) in each contention and access cycle. The proposed FD cognitive MAC (FDC-MAC) protocol does not require synchronization among SUs and it efficiently utilizes the spectrum and mitigates the self-interference in the FD transceiver. We then develop a mathematical model to analyze the throughput performance of the FDC-MAC protocol where both half-duplex (HD) transmission (HDTx) and FD transmission (FDTx) modes are considered in the transmission stage. Then, we study the FDC-MAC configuration optimization through adaptively controlling the spectrum sensing duration and transmit power level in the FD sensing stage where we prove that there exists optimal sensing time and transmit power to achieve the maximum throughput and we develop an algorithm to configure the proposed FDC-MAC protocol. Extensive numerical results are presented to illustrate the characteristic of the optimal FDC-MAC configuration and the impacts of protocol parameters and the self-interference cancellation quality on the throughput performance. Moreover, we demonstrate the significant throughput gains of the FDC-MAC protocol with respect to existing half-duplex MAC (HD MAC) and single-stage FD MAC protocols.Comment: To Appear, IEEE Access, 201

    Comprehensive survey on quality of service provisioning approaches in cognitive radio networks : part one

    Get PDF
    Much interest in Cognitive Radio Networks (CRNs) has been raised recently by enabling unlicensed (secondary) users to utilize the unused portions of the licensed spectrum. CRN utilization of residual spectrum bands of Primary (licensed) Networks (PNs) must avoid harmful interference to the users of PNs and other overlapping CRNs. The coexisting of CRNs depends on four components: Spectrum Sensing, Spectrum Decision, Spectrum Sharing, and Spectrum Mobility. Various approaches have been proposed to improve Quality of Service (QoS) provisioning in CRNs within fluctuating spectrum availability. However, CRN implementation poses many technical challenges due to a sporadic usage of licensed spectrum bands, which will be increased after deploying CRNs. Unlike traditional surveys of CRNs, this paper addresses QoS provisioning approaches of CRN components and provides an up-to-date comprehensive survey of the recent improvement in these approaches. Major features of the open research challenges of each approach are investigated. Due to the extensive nature of the topic, this paper is the first part of the survey which investigates QoS approaches on spectrum sensing and decision components respectively. The remaining approaches of spectrum sharing and mobility components will be investigated in the next part

    An Efficient Relay Selection Strategy for Random Cognitive Relay Networks

    No full text

    Towards realisation of spectrum sharing of cognitive radio networks

    Get PDF
    Cognitive radio networks (CRN) have emerged as a promising solution to spectrum shortcoming, thanks to Professor Mitola who coined Cognitive Radios. To enable efficient communications, CRNs need to avoid interference to both Primary (licensee) Users (PUs), and among themselves (called self-coexistence). In this thesis, we focus on self-coexistence issues. Very briefly, the problems are categorised into intentional and unintentional interference. Firstly, unintentional interference includes: 1) CRNs administration; 2) Overcrowded CRNs Situation; 3) Missed spectrum detection; 4) Inter-cell Interference (ICI); and 5) Inability to model Secondary Users’ (SUs) activity. In intentional interference there is Primary User Emulation Attack (PUEA). To administer CRN operations (Prob. 1), in our first contribution, we proposed CogMnet, which aims to manage the spectrum sharing of centralised networks. CogMnet divides the country into locations. It then dedicates a real-time database for each location to record CRNs’ utilisations in real time, where each database includes three storage units: Networks locations storage unit; Real-time storage unit; and Historical storage unit. To tackle Prob. 2, our second contribution is CRNAC, a network admission control algorithm that aims to calculate the maximum number of CRNs allowed in any location. CRNAC has been tested and evaluated using MATLAB. To prevent research problems 3, 4, and to tackle research problem (5), our third contribution is RCNC, a new design for an infrastructure-based CRN core. The architecture of RCNC consists of two engines: Monitor and Coordinator Engine (MNCE) and Modified Cognitive Engine (MCE). Comprehensive simulation scenarios using ICS Designer (by ATDI) have validated some of RCNC’s components. In the last contribution, to deter PUEA (the intentional interference type), we developed a PUEA Deterrent (PUED) algorithm capable of detecting PUEAs commission details. PUED must be implemented by a PUEA Identifier Component in the MNCE in RCNC after every spectrum handing off. Therefore, PUED works like a CCTV system. According to criminology, robust CCTV systems have shown a significant prevention of clear visible theft, reducing crime rates by 80%. Therefore, we believe that our algorithm will do the same. Extensive simulations using a Vienna simulator showed the effectiveness of the PUED algorithm in terms of improving CRNs’ performance
    corecore