defense.a conservative approach for transmission in cognitive radios

Upload: syed-ahmed-faran

Post on 09-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    1/14

    A Conservative ApproachA Conservative Approachfor Transmission infor Transmission in

    Cognitive RadiosCognitive RadiosPresented by: Syed Ahmed Faran

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    2/14

    Contents of PaperContents of Papery I nterference considerationy Filteringy

    Channel codingy Modulationy Transmission Algorithm

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    3/14

    Why Consider Transmission?

    Why Consider Transmission?

    y The transmission parameters determinethe capabilities of a radio.

    y Transmission schemes vary dependingupon the bandwidth efficiency, powerrequirements and BER performance.

    y Efficient techniques can lead to a robustsystem design.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    4/14

    The Cognitive EnvironmentThe Cognitive Environmenty The cognitive radios form a cognitive

    network.y The cognitive radios use their intelligence

    to render the spectrum resource in anefficient manner.

    y The cognitive network has variables

    designs.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    5/14

    The Secondary UserThe Secondary Usery The cognitive radio accesses the spectrum

    as secondary user (SU).y Primary user (PU) should not suffer from

    performance degradation.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    6/14

    Accessing the Channel:Accessing the Channel:

    InterferenceInterferencey The SU can gain access to the channel in

    two ways.i) Underlay approachii) Opportunistic approach

    y I nterference caused by both methods isdifferent to the PU.

    y

    The point is to keep the interference lowto the PU.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    7/14

    G aussian FilteringG aussian Filteringy G aussian filtering is

    used to cater for outof band interference.

    y The G aussian filterused has BT productof 0.3 and 0.5.

    I mg ref: http://www.aero.org/publications/crosslink/winter2002/images/03_03.gif

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    8/14

    Channel CodingChannel Codingy G aussian filtering introduces I S I . Tradeoff!y Robust channel coding techniques are

    used cater for this interference.y Turbo codes and convolutional codes with

    rates 1/2 and 1/3 are used.y Decision of using a coding technique

    depends upon channel condition.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    9/14

    M odulationM odulationy Modulation techniques are used that

    provide low power to signal componentsleaving given frequency band.

    y MSK, 2-MSK, 16-QAM and 64-QAM areused.

    y G aussian filtering is not used with 16-QAM

    and 64-QAM.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    10/14

    TransmissionTransmission

    AlgorithmAlgorithm

    The access mode is decided first.I nterference is modeled differently.Transmission parameters adjusted

    based on the access mode used.G aussian filter used if interference

    in environment.Channel coding and modulation

    adjusted accordingly.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    11/14

    Conservativeness?Conservativeness?y I nterference to the PU is considered prior

    to maximization of the throughput for SU.y The SU is a less privileged user.y The bandwidth requirement of 2-MSK

    signal is almost same as 16-QAM.Why use it then?

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    12/14

    Transmission ParametersTransmission Parameters

    Opportunistic Access Underlay Access

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    13/14

    RefrencesRefrencesy S. Haykin, Cognitive radio: Brain-empowered wireless communications, IEEE J. Select. Areas Commun .,

    vol. 23, no. 2, pp. 201220, Feb. 2005.y FCC, Spectrum policy task force report, FCC 02-155, Nov. 2002.y J. Mitola, Cognitive Radio, Ph.D. dissertation, Royal I nstitute of Technology (KTH), Stockholm, Sweden,

    2000.y I . F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, Next generation/ dynamic spectrum

    access/cognitive radio wireless networks: a survey, E lsevier Computer Networks Journal , 50:21272159,September 2006.

    y

    Sudhir Srinivasa and Syed Ali Jafar, The throughput potential of cognitive radio: a theoretical perspective, IEEE Commun magizine , May 2007.y X . Hong, C.- X . Wang, and J. Thompson, I nterference modeling of cognitive radio networks, in P roc. IEEE

    Veh. Technol. Conf ., pp. 1851-1855, May 2008.y Y. Fei et al., I nterference effect evaluation of cognitive radio by using statistical method, IEEE

    I nternational symposium on microwave, antenna, propogation and EM C technologies for wirelesscommunication , pp. 858-861, Dec. 2009.

    y M. Pursley and T. Royster, Low-complexity adaptive transmission for cognitive radios in dynamic spectrumaccess networks, IEEE J. Select Areas Commun , vol. 26, no. 1, pp. 8394, Jan. 2008.

    y Y. Zhang, F. Zhang. W. He, Adaptive transmission in cognitive radio networks, CCDC 09, pp. 1951-1953,2009.

    y S. Misra, S. G eirhofer, and L. Tong, "Optimal adaptive transmission for a cognitive radio with sensing,"IEEE I CASS P , pp. 2797-2800, 2008..

    y X . Li, J. Chen, F. Ng, "Secure transmission power of cognitive radios for dynamic spectrum accessapplications," in P roc. 42nd Annual C I SS , pp. 213-218, Mar. 2008..

    y A.A. Eltholth et al ., Performance of multi-amplitude minimum shift keying with orthogonal frequencydivision multiplexing The I nt. Conf. on computer as a tool EURO C O N , pp. 1057-1060, 2007.

  • 8/8/2019 Defense.a Conservative Approach for Transmission in Cognitive Radios

    14/14

    Thank You!Thank You!

    QUEST I ONS?

    Dont ask