2,362 research outputs found
Generic Multiuser Coordinated Beamforming for Underlay Spectrum Sharing
The beamforming techniques have been recently studied as possible enablers
for underlay spectrum sharing. The existing beamforming techniques have several
common limitations: they are usually system model specific, cannot operate with
arbitrary number of transmit/receive antennas, and cannot serve arbitrary
number of users. Moreover, the beamforming techniques for underlay spectrum
sharing do not consider the interference originating from the incumbent primary
system. This work extends the common underlay sharing model by incorporating
the interference originating from the incumbent system into generic combined
beamforming design that can be applied on interference, broadcast or multiple
access channels. The paper proposes two novel multiuser beamforming algorithms
for user fairness and sum rate maximization, utilizing newly derived convex
optimization problems for transmit and receive beamformers calculation in a
recursive optimization. Both beamforming algorithms provide efficient operation
for the interference, broadcast and multiple access channels, as well as for
arbitrary number of antennas and secondary users in the system. Furthermore,
the paper proposes a successive transmit/receive optimization approach that
reduces the computational complexity of the proposed recursive algorithms. The
results show that the proposed complexity reduction significantly improves the
convergence rates and can facilitate their operation in scenarios which require
agile beamformers computation.Comment: 30 pages, 5 figure
Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks
Conventional cellular wireless networks were designed with the purpose of
providing high throughput for the user and high capacity for the service
provider, without any provisions of energy efficiency. As a result, these
networks have an enormous Carbon footprint. In this paper, we describe the
sources of the inefficiencies in such networks. First we present results of the
studies on how much Carbon footprint such networks generate. We also discuss
how much more mobile traffic is expected to increase so that this Carbon
footprint will even increase tremendously more. We then discuss specific
sources of inefficiency and potential sources of improvement at the physical
layer as well as at higher layers of the communication protocol hierarchy. In
particular, considering that most of the energy inefficiency in cellular
wireless networks is at the base stations, we discuss multi-tier networks and
point to the potential of exploiting mobility patterns in order to use base
station energy judiciously. We then investigate potential methods to reduce
this inefficiency and quantify their individual contributions. By a
consideration of the combination of all potential gains, we conclude that an
improvement in energy consumption in cellular wireless networks by two orders
of magnitude, or even more, is possible.Comment: arXiv admin note: text overlap with arXiv:1210.843
Interference Alignment for Cognitive Radio Communications and Networks: A Survey
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.Peer reviewe
RF-Powered Cognitive Radio Networks: Technical Challenges and Limitations
The increasing demand for spectral and energy efficient communication
networks has spurred a great interest in energy harvesting (EH) cognitive radio
networks (CRNs). Such a revolutionary technology represents a paradigm shift in
the development of wireless networks, as it can simultaneously enable the
efficient use of the available spectrum and the exploitation of radio frequency
(RF) energy in order to reduce the reliance on traditional energy sources. This
is mainly triggered by the recent advancements in microelectronics that puts
forward RF energy harvesting as a plausible technique in the near future. On
the other hand, it is suggested that the operation of a network relying on
harvested energy needs to be redesigned to allow the network to reliably
function in the long term. To this end, the aim of this survey paper is to
provide a comprehensive overview of the recent development and the challenges
regarding the operation of CRNs powered by RF energy. In addition, the
potential open issues that might be considered for the future research are also
discussed in this paper.Comment: 8 pages, 2 figures, 1 table, Accepted in IEEE Communications Magazin
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Simultaneous Transmission and Reception: Algorithm, Design and System Level Performance
Full Duplex or Simultaneous transmission and reception (STR) in the same
frequency at the same time can potentially double the physical layer capacity.
However, high power transmit signal will appear at receive chain as echoes with
powers much higher than the desired received signal. Therefore, in order to
achieve the potential gain, it is imperative to cancel these echoes. As these
high power echoes can saturate low noise amplifier (LNA) and also digital
domain echo cancellation requires unrealistically high resolution
analog-to-digital converter (ADC), the echoes should be cancelled or suppressed
sufficiently before LNA. In this paper we present a closed-loop echo
cancellation technique which can be implemented purely in analogue domain. The
advantages of our method are multiple-fold: it is robust to phase noise, does
not require additional set of antennas, can be applied to wideband signals and
the performance is irrelevant to radio frequency (RF) impairments in transmit
chain. Next, we study a few protocols for STR systems in carrier sense multiple
access (CSMA) network and investigate MAC level throughput with realistic
assumptions in both single cell and multiple cells. We show that STR can reduce
hidden node problem in CSMA network and produce gains of up to 279% in maximum
throughput in such networks. Finally, we investigate the application of STR in
cellular systems and study two new unique interferences introduced to the
system due to STR, namely BS-BS interference and UE-UE interference. We show
that these two new interferences will hugely degrade system performance if not
treated appropriately. We propose novel methods to reduce both interferences
and investigate the performances in system level.Comment: 20 pages. This manuscript will appear in the IEEE Transactions on
Wireless Communication
- …