110 research outputs found

    Performance enhancement solutions in wireless communication networks

    Get PDF
    In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations. First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput. Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol). Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo. Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost. Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol). Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově

    Enabling non-linear energy harvesting in power domain based multiple access in relaying networks: Outage and ergodic capacity performance analysis

    Get PDF
    The Power Domain-based Multiple Access (PDMA) scheme is considered as one kind of Non-Orthogonal Multiple Access (NOMA) in green communications and can support energy-limited devices by employing wireless power transfer. Such a technique is known as a lifetime-expanding solution for operations in future access policy, especially in the deployment of power-constrained relays for a three-node dual-hop system. In particular, PDMA and energy harvesting are considered as two communication concepts, which are jointly investigated in this paper. However, the dual-hop relaying network system is a popular model assuming an ideal linear energy harvesting circuit, as in recent works, while the practical system situation motivates us to concentrate on another protocol, namely non-linear energy harvesting. As important results, a closed-form formula of outage probability and ergodic capacity is studied under a practical non-linear energy harvesting model. To explore the optimal system performance in terms of outage probability and ergodic capacity, several main parameters including the energy harvesting coefficients, position allocation of each node, power allocation factors, and transmit signal-to-noise ratio (SNR) are jointly considered. To provide insights into the performance, the approximate expressions for the ergodic capacity are given. By matching analytical and Monte Carlo simulations, the correctness of this framework can be examined. With the observation of the simulation results, the figures also show that the performance of energy harvesting-aware PDMA systems under the proposed model can satisfy the requirements in real PDMA applications.Web of Science87art. no. 81

    マルチホップ無線ネットワークの特性解析に関する研究

    Get PDF
    九州工業大学博士学位論文 学位記番号:情工博甲第309号 学位授与年月日:平成28年3月25日1 Introduction||2 Impact of Transceiver Hardware Impairments on Cognitive Network||3 Case study: Two-Way Cognitive Relay in RF Energy HarvestingWireless Sensor Network||4 Soft Information Relaying Protocol||5 Overall Conclusion and FutureWorkWireless communication has been considered as the most efficient mean of data transmission. We have been witnessed the breakthrough of wireless communication era in many manifolds, such as speech, coverage area, and stability. However, frequency bands, the resource to convey information wirelessly, are limited and expensive to be granted usage licenses. Attaining the goals of ubiquitous wireless devices will require the future wireless networks stepping forward to overcome the scarcity and expensiveness of wireless frequency bands. Thus, the future wireless networks should evolve to utilize wireless frequencies more efficiently, such as cognitive relay network where non-license users are able to transmit data in the same frequency band that officially allocated to primary users. Subsequently, the transmit power of users in a cognitive network is limited and the performance is vulnerable to impairments of transceiver hardware. This dissertation aims to analyze the performance of the cognitive relay network under the impact of transceiver hardware impairments. A case study of two-way cognitive relay network is given for further investigate the impact of transceiver hardware impairments on end-to-end outage performance and throughput. Furthermore, we provide a new relaying scheme in order to lessen the impact of transceiver hardware impairment and further boost the system performance. For the purposes, this dissertation is organized into five (5) chapters. Chapter 1: Introduction. In this chapter, multihop wireless networks and the performance metrics are overviewed. In particular, the relay networks and cognitive relay networks are presented. Moreover, the general model of the practical transceiver hardware impairment is detailed for further analysis. Chapter 2: The impact of transceiver hardware impairments on cognitive relay networks. By using the general hardware impairment model for the received signal, the closed forms of outage probability of the relay network with decode-and-forward (DF) and amplify-and-forward (AF) under the impact of transceiver hardware imperfection are derived. Based on these results, we provide further discussion on transceiver hardware selection guideline. Chapter 3: Case study: two-way cognitive relaying in energy harvesting wireless sensor networks. A two-way relay wireless sensor network equipped with RF energy harvesting node is introduced. This network is aimed to be implemented in hazardous or remote areas where power supply for the relay node is difficult to maintain. In this chapter, we consider four configurations of the network with formed by combining two bidirectional relaying protocols and two wireless power transfer policies. The detailed performance analysis of outage probability and throughput of the case-study network with four configurations are presented. Based on the analysis, we provide performance comparison between the four and suggest the network configuration with the best performance. Chapter 4: Soft information relaying protocol. The soft information relaying protocol is proposed and analyzed. The analysis shows that this relaying protocol can gradually reduce the impact of transceiver hardware impairment on cognitive relay networks. Hence, soft relaying protocol is considered as a solution for cognitive relay network with cost-effective wireless transceiver devices. Chapter 5: Overall conclusion. An overall summary of the works presented in the above is provided in this chapter. Moreover, the future related work is also discussed. The results in this dissertation acknowledge the impact of transceiver hardware impairment by presenting the reduction of outage probability and throughput of the cognitive relay network. It puts forward the consideration of including the impact of transceiver hardware impairments on wireless network performance analysis, especially for the cognitive networks of which the transmit power is limited. Furthermore, a new relaying protocol, namely soft information relaying protocol, is proposed as a solution to lessen the impact of transceiver hardware impairment. The analysis shows that the impact of transceiver hardware impairment in cognitive relay network is reduced in compared to conventional relaying schemes. As a final point, we have provided a full picture of performance analysis for the cognitive relay network under the impact of transceiver hardware imperfection and the solution to reduce the performance loss by applying soft information relaying scheme. This research would contribute to boost the development of cognitive relay networks where frequency bands are used more efficiently

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116

    Enabling relay selection in non-orthogonal multiple access networks: direct and relaying mode

    Get PDF
    In this paper, we consider downlink non-orthogonal multiple access (NOMA) in which the relay selection (RS) scheme is enabled for cooperative networks. In particular, we investigate impact of the number of relays on system performance in term of outage probability. The main factors affecting on cooperative NOMA performance are fixed power allocations coefficients and the number of relay. This paper also indicate performance gap of the outage probabilities among two users the context of NOMA. To exhibit the exactness of derived formula, we match related results between simulation and analytical methods. Numerical results confirms that cooperative NOMA networks benefit from increasing the number of relay

    Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy

    Get PDF
    In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and multiple sensor relays harvest energy from multiple power transfer stations (PTSs), and then, the source uses this harvested energy to transmit information to the base station (BS) with the help of the relays. During the transmission of information, the BS typically faces a risk of losing information due to the EAVs. Thus, to enhance the secrecy of the considered system, one of the relays acts as a jammer, using harvested energy to generate interference with the EAVs. We propose a best-relay-and-best-jammer scheme for this purpose and compare this scheme with other previous schemes. The exact closed-form expression for the secrecy outage probability (SOP) is obtained and is validated through Monte Carlo simulations. A near-optimal EH time algorithm is also proposed. In addition, the effects on the SOP of key system parameters such as the EH efficiency coefficient, the EH time, the distance between the relay and BS, the number of PTSs, the number of relays, and the number of EAVs are investigated. The results indicate that the proposed scheme generally outperforms both the best-relay-and-random-jammer scheme and the random-relay-and-best-jammer scheme in terms of the secrecy capacity
    corecore