Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information

Size: px
Start display at page:

Download "Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information"

Transcription

1 Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California Abstract We explore a flexible and non-intrusive opportunistic spectrum access control mechanism for cognitive radios that goes beyond the standard Listen-Before-Talk (LBT) strategy. We exploit the bi-directional nature of many primary communication systems to control cognitive radio access that is based on both spectral sensing and primary receiver acknowledgements. In this work, we limit our attention on the ACK/NAK messages in primary data-link-control. We use partially observable Markovdecision processes to devise an optimized admission control policy. Our new method achieves high cognitive network throughput while offering robust protection of primary user signals. I. INTRODUCTION Cognitive radio access delineates a new paradigm for dynamically alleviating the spectrum scarcity problem. Cognitive radios are designed to access a bandwidth already allocated to a primary user network under the constraint that the primary user communication quality of service is not heavily impaired. Cognitive radio access control has been a popular topic of research, for example, the authors of [1] devised distributed spectrum sensing and access strategies under an energy constraint on secondary users. In [2] and [3], the design of sensing policies for tracking spectrum opportunities is explored. The authors of [4] applied a partially observable Markov decision framework to devise an optimal sensing and channel selection policy in a multi-channel opportunistic communication system. The authors of [5] and [6] studied the challenge of SNR threshold below which the sensing outcome is severely impaired regardless of the sensing time. The authors of [7] derived an optimal sensing policy for exponential idle time whereas in [8] they addressed optimal sensing strategies for continuous time systems, exploiting acknowledgement signals from the SU-Rx. Also, the authors of [9] presented a cognitive radio system that varies transmission power according to all the information available to the spectrum sensor. It should be noted that, thus far, listen-before-talk (LBT) is the state-ofthe-art opportunistipectrum access approach to cognitive radio. LBT simply relies on spectrum sensing, thereby enabling a secondary user (SU) to access the spectrum of a primary user (PU) only after sensing the PU spectrum unoccupied band. LBT is natural and practical, not requiring any modification to the existing PU infrastructure. However, LBT only senses primary transmission activities and it is unaware of the actual receiver conditions. More specifically, it neither solves the hidden receiver problem nor utilizes any capacity that robust interference-resistant PU networks may provide. To expand the applications and to improve the efficiency of cognitive radios, we enhance the LBT learning capability by leveraging the feedback information typically available in duplex PU links. Feedback signals for data-link-control are available in many systems such as HSDPA [] and WiMAX [11] in the form of ACK/NAK packets and downlink/uplink profiles. Such information allows the SU to more accurately infer the effect of the SU activity on the PU receivers (PU-Rx). In this work, we emphasize that advanced cognition should require the SUs to learn about primary network characteristics and user interaction. Similar concept of cognition has been discussed in [12] where a SU transmits probing signals to observe the PU transmission power changes in response to better estimate the SU to PU channel gain. Specifically, we utilize the ACK/NAK signals transmitted by the packet receivers for data-link-control. Exploiting the ACK/NAK signals from the PU-Rx allows the SUs to detect the presence of any hidden PU-Rx and to assess the quality of the PU-Rx reception, thereby better providing the necessary PU protection. It also makes it possible for the SU transmitter (SU-Tx) to optimize its access policy by estimating the PU-Rx reception quality under the SU-Tx access control policy, therefore allowing the SU-Tx to better exploit any PU excess capacity. This paper is an extension of our preliminary work [13] where we presented an optimal channel access scheme based PU ACK/NAK information overhearing. The rest of this manuscript is divided into three sections. Section II presents the description of the problem and the basic formulation of the cognitive spectrum access based on acknowledgement information. Section III presents the development of our optimized spectrum access policy. Section IV presents our test results of our access algorithm. Section V summarizes our conclusions and future directions under pursuit. II. SYSTEM MODEL Fig. 1 illustrates a wireless scenario under investigation that involves the co-existence of a primary and a secondary link. The PU access is time-slotted for packet transmissions. The high priority PU may transmit the available packets at the beginning of each slot. We assume that the SU uses that same

2 PU Tx Fig. 1. Forward link Reverse link SU Tx PU Rx SU learning environment. slot length and that the SU actions are in synchronization with the PU time slot. The PU traffic is randomly busy or idle, irrespective of the SU action. The random BUSY/IDLE durations are independent distributed with probability mass functions, respectively, p B (k) = P[D B = k] p I (k) = P[D I = k]. (1) Here D B and D I are discrete random variables denoting the BUSY and IDLE periods, respectively. SUs are aware of the IDLE/BUSY distribution (from prior measurement). We use partially observable Markov decision processes to devise an optimal admission control policy. Our time horizon is infinite. At the start time t of every slot, we define the binary variable s t via: {, when the PU channel is BUSY; s t = (2) 1, when the PU channel is IDLE. The SU-Tx can take one of three possible actions: I, ; a t = S, ; (3) T,. To take action S, the SU-Tx uses an energy detector to detect whether the PU-Tx spectrum is IDLE or BUSY. The detection (sensing) is not perfect and is characterized by a false-alarm probability P F and a missed-detection probability P M. False alarm means declaring an IDLE primary channel to be BUSY, while a missed detection means declaring a BUSY primary channel to be IDLE. Since the state s t is not directly observable to the SU, we define ρ t = P[s t = 1], and p t as the estimate of ρ t by the SU-Tx from its observations up to time t. We will refer to p t as the information state of the SU-Tx. When the PU is BUSY, it corresponds to packet error rates of Q 1 and Q 2, in the presence and the absence of SU-Tx transmissions, respectively. Naturally, Q 1 < Q 2. We let both Q 1 and Q 2 be known to the SUs a priori from measurements before deploying access control. We assume that the SU-Tx can either correctly decode a feedback message from the PU- Rx or cannot decode it at all. We define as the probability that the SU-Tx can correctly decode a feedback signal from the PU-Rx. To optimize the access control, we need to define the perstage reward/cost function. Let p t = q and the action a t = ν, then: r T c T P[NAK], for ν=t; R(q, ν) = c S, for ν=s; (4), for ν=i; where r T is a reward the SU-Tx gets for each packet transmission, c T and c S are the cost of a packet collision with the PUs and the cost of sensing the PU spectrum, respectively. P[NAK] = (1 q) Q 2 is the prior probability of PU-Rx sending a NAK. In what follows, we will define τ j (t) as the estimated transition instant to state j {; 1} from state 1 j based on observation up to time t. τ j (t) is needed in order to tackle the information state update from one time slot to another. Our algorithm development assumes that the SU-Tx knows the starting point of the first PU BUSY cycle. For simplicity and without loss of generality we will assume the first BUSY cycle starts at time. The access control policy we seek consists of a sequence of functions π = {µ, µ 1,...,µ t,...} where each function µ t (.) maps the information state p t into an action s t {I, S, T}. At time t, upon taking action a t, the SU-Tx uses the current and past observations to determine a maximum-a-posteriori (MAP) estimation of the next PU-traffic transition moment. Given a policy π we define the value function of the SU-Tx from time t s = as: + V π (q, t s, τ (t s )) = E π [ α t r(p t, a t ) p ts = q]. (5) t=t s The optimized access policy is an admissible policy π that maximizes the expected value function (5): DATA Feedback π = argmax{v π (q, t s, τ (t s )))}. (6) π III. OPTIMIZED SPECTRUM ACCESS CONTROL time a = S 1 2 O {I, Ia, In, B, Ba, Bn} O2 {I, B } O3 = PU activity SU activity O4 {ACK, NAK, } a1 = I a2 = S a3 = T Fig. 2. a4 = T Sequences of spectrum access. time

3 Fig. 2 shows a possible sequence of PU/SU activities in time. Clearly, no observation is associated to the action ν = I. At time t, for action a t = T, we have: O T t Ω T = {ACK, NAK, }; (7) where ACK stands for the event of receiving an ACK from the PU-Rx, NAK denotes the event of receiving a NAK packet from the PU-Rx, possibly caused by the SU interference, whereas stands for the case of SU-Tx failing to decode any feedback from the PU-Rx. This may be due to either high noise/interference level at the SU-Tx or an idle PU. For action a t = S, the SU-Tx observes O S t. Specifically, O S t ΩS = {I, I A, I N, B, B A, B N }; (8) where I denotes an IDLE observation while the SU-Tx does not decode any feedback message from the PU-Rx, I A denotes IDLE observation while an ACK is correctly decoded at the end of the time slot; I N represents IDLE sensing while a NAK from the PU-Rx is correctly decoded. The symbol B follows the same convention to represent the three cases when the PU channel has been sensed as BUSY. The SU stores the past observations since the latest PU traffic pattern transition in the vector O t. For example, if at time t the latest transition epoch is τ (t), the vector O t will be: [ ] O t = O a τ (t) τ,..., (t) Oat 1. (9) Recall that τ j (t 1) denotes the last estimated transition instant at t 1. After collecting a new O ν t, the SU-Tx estimates the j 1 j transition instant τ 1 j (t) via the MAP principle τ 1 j (t) = MAP(τ 1 j (t) O ν t,o t, τ j (t 1)) () = argmax {ln(p[ot ν,o t τ 1 j (t) = x]) + ln(p[τ 1 j (t) = x)}. x>τ j(t 1) (11) There are two possibilities for τ i (t): 1) τ j (t 1) < τ 1 j (t) < t: the estimated transition from state j to 1 j happened before t. In this case, the traffic distribution used to calculate the information state p t will change from p j (k) = P[D j = k] to p 1 j (k) = P[D 1 j = k]. Moreover, the SU-Tx will erase the stale O t and create a new one associated to τ 1 j (t). 2) τ 1 j (t) t: the MAP estimator does not detect a transition before t. The SU-Tx assumes the PU channel state to remain in state j and will discard the estimate τ 1 j (t). A. Information state update equations At time t, the SU-Tx takes action a t = ν and uses O ν t and O t to determine the next PU traffic transitions via a MAP estimator. Since the MAP estimator is error-prone, the SU- Tx will base its channel admission control on the information state p t to fine-tune the PU channel state. Let τ j (t) be the latest estimated PU traffic transition at t, the information vector is defined t > : p t = P[s t = 1 O at 1 t 1, τ j(t 1)]; (12) The SU-Tx updates p t following two steps: 1) Determining the posterior probability: ˆp t = P[s t = 1 O ν t, τ j (t 1)]. (13) In order to find ˆp t of (13), the SU-Tx determines first the probabilities v 1 = P[O ν t s t = 1], v = P[O ν t s t = ]. (14) It then uses (14) to calculate the observation probability p(o ν t ) = v 1 p t +v (1 p t ). The posterior probability (13) is defined as: ˆp t = v 1 p t v 1 p t + v (1 p t ). (15) 2) Updating the information vector p t+1. Let K j be the number of time slots the PU channel has been in state j {; 1}. Its probability of being still in state j at time t + 1 is: P[s t+1 = j {s t = j,..., s t Kj = j}] = P[D j K j + 1 D j K j ] = P[Dj Kj+1] P[D j K j] ; (16) where D j is a random variable denoting the number of time slots in state j. For computational tractability, we assume that since the last τ j (t), at most one transition may take place. To update the probability estimate that s t+1 = 1, we need to define this probability: K j w = p[d j = k] (1 P[D 1 j K j k + 1] ). P[D 1 j K j k] k=1 (17) Hence, the updated information vector is p t+1 = P[Dj Kj+1] P[D j K j] ˆp t + w (1 ˆp t ). (18) For the sake of simplicity, we will refer this update procedure as a function: p t+1 = UPDATE(O at t, p t, t, τ j (t)). (19) B. Optimal value function and policy calculation We define V (p, t, τ j (t)) as the maximum expected discounted value function that the SU-Tx can get at time slot t, with the information state p assuming that the latest PU traffic transition was to state j. From the Bellman equation: V (p, t, τ j (t)) = max {V a (p, t, τ j (t))}; () a {I, T, S} where V I (p, t, τ j (t)), V S (p, t, τ j (t)), V T (p, t, τ j (t)) are the value function associated with actions,,

4 and, respectively. They are defined as V I (p, t, τ j (t)) = R(p, I) + α V (q = UPDATE({ }, p, t, τ j (t))); V S (p, t, τ j (t)) = R(p, S) + α P[O S ]V (q = UPDATE(O S, p, t, τ j (t))); O S Ω S V T (p, t, τ j (t)) = R(p, T) (21) + α P[O T ]V (q = UPDATE(O T, p, t, τ j (t))); O T Ω T where the set Ω ν is defined in (7) and (8), for action ν = {T,S} respectively; R(p, ν) is the per-stage reward function associated with the action ν, and q = UPDATE(O ν, p, t, τ j (t))) is the information state-update procedure earlier. We omitted the time indices of the current and next state for simplicity. IV. SIMULATION RESULTS We now test our optimized SU access policy through computer simulations. In the test, we let BUSY and IDLE durations be uniformly distributed over [1, ] and [1, ], respectively. Our performance metrics are the PU packet collision probability (P coll ) and the SU throughput T t= SU th = I(a t = T) (22) (T + 1) where I( ) is the indicator function and T is the test duration. In all our tests, we set T =. To examine the effect of cost/reward on the SU behavior, we test 2 different settings of costs and reward shown below. The sensing cost in setting B is much lower than in setting A. We let Q 1 =.1 and Q 2 =.99, implying that a collision between simultaneous PU-SU transmissions will almost certainly lead to a NAK from the PU-Rx. Total Transmission, Sense, Idle time % Total Transmission, Sense, Idle time % Fig. 3. Total percentage of sensing, transmission and idle time as varies: under setting A; under setting B. SU th set A vs. set A % =5 =.5 set A r T = 5 c T = 15 c S = 5 set B r T = 5 c T = c S = Figure 3 compares the SU behavior as a function of under the two different cost/reward settings. The transmission percentage can also be regarded as a throughput metric. As the decoding probability increases, the feedback information becomes more reliable. Therefore, the SU throughput increases and the percentage of time spent in the idle state decreases. Since setting A represents a high sensing cost, the SU-Tx senses the spectrum more frequently compared to setting B. In both cases, as increases which leads to higher ACK/NAK reliability, the transmission time increases. Fig. 4 provides an SU throughput comparison between the two settings, where as Fig. 4 illustrates the corresponding collision rate under the same conditions. When =, then the optimal decision is based solely on the sensing outcome. In this case, SU-Tx shows a higher throughput under setting B, whose lower sensing cost allows the SU-Tx to sense more Fig. 4. Collision prob % =5 =.5 Comparison of: SU th and PU collision rate. and transmit more. When the ACK/NAK decoding is less reliable (.1.35), the SU throughput associated to

5 setting A is higher because its higher sensing cost does not encourage sensing whereas some correctly decoded feedback information from the PU-Rx may encourage transmission in lieu of sensing. On the other hand, =.5 allows the SU- Tx to be more conservative and to transmit only when it is confident of the PU channel state. This is reflected by the P coll shown in Fig. 4 where it is clear that sensing more frequently leads to less collisions with the PUs. When PU- Tx signals become more reliable ( >.35) the SU th in both settings have similar throughput results, as the SU can rely more on the PU-Tx feedback and less on sensing. When =.5 and the sensing cost is low, the P coll varies little between 5% and 8%. In this case, sensing is more desirable than getting ACK/NACK feedback ( > ) as ACK/NAK does little to improve the performance versus no feedback ( = ). More sensing leads to lower of SU th as less time is devoted to transmission. On the other hand, when = 5, reliable feedback information help reduce the P coll from 15% to 5%. This means that when pure sensing is expensive or unreliable, feedback from the PU-Rx constitutes a reliable observation signal for PU protection. Transmission, Sense, Idle time % in a PU Idle cycle Transmission, Sense, Idle time % in a PU Idle cycle Fig. 5. SU sensing, transmission and idle time percentage during a PU Idle period as a function of under: setting A; setting B. Fig. 5 shows the percentage of the three possible actions during a PU idle period for the two test cases of high versus low sensing cost. Since the T action allows the SU-Tx to listen on the reverse channel and update its information state through the observation of the feedback, when the sensing cost is higher, it is preferable for the SU-Tx to either transmit or stay idle, as shown in Fig. 5. Fig. 5 shows that when the sensing cost decreases, the SU-Tx changes its behavior and senses the PU channel more frequently. In both cases, when the SU-Tx is able to decode almost all its feedback messages ( >.99), the data-link-control feedback message represents a very reliable indicator of spectrum opportunity that allows the SU-Tx to reach throughput of nearly 9%. V. CONCLUSIONS AND FUTURE WORKS We investigated means of improving the basic LBT access strategy for cognitive radio systems. Exploiting data-linkcontrol messages that can be overheard by the SU-Tx, our new approach can enhance the traditional spectral sensing and more accurately determine the operating conditions of the primary reception for protection. Based on the simple ACK/NAK signals from the PU-Rx and the prior knowledge of the PU idle-busy probability distribution, we applied partially observable Markov-decision processes to devise an optimal channel access control strategy in order to maximize the secondary user utility. Our future works include investigating means for SU capacity enhancement by detecting the robust mode of the PU-Rx under SU interference as well as developing more versatile ways of SU access such as multi-level power access. REFERENCES [1] Y. Chen; Q. Zhao; A. Swami, Distributed Spectrum and Access in Cognitive Radio Networks With Energy Constraint, IEEE Trans. Signal Processing, 57(2): , Feb. 9. [2] Q. Zhao; L Tong; A Swami and Yunxia Chen, Decentralized cognitive MAC for opportunistipectrum access in ad hoc networks: A POMDP framework, IEEE Journal Selected Areas in Communications,25(3):589-, April 7. [3] Y. Chen; Q. Zhao; A. Swami, Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Errors, IEEE Trans. Info. Theory, 54(5):53-71, May 8. [4] Q. Zhao; B. Krishnamachari; K. Liu, On myopiensing for multichannel opportunistic access: structure, optimality, and performance, IEEE Trans Wireless Comm., 7(12): , Dec. 8. [5] A. Sahai, N. Hoven, and R. Tandra, Some fundamental limits on cognitive radio, 42th Allerton, 4. [6] R. Tandra and A. Sahai, Fundamental limits on detection in low SNR under noise uncertainty, IEEE WirelessCom Symp. on Emerging Networks, Technologies and Standards, Hawaii, June 5. [7] S. Huang; X. Liu; Z. Ding, Short Paper: On Optimal and Transmission Strategies for Dynamic Spectrum Access, 3rd IEEE Intl. Symp. on New Frontiers in Dynamic Spectrum Access Networks, 8. [8] S. Huang; X. Liu; Z. Ding, Optimal -Transmission Structure for Dynamic Spectrum Access, IEEE INFOCOM, April 9. [9] S. Srinivasa and S. Jafar, Soft sensing and optimal power control for cognitive radio, IEEE GLOBECOM, Nov. 7. [] 3GPP Technical Specification Group Radio Access Network Physical layer procedures (FDD) (Release 5), 3rd Generation Partnership Project Std. S V5.11., 5. [11] Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std , 4. [12] R. Zhang and Y. C. Liang, Exploiting hidden power feedbacks in cognitive radio networks, 3rd IEEE Intl. Symp. on New Frontiers in Dynamic Spectrum Access Networks, 8. [13] F. E. Lapiccirella; S. Huang; X. Liu; Z. Ding, Feedback-based access and power control for distributed multiuser cognitive networks, Info. Theory and Applications Workshop, pp.85-89, Feb. 9.

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Dynamic spectrum access with learning for cognitive radio

Dynamic spectrum access with learning for cognitive radio 1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University

More information

STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS

STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS STRUCTURE AND OPTIMALITY OF MYOPIC SENSING FOR OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao University of California Davis, CA 95616 qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern California

More information

Optimal Sensing-Transmission Structure for Dynamic Spectrum Access

Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis, CA 9566, USA Abstract In cognitive wireless networks where secondary

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios

Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios 1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong,

More information

OPPORTUNISTIC Spectrum Access (OSA) is emerging

OPPORTUNISTIC Spectrum Access (OSA) is emerging Optimal and Low-complexity Algorithms for Dynamic Spectrum Access in Centralized Cognitive Radio Networks with Fading Channels Mario Bkassiny, Sudharman K. Jayaweera, Yang Li Dept. of Electrical and Computer

More information

Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks. Senhua Huang, Xin Liu, and Zhi Ding

Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks. Senhua Huang, Xin Liu, and Zhi Ding 1 Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks Senhua Huang, Xin Liu, and Zhi Ding Abstract Cognitive radio offers a promising technology to mitigate spectrum

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users

Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Distributed Reinforcement Learning Based MAC Protocols for Autonomous Cognitive Secondary Users Mario Bkassiny and Sudharman K. Jayaweera Dept. of Electrical and Computer Engineering University of New

More information

Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing

Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing 1 Opportunistic Channel-Aware Spectrum Access for Cognitive Radio Networks with Interleaved Transmission and Sensing Sheu-Sheu Tan, James Zeidler, and Bhaskar Rao Department of Electrical and Computer

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-30 June 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-6 March 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September

More information

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v2 [cs.ni] 21 Nov 2008

More information

Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel

Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Yanting Wu Dept. of Electrical Engineering University of Southern California Email: yantingw@usc.edu Bhaskar Krishnamachari

More information

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013 ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Power Allocation over Two Identical Gilbert-Elliott Channels

Power Allocation over Two Identical Gilbert-Elliott Channels Power Allocation over Two Identical Gilbert-Elliott Channels Junhua Tang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University, China Email: junhuatang@sjtu.edu.cn Parisa

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

arxiv:cs/ v1 [cs.ni] 27 Feb 2007

arxiv:cs/ v1 [cs.ni] 27 Feb 2007 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Qing Zhao, and Ananthram Swami Abstract arxiv:cs/0702158v1 [cs.ni] 27 Feb 2007 We

More information

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models c Qing Zhao, UC Davis. Talk at Xidian Univ., September, 2011. 1 Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models Qing Zhao Department of Electrical and Computer Engineering University

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Analysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction

Analysis of opportunistic spectrum access in cognitive radio networks using hidden Markov model with state prediction Wang and Adriman EURASIP Journal onwireless Communications and Networking (2015) 2015:10 DOI 10.1186/s13638-014-0238-5 RESEARCH Open Access Analysis of opportunistic spectrum access in cognitive radio

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

SPECTRUM resource scarcity motivates researchers to

SPECTRUM resource scarcity motivates researchers to 1 A Neural Network Prediction Based Adaptive Mode Selection Scheme in Full-Duplex Cognitive Networks Yirun Zhang Qirui Wu Jiancao Hou Vahid Towhidlou and Mohammad Shikh-Bahaei arxiv:1904.06222v1 [eess.sp]

More information

arxiv: v3 [cs.lg] 4 Oct 2011

arxiv: v3 [cs.lg] 4 Oct 2011 Reinforcement learning based sensing policy optimization for energy efficient cognitive radio networks Jan Oksanen a,, Jarmo Lundén a,b,1, Visa Koivunen a a Aalto University School of Electrical Engineering,

More information

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v4 [cs.ni] 6 Feb 2010

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Optimal Transmission-Sensing-Reception Strategies for Full-duplex Dynamic Spectrum Access

Optimal Transmission-Sensing-Reception Strategies for Full-duplex Dynamic Spectrum Access This is a technical report for our published paper in IEEE yspan 24 Optimal Transmission-Sensing-Reception Strategies for Full-duplex ynamic Spectrum Access Wessam Afifi and Marwan Krunz epartment of Electrical

More information

Sensing for Cognitive Radio Networks

Sensing for Cognitive Radio Networks Censored Truncated Sequential Spectrum 1 Sensing for Cognitive Radio Networks Sina Maleki Geert Leus arxiv:1106.2025v2 [cs.sy] 14 Mar 2013 Abstract Reliable spectrum sensing is a key functionality of a

More information

Decentralized Cognitive Radio Control based on Inference from Primary Link Control Information

Decentralized Cognitive Radio Control based on Inference from Primary Link Control Information Decentralized Cognitive Radio Control based on Inference from Primary Link Control Information 1 Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis Davis, CA 95616, USA Abstract This work

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Stability analysis of a cognitive multiple access channel with primary QoS constraints

Stability analysis of a cognitive multiple access channel with primary QoS constraints tability analysis of a cognitive multiple access channel with primary o constraints J. Gambini 1,2,O.imeone 1, U. pagnolini 2,.Bar-Ness 1 andungsooim 3 1 CWCR, NJIT, Newark, New Jersey 07102-1982, UA 2

More information

Optimal Transmission-Sensing-Reception Strategies for Full-duplex Dynamic Spectrum Access

Optimal Transmission-Sensing-Reception Strategies for Full-duplex Dynamic Spectrum Access This is a technical report for our submitted paper to IEEE yspan 24 in November 23 Optimal Transmission-Sensing-Reception Strategies for Full-duplex ynamic Spectrum Access Wessam Afifi and Marwan Krunz

More information

Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing

Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Tao Shu and Marwan Krunz Department of Computer Science and Engineering Oakland University, Rochester, MI Department of Electrical

More information

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari, Qing Zhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu

More information

Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty

Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty Cooperative Eigenvalue-Based Spectrum Sensing Performance Limits Under different Uncertainty A. H.Ansari E&TC Department Pravara Rural Engineering College Loni B. A.Pangavhane E&TC Department Pravara Rural

More information

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems HyeJeong Lee, Woon-Young Yeo and Dong-Ho Cho Korea Advanced Institute of Science and Technology Abstract The cdma2000 1xEV-DO standard

More information

Prediction Based Cognitive Spectrum Access 1

Prediction Based Cognitive Spectrum Access 1 Prediction Based Cognitive Spectrum Access 1 Boris Oklander Department of Electrical Engineering Technion Israel Institute of Technology Haifa, Israel oklander@tx.technion.ac.il Moshe Sidi Department of

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Multiple-Level Power Allocation Strategy for

Multiple-Level Power Allocation Strategy for Multiple-Level Power Allocation Strategy for 1 Secondary Users in Cognitive Radio Networks Zhong Chen, Feifei Gao, Zhenwei Zhang, James C. F. Li, and Ming Lei arxiv:137.158v2 [cs.i] 12 Dec 213 Abstract

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Harnessing Interaction in Bursty Interference Networks

Harnessing Interaction in Bursty Interference Networks 215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

HYPOTHESIS TESTING OVER A RANDOM ACCESS CHANNEL IN WIRELESS SENSOR NETWORKS

HYPOTHESIS TESTING OVER A RANDOM ACCESS CHANNEL IN WIRELESS SENSOR NETWORKS HYPOTHESIS TESTING OVER A RANDOM ACCESS CHANNEL IN WIRELESS SENSOR NETWORKS Elvis Bottega,, Petar Popovski, Michele Zorzi, Hiroyuki Yomo, and Ramjee Prasad Center for TeleInFrastructure (CTIF), Aalborg

More information

Continuous Power Allocation for Sensing-based Spectrum Sharing. Xiaodong Wang

Continuous Power Allocation for Sensing-based Spectrum Sharing. Xiaodong Wang Continuous Power Allocation for Sensing-based Spectrum Sharing Xiaodong Wang Electrical Engineering Department Columbia University, New York joint work with Z. Chen X. Zhang Y. Yılmaz Z. Guo EUSIPCO 13

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Administration. CSCI567 Machine Learning (Fall 2018) Outline. Outline. HW5 is available, due on 11/18. Practice final will also be available soon.

Administration. CSCI567 Machine Learning (Fall 2018) Outline. Outline. HW5 is available, due on 11/18. Practice final will also be available soon. Administration CSCI567 Machine Learning Fall 2018 Prof. Haipeng Luo U of Southern California Nov 7, 2018 HW5 is available, due on 11/18. Practice final will also be available soon. Remaining weeks: 11/14,

More information

Markovian Decision Process (MDP): theory and applications to wireless networks

Markovian Decision Process (MDP): theory and applications to wireless networks Markovian Decision Process (MDP): theory and applications to wireless networks Philippe Ciblat Joint work with I. Fawaz, N. Ksairi, C. Le Martret, M. Sarkiss Outline Examples MDP Applications A few examples

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Expectation propagation for signal detection in flat-fading channels

Expectation propagation for signal detection in flat-fading channels Expectation propagation for signal detection in flat-fading channels Yuan Qi MIT Media Lab Cambridge, MA, 02139 USA yuanqi@media.mit.edu Thomas Minka CMU Statistics Department Pittsburgh, PA 15213 USA

More information

A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling

A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling 2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015 Osaka, Japan A Restless Bandit With No Observable States for Recommendation Systems and Communication Link Scheduling

More information

Finding the best mismatched detector for channel coding and hypothesis testing

Finding the best mismatched detector for channel coding and hypothesis testing Finding the best mismatched detector for channel coding and hypothesis testing Sean Meyn Department of Electrical and Computer Engineering University of Illinois and the Coordinated Science Laboratory

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:

More information

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access

Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Optimality of Myopic Sensing in Multi-Channel Opportunistic Access Tara Javidi, Bhasar Krishnamachari,QingZhao, Mingyan Liu tara@ece.ucsd.edu, brishna@usc.edu, qzhao@ece.ucdavis.edu, mingyan@eecs.umich.edu

More information

Reliable Cooperative Sensing in Cognitive Networks

Reliable Cooperative Sensing in Cognitive Networks Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

Uplink HARQ for Cloud RAN via Separation of Control and Data Planes

Uplink HARQ for Cloud RAN via Separation of Control and Data Planes 1 Uplink HARQ for Cloud RAN via Separation of Control and Data Planes Shahrouz Khalili, Student Member, IEEE and Osvaldo Simeone, Fellow, IEEE arxiv:158.657v5 [cs.it] 5 Sep 16 Abstract The implementation

More information

EUSIPCO

EUSIPCO EUSIPCO 3 569736677 FULLY ISTRIBUTE SIGNAL ETECTION: APPLICATION TO COGNITIVE RAIO Franc Iutzeler Philippe Ciblat Telecom ParisTech, 46 rue Barrault 753 Paris, France email: firstnamelastname@telecom-paristechfr

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Maximum Sum Rate of Slotted Aloha with Capture

Maximum Sum Rate of Slotted Aloha with Capture Maximum Sum Rate of Slotted Aloha with Capture Yitong Li and Lin Dai, Senior Member, IEEE arxiv:50.03380v3 [cs.it] 7 Dec 205 Abstract The sum rate performance of random-access networks crucially depends

More information

Fully-distributed spectrum sensing: application to cognitive radio

Fully-distributed spectrum sensing: application to cognitive radio Fully-distributed spectrum sensing: application to cognitive radio Philippe Ciblat Dpt Comelec, Télécom ParisTech Joint work with F. Iutzeler (PhD student funded by DGA grant) Cognitive radio principle

More information

Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access

Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access ABSTRACT Nicholas B. Chang Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor,

More information

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio Yulong Zou, Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Baoyu Zheng,

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Adaptive Distributed Algorithms for Optimal Random Access Channels

Adaptive Distributed Algorithms for Optimal Random Access Channels Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October, 2 Adaptive Distributed Algorithms for Optimal Random Access Channels Yichuan Hu and Alejandro Ribeiro

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Communication constraints and latency in Networked Control Systems

Communication constraints and latency in Networked Control Systems Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega

More information

Opportunistic Cooperation in Cognitive Femtocell Networks

Opportunistic Cooperation in Cognitive Femtocell Networks 1 Opportunistic Cooperation in Cognitive Femtocell Networks Rahul Urgaonkar, Member, IEEE, and Michael J. Neely, Senior Member, IEEE Abstract We investigate opportunistic cooperation between secondary

More information

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Learning Algorithms for Minimizing Queue Length Regret

Learning Algorithms for Minimizing Queue Length Regret Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts

More information

ON THE CAPACITY REGION OF COGNITIVE MULTIPLE ACCESS OVER WHITE SPACE CHANNELS

ON THE CAPACITY REGION OF COGNITIVE MULTIPLE ACCESS OVER WHITE SPACE CHANNELS IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, OCT. 22 ON THE CAPACITY REGION OF COGNITIVE MULTIPLE ACCESS OVER WHITE SPACE CHANNELS Huazi Zhang, Zhaoyang Zhang, Member, IEEE, and Huaiyu

More information

Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss

Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss M. Majid Butt, Eduard A. Jorswieck and Amr Mohamed Department of Computer Science and Engineering, Qatar University,

More information

Performance Analysis of Spectrum Sensing Techniques for Future Wireless Networks

Performance Analysis of Spectrum Sensing Techniques for Future Wireless Networks This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Limited Feedback in Wireless Communication Systems

Limited Feedback in Wireless Communication Systems Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N

More information

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks A new analytic approach to evaluation of Packet Error Rate in Wireless Networks Ramin Khalili Université Pierre et Marie Curie LIP6-CNRS, Paris, France ramin.khalili@lip6.fr Kavé Salamatian Université

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information