Professional Documents
Culture Documents
INDEX
ABSTRACT.....................................5 Chapter 1 -SOFTWARE-DEFINED RADIO 1.1 Introduction to Software-Defined Radio6 1.2 A brief history of SDR .7 1.3 Role of SDR ...7 1.3.1 Problems faced by Wireless Communication Industry 1.3.2 How SDR solves the problems 1.4 Features of SDR...............................9
Chapter 2 COGNITIVE RADIO TECHNOLOGY 2.1 2.2 2.3 2.4 A vision of Cognitive Radio..10 History Leading to Cognitive Radio10 Information on Cognitive Radio11 Cognitive Radio Network Paradigms.13 2.4.1 Underlay Paradigm 2.4.2 Overlay Paradigm 2.4.3 Interweave Paradigm
Chapter 3- IMPLEMENTATION 3.1 Algorithm.........15 3.2 Related Theory.........16 3.2.1 About MATLAB & Simulink 3.2.2 DSB-SC AM Modulation 3.2.3 Power Spectral Density
Chapter 4- SIMULATION 4.1 Simulink Model ....19 4.1.1 Block Details 4.1.2 Block Properties 4.2 Matlab Code......26 4.3 Results and Graphs ......28 4.4 Interpretation of Results ...33
REFERENCES...35
ABSTRACT
The report talks about the Cognitive Radio technique and goes into details of its Software implementation (on Simulink and MATLAB) using Spectrum Sensing and the practicality of cognitive radio in our present scenario of communication and its actual hardware implementation on Software Defined Radio.
This report contains basic information on Cognitive Radio and Software Defined Radio. Software Defined Radio is an emerging technique in this domain that promises easy portability and adaptability of new techniques on the same hardware. Cognitive Radio technique utilizes this Software Defined Radio to intelligently and efficiently utilize the available frequency spectrum knowing about the side information of other users sharing the same spectrum.
This problem has inhibited the deployment of global roaming facilities causing great inconvenience to subscribers who travel frequently from one continent to another. Handset vendors face problems in building viable multi-mode handsets due to high cost and bulky nature of such handsets. Wireless network operators face deployment issues while rolling-out new services/features to realize new revenue-streams since this may require large-scale customizations on subscribers handsets.
networks, a field founded by Frank Rosenblatt. In networking, DARPA and industrial developers at Xerox, BBN Technologies, IBM, ATT, and Cisco each developed computer-networking techniques, which evolved into the standard Ethernet and Internet we all benefit from today. The researchers are exploring wireless networks that range from access directly via a radio access point to more advanced techniques in which intermediate radio nodes serve as repeaters to forward data packets toward their eventual destination in an ad hoc network topology. Cognitive radios are nearly always applications that sit on top of an SDR, which in turn is implemented largely from digital signal processors and general-purpose processors (GPPs) built in silicon.
The idea of cognitive radio was born because of spectrum shortage. These devices utilize advanced radio and signal-processing technology along with novel spectrumallocation policies to support new wireless users operating in the existing crowded spectrum without degrading the performance of entrenched users. A cognitive radio must collect and process information about coexisting users within its spectrum, which requires advanced sensing and signal-processing capabilities. The larger barrier is the requirement for significant changes in the way wireless spectrum is currently allocated to enable cognitive techniques. Licensed frequency bands today are the radio and television bands, cellular and satellite bands, and air traffic control bands. The main advantage of the licensing approach is that the licensee completely controls its assigned spectrum, and can thus unilaterally manage interference between its users and hence their quality of service (QoS). In addition to the licensed spectrum, in recent years spectrum has been set aside in specific frequency bands that can be used without a license by radios following a specific set of etiquette rules, such as a maximum power per hertz or a shared channel access mechanism. The purpose of these unlicensed bands is to encourage innovation without the high cost to entry associated with purchasing licensed spectrum through auctions. The unlicensed bands have proven a great vehicle for innovation, and the 2.4 GHz unlicensed band currently hosts systems such as Bluetooth, 802.11b/g/n Wifi, and cordless phones. Unfortunately, the unlicensed bands can be killed by their own success, since the more devices that occupy these bands, the more interference they cause to each other.
10
Spectrum allocation is not just limited to licensed and unlicensed paradigms. The licensed or unlicensed bands may accommodate many additional wireless devices if these devices can exploit advanced technology to only minimally disrupt the communications of coexisting non-cognitive devices. Cognitive radio originated in the form of various solutions to this problem that allow cognitive communication with minimal impact on non-cognitive users.
2.4.1
Underlay Paradigm
The underlay paradigm encompasses techniques that allow secondary communications assuming that they have knowledge of the interference caused by its transmitter to the receivers of the primary users. Specifically, the underlay paradigm mandates that concurrent primary and secondary transmissions may occur as long as the aggregated interference generated by the secondary users is below some acceptable threshold. In the underlay paradigm, the secondary user enters the primary spectrum only when its activity will not cause considerable interference or capacity penalty to the primary user. Measure of interference requires knowledge about multiuser CQI. Measurement challenges for underlay paradigm are: Measuring interference at NC receiver Measuring direction of NC node for beam steering Both easy if NC receiver also transmits, else hard. Underlay typically coexists with licensed users. Licensed users paid for their spectrum so they dont want underlay, Insist on very stringent interference
11
constraints which severely limits underlay capabilities and applications. That is the main challenge for underlay policy.
12
Chapter 3 IMPLEMENTATION
3.1 Algorithm
In the Project, our primary aim was to simulate a working cognitive radio for which we were required to produce a variable source generator to replicate real life usage of the frequency channels. After completion of the source generator, the signal in channel, if there, have to be modulated so as for making it suitable for transmission and defining the frequencies that will be used by it during transmission.
All the different modulated carrier signals will then multiplexed to give a continuous spectrum. To detect an empty channel, we have used the power spectral density of all the signals which will provide us the power being transmitted at a particular frequency channel at the moment.
Threshold values will be set for determining whether the channel is empty or not. Once the sensing part is over, another user will be introduced acting as secondary user and will attain the particular frequency for which the PSD is below the threshold, Thus achieving functionality of cognitive radio.
13
3.2
Related Theory
MATLAB is a high-level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. Using MATLAB, you can solve technical computing problems faster than with traditional programming languages, such as C, C++, and Fortran. You can use MATLAB in a wide range of applications, including signal and image processing, communications, control design, test and measurement, financial modeling and analysis, and computational biology. Add-on toolboxes (collections of special-purpose MATLAB functions) extend the MATLAB environment to solve particular classes of problems in these application areas. MATLAB provides a number of features for documenting and sharing your work. You can integrate your MATLAB code with other languages and applications, and distribute your MATLAB algorithms and applications. Key Features
High-level language for technical computing Development environment for managing code, files, and data Interactive tools for iterative exploration, design, and problem solving Mathematical functions for linear algebra, statistics, Fourier analysis, filtering, optimization, and numerical integration 2-D and 3-D graphics functions for visualizing data Tools for building custom graphical user interfaces Functions for integrating MATLAB based algorithms with external applications and languages, such as C, C++, Fortran, Java, COM, and Microsoft Excel
14
3.2.1.2
SIMULINK
Simulink is an environment for multidomain simulation and Model-Based Design for dynamic and embedded systems. It provides an interactive graphical environment and a customizable set of block libraries that let you design, simulate, implement, and test a variety of time-varying systems, including communications, controls, signal processing, video processing, and image processing. Simulink is integrated with MATLAB, providing immediate access to an extensive range of tools that let you develop algorithms, analyze and visualize simulations, create batch processing scripts, customize the modeling environment, and define signal, parameter, and test data. Key Features
Extensive and expandable libraries of predefined blocks Interactive graphical editor for assembling and managing intuitive block diagrams Ability to manage complex designs by segmenting models into hierarchies of design components Model Explorer to navigate, create, configure, and search all signals, parameters, properties, and generated code associated with your model Application programming interfaces (APIs) that let you connect with other simulation programs and incorporate hand-written code MATLAB Function blocks for bringing MATLAB algorithms into Simulink and embedded system implementations Simulation modes (Normal, Accelerator, and Rapid Accelerator) for running simulations interpretively or at compiled C-code speeds using fixed- or variable-step solvers Graphical debugger and profiler to examine simulation results and then diagnose performance and unexpected behavior in your design Full access to MATLAB for analyzing and visualizing results, customizing the modeling environment, and defining signal, parameter, and test data Model analysis and diagnostics tools to ensure model consistency and identify modeling errors
15
16
Chapter 4 SIMULATION
17
Multiplexer The Mux block combines its inputs into a single vector output. An input can be a scalar or vector signal. All inputs should be of the same data type and numeric type. The elements of the vector output signal take their order from the top to bottom, or left to right, input port signals.
Sine Wave Block The Sine Wave block provides a sinusoid. The block can operate in either time-based or sample-based mode. In Time-Based Mode the output of the Sine Wave block is determined by Y=Amplitude*sin(frequency*time+phase)+bias Time-based mode has two sub modes: continuous mode or discrete mode. The value of the Sample time parameter determines whether the block operates in continuous mode or discrete mode: 0 (the default) causes the block to operate in continuous mode. >0 causes the block to operate in discrete mode.
Bernoulli Binary generator The Bernoulli Binary Generator block generates random binary numbers using a Bernoulli distribution. The Bernoulli distribution with parameter p produces zero with probability p and one with probability 1-p. The Bernoulli distribution has mean value 1-p and variance p(1-p). The Probability of a zero parameter specifies p, and can be any real number between zero and one.
18
Scope The Scope block displays its input with respect to simulation time. The Scope block can have multiple axes (one per port); all axes have a common time range with independent y-axes. The Scope allows you to adjust the amount of time and the range of input values displayed. You can move and resize the Scope window and you can modify the Scope's parameter values during the simulation. When you start a simulation, Simulink does not open Scope windows, although it does write data to connected Scopes. As a result, if you open a Scope after a simulation, the Scope's input signal or signals will be displayed. If the signal is continuous, the Scope produces a point-to-point plot. If the signal is discrete, the Scope produces a stairstep plot.
SOFTWARE DEFINED COGNITIVE RADIO USING MATLAB
DSBSC AM Modulator Passband block The DSBSC AM Modulator Passband block modulates using double-sideband suppressed-carrier amplitude modulation. The output is a passband representation of the modulated signal. Both the input and output signals are real sample-based scalar signals. If the input is u(t) as a function of time t, then the output is where fc is the Carrier frequency parameter and ? is the Initial phase parameter. Typically, an appropriate Carrier frequency value is much higher than the highest frequency of the input signal. By the Nyquist sampling theorem, the reciprocal of the model's sample time (defined by the model's signal source) must exceed twice the Carrier frequency parameter. This block works only with real inputs of type double. This block is not suited to be placed inside a triggered subsystem.
19
Count 10 5 5
Block Names Scope, Scope1, Scope2, Scope3, Scope4, Scope5, Scope6, Scope7, Scope8, Scope9 Sine Wave, Sine Wave1, Sine Wave2, Sine Wave3, Sine Wave4 Product, Product1, Product2, Product3, Product4 DSBSC AM Modulator Passband, DSBSC AM Modulator Passband1, DSBSC AM Modulator Passband2, DSBSC AM Modulator Passband3, DSBSC AM Modulator Passband4 Bernoulli Binary Generator, Bernoulli Binary Generator1, Bernoulli Binary Generator2, Bernoulli Binary Generator3, Bernoulli Binary Generator4 To Workspace Spectrum Scope Mux
1 1 1
20
Name
Seed
Ts
Orient
Bernoulli Binary Generator1 Bernoulli Binary Generator2 Bernoulli Binary Generator3 Bernoulli Binary Generator4 Bernoulli Binary Generator5
0.5
61
100
Off
0.5
61
100
Off
Off
double
0.5
61
100
Off
Off
double
0.5
61
100
Off
Off
double
Name Mux
Inputs 5
0.5
61
100
Off
Off
double
21
Name DSBSC AM Modulator Passband1 DSBSC AM Modulator Passband2 DSBSC AM Modulator Passband3 DSBSC AM Modulator Passband4 DSBSC AM Modulator Passband5
Ph 45 0 0 0 0
Name Sine Wave 1 Sine Wave 2 Sine Wave 3 Sine Wave 4 Sine Wave 5
Sin Type Time based Time based Time based Time based Time based
Time Source Use simulation time Use simulation time Use simulation time Use simulation time Use simulation time
Ampl 5 5 5 5 5
Bias 0 0 0 0 0
Phase 0 0 0 0 0
Sampl es 20 20 20 20 20
Offset 0 0 0 0 0
Sampl e Time 2 2 2 2 2
22
Scope Properties On
Domain
Use Buffer FFT Num Buffer Size length Avg On 128 1024 5
Frequency
Name To Workspace
Variable Name In
Decimation 1
Fixpt As Fi Off
23
Fs=12000; x1=in(:,1); x2=in(:,2); x3=in(:,3); x4=in(:,4); x5=in(:,5); y=x1+x2+x3+x4+x5; Pxx = periodogram(y); Hpsd = dspdata.psd(Pxx,'Fs',Fs); plot(Hpsd) figure plot(Pxx); xlabel('Frequency (KHz)') ylabel('Power/Frequency (dB/KHz)') title('Power Spectral Density via Periodogram') check1 check2 check6 check3 check4 check5 = = = = = = Pxx(53); Pxx(105); Pxx(150); Pxx(187); Pxx(223); Pxx(239);
if(check1 < 80) disp('Assigned to channel 1 as user was not present.'); y1 = ammod(x1,1000,Fs); y = x1 + x2 + x3 + x4 + x5 + 2*y1; elseif (check2 < 80) disp('Assigned to channel 2 as user was not present.'); y2 = ammod(x2,2000,Fs); y = x1 + x2 + x3 + x4 + x5 + 2*y2; elseif(check3 < 80) disp('Assigned to channel 4 as user was not present.'); y4 = ammod(x4,4000,Fs); y= x1 + x2 + x3 + x4 + x5+ 2*y4; elseif(check4 < 80) disp('Assigned to channel 5 as user was not present.'); y5 = ammod(x5,5000,Fs); y = x1 + x2 + x3 + x4 + x5 + 2*y5;
24
elseif(check5 < 80) disp('Assigned to channel 6 as user was not present.'); y6 = ammod(x1,6000,Fs); y = x1 + x2 + x3 + x4 + x5 + 2*y6; elseif (check6 < 80) disp('Assigned to channel 3 as user was not present.'); y3 = ammod(x1,3000,12000); y = x1 + x2 + x3 + x4 + x5 + 2*y3; else disp('All user slots in use. Try again later,'); tp=1; end
SOFTWARE DEFINED COGNITIVE RADIO USING MATLAB
figure Pxx = periodogram(y); Hpsd = dspdata.psd(Pxx,'Fs',Fs); plot(Hpsd); figure plot(Pxx); xlabel('Frequency (KHz)') ylabel('Power/Frequency (dB/KHz)') title('Power Spectral Density via Periodogram')
25
26
Plot 2. Primary User 2
27
28
Plot 6. Multiplexed Signal In Time Domain
29
30
Plot 10. Power Spectral Density With Secondary User
Plot 11. Power Spectral Density With Secondary User via Periodogram
31
Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology. A cognitive radio system is 'aware' of its operating environment and automatically adjusts itself to maintain desired communications its like having a trained operator inside the radio making constant adjustments for maximum performance. Operating frequency, power output, antenna orientation/beam width, modulation, and transmitter bandwidth are just a few of the operating parameters that can automatically be adjusted on the fly in a cognitive radio system The phenomenal success of the unlicensed band in accommodating a range of wireless devices and services has led the FCC to consider opening further bands for unlicensed use. In contrast, the licensed bands are underutilized due to static frequency allocation. Realizing that CR technology has the potential to exploit the inefficiently utilized licensed bands without causing interference to incumbent users; the FCC released the Notice of Proposed Rule Making to allow unlicensed radios to operate in the TV broadcast bands. The IEEE 802.22 working group formed in November/2004 is equipped with the task of defining the air interface standard for Wireless Regional Area Networks based on CR sensing for the operation of unlicensed devices in the spectrum allocated to TV service. While CR devices are built with components that have been well-established in the telecommunications and computer science disciplines, the existing approaches to provide robustness and effective security for a network of CR devices are inadequate. Due to the particular characteristics of the CR systems, new types of attack are possible and some of the well-known types increase in complexity. Therefore, new ideas are needed to make CR networks secure and robust against specific attacks, especially against those that are inherent to the CR functionality. There is, therefore, the need for comprehensive and energy efficient mechanisms to discourage, identify and mitigate the attacks at all phases of the cognitive cycle, in order to obtain CR systems that are trustworthy, efficient and dependable.
32
REFERENCES
[1] Allen B.MacKenzie , Peter Athanas , R. Michael Buehrer , Steven W. Ellingson ,Michael Hsiao , Cameron Patterson and Claudio R. C. M. da Silva, Cognitive Radio and Networking Research at Virginia Tech, Proceedingd of IEEE | Vol. 97, No. 4, April 2009, pp 660 688 [2] S. Kaneko, T. Ueda, S. Nomura, K. Sugiyama, K. Takeuchi, and S. Nomoto, The possibility of the prediction of radio resource availability in cognitive radio, Proc. IEICE General Conference, Nagoya| B-17-33, Japan, Mar., 2007 [3] Burke, M.; Lally, B.T.; Kerans, A.J., Virtual Occupancy in Cognitive Radio| 2011 , pp 328 336 [4] A.Venkata Reddy, E.Rama Krishna and , P.Mahipal Reddy, Sensor Networks for Cognitive Radio: Theory and System Design | Volume: 3 , 2011 , pp 229 233 [5] Na Yi, YiMa, and Rahim Tafazolli, Underlay Cognitive Radio with Full or Partial Channel Quality Information C.C.S.R., University of Surrey, Guildford GU2 7XH, UK, Research Article | June 2010 [6] Theodore S. Rappaport, Wireless Communications Principles and Practice , 2nd EDITION, 1996 [7] Bruce A. Fette, Cognitive Radio Technology, 1st EDITION,2006 [8] Kamilo Feher ,Wireless Digital Communication: Modulation and Spread Spectrum Application , 2nd Edition
SOFTWARE DEFINED COGNITIVE RADIO USING MATLAB
33