247 research outputs found

    Performance enhancement solutions in wireless communication networks

    Get PDF
    In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations. First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput. Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol). Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo. Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost. Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol). Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově

    Performance of DF Incremental Relaying with Energy Harvesting Relays in Underlay CRNs

    Full text link
    In this paper, we analyze the throughput performance of incremental relaying using energy harvesting (EH) decode-and-forward (DF) relays in underlay cognitive radio networks (CRNs). The destination combines the direct and relayed signals when the direct link is in outage. From the derived closed-form expressions, we present an expression for the power-splitting parameter of the EH relay that optimizes the throughput performance. We demonstrate that relaying using EH DF relays results in better performance than direct signalling without a relay only when the destination combines the direct signal from the source with the relayed signal. Computer simulations demonstrate accuracy of the derived expressions

    Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications

    Full text link
    In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying. In return, it gets access to the spectrum of the PUs to enable its own transmission to SU-receiver (SU-Rx). Further, in order to support sustainable operation of the network, SU-Tx is assumed to harvest energy from the RF signals received from the PUs, using the technique of simultaneous wireless information and power transfer (SWIPT). Assuming a decode-and-forward behaviour and power-splitting based relaying protocol at SU-Tx, closed form expressions for outage probability of PU and SU are obtained. Simulation results validate our analytical results and illustrate spectrum-efficiency and energy-efficiency advantages of the proposed system over one-way relaying.Comment: 15 pages, 5 figures, Submitted to IEEE Transactions on Vehicular Technolog

    Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications

    Full text link
    In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying. In return, it gets access to the spectrum of the PUs to enable its own transmission to SU-receiver (SU-Rx). Further, in order to support sustainable operation of the network, SU-Tx is assumed to harvest energy from the RF signals received from the PUs, using the technique of simultaneous wireless information and power transfer (SWIPT). Assuming a decode-and-forward behaviour and power-splitting based relaying protocol at SU-Tx, closed form expressions for outage probability of PU and SU are obtained. Simulation results validate our analytical results and illustrate spectrum-efficiency and energy-efficiency advantages of the proposed system over one-way relaying.Comment: 15 pages, 5 figures, Submitted to IEEE Transactions on Vehicular Technolog

    Cooperation and Underlay Mode Selection in Cognitive Radio Network

    Full text link
    In this research, we proposes a new method for cooperation and underlay mode selection in cognitive radio networks. We characterize the maximum achievable throughput of our proposed method of hybrid spectrum sharing. Hybrid spectrum sharing is assumed where the Secondary User (SU) can access the Primary User (PU) channel in two modes, underlay mode or cooperative mode with admission control. In addition to access the channel in the overlay mode, secondary user is allowed to occupy the channel currently occupied by the primary user but with small transmission power. Adding the underlay access modes attains more opportunities to the secondary user to transmit data. It is proposed that the secondary user can only exploits the underlay access when the channel of the primary user direct link is good or predicted to be in non-outage state. Therefore, the secondary user could switch between underlay spectrum sharing and cooperation with the primary user. Hybrid access is regulated through monitoring the state of the primary link. By observing the simulation results, the proposed model attains noticeable improvement in the system performance in terms of maximum secondary user throughput than the conventional cooperation and non-cooperation schemes

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116

    Outage performance of underlay cognitive radio networks over mix fading environment

    Get PDF
    In this paper, the underlay cognitive radio network over mix fading environment is presented and investigated. A cooperative cognitive system with a secondary source node S, a secondary destination node D, secondary relay node Relay, and a primary node P are considered. In this model system, we consider the mix fading environment in two scenarios as Rayleigh/Nakagami-m and Nakagami-m/Rayleigh Fading channels. For system performance analysis, the closed-form expression of the system outage probability (OP) and the integral-formed expression of the ergodic capacity (EC) are derived in connection with the system's primary parameters. Finally, we proposed the Monte Carlo simulation for convincing the correctness of the system performance
    corecore