[ieee 2012 9th international symposium on wireless communication systems (iswcs 2012) - paris,...
TRANSCRIPT
Cooperative Cognitive Radio Protocol ExploitingPrimary Retransmissions in Nakagami-π Fading
Samuel Baraldi Mafra, Evelio M. G. FernandezFederal University of Parana (UFPR)
Curitiba-PR, [email protected], [email protected]
Richard Demo Souza, Joao Luiz RebelattoFederal University of Technology-Parana (UTFPR)
Curitiba-PR, Brazil{richard, jlrebelatto}@utfpr.edu.br
AbstractβWe consider a cooperative overlay cognitive net-work, where the secondary exploits the primary retransmissions.We show that by using cooperation, the secondary rate canbe considerably increased when compared to other schemes,without causing major impact on the primary performance. Thebest configuration for the proposed scheme is that in which thesecondary nodes are close to the primary transmitter.
I. INTRODUCTION
The term cognitive radio was introduced by Mitola [1] in1999 to designate intelligent communication networks, whichcan learn about the surrounding environment and are adaptableto changes. Furthermore, Haykin [2] defined cognitive radioas an intelligent wireless communication system able to adaptcertain parameters (such as transmit-power, carrier-frequency,etc) with two main goals: highly reliable communications andefficient utilization of the radio spectrum.
Cognitive radio network can be divided into interweave,underlay, and overlay protocols [3], [4]. In the interweaveprotocol, the unlicensed users (also referred as secondaryusers) monitor the radio spectrum and communicate overspectrum holes without causing interference to the licensedusers (primary users). In the underlay protocol, the secondaryusers are allowed to transmit simultaneously to the primaryusers whereas the interference they cause is below a giventhreshold. Thus, the secondary transmitter power is limitedby the interference level accepted by the primary user. In theoverlay protocol (the one with the best performance, as shownin [4]), the secondary users know, a priori, the primary usermessage. With this knowledge and using advanced commu-nication techniques, the secondary can transmit concurrentlywith the primary.
In [5], Tannious and Nosratinia proposed an overlay proto-col where the secondary exploits the primary retransmissions.In many cases, there is an excess of mutual information aftera retransmission with respect to the minimum mutual infor-mation required to correctly decode the message, such that theprimary link can tolerate a certain amount of interference with-out losing performance. Nevertheless, it is still possible thatthe secondary communication interferes on the primary abovean acceptable threshold. In [5], the authors proposed a solutionto eliminate the excess secondary interference on the primary,which requires the knowledge of all the channels (secondary-secondary, secondary-primary and primary-primary) by the
secondary transmitter. Note that this global channel knowledgeis much difficult to achieve in practice. In [6], it is considered asimilar scenario, but assuming that the nodes in the secondarynetwork are provided with multiple antennas, which enables toconsiderably decrease the interference on the primary, withoutthe need of global channel knowledge. However, this strategymay not be applied in situations where the size or cost of thedevices limit the installation of multiple antennas.
An alternative to multiple antennas is to consider coop-erative communications [7]β[9], where one or more nodeshelp the communication between source and destination byacting as relays, achieving spatial diversity even in a networkcomposed of single antenna devices. In [7], Laneman et alpresented two cooperative communications protocols: amplify-and-forward (AF) and decode-and-forward (DF). In the AFprotocol, the relay amplifies the received signal and forwardsit to the destination. In the DF protocol, the relay tries todecode the source message and then re-encodes and forwardsit to the destination. The DF protocol can be divided intothe fixed DF (FDF), selective DF (SDF) and incrementalDF (IDF) protocols. In the FDF protocol, the relay alwaysforwards the message to the destination. In the SDF protocolthe message is forwarded only if its decoding at the relaywas successful. Finally, in the IDF protocol (which requires afeedback channel), similarly to the SDF protocol, the messagealso needs to be correct decoded by the relay, however, theforwarding occurs only when requested by the destination.
In this paper, we consider the same scenario as in [5], [6],but with a cooperative secondary network, operating accordingto the SDF and IDF protocols. Our main objective is toincrease the secondary rate, without significantly harming theperformance of the primary, and without requiring global chan-nel knowledge nor the use of multiple antennas. We presentthe outage probability and throughput of the proposed scheme,and show through numerical results that the use of cooperationin the secondary network can increase its throughput withoutconsiderably harming the primary performance.
The remainder of this paper is organized as follows. Sec-tion II describes the system model and the proposed protocol,whose outage probability and throughput are presented inSection III. Section IV presents some numerical results, whileSection V concludes the paper.
978-1-4673-0762-8/12/$31.00 Β©2012 IEEE 771
II. SYSTEM MODEL
We consider a primary network composed of a transmitterππ and a destination π·π. The secondary network consist of asecondary transmitter ππ , a relay π π and a secondary destina-tion π·π , as depicted in Fig. 1. The channel coefficient betweentransmitter π and receiver π is denoted by βππ and follows aNakagami-π distribution1 [10] with fading parameter πππ andaverage power πππ . In our notation π, π β {π, π , π}, where πrepresents the primary transmitter or receiver, π the secondarytransmitter or receiver and π the relay. The average power isdefined as πππ =
1(ππππ)πΌ
, where ππππ =πππ
πππis the normalized
distance between the transmitter π and the receiver π withrespect to the distance between ππ and π·π (πππ), and πΌ isthe path-loss exponent. The secondary network operates at thesame frequency band and time slot allocated to the primarynetwork.
πππ·π
π·π π π ππ
Fig. 1. System model with a primary transmitter ππ, primary receiver π·π,secondary transmitter ππ , relay π π and secondary receiver π·π .
The received signal at node π is given by
π¦ππ =β
ππβπππ₯π + π§π , (1)
where ππ is the transmit power, π₯π is the transmitted messageand π§π is additive white Gaussian noise with variance π0
2per dimension, where π0 is the noise power spectral densityassumed to be π0 = 1.
The outage probability is the probability that a failureoccurs in the communication between nodes π and π [11].Moreover, an outage can be defined as the event that themutual information is lower than the attempted rate βπ,where π β {π, π }. Assuming a unitary bandwidth, the outageprobability is given by [7]:
π«ππ’π‘ = π«{log2(1 + β£βππ β£2ππ) < βπ}, (2)
where π«{π} is the probability of event π. The expectedthroughput π―π is the rate of error-free information transfer:
π―π = βπ(1β π«ππ’π‘). (3)
1The Nakagami-π distribution is a general distribution, that fits severaltypes of fading. The Rayleigh distribution, for example, corresponds to π =1. For π > 1 there is some line-of-sight between the transmitter and receiver.
A. Proposed Protocol
The proposed protocol works as follows.
β ππ broadcasts a packet, which can be received by both π·π
and π·π , due to the broadcast nature of the wireless chan-nel. If π·π successfully decodes such a packet, a positiveacknowledgment (ACK) is broadcasted back, allowing ππ
to send a new packet. However, if π·π does not receivethe packet correctly, a negative acknowledgment (NACK)is sent back, requesting a retransmission.
β Upon hearing a NACK, π·π verifies if it could decodethe packet broadcasted by ππ. If yes, then π·π sendsa βclear to sendβ (CTS) to ππ , enabling the secondarytransmission.
β The secondary communication occurs in two steps2: Inthe first step, upon receiving a CTS, ππ broadcasts itsmessage to π π and π·π . In the second step, π π forwardssuch a message to π·π . If π π does not decode the messagefrom ππ or ππ , it does not cooperate. Note that bothπ π and π·π can eliminate the primary interference onreceiving the packet transmitted by ππ.
β Both receivers decode their corresponding messages.
III. OUTAGE PROBABILITY AND THROUGHPUT
In this section we determine the outage probability andthroughput for three different situations: First we consider anetwork where the secondary network is inactive; then weanalyze the performance of primary and secondary links whenthe proposed cooperative secondary network is active; andfinally we present the performance of the secondary network inthe case of a non-cooperative secondary network, as proposedin [5].
A. Inactive Secondary Network
Defining π«{ππππ} as the outage probability of the initialtransmission of the primary user, then [12], [13]:
π«{ππππ} = π«{log2(1 + β£βππβ£2ππ) < βπ}
=Ξ¨(πππ,
(πππ(2(βπ)β1))
(πππππ)
)Ξ(πππ)
, (4)
where πππ denotes the average energy of channel βππ,πππ is the associated Nakagami parameter and ππ isthe transmit power of the primary. Moreover, Ξ¨(π, π) =β« π
0π¦πβ1 exp (βπ¦)ππ¦ is the incomplete gamma function and
Ξ(π) =β«β0
π¦πβ1 exp (βπ¦)ππ¦ is the complete Gamma func-tion.
Considering that only one retransmission is allowed, anoutage occurs in the primary network when the accumulatedmutual information after two transmissions (the transmissionplus the retransmission) is lower than the attempted rate βπ.We assume that the primary link employs an incrementalredundancy (IR) strategy and that the channels remain constant
2The communications of the secondary transmitter and relay must occurduring the interval of the primary retransmission.
772
during the two transmissions. The outage probability of theprimary after a retransmission is then given by
π«{ππππ} = π«{2 log2(1 + β£βππβ£2ππ) < βπ}
=
Ξ¨
(πππ,
(πππ(2
(βπ2
)β1))
(πππππ)
)Ξ(πππ)
. (5)
The expected throughput π―πππ depends on whether thesuccessfully received packets required retransmission or not,that is
π―πππ = βππ«{ππππ}+ βπ
2π«{ππππ , ππππ}
= βππ«{ππππ}+ βπ
2π«{ππππ}π«{ππππ β£ππππ}
= βππ«{ππππ}+ βπ
2π«{ππππ} β
(1β π«{ππππ}
π«{ππππ}), (6)
where π«{π} = 1 β π«{π}. Moreover, in (6) we used the factthat:
π«{ππππ β£ππππ} = 1β π«{ππππ β£ππππ}= 1β π«{ππππβ£ππππ}π«{ππππ}
π«{ππππ}= 1β π«{ππππ}
π«{ππππ} . (7)
B. Proposed Cooperative Secondary Network
In this case, it is necessary to analyze the overall systemperformance when the cooperative secondary network is ac-tive. First, consider the probability that the secondary receiveris not able to decode the primary message:
π«{πππ } = π«{log2(1 + β£βππ β£2ππ) < βπ}. (8)
Defining π«{ππ} as the probability that the secondary isactive (i. e. the initial transmission of the primary failed andthe secondary receiver decoded the primary message), then:
π«{ππ} = π«{ππππ} β (1β π«{πππ }). (9)
The outage probability of the primary in the presence ofsecondary π«{ππ} can then be written as:
π«{ππ} = π«{ππβ£ππ} β π«{ππ}οΈΈ οΈ·οΈ· οΈΈ(π΄)
+π«{ππβ£ππ} β π«{ππ}οΈΈ οΈ·οΈ· οΈΈ(π΅)
, (10)
where term (A) is the probability that an outage occurred inthe primary link and that the secondary correctly decoded theprimary message, while in (B) the primary link is in outageand the secondary could not decode the primary message.Moreover, the term (A) in (10) can be written as:
π«{ππβ£ππ}π«{ππ} = π«{ππβ£ππππ, πππ }π«{ππππ, πππ }= π«{ππ}π«{ππππβ£ππ}π«{πππ β£ππ}. (11)
Since the occurrence of an outage in the first transmission isa necessary requirement in order to an outage in the primarylink occurs after the retransmission, we can rewrite (11) as:
π«{ππβ£ππ}π«{ππ} = π«{ππ}π«{πππ β£ππ}= π«{ππβ£πππ }π«{πππ }, (12)
where the first term is the probability that the mutual infor-mation of the primary link after the first transmission plus themutual information of the retransmission (in the presence ofinterference from ππ ) is less than the attempted rate βπ.
The term (B) in (10) can be rewritten as:
π«{ππβ£ππ}π«{ππ} = π«{ππ, ππ}
= π«{ππ, ππππ, πππ }= π«{2 log2(1 + β£βππβ£2ππ) < βπ}β π«{log2(1 + β£βππ β£2ππ) < βπ}. (13)
Thus, we can write the throughput of the primary in thepresence of the secondary as:
π―π = βππ«{ππππ}+ βπ
2π«{ππβ£ππππ}
= βππ«{ππππ}+ βπ
2π«{ππβ£ππππ, πππ } β π«{πππ }
+βπ
2π«{ππβ£ππππ, πππ } β π«{πππ }
= βπ β (1β π«{ππππ})+
βπ
2
(π«{log2(1 + β£βππβ£2ππ) < βπ β€ (log2(1 + β£βππβ£2ππ)
+1
2log2
(1 +
β£βππβ£2ππ
1 + β£βπ πβ£2ππ
)+
1
2log2
(1 +
β£βππβ£2ππ
1 + β£βππβ£2ππ
)})
β π«{log2(1 + β£βππ β£2ππ) β₯ βπ} )
+βπ
2(π«{log2(1 + β£βππβ£2ππ) < βπ β€ 2 log2(1 + β£βππβ£2ππ)}
β π«{log2(1 + β£βππ β£2ππ) < βπ}), (14)
where ππ corresponds to the transmission power of ππ .The first term in (14) represents the case where the first
primary transmission was successful; the second term corre-sponds to the case where a retransmission is requested andπ·π correctly decoded the primary message; the third termrepresents the case where a retransmission is requested but π·π
has failed to decode the primary message. We can see from(14) that the secondary network only causes interference onπ·π when a retransmission occurs, and if the primary messagewas correctly decoded by π·π
3.Let π«{ππ π } and π«{ππ π} be the outage probabilities of the
ππ β π·π and ππ β π π links, respectively, then:
π«{ππ π } = π«{log2(1 + β£βπ π β£2ππ ) < βπ }, (15)
π«{ππ π} = π«{log2(1 + β£βπ πβ£2ππ ) < βπ }. (16)
In order for the relay π π to cooperate, the occurrence ofthree events is necessary: 1) π·π needs to decode the messagefrom ππ; 2) π π also needs to correctly receive the message
3In order to simplify the derivation, we consider that ππ π β πππ.
773
from ππ; 3) π π has to receive the message transmitted byππ . Defining as π«{πππ} the probability that the relay has notdecoded the primary message and as π«{ππ} the probabilitythat the secondary link is active and that the relay has decodedboth the primary and the secondary messages, then:
π«{πππ} = π«{log2(1 + β£βππβ£2ππ) < βπ}, (17)
π«{ππ} = π«{ππ} β [(1β π«{πππ}) β (1β π«{ππ π})]. (18)
The outage probability in the link from π·π to π π is:
π«{πππ } = π«{log2(1 + β£βππ β£2ππ ) < βπ }. (19)
Considering a SDF-based cooperative scheme, the through-put of the secondary becomes4:
π― ππ·πΉππππ =
βπ
2β π«{ππ} β (1β π«{ππ π })
+βπ
2β π«{ππ} β (1β π«{πππ }) β π«{ππ π }, (20)
For a IDF-based cooperative scheme, the throughput is
π― πΌπ·πΉππππ = βπ β π«{ππ} β (1β π«{ππ π })
+βπ
2β π«{ππ} β (1β π«{πππ }) β π«{ππ π }. (21)
In both (20) and (21), the first term refers to the case whereπ·π decodes the message from ππ , while the second term refersto the case where π·π does not decode the message from ππ
but does decode the message from the relay π π . In the firstterm of (21), the expected rate is βπ instead of βπ
2 due tothe fact that, in the IDF scheme, if π·π is able to decode themessage transmitted by ππ (situation informed via an ACKsignal to both the ππ and the relay π π ), then ππ is allowedto send a new message in the next slot, remaining the relaysilent. In this way, the IDF-based protocol can achieve twicethe throughput of the SDF-based scheme [7].
C. Non-cooperative Secondary Network
When the secondary network is non-cooperative, as pro-posed in [5], the outage probability of the secondary linkπ«{ππ } becomes
π«{ππ } = 1β (π«{ππ} β π«{log2(1+ β£βπ π β£2ππ ) β₯ βπ }), (22)
leading to a throughput given by
π―π = βπ (1β π«{ππ }). (23)
4π·π applies selection combining with the messages received from ππ andπ π , so that an outage occurs only if the ππ β π·π and π π β π·π links arein outage simultaneously.
β15 β10 β5 0 50
0.5
1
1.5
2
2.5
Ps (dB)
Thr
ough
put (
bpcu
)
Primary with secondary NLOS β blue
Coop.secondaryNLOS
Nonβcoop. secondaryNLOS
Primary withoutsecondary
SDF protocol β greenIDF protocol β blue
Fig. 2. Throughput versus ππ , for βπ = 4 bpcu, βπ = 4 bpcu, ππ = 10dB, πππ = ππ π = πππ = 1, πππ = πππ = ππ π = 24, ππ π = πππ = 44,considering the NLOS scenario.
IV. NUMERICAL RESULTS
This section presents some numerical results in order to in-vestigate the performance of the proposed cooperative scheme.It is considered a path-loss coefficient πΌ=4. We also considerthat ππ πβπππ, πππ βπππ and ππ π=ππ π /2 (relay is positionedexactly halfway between ππ and π·π ). The distances in thenetwork are considered normalized with respect to πππ = 1.Finally, we assume that ππ and π π transmit with the samepower ππ .
Fig. 2 shows the system throughput versus the secondarytransmit power. The non-cooperative scheme proposed in [5]is compared to the cooperative scheme proposed in this paper.We consider a non line-of-sight (NLOS) scenario, so that π=1 for all channels. Moreover, βπ = 4 bits per channel use(bpcu), βπ =4 bpcu, ππ=10 dB, πππ=ππ π=πππ=1, πππ =πππ =ππ π =24, ππ π =πππ =44. These parameters correspondto a topology where the secondary network is closer to ππ
than to π·π.We can see from Fig. 2 that the IDF-based proposed scheme
outperforms the scheme proposed in [5] for all values of ππ .We can also observe that the SDF-based proposed schemeperforms similarly to the IDF-based proposed scheme whenππ is relatively small, that is, in the range of secondarytransmit power that causes minimum harm to the primarycommunication. For instance, with the proposed scheme, it ispossible to achieve a secondary throughput between 0.5 and1.0 bpcu (with either IDF or SDF protocol) without impactingsignificantly on the primary performance, while the secondarynetwork achieves almost zero throughput at this range oftransmission power according to the scheme proposed in [5].
Fig. 3 evaluates the existence of some line-of-sight (LOS)in the links ππ β π π and ππ β π·π , by setting ππ π =ππ π = πππ = πππ = πππ = 2 (πππ = ππ π = πππ = 1 iskept unchanged). The idea is to better reflect the fact that
774
β15 β10 β5 0 50
0.5
1
1.5
2
2.5
3
Ps (dB)
Thr
ough
put (
bpcu
)
Primary withoutsecondary
Primary with secondary LOS β black
Nonβcoop. secondaryLOS
Coop. secondaryLOS
SDF protocol β greenIDF protocol β blue
Fig. 3. Throughput versus ππ , for βπ = 4 bpcu, βπ = 4 bpcu, ππ = 10dB, πππ = ππ π = πππ = 1, πππ = πππ = ππ π = 24, ππ π = πππ = 44,considering the LOS scenario.
β20 β15 β10 β5 0 50
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
Ps (dB)
Thr
ough
put (
bpcu
)
SDF protocol β greenIDF protocol β blue
Primary without secondary
Coop. secondary LOS
Coop.secondaryNLOS
Nonβcoop. secondary NLOS
Nonβcoop. secondaryLOS
Primary with secondary NLOS β blue Primary with secondary LOS β black
Fig. 4. Throughput versus ππ , for βπ = 4 bpcu, βπ = 6 bpcu, ππ = 10dB, πππ = ππ π = πππ = 1, πππ = πππ = 24, ππ π = 44, ππ π = πππ = 84.Both LOS and NLOS cases are considered.
the secondary network is closer to ππ than to π·π. As wecan see, the performance of the proposed scheme increasesconsiderably specially in the ππ range where the impact onthe primary performance is negligible.
In Fig. 4 it is considered that the nodes of the secondarynetwork are even closer to each other, by assuming thatπππ = ππ π = πππ = 1, πππ = πππ = 24, ππ π = 44,ππ π =πππ =84. We also consider that πππ =ππ π =πππ =1,ππ π = ππ π = πππ = πππ = πππ = 4, βπ = 4 bpcu,βπ = 6 bpcu, and ππ = 10 dB. We can see that havingthe secondary nodes closer to each other is more favorableto the proposed scheme, increasing the secondary throughputthat can be achieved without significantly harming the primary
performance.Finally, it is important to point out that if the secondary
network is much closer to the π·π than to ππ, both theproposed scheme and the scheme in [5] do not perform well,achieving very low secondary throughput or, on the otherhand, significantly degrading the performance of the primarynetwork.
V. CONCLUSION
This paper presented a new cooperative protocol for overlaycognitive radio, in which the secondary network exploits theprimary retransmissions. Through the use of cooperation, thethroughput of the secondary network can be significantlyincreased, with a very small performance loss imposed tothe primary network. The best configuration for the proposedscheme is when the secondary nodes are close to each otherand nearby the primary transmitter.
ACKNOWLEDGMENT
This work was supported by CAPES and CNPq (Brazil).
REFERENCES
[1] J. Mitola, G. Q. Maguire, βCognitive radio: making software radios morepersonal,β IEEE Personal Communications, vol. 6, no. 4, pp. 13-18, Aug.1999.
[2] S. Haykin, βCognitive radio: brain-empowered wireless communica-tions,β IEEE Journal on Selected Areas in Communications, vol. 23,no. 2, pp. 201-220, Feb. 2005.
[3] A. Goldsmith, S. Jafar, I. Maric and S. Srinivasa, βBreaking spectrumgridlock with cognitive radios: an information theoretic perspective,βProceedings of the IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
[4] S. Srinivasa, S. A. Jafar, βThe throughput potential of cognitive radio: atheoretical perspective,β IEEE Communications Magazine, vol. 45, no.5, pp. 73-79, May 2007.
[5] R. A. Tannious, A. Nosratinia, βCognitive radio protocols based onexploiting hybrid ARQ retransmissions,β IEEE Trans. on Wireless Com-munications, vol. 9, no. 9, pp. 2833-2841, Sep. 2010.
[6] R. D. Souza, βReducing co-existence penalty of retransmission-basedcognitive radio protocol,β Electronics Letters, vol. 47, no. 6, pp. 409-411, Mar. 2011.
[7] J. N. Laneman, D. N. C. Tse and G. W. Wornell, βCooperative diversityin wireless networks: efficient protocols and outage behavior,β IEEETrans. Inform. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
[8] A. Sendonaris, E. Erkip and B. Aazhang, βUser cooperation diversity.Part I. System description,β IEEE Transactions on Communications, vol.51, no. 11, pp. 1927-1938, Nov. 2003.
[9] A. Nosratinia, T. E. Hunter and A. Hedayat, βCooperative communica-tion in wireless networks,β IEEE Communications Magazine, vol. 42,no. 10, pp. 74-80, Oct. 2004.
[10] N. Nakagami, βThe m-distribution, a general formula for intensitydistribution of rapid fading,β in Statistical Methods in Radio WavePropagation, W. G. Hoffman, Ed. Oxford, England: Pergamon, 1960.
[11] A. Goldsmith, Wireless Communications. New York, NY, USA: Cam-bridge University Press, 2005.
[12] Z. Wang, G. Giannakis, βA simple and general parameterization quanti-fying performance in fading channels,β IEEE Transactions on Commu-nications, vol. 51, no. 8, pp. 1389-1398, Aug. 2003.
[13] S. Savazzi, U. Spagnolini, βCooperative space-time coded transmissionsin Nakagami-m fading channels,β in IEEE Global TelecommunicationsConference, pp. 4334-4338, Nov. 2007.
775