132 research outputs found

    Improving the Cognitive Access Efficiency by Non-Uniform Bandwidth Allocation

    Full text link

    Dirty RF Signal Processing for Mitigation of Receiver Front-end Non-linearity

    Get PDF
    Moderne drahtlose Kommunikationssysteme stellen hohe und teilweise gegensätzliche Anforderungen an die Hardware der Funkmodule, wie z.B. niedriger Energieverbrauch, große Bandbreite und hohe Linearität. Die Gewährleistung einer ausreichenden Linearität ist, neben anderen analogen Parametern, eine Herausforderung im praktischen Design der Funkmodule. Der Fokus der Dissertation liegt auf breitbandigen HF-Frontends für Software-konfigurierbare Funkmodule, die seit einigen Jahren kommerziell verfügbar sind. Die praktischen Herausforderungen und Grenzen solcher flexiblen Funkmodule offenbaren sich vor allem im realen Experiment. Eines der Hauptprobleme ist die Sicherstellung einer ausreichenden analogen Performanz über einen weiten Frequenzbereich. Aus einer Vielzahl an analogen Störeffekten behandelt die Arbeit die Analyse und Minderung von Nichtlinearitäten in Empfängern mit direkt-umsetzender Architektur. Im Vordergrund stehen dabei Signalverarbeitungsstrategien zur Minderung nichtlinear verursachter Interferenz - ein Algorithmus, der besser unter "Dirty RF"-Techniken bekannt ist. Ein digitales Verfahren nach der Vorwärtskopplung wird durch intensive Simulationen, Messungen und Implementierung in realer Hardware verifiziert. Um die Lücken zwischen Theorie und praktischer Anwendbarkeit zu schließen und das Verfahren in reale Funkmodule zu integrieren, werden verschiedene Untersuchungen durchgeführt. Hierzu wird ein erweitertes Verhaltensmodell entwickelt, das die Struktur direkt-umsetzender Empfänger am besten nachbildet und damit alle Verzerrungen im HF- und Basisband erfasst. Darüber hinaus wird die Leistungsfähigkeit des Algorithmus unter realen Funkkanal-Bedingungen untersucht. Zusätzlich folgt die Vorstellung einer ressourceneffizienten Echtzeit-Implementierung des Verfahrens auf einem FPGA. Abschließend diskutiert die Arbeit verschiedene Anwendungsfelder, darunter spektrales Sensing, robuster GSM-Empfang und GSM-basiertes Passivradar. Es wird gezeigt, dass nichtlineare Verzerrungen erfolgreich in der digitalen Domäne gemindert werden können, wodurch die Bitfehlerrate gestörter modulierter Signale sinkt und der Anteil nichtlinear verursachter Interferenz minimiert wird. Schließlich kann durch das Verfahren die effektive Linearität des HF-Frontends stark erhöht werden. Damit wird der zuverlässige Betrieb eines einfachen Funkmoduls unter dem Einfluss der Empfängernichtlinearität möglich. Aufgrund des flexiblen Designs ist der Algorithmus für breitbandige Empfänger universal einsetzbar und ist nicht auf Software-konfigurierbare Funkmodule beschränkt.Today's wireless communication systems place high requirements on the radio's hardware that are largely mutually exclusive, such as low power consumption, wide bandwidth, and high linearity. Achieving a sufficient linearity, among other analogue characteristics, is a challenging issue in practical transceiver design. The focus of this thesis is on wideband receiver RF front-ends for software defined radio technology, which became commercially available in the recent years. Practical challenges and limitations are being revealed in real-world experiments with these radios. One of the main problems is to ensure a sufficient RF performance of the front-end over a wide bandwidth. The thesis covers the analysis and mitigation of receiver non-linearity of typical direct-conversion receiver architectures, among other RF impairments. The main focus is on DSP-based algorithms for mitigating non-linearly induced interference, an approach also known as "Dirty RF" signal processing techniques. The conceived digital feedforward mitigation algorithm is verified through extensive simulations, RF measurements, and implementation in real hardware. Various studies are carried out that bridge the gap between theory and practical applicability of this approach, especially with the aim of integrating that technique into real devices. To this end, an advanced baseband behavioural model is developed that matches to direct-conversion receiver architectures as close as possible, and thus considers all generated distortions at RF and baseband. In addition, the algorithm's performance is verified under challenging fading conditions. Moreover, the thesis presents a resource-efficient real-time implementation of the proposed solution on an FPGA. Finally, different use cases are covered in the thesis that includes spectrum monitoring or sensing, GSM downlink reception, and GSM-based passive radar. It is shown that non-linear distortions can be successfully mitigated at system level in the digital domain, thereby decreasing the bit error rate of distorted modulated signals and reducing the amount of non-linearly induced interference. Finally, the effective linearity of the front-end is increased substantially. Thus, the proper operation of a low-cost radio under presence of receiver non-linearity is possible. Due to the flexible design, the algorithm is generally applicable for wideband receivers and is not restricted to software defined radios

    Distributed spectrum leasing via cooperation

    Get PDF
    “Cognitive radio” networks enable the coexistence of primary (licensed) and secondary (unlicensed) terminals. Conventional frameworks, namely commons and property-rights models, while being promising in certain aspects, appear to have significant drawbacks for implementation of large-scale distributed cognitive radio networks, due to the technological and theoretical limits on the ability of secondary activity to perform effective spectrum sensing and on the stringent constraints on protocols and architectures. To address the problems highlighted above, the framework of distributed spectrum leasing via cross-layer cooperation (DiSC) has been recently proposed as a basic mechanism to guide the design of decentralized cognitive radio networks. According to this framework, each primary terminal can ”lease” a transmission opportunity to a local secondary terminal in exchange for cooperation (relaying) as long as secondary quality-of-service (QoS) requirements are satisfied. The dissertation starts by investigating the performance bounds from an information-theoretical standpoint by focusing on the scenario of a single primary user and multiple secondary users with private messages. Achievable rate regions are derived for discrete memoryless and Gaussian models by considering Decode-and-Forward (DF), with both standard and parity-forwarding techniques, and Compress-and-Forward (CF), along with superposition coding at the secondary nodes. Then a framework is proposed that extends the analysis to multiple primary users and multiple secondary users by leveraging the concept of Generalized Nash Equilibrium. Accordingly, multiple primary users, each owning its own spectral resource, compete for the cooperation of the available secondary users under a shared constraint on all spectrum leasing decisions set by the secondary QoS requirements. A general formulation of the problem is given and solutions are proposed with different signaling requirements among the primary users. The novel idea of interference forwarding as a mechanism to enable DiSC is proposed, whereby primary users lease part of their spectrum to the secondary users if the latter assist by forwarding information about the interference to enable interference mitigation at the primary receivers. Finally, an application of DiSC in multi-tier wireless networks such as femtocells overlaid by macrocells whereby the femtocell base station acts as a relay for the macrocell users is presented. The performance advantages of the proposed application are evaluated by studying the transmission reliability of macro and femto users for a quasi-static fading channel in terms of outage probability and diversity-multiplexing trade-off for uplink and, more briefly, for downlink

    RIScatter: unifying backscatter communication and reconfigurable intelligent surface

    Get PDF
    Backscatter Communication (BackCom) nodes harvest energy from and modulate information over an external electromagnetic wave. Reconfigurable Intelligent Surface (RIS) adapts its phase shift response to enhance or attenuate channel strength in specific directions. In this paper, we show how those two seemingly different technologies (and their derivatives) can be unified to leverage their benefits simultaneously into a single architecture called RIScatter. RIScatter consists of multiple dispersed or co-located scatter nodes, whose reflection states can be adapted to partially engineer the wireless channel of the existing link and partially modulate their own information onto the scattered wave. This contrasts with BackCom (resp. RIS) where the reflection pattern is exclusively a function of the information symbol (resp. Channel State Information (CSI)). The key principle in RIScatter is to render the probability distribution of reflection states (i.e., backscatter channel input) as a joint function of the information source, CSI, and Quality of Service (QoS) of the coexisting active primary and passive backscatter links. This enables RIScatter to softly bridge, generalize, and outperform BackCom and RIS; boil down to either under specific input distribution; or evolve in a mixed form for heterogeneous traffic control and universal hardware design. For a single-user multi-node RIScatter network, we characterize the achievable primary-(total-)backscatter rate region by optimizing the input distribution at the nodes, the active beamforming at the Access Point (AP), and the backscatter detection regions at the user. Simulation results demonstrate RIScatter nodes can exploit the additional propagation paths to smoothly transition between backscatter modulation and passive beamforming

    Mathematical optimization techniques for resource allocation and spatial multiplexing in spectrum sharing networks

    Get PDF
    Due to introduction of smart phones with data intensive multimedia and interactive applications and exponential growth of wireless devices, there is a shortage for useful radio spectrum. Even though the spectrum has become crowded, many spectrum occupancy measurements indicate that most of the allocated spectrum is underutilised. Hence radically new approaches in terms of allocation of wireless resources are required for better utilization of radio spectrum. This has motivated the concept of opportunistic spectrum sharing or the so-called cognitive radio technology that has great potential to improve spectrum utilization. The cognitive radio technology allows an opportunistic user namely the secondary user to access the spectrum of the licensed user (known as primary user) provided that the secondary transmission does not harmfully affect the primary user. This is possible with the introduction of advanced resource allocation techniques together with the use of wireless relays and spatial diversity techniques. In this thesis, various mathematical optimization techniques have been developed for the efficient use of radio spectrum within the context of spectrum sharing networks. In particular, optimal power allocation techniques and centralised and distributed beamforming techniques have been developed. Initially, an optimization technique for subcarrier and power allocation has been proposed for an Orthogonal Frequency Division Multiple Access (OFDMA) based secondary wireless network in the presence of multiple primary users. The solution is based on integer linear programming with multiple interference leakage and transmission power constraints. In order to enhance the spectrum efficiency further, the work has been extended to allow multiple secondary users to occupy the same frequency band under a multiple-input and multiple-output (MIMO) framework. A sum rate maximization technique based on uplink-downlink duality and dirty paper coding has been developed for the MIMO based OFDMA network. The work has also been extended to handle fading scenarios based on maximization of ergodic capacity. The optimization techniques for MIMO network has been extended to a spectrum sharing network with relays. This has the advantage of extending the coverage of the secondary network and assisting the primary network in return for the use of the primary spectrum. Finally, instead of considering interference mitigation, the recently emerged concept of interference alignment has been used for the resource allocation in spectrum sharing networks. The performances of all these new algorithms have been demonstrated using MATLAB based simulation studies

    Cooperative diversity techniques for high-throughput wireless relay networks

    Get PDF
    Relay communications has attracted a growing interest in wireless communications with application to various enhanced technologies. This thesis considers a number of issues related to data throughput in various wireless relay network models. Particularly, new implementations of network coding (NC) and space-time coding (STC) techniques are investigated to offer various means of achieving high-throughput relay communications. Firstly, this thesis investigates different practical automatic repeat request (ARQ) retransmission protocols based on NC for two-way wireless relay networks to improve throughput efficiency. Two improved NC-based ARQ schemes are designed based on go-back-N and selective-repeat (SR) protocols. Addressing ARQ issues in multisource multidestination relay networks, a new NC-based ARQ protocol is proposed and two packet-combination algorithms are developed for retransmissions at relay and sources to significantly improve the throughput. In relation to the concept of channel quality indicator (CQI) reporting in two-way relay networks, two new efficient CQI reporting schemes are designed based on NC to improve the system throughput by allowing two terminals to simultaneously estimate the CQI of the distant terminal-relay link without incurring additional overhead. The transmission time for CQI feedback at the relays is reduced by half while the increase in complexity and the loss of performance are shown to be negligible. Furthermore, a low-complexity relay selection scheme is suggested to reduce the relay searching complexity. For the acknowledgment (ACK) process, this thesis proposes a new block ACK scheme based on NC to significantly reduce the ACK overheads and therefore produce an enhanced throughput. The proposed scheme is also shown to improve the reliability of block ACK transmission and reduce the number of data retransmissions for a higher system throughput. Additionally, this thesis presents a new cooperative retransmission scheme based on relay cooperation and NC to considerably reduce the number of retransmission packets and im- prove the reliability of retransmissions for a more power efficient and higher throughput system with non-overlapped retransmissions. Moreover, two relay selection schemes are recommended to determine the optimised number of relays for the retransmission. Finally, with respect to cognitive wireless relay networks (CWRNs), this thesis proposes a new cooperative spectrum sensing (CSS) scheme to improve the spectrum sensing performance and design a new CSS scheme based on NC for three-hop CWRNs to improve system throughput. Furthermore, a new distributed space-time-frequency block code (DSTFBC) is designed for a two- hop nonregenerative CWRN over frequency-selective fading channels. The proposed DSTFBC design achieves higher data rate, spatial diversity gain, and decoupling detection of data blocks at all destination nodes with a low-complexity receiver structure

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    D11.2 Consolidated results on the performance limits of wireless communications

    Get PDF
    Deliverable D11.2 del projecte europeu NEWCOM#The report presents the Intermediate Results of N# JRAs on Performance Limits of Wireless Communications and highlights the fundamental issues that have been investigated by the WP1.1. The report illustrates the Joint Research Activities (JRAs) already identified during the first year of the project which are currently ongoing. For each activity there is a description, an illustration of the adherence and relevance with the identified fundamental open issues, a short presentation of the preliminary results, and a roadmap for the joint research work in the next year. Appendices for each JRA give technical details on the scientific activity in each JRA.Peer ReviewedPreprin
    corecore