24,667 research outputs found
Network-Level Performance Evaluation of a Two-Relay Cooperative Random Access Wireless System
In wireless networks relay nodes can be used to assist the users'
transmissions to reach their destination. Work on relay cooperation, from a
physical layer perspective, has up to now yielded well-known results. This
paper takes a different stance focusing on network-level cooperation. Extending
previous results for a single relay, we investigate here the benefits from the
deployment of a second one. We assume that the two relays do not generate
packets of their own and the system employs random access to the medium; we
further consider slotted time and that the users have saturated queues. We
obtain analytical expressions for the arrival and service rates of the queues
of the two relays and the stability conditions. We investigate a model of the
system, in which the users are divided into clusters, each being served by one
relay, and show its advantages in terms of aggregate and throughput per user.
We quantify the above, analytically for the case of the collision channel and
through simulations for the case of Multi-Packet Reception (MPR), and we
provide insight on when the deployment of a second relay in the system can
yield significant advantages.Comment: Submitted for journal publicatio
Optimal Selection of Spectrum Sensing Duration for an Energy Harvesting Cognitive Radio
In this paper, we consider a time-slotted cognitive radio (CR) setting with
buffered and energy harvesting primary and CR users. At the beginning of each
time slot, the CR user probabilistically chooses the spectrum sensing duration
from a predefined set. If the primary user (PU) is sensed to be inactive, the
CR user accesses the channel immediately. The CR user optimizes the sensing
duration probabilities in order to maximize its mean data service rate with
constraints on the stability of the primary and cognitive queues. The
optimization problem is split into two subproblems. The first is a
linear-fractional program, and the other is a linear program. Both subproblems
can be solved efficiently.Comment: Accepted in GLOBECOM 201
Optimal Spectrum Access for Cognitive Radios
In this paper, we investigate a time-slotted cognitive setting with buffered
primary and secondary users. In order to alleviate the negative effects of
misdetection and false alarm probabilities, a novel design of spectrum access
mechanism is proposed. We propose two schemes. First, the SU senses primary
channel to exploit the periods of silence, if the PU is declared to be idle,
the SU randomly accesses the channel with some access probability .
Second, in addition to accessing the channel if the PU is idle, the SU possibly
accesses the channel if it is declared to be busy with some access probability
. The access probabilities as function of the misdetection, false alarm
and average primary arrival rate are obtained via solving an optimization
problem designed to maximize the secondary service rate given a constraint on
primary queue stability. In addition, we propose a variable sensing duration
schemes where the SU optimizes over the optimal sensing time to achieve the
maximum stable throughput of the network. The results reveal the performance
gains of the proposed schemes over the conventional sensing scheme. We propose
a method to estimate the mean arrival rate and the outage probability of the PU
based on the primary feedback channel, i.e., acknowledgments (ACKs) and
negative-acknowledgments (NACKs) messages.Comment: arXiv admin note: substantial text overlap with arXiv:1206.615
Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
We consider a secondary user (SU) with energy harvesting capability. We
design access schemes for the SU which incorporate random spectrum sensing and
random access, and which make use of the primary automatic repeat request (ARQ)
feedback. We study two problem-formulations. In the first problem-formulation,
we characterize the stability region of the proposed schemes. The sensing and
access probabilities are obtained such that the secondary throughput is
maximized under the constraints that both the primary and secondary queues are
stable. Whereas in the second problem-formulation, the sensing and access
probabilities are obtained such that the secondary throughput is maximized
under the stability of the primary queue and that the primary queueing delay is
kept lower than a specified value needed to guarantee a certain quality of
service (QoS) for the primary user (PU). We consider spectrum sensing errors
and assume multipacket reception (MPR) capabilities. Numerical results show the
enhanced performance of our proposed systems.Comment: ACCEPTED in EAI Endorsed Transactions on Cognitive Communications.
arXiv admin note: substantial text overlap with arXiv:1208.565
Effect of Energy Harvesting on Stable Throughput in Cooperative Relay Systems
In this paper, the impact of energy constraints on a two-hop network with a
source, a relay and a destination under random medium access is studied. A
collision channel with erasures is considered, and the source and the relay
nodes have energy harvesting capabilities and an unlimited battery to store the
harvested energy. Additionally, the source and the relay node have external
traffic arrivals and the relay forwards a fraction of the source node's traffic
to the destination; the cooperation is performed at the network level. An inner
and an outer bound of the stability region for a given transmission probability
vector are obtained. Then, the closure of the inner and the outer bound is
obtained separately and they turn out to be identical. This work is not only a
step in connecting information theory and networking, by studying the maximum
stable throughput region metric but also it taps the relatively unexplored and
important domain of energy harvesting and assesses the effect of that on this
important measure.Comment: 20 pages, 4 figure
Relay-assisted Multiple Access with Full-duplex Multi-Packet Reception
The effect of full-duplex cooperative relaying in a random access multiuser
network is investigated here. First, we model the self-interference incurred
due to full-duplex operation, assuming multi-packet reception capabilities for
both the relay and the destination node. Traffic at the source nodes is
considered saturated and the cooperative relay, which does not have packets of
its own, stores a source packet that it receives successfully in its queue when
the transmission to the destination has failed. We obtain analytical
expressions for key performance metrics at the relay, such as arrival and
service rates, stability conditions, and average queue length, as functions of
the transmission probabilities, the self interference coefficient, and the
links' outage probabilities. Furthermore, we study the impact of the relay node
and the self-interference coefficient on the per-user and aggregate throughput,
and the average delay per packet. We show that perfect self-interference
cancelation plays a crucial role when the SINR threshold is small, since it may
result to worse performance in throughput and delay comparing with the
half-duplex case. This is because perfect self-interference cancelation can
cause an unstable queue at the relay under some conditions.Comment: Accepted for publication in the IEEE Transactions on Wireless
Communication
On the Stability of Random Multiple Access with Feedback Exploitation and Queue Priority
In this paper, we study the stability of two interacting queues under random
multiple access in which the queues leverage the feedback information. We
derive the stability region under random multiple access where one of the two
queues exploits the feedback information and backs off under negative
acknowledgement (NACK) and the other, higher priority, queue will access the
channel with probability one. We characterize the stability region of this
feedback-based random access protocol and prove that this derived stability
region encloses the stability region of the conventional random access (RA)
scheme that does not exploit the feedback information
- …