[ieee 2012 9th international symposium on wireless communication systems (iswcs 2012) - paris,...

5
Cooperative Cognitive Radio Protocol Exploiting Primary Retransmissions in Nakagami- Fading Samuel Baraldi Mafra, Evelio M. G. Fernandez Federal University of ParanΒ΄ a (UFPR) Curitiba-PR, Brazil [email protected], [email protected] Richard Demo Souza, Jo˜ ao Luiz Rebelatto Federal University of Technology-ParanΒ΄ a (UTFPR) Curitiba-PR, Brazil {richard, jlrebelatto}@utfpr.edu.br Abstractβ€”We consider a cooperative overlay cognitive net- work, where the secondary exploits the primary retransmissions. We show that by using cooperation, the secondary rate can be considerably increased when compared to other schemes, without causing major impact on the primary performance. The best configuration for the proposed scheme is that in which the secondary nodes are close to the primary transmitter. I. I NTRODUCTION The term cognitive radio was introduced by Mitola [1] in 1999 to designate intelligent communication networks, which can learn about the surrounding environment and are adaptable to changes. Furthermore, Haykin [2] defined cognitive radio as an intelligent wireless communication system able to adapt certain parameters (such as transmit-power, carrier-frequency, etc) with two main goals: highly reliable communications and efficient utilization of the radio spectrum. Cognitive radio network can be divided into interweave, underlay, and overlay protocols [3], [4]. In the interweave protocol, the unlicensed users (also referred as secondary users) monitor the radio spectrum and communicate over spectrum holes without causing interference to the licensed users (primary users). In the underlay protocol, the secondary users are allowed to transmit simultaneously to the primary users whereas the interference they cause is below a given threshold. Thus, the secondary transmitter power is limited by the interference level accepted by the primary user. In the overlay protocol (the one with the best performance, as shown in [4]), the secondary users know, a priori, the primary user message. With this knowledge and using advanced commu- nication techniques, the secondary can transmit concurrently with the primary. In [5], Tannious and Nosratinia proposed an overlay proto- col where the secondary exploits the primary retransmissions. In many cases, there is an excess of mutual information after a retransmission with respect to the minimum mutual infor- mation required to correctly decode the message, such that the primary link can tolerate a certain amount of interference with- out losing performance. Nevertheless, it is still possible that the secondary communication interferes on the primary above an acceptable threshold. In [5], the authors proposed a solution to eliminate the excess secondary interference on the primary, which requires the knowledge of all the channels (secondary- secondary, secondary-primary and primary-primary) by the secondary transmitter. Note that this global channel knowledge is much difficult to achieve in practice. In [6], it is considered a similar scenario, but assuming that the nodes in the secondary network are provided with multiple antennas, which enables to considerably decrease the interference on the primary, without the need of global channel knowledge. However, this strategy may not be applied in situations where the size or cost of the devices limit the installation of multiple antennas. An alternative to multiple antennas is to consider coop- erative communications [7]–[9], where one or more nodes help the communication between source and destination by acting as relays, achieving spatial diversity even in a network composed of single antenna devices. In [7], Laneman et al presented two cooperative communications protocols: amplify- and-forward (AF) and decode-and-forward (DF). In the AF protocol, the relay amplifies the received signal and forwards it to the destination. In the DF protocol, the relay tries to decode the source message and then re-encodes and forwards it to the destination. The DF protocol can be divided into the fixed DF (FDF), selective DF (SDF) and incremental DF (IDF) protocols. In the FDF protocol, the relay always forwards the message to the destination. In the SDF protocol the message is forwarded only if its decoding at the relay was successful. Finally, in the IDF protocol (which requires a feedback channel), similarly to the SDF protocol, the message also needs to be correct decoded by the relay, however, the forwarding occurs only when requested by the destination. In this paper, we consider the same scenario as in [5], [6], but with a cooperative secondary network, operating according to the SDF and IDF protocols. Our main objective is to increase the secondary rate, without significantly harming the performance of the primary, and without requiring global chan- nel knowledge nor the use of multiple antennas. We present the outage probability and throughput of the proposed scheme, and show through numerical results that the use of cooperation in the secondary network can increase its throughput without considerably harming the primary performance. The remainder of this paper is organized as follows. Sec- tion II describes the system model and the proposed protocol, whose outage probability and throughput are presented in Section III. Section IV presents some numerical results, while Section V concludes the paper. 978-1-4673-0762-8/12/$31.00 Β©2012 IEEE 771

Upload: joao-luiz

Post on 21-Feb-2017

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: [IEEE 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012) - Paris, France (2012.08.28-2012.08.31)] 2012 International Symposium on Wireless Communication

Cooperative Cognitive Radio Protocol ExploitingPrimary Retransmissions in Nakagami-π‘š Fading

Samuel Baraldi Mafra, Evelio M. G. FernandezFederal University of Parana (UFPR)

Curitiba-PR, [email protected], [email protected]

Richard Demo Souza, Joao Luiz RebelattoFederal University of Technology-Parana (UTFPR)

Curitiba-PR, Brazil{richard, jlrebelatto}@utfpr.edu.br

Abstractβ€”We consider a cooperative overlay cognitive net-work, where the secondary exploits the primary retransmissions.We show that by using cooperation, the secondary rate canbe considerably increased when compared to other schemes,without causing major impact on the primary performance. Thebest configuration for the proposed scheme is that in which thesecondary nodes are close to the primary transmitter.

I. INTRODUCTION

The term cognitive radio was introduced by Mitola [1] in1999 to designate intelligent communication networks, whichcan learn about the surrounding environment and are adaptableto changes. Furthermore, Haykin [2] defined cognitive radioas an intelligent wireless communication system able to adaptcertain parameters (such as transmit-power, carrier-frequency,etc) with two main goals: highly reliable communications andefficient utilization of the radio spectrum.

Cognitive radio network can be divided into interweave,underlay, and overlay protocols [3], [4]. In the interweaveprotocol, the unlicensed users (also referred as secondaryusers) monitor the radio spectrum and communicate overspectrum holes without causing interference to the licensedusers (primary users). In the underlay protocol, the secondaryusers are allowed to transmit simultaneously to the primaryusers whereas the interference they cause is below a giventhreshold. Thus, the secondary transmitter power is limitedby the interference level accepted by the primary user. In theoverlay protocol (the one with the best performance, as shownin [4]), the secondary users know, a priori, the primary usermessage. With this knowledge and using advanced commu-nication techniques, the secondary can transmit concurrentlywith the primary.

In [5], Tannious and Nosratinia proposed an overlay proto-col where the secondary exploits the primary retransmissions.In many cases, there is an excess of mutual information aftera retransmission with respect to the minimum mutual infor-mation required to correctly decode the message, such that theprimary link can tolerate a certain amount of interference with-out losing performance. Nevertheless, it is still possible thatthe secondary communication interferes on the primary abovean acceptable threshold. In [5], the authors proposed a solutionto eliminate the excess secondary interference on the primary,which requires the knowledge of all the channels (secondary-secondary, secondary-primary and primary-primary) by the

secondary transmitter. Note that this global channel knowledgeis much difficult to achieve in practice. In [6], it is considered asimilar scenario, but assuming that the nodes in the secondarynetwork are provided with multiple antennas, which enables toconsiderably decrease the interference on the primary, withoutthe need of global channel knowledge. However, this strategymay not be applied in situations where the size or cost of thedevices limit the installation of multiple antennas.

An alternative to multiple antennas is to consider coop-erative communications [7]–[9], where one or more nodeshelp the communication between source and destination byacting as relays, achieving spatial diversity even in a networkcomposed of single antenna devices. In [7], Laneman et alpresented two cooperative communications protocols: amplify-and-forward (AF) and decode-and-forward (DF). In the AFprotocol, the relay amplifies the received signal and forwardsit to the destination. In the DF protocol, the relay tries todecode the source message and then re-encodes and forwardsit to the destination. The DF protocol can be divided intothe fixed DF (FDF), selective DF (SDF) and incrementalDF (IDF) protocols. In the FDF protocol, the relay alwaysforwards the message to the destination. In the SDF protocolthe message is forwarded only if its decoding at the relaywas successful. Finally, in the IDF protocol (which requires afeedback channel), similarly to the SDF protocol, the messagealso needs to be correct decoded by the relay, however, theforwarding occurs only when requested by the destination.

In this paper, we consider the same scenario as in [5], [6],but with a cooperative secondary network, operating accordingto the SDF and IDF protocols. Our main objective is toincrease the secondary rate, without significantly harming theperformance of the primary, and without requiring global chan-nel knowledge nor the use of multiple antennas. We presentthe outage probability and throughput of the proposed scheme,and show through numerical results that the use of cooperationin the secondary network can increase its throughput withoutconsiderably harming the primary performance.

The remainder of this paper is organized as follows. Sec-tion II describes the system model and the proposed protocol,whose outage probability and throughput are presented inSection III. Section IV presents some numerical results, whileSection V concludes the paper.

978-1-4673-0762-8/12/$31.00 Β©2012 IEEE 771

Page 2: [IEEE 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012) - Paris, France (2012.08.28-2012.08.31)] 2012 International Symposium on Wireless Communication

II. SYSTEM MODEL

We consider a primary network composed of a transmitter𝑇𝑝 and a destination 𝐷𝑝. The secondary network consist of asecondary transmitter 𝑇𝑠, a relay 𝑅𝑠 and a secondary destina-tion 𝐷𝑠, as depicted in Fig. 1. The channel coefficient betweentransmitter 𝑖 and receiver 𝑗 is denoted by β„Žπ‘–π‘— and follows aNakagami-π‘š distribution1 [10] with fading parameter π‘šπ‘–π‘— andaverage power πœ†π‘–π‘— . In our notation 𝑖, 𝑗 ∈ {𝑝, 𝑠, π‘Ÿ}, where 𝑝represents the primary transmitter or receiver, 𝑠 the secondarytransmitter or receiver and π‘Ÿ the relay. The average power isdefined as πœ†π‘–π‘— =

1(𝑑𝑛𝑖𝑗)𝛼

, where 𝑑𝑛𝑖𝑗 =𝑑𝑖𝑗

𝑑𝑝𝑝is the normalized

distance between the transmitter 𝑖 and the receiver 𝑗 withrespect to the distance between 𝑇𝑝 and 𝐷𝑝 (𝑑𝑝𝑝), and 𝛼 isthe path-loss exponent. The secondary network operates at thesame frequency band and time slot allocated to the primarynetwork.

𝑇𝑝𝐷𝑝

𝐷𝑠 𝑅𝑠 𝑇𝑠

Fig. 1. System model with a primary transmitter 𝑇𝑝, primary receiver 𝐷𝑝,secondary transmitter 𝑇𝑠, relay 𝑅𝑠 and secondary receiver 𝐷𝑠.

The received signal at node 𝑗 is given by

𝑦𝑖𝑗 =√

π‘ƒπ‘–β„Žπ‘–π‘—π‘₯𝑖 + 𝑧𝑗 , (1)

where 𝑃𝑖 is the transmit power, π‘₯𝑖 is the transmitted messageand 𝑧𝑗 is additive white Gaussian noise with variance 𝑁0

2per dimension, where 𝑁0 is the noise power spectral densityassumed to be 𝑁0 = 1.

The outage probability is the probability that a failureoccurs in the communication between nodes 𝑖 and 𝑗 [11].Moreover, an outage can be defined as the event that themutual information is lower than the attempted rate β„›π‘˜,where π‘˜ ∈ {𝑝, 𝑠}. Assuming a unitary bandwidth, the outageprobability is given by [7]:

π’«π‘œπ‘’π‘‘ = 𝒫{log2(1 + βˆ£β„Žπ‘–π‘— ∣2𝑃𝑖) < β„›π‘˜}, (2)

where 𝒫{π‘Ž} is the probability of event π‘Ž. The expectedthroughput π’―π‘˜ is the rate of error-free information transfer:

π’―π‘˜ = β„›π‘˜(1βˆ’ π’«π‘œπ‘’π‘‘). (3)

1The Nakagami-π‘š distribution is a general distribution, that fits severaltypes of fading. The Rayleigh distribution, for example, corresponds to π‘š =1. For π‘š > 1 there is some line-of-sight between the transmitter and receiver.

A. Proposed Protocol

The proposed protocol works as follows.

βˆ™ 𝑇𝑝 broadcasts a packet, which can be received by both 𝐷𝑝

and 𝐷𝑠, due to the broadcast nature of the wireless chan-nel. If 𝐷𝑝 successfully decodes such a packet, a positiveacknowledgment (ACK) is broadcasted back, allowing 𝑇𝑝

to send a new packet. However, if 𝐷𝑝 does not receivethe packet correctly, a negative acknowledgment (NACK)is sent back, requesting a retransmission.

βˆ™ Upon hearing a NACK, 𝐷𝑠 verifies if it could decodethe packet broadcasted by 𝑇𝑝. If yes, then 𝐷𝑠 sendsa β€œclear to send” (CTS) to 𝑇𝑠, enabling the secondarytransmission.

βˆ™ The secondary communication occurs in two steps2: Inthe first step, upon receiving a CTS, 𝑇𝑠 broadcasts itsmessage to 𝑅𝑠 and 𝐷𝑠. In the second step, 𝑅𝑠 forwardssuch a message to 𝐷𝑠. If 𝑅𝑠 does not decode the messagefrom 𝑇𝑝 or 𝑇𝑠, it does not cooperate. Note that both𝑅𝑠 and 𝐷𝑠 can eliminate the primary interference onreceiving the packet transmitted by 𝑇𝑝.

βˆ™ Both receivers decode their corresponding messages.

III. OUTAGE PROBABILITY AND THROUGHPUT

In this section we determine the outage probability andthroughput for three different situations: First we consider anetwork where the secondary network is inactive; then weanalyze the performance of primary and secondary links whenthe proposed cooperative secondary network is active; andfinally we present the performance of the secondary network inthe case of a non-cooperative secondary network, as proposedin [5].

A. Inactive Secondary Network

Defining 𝒫{𝑂𝑖𝑛𝑖} as the outage probability of the initialtransmission of the primary user, then [12], [13]:

𝒫{𝑂𝑖𝑛𝑖} = 𝒫{log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝) < ℛ𝑝}

=Ξ¨(π‘šπ‘π‘,

(π‘šπ‘π‘(2(ℛ𝑝)βˆ’1))

(πœ†π‘π‘π‘ƒπ‘)

)Ξ“(π‘šπ‘π‘)

, (4)

where πœ†π‘π‘ denotes the average energy of channel β„Žπ‘π‘,π‘šπ‘π‘ is the associated Nakagami parameter and 𝑃𝑝 isthe transmit power of the primary. Moreover, Ξ¨(π‘Ž, 𝑏) =∫ 𝑏

0π‘¦π‘Žβˆ’1 exp (βˆ’π‘¦)𝑑𝑦 is the incomplete gamma function and

Ξ“(π‘Ž) =∫∞0

π‘¦π‘Žβˆ’1 exp (βˆ’π‘¦)𝑑𝑦 is the complete Gamma func-tion.

Considering that only one retransmission is allowed, anoutage occurs in the primary network when the accumulatedmutual information after two transmissions (the transmissionplus the retransmission) is lower than the attempted rate ℛ𝑝.We assume that the primary link employs an incrementalredundancy (IR) strategy and that the channels remain constant

2The communications of the secondary transmitter and relay must occurduring the interval of the primary retransmission.

772

Page 3: [IEEE 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012) - Paris, France (2012.08.28-2012.08.31)] 2012 International Symposium on Wireless Communication

during the two transmissions. The outage probability of theprimary after a retransmission is then given by

𝒫{π‘‚π‘Ÿπ‘’π‘“} = 𝒫{2 log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝) < ℛ𝑝}

=

Ξ¨

(π‘šπ‘π‘,

(π‘šπ‘π‘(2

(ℛ𝑝2

)βˆ’1))

(πœ†π‘π‘π‘ƒπ‘)

)Ξ“(π‘šπ‘π‘)

. (5)

The expected throughput π’―π‘Ÿπ‘’π‘“ depends on whether thesuccessfully received packets required retransmission or not,that is

π’―π‘Ÿπ‘’π‘“ = ℛ𝑝𝒫{𝑂𝑖𝑛𝑖}+ ℛ𝑝

2𝒫{π‘‚π‘Ÿπ‘’π‘“ , 𝑂𝑖𝑛𝑖}

= ℛ𝑝𝒫{𝑂𝑖𝑛𝑖}+ ℛ𝑝

2𝒫{𝑂𝑖𝑛𝑖}𝒫{π‘‚π‘Ÿπ‘’π‘“ βˆ£π‘‚π‘–π‘›π‘–}

= ℛ𝑝𝒫{𝑂𝑖𝑛𝑖}+ ℛ𝑝

2𝒫{𝑂𝑖𝑛𝑖} β‹…

(1βˆ’ 𝒫{π‘‚π‘Ÿπ‘’π‘“}

𝒫{𝑂𝑖𝑛𝑖}), (6)

where 𝒫{π‘Ž} = 1 βˆ’ 𝒫{π‘Ž}. Moreover, in (6) we used the factthat:

𝒫{π‘‚π‘Ÿπ‘’π‘“ βˆ£π‘‚π‘–π‘›π‘–} = 1βˆ’ 𝒫{π‘‚π‘Ÿπ‘’π‘“ βˆ£π‘‚π‘–π‘›π‘–}= 1βˆ’ 𝒫{π‘‚π‘–π‘›π‘–βˆ£π‘‚π‘Ÿπ‘’π‘“}𝒫{π‘‚π‘Ÿπ‘’π‘“}

𝒫{𝑂𝑖𝑛𝑖}= 1βˆ’ 𝒫{π‘‚π‘Ÿπ‘’π‘“}

𝒫{𝑂𝑖𝑛𝑖} . (7)

B. Proposed Cooperative Secondary Network

In this case, it is necessary to analyze the overall systemperformance when the cooperative secondary network is ac-tive. First, consider the probability that the secondary receiveris not able to decode the primary message:

𝒫{𝑂𝑝𝑠} = 𝒫{log2(1 + βˆ£β„Žπ‘π‘ βˆ£2𝑃𝑝) < ℛ𝑝}. (8)

Defining 𝒫{π‘ˆπ‘‘} as the probability that the secondary isactive (i. e. the initial transmission of the primary failed andthe secondary receiver decoded the primary message), then:

𝒫{π‘ˆπ‘‘} = 𝒫{𝑂𝑖𝑛𝑖} β‹… (1βˆ’ 𝒫{𝑂𝑝𝑠}). (9)

The outage probability of the primary in the presence ofsecondary 𝒫{𝑂𝑝} can then be written as:

𝒫{𝑂𝑝} = 𝒫{π‘‚π‘βˆ£π‘ˆπ‘‘} β‹… 𝒫{π‘ˆπ‘‘}οΈΈ οΈ·οΈ· οΈΈ(𝐴)

+𝒫{π‘‚π‘βˆ£π‘ˆπ‘‘} β‹… 𝒫{π‘ˆπ‘‘}οΈΈ οΈ·οΈ· οΈΈ(𝐡)

, (10)

where term (A) is the probability that an outage occurred inthe primary link and that the secondary correctly decoded theprimary message, while in (B) the primary link is in outageand the secondary could not decode the primary message.Moreover, the term (A) in (10) can be written as:

𝒫{π‘‚π‘βˆ£π‘ˆπ‘‘}𝒫{π‘ˆπ‘‘} = 𝒫{π‘‚π‘βˆ£π‘‚π‘–π‘›π‘–, 𝑂𝑝𝑠}𝒫{𝑂𝑖𝑛𝑖, 𝑂𝑝𝑠}= 𝒫{𝑂𝑝}𝒫{π‘‚π‘–π‘›π‘–βˆ£π‘‚π‘}𝒫{π‘‚π‘π‘ βˆ£π‘‚π‘}. (11)

Since the occurrence of an outage in the first transmission isa necessary requirement in order to an outage in the primarylink occurs after the retransmission, we can rewrite (11) as:

𝒫{π‘‚π‘βˆ£π‘ˆπ‘‘}𝒫{π‘ˆπ‘‘} = 𝒫{𝑂𝑝}𝒫{π‘‚π‘π‘ βˆ£π‘‚π‘}= 𝒫{π‘‚π‘βˆ£π‘‚π‘π‘ }𝒫{𝑂𝑝𝑠}, (12)

where the first term is the probability that the mutual infor-mation of the primary link after the first transmission plus themutual information of the retransmission (in the presence ofinterference from 𝑇𝑠) is less than the attempted rate ℛ𝑝.

The term (B) in (10) can be rewritten as:

𝒫{π‘‚π‘βˆ£π‘ˆπ‘‘}𝒫{π‘ˆπ‘‘} = 𝒫{𝑂𝑝, π‘ˆπ‘‘}

= 𝒫{𝑂𝑝, 𝑂𝑖𝑛𝑖, 𝑂𝑝𝑠}= 𝒫{2 log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝) < ℛ𝑝}β‹… 𝒫{log2(1 + βˆ£β„Žπ‘π‘ βˆ£2𝑃𝑝) < ℛ𝑝}. (13)

Thus, we can write the throughput of the primary in thepresence of the secondary as:

𝒯𝑝 = ℛ𝑝𝒫{𝑂𝑖𝑛𝑖}+ ℛ𝑝

2𝒫{π‘‚π‘βˆ£π‘‚π‘–π‘›π‘–}

= ℛ𝑝𝒫{𝑂𝑖𝑛𝑖}+ ℛ𝑝

2𝒫{π‘‚π‘βˆ£π‘‚π‘–π‘›π‘–, 𝑂𝑝𝑠} β‹… 𝒫{𝑂𝑝𝑠}

+ℛ𝑝

2𝒫{π‘‚π‘βˆ£π‘‚π‘–π‘›π‘–, 𝑂𝑝𝑠} β‹… 𝒫{𝑂𝑝𝑠}

= ℛ𝑝 β‹… (1βˆ’ 𝒫{𝑂𝑖𝑛𝑖})+

ℛ𝑝

2

(𝒫{log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝) < ℛ𝑝 ≀ (log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝)

+1

2log2

(1 +

βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝

1 + βˆ£β„Žπ‘ π‘βˆ£2𝑃𝑠

)+

1

2log2

(1 +

βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝

1 + βˆ£β„Žπ‘Ÿπ‘βˆ£2π‘ƒπ‘Ÿ

)})

β‹… 𝒫{log2(1 + βˆ£β„Žπ‘π‘ βˆ£2𝑃𝑝) β‰₯ ℛ𝑝} )

+ℛ𝑝

2(𝒫{log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝) < ℛ𝑝 ≀ 2 log2(1 + βˆ£β„Žπ‘π‘βˆ£2𝑃𝑝)}

β‹… 𝒫{log2(1 + βˆ£β„Žπ‘π‘ βˆ£2𝑃𝑝) < ℛ𝑝}), (14)

where 𝑃𝑠 corresponds to the transmission power of 𝑇𝑠.The first term in (14) represents the case where the first

primary transmission was successful; the second term corre-sponds to the case where a retransmission is requested and𝐷𝑠 correctly decoded the primary message; the third termrepresents the case where a retransmission is requested but 𝐷𝑠

has failed to decode the primary message. We can see from(14) that the secondary network only causes interference on𝐷𝑝 when a retransmission occurs, and if the primary messagewas correctly decoded by 𝐷𝑠

3.Let 𝒫{𝑂𝑠𝑠} and 𝒫{π‘‚π‘ π‘Ÿ} be the outage probabilities of the

𝑇𝑠 β†’ 𝐷𝑠 and 𝑇𝑠 β†’ 𝑅𝑠 links, respectively, then:

𝒫{𝑂𝑠𝑠} = 𝒫{log2(1 + βˆ£β„Žπ‘ π‘ βˆ£2𝑃𝑠) < ℛ𝑠}, (15)

𝒫{π‘‚π‘ π‘Ÿ} = 𝒫{log2(1 + βˆ£β„Žπ‘ π‘Ÿβˆ£2𝑃𝑠) < ℛ𝑠}. (16)

In order for the relay 𝑅𝑠 to cooperate, the occurrence ofthree events is necessary: 1) 𝐷𝑠 needs to decode the messagefrom 𝑇𝑝; 2) 𝑅𝑠 also needs to correctly receive the message

3In order to simplify the derivation, we consider that 𝑑𝑠𝑝 β‰ˆ π‘‘π‘Ÿπ‘.

773

Page 4: [IEEE 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012) - Paris, France (2012.08.28-2012.08.31)] 2012 International Symposium on Wireless Communication

from 𝑇𝑝; 3) 𝑅𝑠 has to receive the message transmitted by𝑇𝑠. Defining as 𝒫{π‘‚π‘π‘Ÿ} the probability that the relay has notdecoded the primary message and as 𝒫{π‘ˆπ‘Ÿ} the probabilitythat the secondary link is active and that the relay has decodedboth the primary and the secondary messages, then:

𝒫{π‘‚π‘π‘Ÿ} = 𝒫{log2(1 + βˆ£β„Žπ‘π‘Ÿβˆ£2𝑃𝑝) < ℛ𝑝}, (17)

𝒫{π‘ˆπ‘Ÿ} = 𝒫{π‘ˆπ‘‘} β‹… [(1βˆ’ 𝒫{π‘‚π‘π‘Ÿ}) β‹… (1βˆ’ 𝒫{π‘‚π‘ π‘Ÿ})]. (18)

The outage probability in the link from 𝐷𝑠 to 𝑅𝑠 is:

𝒫{π‘‚π‘Ÿπ‘ } = 𝒫{log2(1 + βˆ£β„Žπ‘Ÿπ‘ βˆ£2𝑃𝑠) < ℛ𝑠}. (19)

Considering a SDF-based cooperative scheme, the through-put of the secondary becomes4:

𝒯 π‘†π·πΉπ‘π‘œπ‘œπ‘ =

ℛ𝑠

2β‹… 𝒫{π‘ˆπ‘‘} β‹… (1βˆ’ 𝒫{𝑂𝑠𝑠})

+ℛ𝑠

2β‹… 𝒫{π‘ˆπ‘Ÿ} β‹… (1βˆ’ 𝒫{π‘‚π‘Ÿπ‘ }) β‹… 𝒫{𝑂𝑠𝑠}, (20)

For a IDF-based cooperative scheme, the throughput is

𝒯 πΌπ·πΉπ‘π‘œπ‘œπ‘ = ℛ𝑠 β‹… 𝒫{π‘ˆπ‘‘} β‹… (1βˆ’ 𝒫{𝑂𝑠𝑠})

+ℛ𝑠

2β‹… 𝒫{π‘ˆπ‘Ÿ} β‹… (1βˆ’ 𝒫{π‘‚π‘Ÿπ‘ }) β‹… 𝒫{𝑂𝑠𝑠}. (21)

In both (20) and (21), the first term refers to the case where𝐷𝑠 decodes the message from 𝑇𝑠, while the second term refersto the case where 𝐷𝑠 does not decode the message from 𝑇𝑠

but does decode the message from the relay 𝑅𝑠. In the firstterm of (21), the expected rate is ℛ𝑠 instead of ℛ𝑠

2 due tothe fact that, in the IDF scheme, if 𝐷𝑠 is able to decode themessage transmitted by 𝑇𝑠 (situation informed via an ACKsignal to both the 𝑇𝑠 and the relay 𝑅𝑠), then 𝑇𝑠 is allowedto send a new message in the next slot, remaining the relaysilent. In this way, the IDF-based protocol can achieve twicethe throughput of the SDF-based scheme [7].

C. Non-cooperative Secondary Network

When the secondary network is non-cooperative, as pro-posed in [5], the outage probability of the secondary link𝒫{𝑂𝑠} becomes

𝒫{𝑂𝑠} = 1βˆ’ (𝒫{π‘ˆπ‘‘} β‹… 𝒫{log2(1+ βˆ£β„Žπ‘ π‘ βˆ£2𝑃𝑠) β‰₯ ℛ𝑠}), (22)

leading to a throughput given by

𝒯𝑠 = ℛ𝑠(1βˆ’ 𝒫{𝑂𝑠}). (23)

4𝐷𝑠 applies selection combining with the messages received from 𝑇𝑠 and𝑅𝑠, so that an outage occurs only if the 𝑇𝑠 β†’ 𝐷𝑠 and 𝑅𝑠 β†’ 𝐷𝑠 links arein outage simultaneously.

βˆ’15 βˆ’10 βˆ’5 0 50

0.5

1

1.5

2

2.5

Ps (dB)

Thr

ough

put (

bpcu

)

Primary with secondary NLOS βˆ’ blue

Coop.secondaryNLOS

Nonβˆ’coop. secondaryNLOS

Primary withoutsecondary

SDF protocol βˆ’ greenIDF protocol βˆ’ blue

Fig. 2. Throughput versus 𝑃𝑠, for ℛ𝑝 = 4 bpcu, ℛ𝑠 = 4 bpcu, 𝑃𝑝 = 10dB, πœ†π‘π‘ = πœ†π‘ π‘ = πœ†π‘Ÿπ‘ = 1, πœ†π‘π‘  = πœ†π‘π‘Ÿ = πœ†π‘ π‘  = 24, πœ†π‘ π‘Ÿ = πœ†π‘Ÿπ‘  = 44,considering the NLOS scenario.

IV. NUMERICAL RESULTS

This section presents some numerical results in order to in-vestigate the performance of the proposed cooperative scheme.It is considered a path-loss coefficient 𝛼=4. We also considerthat π‘‘π‘ π‘β‰ˆπ‘‘π‘Ÿπ‘, π‘‘π‘π‘ β‰ˆπ‘‘π‘π‘Ÿ and π‘‘π‘ π‘Ÿ=𝑑𝑠𝑠/2 (relay is positionedexactly halfway between 𝑇𝑠 and 𝐷𝑠). The distances in thenetwork are considered normalized with respect to 𝑑𝑝𝑝 = 1.Finally, we assume that 𝑇𝑠 and 𝑅𝑠 transmit with the samepower 𝑃𝑠.

Fig. 2 shows the system throughput versus the secondarytransmit power. The non-cooperative scheme proposed in [5]is compared to the cooperative scheme proposed in this paper.We consider a non line-of-sight (NLOS) scenario, so that π‘š=1 for all channels. Moreover, ℛ𝑝 = 4 bits per channel use(bpcu), ℛ𝑠=4 bpcu, 𝑃𝑝=10 dB, πœ†π‘π‘=πœ†π‘ π‘=πœ†π‘Ÿπ‘=1, πœ†π‘π‘ =πœ†π‘π‘Ÿ =πœ†π‘ π‘  =24, πœ†π‘ π‘Ÿ =πœ†π‘Ÿπ‘  =44. These parameters correspondto a topology where the secondary network is closer to 𝑇𝑝

than to 𝐷𝑝.We can see from Fig. 2 that the IDF-based proposed scheme

outperforms the scheme proposed in [5] for all values of 𝑃𝑠.We can also observe that the SDF-based proposed schemeperforms similarly to the IDF-based proposed scheme when𝑃𝑠 is relatively small, that is, in the range of secondarytransmit power that causes minimum harm to the primarycommunication. For instance, with the proposed scheme, it ispossible to achieve a secondary throughput between 0.5 and1.0 bpcu (with either IDF or SDF protocol) without impactingsignificantly on the primary performance, while the secondarynetwork achieves almost zero throughput at this range oftransmission power according to the scheme proposed in [5].

Fig. 3 evaluates the existence of some line-of-sight (LOS)in the links 𝑇𝑝 β†’ 𝑅𝑠 and 𝑇𝑝 β†’ 𝐷𝑠, by setting π‘šπ‘ π‘  =π‘šπ‘ π‘Ÿ = π‘šπ‘Ÿπ‘  = π‘šπ‘π‘Ÿ = π‘šπ‘π‘  = 2 (π‘šπ‘π‘ = π‘šπ‘ π‘ = π‘šπ‘Ÿπ‘ = 1 iskept unchanged). The idea is to better reflect the fact that

774

Page 5: [IEEE 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012) - Paris, France (2012.08.28-2012.08.31)] 2012 International Symposium on Wireless Communication

βˆ’15 βˆ’10 βˆ’5 0 50

0.5

1

1.5

2

2.5

3

Ps (dB)

Thr

ough

put (

bpcu

)

Primary withoutsecondary

Primary with secondary LOS βˆ’ black

Nonβˆ’coop. secondaryLOS

Coop. secondaryLOS

SDF protocol βˆ’ greenIDF protocol βˆ’ blue

Fig. 3. Throughput versus 𝑃𝑠, for ℛ𝑝 = 4 bpcu, ℛ𝑠 = 4 bpcu, 𝑃𝑝 = 10dB, πœ†π‘π‘ = πœ†π‘ π‘ = πœ†π‘Ÿπ‘ = 1, πœ†π‘π‘  = πœ†π‘π‘Ÿ = πœ†π‘ π‘  = 24, πœ†π‘ π‘Ÿ = πœ†π‘Ÿπ‘  = 44,considering the LOS scenario.

βˆ’20 βˆ’15 βˆ’10 βˆ’5 0 50

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

Ps (dB)

Thr

ough

put (

bpcu

)

SDF protocol βˆ’ greenIDF protocol βˆ’ blue

Primary without secondary

Coop. secondary LOS

Coop.secondaryNLOS

Nonβˆ’coop. secondary NLOS

Nonβˆ’coop. secondaryLOS

Primary with secondary NLOS βˆ’ blue Primary with secondary LOS βˆ’ black

Fig. 4. Throughput versus 𝑃𝑠, for ℛ𝑝 = 4 bpcu, ℛ𝑠 = 6 bpcu, 𝑃𝑝 = 10dB, πœ†π‘π‘ = πœ†π‘ π‘ = πœ†π‘Ÿπ‘ = 1, πœ†π‘π‘  = πœ†π‘π‘Ÿ = 24, πœ†π‘ π‘  = 44, πœ†π‘ π‘Ÿ = πœ†π‘Ÿπ‘  = 84.Both LOS and NLOS cases are considered.

the secondary network is closer to 𝑇𝑝 than to 𝐷𝑝. As wecan see, the performance of the proposed scheme increasesconsiderably specially in the 𝑃𝑠 range where the impact onthe primary performance is negligible.

In Fig. 4 it is considered that the nodes of the secondarynetwork are even closer to each other, by assuming thatπœ†π‘π‘ = πœ†π‘ π‘ = πœ†π‘Ÿπ‘ = 1, πœ†π‘π‘  = πœ†π‘π‘Ÿ = 24, πœ†π‘ π‘  = 44,πœ†π‘ π‘Ÿ =πœ†π‘Ÿπ‘  =84. We also consider that π‘šπ‘π‘ =π‘šπ‘ π‘ =π‘šπ‘Ÿπ‘ =1,π‘šπ‘ π‘  = π‘šπ‘ π‘Ÿ = π‘šπ‘Ÿπ‘  = π‘šπ‘π‘Ÿ = π‘šπ‘π‘  = 4, ℛ𝑝 = 4 bpcu,ℛ𝑠 = 6 bpcu, and 𝑃𝑝 = 10 dB. We can see that havingthe secondary nodes closer to each other is more favorableto the proposed scheme, increasing the secondary throughputthat can be achieved without significantly harming the primary

performance.Finally, it is important to point out that if the secondary

network is much closer to the 𝐷𝑝 than to 𝑇𝑝, both theproposed scheme and the scheme in [5] do not perform well,achieving very low secondary throughput or, on the otherhand, significantly degrading the performance of the primarynetwork.

V. CONCLUSION

This paper presented a new cooperative protocol for overlaycognitive radio, in which the secondary network exploits theprimary retransmissions. Through the use of cooperation, thethroughput of the secondary network can be significantlyincreased, with a very small performance loss imposed tothe primary network. The best configuration for the proposedscheme is when the secondary nodes are close to each otherand nearby the primary transmitter.

ACKNOWLEDGMENT

This work was supported by CAPES and CNPq (Brazil).

REFERENCES

[1] J. Mitola, G. Q. Maguire, β€œCognitive radio: making software radios morepersonal,” IEEE Personal Communications, vol. 6, no. 4, pp. 13-18, Aug.1999.

[2] S. Haykin, β€œCognitive radio: brain-empowered wireless communica-tions,” IEEE Journal on Selected Areas in Communications, vol. 23,no. 2, pp. 201-220, Feb. 2005.

[3] A. Goldsmith, S. Jafar, I. Maric and S. Srinivasa, β€œBreaking spectrumgridlock with cognitive radios: an information theoretic perspective,”Proceedings of the IEEE, vol. 97, no. 5, pp. 894-914, May 2009.

[4] S. Srinivasa, S. A. Jafar, β€œThe throughput potential of cognitive radio: atheoretical perspective,” IEEE Communications Magazine, vol. 45, no.5, pp. 73-79, May 2007.

[5] R. A. Tannious, A. Nosratinia, β€œCognitive radio protocols based onexploiting hybrid ARQ retransmissions,” IEEE Trans. on Wireless Com-munications, vol. 9, no. 9, pp. 2833-2841, Sep. 2010.

[6] R. D. Souza, β€œReducing co-existence penalty of retransmission-basedcognitive radio protocol,” Electronics Letters, vol. 47, no. 6, pp. 409-411, Mar. 2011.

[7] J. N. Laneman, D. N. C. Tse and G. W. Wornell, β€œCooperative diversityin wireless networks: efficient protocols and outage behavior,” IEEETrans. Inform. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.

[8] A. Sendonaris, E. Erkip and B. Aazhang, β€œUser cooperation diversity.Part I. System description,” IEEE Transactions on Communications, vol.51, no. 11, pp. 1927-1938, Nov. 2003.

[9] A. Nosratinia, T. E. Hunter and A. Hedayat, β€œCooperative communica-tion in wireless networks,” IEEE Communications Magazine, vol. 42,no. 10, pp. 74-80, Oct. 2004.

[10] N. Nakagami, β€œThe m-distribution, a general formula for intensitydistribution of rapid fading,” in Statistical Methods in Radio WavePropagation, W. G. Hoffman, Ed. Oxford, England: Pergamon, 1960.

[11] A. Goldsmith, Wireless Communications. New York, NY, USA: Cam-bridge University Press, 2005.

[12] Z. Wang, G. Giannakis, β€œA simple and general parameterization quanti-fying performance in fading channels,” IEEE Transactions on Commu-nications, vol. 51, no. 8, pp. 1389-1398, Aug. 2003.

[13] S. Savazzi, U. Spagnolini, β€œCooperative space-time coded transmissionsin Nakagami-m fading channels,” in IEEE Global TelecommunicationsConference, pp. 4334-4338, Nov. 2007.

775