5 research outputs found

    Spectrum Sensing and Multiple Access Schemes for Cognitive Radio Networks

    Get PDF
    Increasing demands on the radio spectrum have driven wireless engineers to rethink approaches by which devices should access this natural, and arguably scarce, re- source. Cognitive Radio (CR) has arisen as a new wireless communication paradigm aimed at solving the spectrum underutilization problem. In this thesis, we explore a novel variety of techniques aimed at spectrum sensing which serves as a fundamental mechanism to find unused portions of the electromagnetic spectrum. We present several spectrum sensing methods based on multiple antennas and evaluate their receiving operating characteristics. We study a cyclostationary feature detection technique by means of multiple cyclic frequencies. We make use of a spec- trum sensing method called sequential analysis that allows us to significantly decrease the time needed for detecting the presence of a licensed user. We extend this scheme allowing each CR user to perform the sequential analysis algorithm and send their local decision to a fusion centre. This enables for an average faster and more accurate detection. We present an original technique for accounting for spatial and temporal cor- relation influence in spectrum sensing. This reflects on the impact of the scattering environment on detection methods using multiple antennas. The approach is based on the scattering geometry and resulting correlation properties of the received signal at each CR device. Finally, the problem of spectrum sharing for CR networks is addressed in or- der to take advantage of the detected unused frequency bands. We proposed a new multiple access scheme based on the Game Theory. We examine the scenario where a random number of CR users (considered as players) compete to access the radio spec- trum. We calculate the optimal probability of transmission which maximizes the CR throughput along with the minimum harm caused to the licensed users’ performance

    Novel Network Paradigms: Microfluidic and M2M Communications

    Get PDF
    The present thesis focuses on two appealing paradigms that are expected to characterize the next generation of communication systems: microfluidic networking and Machine to Machine (M2M) Communications. Concerning the former topic, we show how it is possible to introduce switching and routing mechanism in microfluidic systems. We define some simple mathematical models that capture the macroscopic behavior of droplets in microfluidic networks. Then, we use them to implement a simulator that is able to reproduce the motion and predict the path of droplets in a generic microfluidic system. We validate the simulator and apply it to design a network with bus topology. Finally, we prove the feasibility of attaining molecular communication in this domain by describing a simple protocol that exploits droplets length/interdistance modulation to send information. The research activity on M2M, instead, is aimed at the investigation of two critical issues that are expected to affect Machine-Type Communication (MTC), i.e. energy efficiency and massive access. Regarding energy efficiency, we address the problem of delivering a fixed data payload over a Rayleigh fading wireless channel with the purpose of minimizing the average total energy cost, given by the sum of the transmit energy and an overhead circuit energy, to complete it. This scenario is well suited for uplink cellular MTC in future 5G Internet of Things (IoT) use cases, where the focus is more on device energy efficiency than on throughput. We describe the optimal transmission policies to be used under various coordinated access scenarios with different levels of channel state information and transmitter/receiver capabilities, and show the corresponding theoretical bounds. In the last part of the work, we study the asymptotic performance of uncoordinated access schemes with Multi Packet Reception (MPR) and Successive Interference Cancellation (SIC) techniques for contention resolution at the receiver. The corresponding results in terms of throughput in a massive access M2M scenario are finally evaluated and discussed
    corecore