Professional Documents
Culture Documents
The available electromagnetic radio spectrum is a limited natural resource and getting crowded day by day due to increase in wireless devices and applications. It has been also found that the allocated spectrum is underutilized because of the static allocation of the spectrum. Also, the conventional approach to spectrum management is very inflexible in the sense that each wireless operator is assigned an exclusive license to operate in a certain frequency band. And, with most of the useful radio spectrum already allocated, it is difficult to find vacant bands to either deploy new services or to enhance existing ones. In order to overcome this situation, we need to come up with a means for improved utilization of the spectrum creating opportunities for dynamic spectrum access. The issue of spectrum underutilization in wireless adio !C " communication can be solved in a better way using Cognitive technology. Cognitive
communication for all users of the networ#, wherever and whenever needed and to facilitate effective utilization of the radio spectrum. Cognitive adio is a form of wireless communication in which a transceiver can intelligently detect which $ communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. %pectrum sensing is a fundamental requirement in Cognitive adio networ#. &any signal detection techniques can be used in spectrum sensing so as to enhance the detection probability. The results presented in this thesis will help out in developing clear understanding of spectrum sensing techniques. There are three ma'or categories of spectrum sensing techniques( transmitter detection, receiver detection and interference based detection. This thesis presents a survey of techniques suggested in the literature for spectrum sensing with a performance analysis of transmitter) based detection techniques. An algorithm for minimizing sensing time has been proposed in which under high %* values we can minimize sensing time. Its results are also reliable in comparison with other transmitter detection techniques. All simulations are done in &AT+A, and -ilinx I%..
Table of Content
ii
List of Figures List of Tables Glossary 1. INTRODUCTION /./ Introduction /.0 &otivation of the pro'ect /.1 %cope of the pro'ect /.2 3rganization of the thesis INTRODUCTION TO COGNITI!" RADIO 0./ 3verview of Cognitive adio 0././ Traditional adio 0./.0 %oftware 5efined adio 0./.1 %5 and its relationship with Cognitive adio 0./.2 Cognitive adio 0.0 9hy Cognitive adio 0.1 :ow is a Cognitive adio 5ifferent from 3ther adios 0.1./ Application 0.1.0 5esign 0.1.1 %oftware 0.2 :ardware of Cognitive adio 0.4 5efinitions of Cognitive adio 0.6 The Cognitive adio *etwor# Architecture 0.6./ <rimary *etwor# 0.6.0 Cognitive adio *etwor# 0.7 Cognitive adio Challenges 0.= Characteristics of Cognitive adio 0.8 Cognitive adio $unctions 0./; %pectrum :ole 0.// Cognitive adio Applications, Advantages and 5rawbac#s 0./0 Important Institutions and forums wor#ing on Cognitive adio S%"CTRU& S"NSING T"C'NI(U"S 1./ Introduction 1.0 Classification of %pectrum %ensing Techniques 1.0./ Transmitter 5etection
Pag e v viii ix 1 / 1 1 1 # 4 4 6 7 8 8 /; /; /; // // /1 /4 /4 /6 /7 /7 /= /8 0/ 00 $ 01 01 02
$.
iii
).
#.
1.0././ &atched $ilter 5etection 1.0./.0 .nergy 5etection 1.0./.1 Cyclostationary $eature 5etection 1.1 +imitations of Transmitter 5etection 1.2 eceiver 5etection 1.2./ Two approaches to cooperative spectrum sensing 1.4 Interference ,ased 5etection 1.6 &odeling of %pectrum %ensing Techniques 1.6./ <rimary >sers Transmitter 1.7 <roblem 5ecomposition into &odules 1.7./ <rimary >sers 9aveform 1.7.0 <rocessing on 9aveform 1.7.1 5etection of 9aveform 1.7.2 $eature .xtraction 1.7.4 Classification 1.= &inimizing %ensing Time for 5etection I&%L"&"NTATION 2./ Introduction 2.0 Transmitter of <rimary >sers 2.1 .nergy 5etection 2.2 &atched $ilter 2.4 Cyclostationary $eature 5etection 2.6 .nergy 5etection Technique using ?erilog 2.6./ 5escription of Implementation 2.7 Implementation of Cognitive adio using &AT+A, SI&ULATION R"SULTS 4./ Introduction 4.0 esults of Transmitter detection programming done in &AT+A, 4.0./ .nergy 5etection %imulation esults 4.0././ 3C Curves for .nergy 5etection 4.0.0 &atched $ilter %imulation esults 4.0.0./ 3C Curves for &atched $ilter 4.0.1 Cyclostationary $eature 5etection %imulation esults 4.1 esults of .nergy 5etection programming using ?. I+3@ done in -ilinx I%. 4.2 esults of Cognitive adio %imulation done in &AT+A, iv
04 06 07 08 08 1; 1/ 1/ 10 10 11 11 12 12 12 12 $* 16 16 1= 2; 2/ 21 21 24 )* 26 26 27 4; 4/ 4/ 41 46 48
*.
+.
CO&%ARISON OF S%"CTRU& S"NSING T"C'NI(U"S 6./ Introduction 6.0 Comparison of Transmitter 5etection Techniques 6.0./ %ensing Time 6.0.0 5etection %ensitivity 6.0.1 .ase for Implementation CONCLUSION AND FUTUR" ,OR7./ Conclusion 7.0 $uture wor# <ublications eferences
*$ 61 61 61 62 66 *+ 67 67 68 7;
List of Figures
Title $igure /./ %pectrum >tilization AAAAAAAAAAAAAAAAA.. $igure /.0 %pectrum &easurement across the 8;; B:z )/ @:z band AAA... $igure 0./ +ogical diagram contrasting Traditional, %oftware defined, and Cognitive radios AAAAAAAAAAAAAAAAAAAAAAAA.. $igure 0.0 Illustration of the relationship between the %5 and the Cognitive adio AAAAAAAAAAAAAAAAAAAAAAAAAAAA... $igure 0.1 ,loc# diagram of %5 Transceiver AAAAAAAAAAAA.. $igure 0.2 ,loc# diagram of C Transceiver AAAAAAAAAAAAA. $igure 0.4 <hysical architecture of the Cognitive radioC !a" Cognitive adio transceiver and !b" wideband $Danalog front)end architecture AAAAAA $igure 0.6 Cognitive adio *etwor# Architecture AAAAAAAAAAA $igure 0.7 5ynamic changes in all +ayers AAAAAAAAAAAAAA. $igure 0.= ,asic Cognitive cycle AAAAAAAAAAAAAAAAAA $igure 0.8 %pectrum :ole Concept AAAAAAAAAAAAAAAAA $igure 1./ Classification of %pectrum %ensing Techniques AAAAAAA... $igure 1.0 ,loc# 5iagram of &atched $ilter AAAAAAAAAAAAA. $igure 1.1 ,loc# 5iagram of .nergy 5etector AAAAAAAAAAAA... $igure 1.2 ,loc# 5iagram of Cyclostationary $eature detection AAAAA... $igure 1.4 eceiver >ncertainty and &ultipathD%hadow $ading AAAAA... $igure 1.6 Classification of Cooperative %ensingC !a" Centralized, !b" 5istributed AAAAAAAAAAAAAAAAAAAAAAAAAA.. $igure 1.7 ,loc# 5iagram of 5igital Communication Transmitter AAAA... $igure 1.= %ystem <rocess 5iagram AAAAAAAAAAAAAAAA... $igure 1.8 Algorithm for minimizing sensing time for detection AAAAA.. 1/ 10 11 14 /0 /4 /= /8 0; 02 04 06 0= 1; 7 = 8 6 Pag e/ 0
vi
$igure 2./ $low chart for Implementation of <rimary Transmitter AAAAA $igure 2.0 $low chart for Implementation of .nergy 5etector AAAAAA.. $igure 2.1 $low chart for Implementation of &atched $ilter AAAAAAA. $igure 2.2 $low chart for the Implementation of Cyclostationary $eature 5etection AAAAAAAAAAAAAAAAAAAAAAAAAAA. $igure 2.4 Architecture of .nergy 5etection without A& AAAAAAA.. $igure 2.6 5igital Implementation of an .nergy 5etector AAAAAAAA. $igure 4./ .nergy 5etector 3utput at %* 1;d, for ,<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAAAAAAAA.. $igure 4.0 .nergy 5etector 3utput at %* )1;d, for ,<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAAAAAAAA.. $igure 4.1 .nergy 5etector 3utput at %* 1;d, for E<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAAAAAAAA.. $igure 4.2 .nergy 5etector 3utput at %* )1;d, for E<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAAAAAAAA.. $igure 4.4 3C curves of energy detection scheme with different %* AA... 4.6 &atched $ilter 3utput at %* 1;d, for ,<%B AAAAAAAA $igure $igure 4.7 3C curve for &atched filter detection at %* F1d, AAAAA. $igure 4.= 3C curve for &atched filter detection at %* F/;d, AAAAA $igure 4.8Cyclostationary $eature 5etector 3utput at %* 1;d, for ,<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAA.. $igure 4./; Cyclostationary $eature 5etector 3utput at %* )1;d, for ,<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAA. $igure 4.// Cyclostationary $eature 5etector 3utput at %* 1;d, for E<%B when <rimary user is present at 0;;:z AAAAAAAAAAAAAAA.. $igure 4./0 Cyclostationary $eature 5etector 3utput at %* )1;d, for E<%B when primary user is present at 0;;:z AAAAAAAAAAAAAAA.. $igure 4./1 %imulated wave form for <rimary user is present AAAAAA... $igure 4./2 T+ view/ of the implemented algorithm AAAAAAAAA... $igure 4./4 T+ view0 of the implemented algorithm AAAAAAAAA.. $igure 4./6 T+ view1 of the implemented algorithm AAAAAAAAA..
17 18 2; 20 22 24 27
2=
2=
28 4; 4/ 40 40 41
42
42
44 46 47 4= 4=
vii
$igure 4./7!a" used bands !/st and 2th", unused bands !0nd, 1rdand 4th" AAA.. $igure 4./7!b" /st unused band is assigned to %econdary user/ AAAAAA. $igure 4./7!c" 0nd unused band is assigned to %econdary user0 AAAAAA $igure 4./7!d" All of the %pectrum bands are in use AAAAAAAAAA. $igure 4./7!e" %* F4d, AAAAAAAAAAAAAAAAAAAAA $igure 4./7!f" %* F/2d, AAAAAAAAAAAAAAAAAAAA.. $igure 4./7!g" AttenuationF/;G AAAAAAAAAAAAAAAAA.... $igure 4./7!h" AttenuationF/4G AAAAAAAAAAAAAAAAAA $igure 6./ Comparison metrics of Transmitter 5etection techniques AAAA $igure 6.0 Comparison of Transmitter 5etection Techniques when <rimary >ser is <resent AAAAAAAAAAAAAAAAAAAAAAAAA $igure 6.1 Comparison of Transmitter 5etection Techniques when <rimary >ser is absent AAAAAAAAAAAAAAAAAAAAAAAAA..
48 6; 6; 6/ 6/ 6/ 60 60 61 64 64
viii
List of Tables
Table 0./ Comparison of Cognitive adio with Traditional adio and %oftware 5efined adio in application point of view AAAAAAAAAA Table 0.0 Comparison of Cognitive adio with Traditional adio and %oftware 5efined adio in design point of view AAAAAAAAAAA... Table 0.1 Comparison of Cognitive adio with Traditional adio and %oftware 5efined adio in software point of view AAAAAAAAAAA Table 4./ 5evice >tilization %ummary !estimated values" AAAAAAAA Table 6./ %ensing time for Transmitter 5etection Techniques AAAAAA.. Table 6.0 %ummary of comparison of Transmitter 5etection Techniques AA. // 47 62 66 // /;
ix
Glossary
C %5 5%A $ :5 $CC I... A5C 5AC I$ +*A ?C3 <++ A@C <> %> A9@* ,<%B E<%B %* %C$ $$T 5$T Cognitive adio %oftware 5efined adio 5ynamic %pectrum Access adio $requency :ardware 5efined adio $ederal communication commission Institute of .lectrical and .lectronic .ngineers Analog to 5igital Converter 5igital to Analog Converter Intermediate $requency +ow *oise Amplifier ?oltage Controlled 3scillator <hase +oc#ed loop Automatic @ain Control <rimary >ser %econdary >ser Additive 9hite @aussian *oise ,inary <hase %hift Beying Euadrature <hase %hift Beying %ignal to *oise atio %pectral Correlation $unction $ast $ourier Transform 5iscrete $ourier Transform
C.a/ter 1 INTRODUCTION
1.1 Intro0u1tion
The growing demand of wireless applications has put a lot of constraints on the usage of available radio spectrum which is limited and precious resource. If scanning of a radio spectrum including revenue rich urban areas, shows that some frequency bands in the spectrum are largely unoccupied most of the time, some other frequency bands are partially occupied and the remaining frequency bands are heavily used. This leads to an underutilization of radio spectrum. This underutilization of radio spectrum is minimized by the Cognitive adio. Cognitive adio is a promising technology which provides a novel way to improve utilization of available electromagnetic spectrum efficiently. Cognitive adio refers to wireless architectures in which a communication system does not operate in a fixed band, but rather searches and finds an appropriate band in which to operate. %pectrum sensing helps to detect the spectrum holes !underutilized bands of the spectrum" providing high spectral resolution capability. In todayHs wireless networ#s static spectrum allocation policy is used, that gives inefficient utilization of spectrum as shown in $igure/./I/J. Cognitive radio technology provides efficient utilization of electromagnetic radio spectrum.
The concept of C is proposed by Koseph &itola in /88= may also be defined as a radio that is aware of its environment and the internal state and with #nowledge of these elements and any stored pre)defined ob'ectives can ma#e implement decisions about it. In many spectrum bands, spectrum access is a more significant problem than physical scarcity of spectrum, in large part due to legacy command)and)control regulation that limits the ability of potential spectrum users to obtain such access I0J. The underutilization of the electromagnetic spectrum, referred to as spectrum holes as shown in $igure /.0 I1J, can be defined as a band of frequencies assigned to a primary user, but, at a particular time and specific geographic location, the band is not being utilized by that user. Cognitive adio is viewed as a novel approach for improving the utilization of the electromagnetic radio spectrum. The Cognitive radio, built on a %oftware)defined radio, is defined as an intelligent wireless communication system that is aware of its environment and uses the methodology of understanding)by)building to learn from the environment and adapt to statistical variations in the input stimuli, with two primary ob'ectives in mindC /. :ighly reliable communication whenever and wherever needed. 0. .fficient utilization of the radio spectrum.
$igure /.0 %pectrum &easurement across the 8;; B:z )/ @:z band
%oftware 5efined adio and its relationship with Cognitive adio, various stages adio. Also describes the Cognitive adioHs hardware, definitions, networ# architecture, challenges, characteristics, functions and %pectrum hole concept, its emergent behaviour, applications, standards, and various research organizations dealing with Cognitive radio.
C.a/ter $5 %pectrum %ensing Techniques. This chapter discusses the %pectrum %ensing Techniques, overview of various spectrum sensing techniques and the performance of transmitter detection algorithms in Cognitive adio also limitations of the transmitter detection and described the receiver and interference temperature detection, the modelling of the %pectrum %ensing and how the problem is decomposed, minimization of the sensing time. C.a/ter )5 Implementation. This chapter describes the implementation of the algorithms explained in Chapter 1, one of the transmitter detection technique .nergy 5etection is implemented using ?erilog and Cognitive radio using &atlab software is included. C.a/ter #5 %imulation esults. This chapter presents the simulation results of various spectrum sensing techniques, energy detection technique T+ schematics and Cognitive adio simulation results are discussed. C.a/ter *5 Comparison of %pectrum %ensing Techniques. This chapter presents the comparative analysis after tests conducted on the sensing algorithms. C.a/ter +5 Conclusion and $uture 9or#. This chapter provides a logical conclusion and enumerates the scope for future wor# that can be carried out.
.1.1Tra0itional Ra0io
The term radio refers to the wireless transceiver device, used the adio $requency ! $" as a part of the electromagnetic spectrum to transfer of information. Traditional :ardware 5efined adio !:5 " can perform only a single or a very limited set of radio functionality, and can only be modified through physical intervention, all of modulation and demodulation is performed in the analog domain. This results in higher production budgets and smallest flexibility in supporting multiple signal standards. Traditional adio logical daigram is shown in the $igure 0./. Compare to other radios it consists most of the main bloc#s are implemented in hardware ! $, &odulation, Coding" and remaing bloc#s are implemented in software !$raming, <rocessing" based as shown figure.
$igure 0./ +ogical diagram contrasting Traditional, %oftware defined, and Cognitive radios
physical layer functions are software defined!)) radio system software processing for operational functionality but not control functionality."MI4J. The $CC defined %5 as LAa transmitter in which the operating parameters of frequency range, modulation type or maximum output power Acan be altered by ma#ing a change in software that controls the operation of the device without ma#ing any changes in the hardware components that affect the radio frequency emissionsM I6J. The $CCHs definition is more specific with regards to the physical layer aspects of operations( however, this definition is basically the same as that derived by the %5 $orum and I....
automatically ad'usts its functions according to the desired ob'ectives. The relation between the %5 %5 clear from the below diagram that the Cognitive adio encompasses the %5 . The is developed in software based on digital signal processing with the is a generic radio modifiable radio frequency components. :ence, the %5
platform which has the capability to operate in different bandwidths over a large number of frequencies as well as using different modulation schemes and waveform formats. As a result of this, the %5 T5&A, 3$5& and %5&A etc. can support multiple standards such as @%&, 9C5&A, 9I&A- etc., and multiple access schemes such as
$igure 0.0 Illustration of the relationship between the %5 and the Cognitive adio 7
3ver the past two decades, analog radio systems are being substituted by digital radio systems for several radio applications in military, civilian and commercial spaces. As a result, invented the idea of %oftware 5efined adio. %5 $orum defines %5 technology as N adios that provide software control of a variety of modulation techniques, wideband or narrowband operation, communications security functions !such as hopping", and waveform requirements of current and evolving standards over a broad frequency rangeM. %5 technology facilitates implementation of some of the radio functionality such as modulationDdemodulation, signal generation, coding etc. in software modules running on a common hardware platform. %5 contains the same basic functional bloc#s as any other digital radio, but most, if not all, are implemented in software instead of hardware !e.g. mixer, filters, modulators, demodulators". %5 architecture !physical layer" consists of three main units, which are software tunable $ front end, wideband Analog to 5igital Converter !A5C" and $requency !I$" section and software reconfigurable digital 5igital to Analog Converter !5AC" conversion the implementation of the Intermediate baseband radio, as shown in $igure 0.1I7J
$igure 0.1 ,loc# diagram of %5 Transceiver A Cognitive adio transceiver is sense radio environment and capable of adapting its physical layer parameters according to the environment. In order to achieve the highly flexible reconfigurable physical layer where communication features, thus an %5 with all the latest communication techniques is the core of Cognitive adio. In $igure 0.2 is evidenced the strict relationship between %5
architecture and C %5
frequency band. And with most of the useful radio spectrum already allocated, it is difficult to find vacant bands to either deploy new services or to enhance existing ones. In order to overcome this situation, we need to come up with a means for improved utilization of the spectrum creating opportunities for dynamic spectrum access. The issue of spectrum underutilization in wireless communication can be solved in a better way using Cognitive adio technology. Cognitive radios are designed in order to provide highly reliable communication for all users of the networ#, wherever and whenever needed and to facilitate effective utilization of the radio spectrum.
1.<rovide a wide range of 1.Ad'usts operations services with variable Euality of %ervice to meet the Euality of %ervice required by the application for the signal environment
.$. Design
Table 0.0 Comparison of Cognitive 5efined adio in design point of view adio with Traditional adio and %oftware
/;
%oftware 5efined adio /.Traditional adio O %oftware Architecture 0. econfigurability 1.<rovisions for easy upgrades
.$.$ Soft6are
Table 0.1 Comparison of Cognitive Traditional adio /.Cannot be made as future proof 0.Typically radios are not upgradeable adio with Traditional adio and %oftware 5efined adio in software point of view %oftware 5efined adio Cognitive adio /.Ideally software /.%5 upgrade radios could be future proof 0.&any different external upgrade mechanisms &echanisms 0.Internal upgrades and Collaborative upgrades
$rom the above tables it is observed that how a Cognitive radio is different from other radios in the scenario application, design and software. $rom this it is observed that Cognitive upgradation mechanisms. adio is most suitable for upcoming new wireless communications because of its intelligence, awareness, learning observations and
//
modulates or demodulates and encodes or decodes the signal depending on whether a signal is transmitted or received. The baseband signal processing unit is similar to common transceivers, but the $ front)end is specifically designed to suit the need of the Cognitive adio. Cognitive adio transceiver is required to be capable of sensing over a wide spectrum range and preferably in real time. The wide spectrum range is accomplished by using $ hardware technologies li#e $ hardware is wideband antennas, power amplifiers, and adaptive filters. The
$igure 0.4 <hysical architecture of the Cognitive adio !a" Cognitive adio transceiver and !b" wideband $Danalog front)end architecture. The main components of the Cognitive 0.4!b" and are as followsC RF filter5 The $ filter selects the desired operating band by band pass filtering the received $ signal. Lo6 noise a8/lifier5 The +*A amplifies the received signal without adding remar#able amount of noise. &i9er5 The mixer is used to mix the received signal with locally generated frequency and then convert it to the baseband or the intermediate frequency !I$". $ adio $ front)end are shown in $igure
/0
!oltage:1ontrolle0 os1illator ;!CO<5 The ?C3 generates a signal at a specific frequency depending on the control voltage. The generated signal is then used to convert the incoming signal frequency to the baseband or intermediate frequency. %.ase lo1=e0 loo/ ;%LL<5 The <++ ma#es sure that the signal of ?C3 is loc#ed accurately on the specific reference frequency. C.annel sele1tion filter5 The channel selection filter selects the desired channel and re'ects ad'acent channels. Auto8ati1 gain 1ontrol ;AGC<5 The A@C is used to #eep the gain or output power level of an amplifier constant over a wide range of input signal levels. Analog:to:0igital 1on2erter ;ADC<5 The A5C converts the analog input signal to a digital signal.
computationally intelligent about radio resources and related computer)to) computer communications toC !a" detect user communications needs as a function of use context, and !b" to provide radio resources and wireless services most appropriate to those needs. :owever the concept of C is not limited strictly to wireless devices such as <5As. %imon :ay#in defines Cognitive adio, it as follows I/JC LCognitive radio is an intelligent wireless communication system that is aware of its surrounding environment !i.e., outside world", and uses the methodology of understanding)by) building to learn from the environment and adapt its internal states to statistical variations in the incoming $ stimuli by ma#ing corresponding changes in certain operating parameters !e.g., transmit)power, carrier)frequency, and modulation strategy" in real)time, with two primary ob'ectives in mindC a. :ighly reliable communications whenever and wherever needed. b. .fficient utilization of the radio spectrum.
/1
The regulatory bodies focus on the operation of transmitter li#e $CC defines the Cognitive radio asC A radio that can change its transmitter parameters based on interaction with the environment in which it operates I7J. 9hile assisting the $CC in its efforts to define Cognitive adio, I... >%A
offered the following definition I=J.A radio frequency transmitter or receiver that is designed to intelligently detect whether a particular segment of the radio spectrum is currently in use, and to 'ump into !and out of, as necessary" the temporarily)unused spectrum very rapidly, without interfering with the transmissions of other authorized users. %5 C forum which is mostly associated with C and %5 , that wor#s on I=J application defines C asC An adaptive, autonomous radio, multi)
dimensionally aware !system" that learns from its experiences to reason, plan, and decide future actions to meet user needs. %o among all definitions it is found that following terminologies are common L3bservationM, LAdaptabilityM and LIntelligenceM. >sing following terminologies C is defined as I=J L adio whose control processes permit the radio to leverage situational #nowledge and intelligent processing to autonomously adapt towards some goal. 5epending on the set of criteria ta#en into account when deciding on the changes transmission and reception, there are two main types of Cognitive adiosC 1. Full Cogniti2e Ra0io ;&itola ra0io<5 In which every possible parameter observable by a %econdary >ser !%>" ta#es into account. . S/e1tru8 Sensing Cogniti2e Ra0io ;'ay=in ra0io<5 In which only the radio frequency spectrum is considered.
/2
%ome part of the wireless spectrum is licensed for different tas#s and few bands are still unlicensed. In this section, there is discussion about all the possible scenarios for a better description of the communication protocols. The components of the Cognitive adio architecture are illustrated in $igure 0.6I0J. In figure it is clear that there are two main groups, the primary networ#s and the Cognitive adio networ#s !the next generation networ#s".
/4
spectrum with Cognitive users but it can be requested to have both legacy and Cognitive adio protocols for primary networ# access of Cognitive radio users.
infrastructure networ#s as illustrated in $igure 0.6. The components of the networ# are as followsC Cogniti2e Ra0io user5 The C user !the unlicensed user" has no spectrum license, so extra functionalities are needed for sharing the spectrum band. Cogniti2e Ra0io base:station5 The C base)station !the unlicensed base station" has a fixed infrastructure component with C abilities. Cognitive adio can access the different networ#s by providing the single hop networ# connection to C user I4J. %ingle hop connection is used to reduce the propagation delay( it has now become essential to have single hop networ# connection which connects the user terminals. The C networ# architecture in $igure 0.6 shows different types of networ#s networ#, without networ#s operate networ# !ad)hoc networ#".The C primary networ# access, with infrastructure based C infrastructure based C are three access types areC CR net6or= a11ess5 The C users can access the C base)station not only the licensed bands but also the unlicensed spectrum bands. CR a0 .o1 a11ess5 The C users communicate with different C users through the ad hoc connection on licensed and unlicensed bands. %ri8ary net6or= a11ess5 The licensed bands are means for the C users through which they access the primary base)station.
/6
Common receivers are capable of processing narrowband signals with low complexity and low power processors for digital signal processing. In order to utilize any opportunity, the Cognitive radio terminals need to process significantly wider bands. <>s are entitled to claim their frequency bands anytime when Cognitive adio is operating at that band. In order to prevent interference to and from <>s, Cognitive adio needs to identify the presence of a <> as quic#ly as possible and vacate the spectrum immediately. Consequently, detection algorithms need to sense the <> during a certain time period. This sets stringent requirement for the sensing method, forming a design challenge for Cognitive Challenges of Cognitive adio can be listed as followsC /" 5esigning an efficient spectrum sensing algorithm 0" Implementation complexity as Cognitive and system flexibility 1" 3peration in multiple secondary user environments to not compromise the signaling channel. 2" &ultipath fading and shadowing of user signals. 4" 5esigning a resource efficient cooperative scheme for spectrum sensing and information sharing between Cognitive radios. 6" obustness, low power. adio has requirement of frequency adios.
modulation and transmission power at run time without any modifications in the hardware components. In other words econfigurability of C is %5 . 5oing so we dynamically change all the layers of communication as shown in $igure 0.7. 9e can use different technologies depending on their spectrum availability with the same hardware.
/=
These four functions are included in the basic Cognitive cycle is shown in $igure 0.=
/8
The C
commonly #nown as spectrum holes. >sually spectrum holes are generally categorized into temporal spectrum holes and spatial spectrum holes. A temporal spectrum hole is unoccupied by the <> during the time of sensing. :ence, this band can be used by %>s in the current time slot. %pectrum sensing of this #ind does not require complex signal processing. A spatial spectrum hole is a band which is unoccupied by the <> at some spatial areas( and therefore can be occupied by %>s as well as outside this area. %patial sensing of a <> needs complex signal <rocessing algorithms I/0J. In terms of power spectra of incoming three broadly defined types I/1J. 1. Bla1= s/e1tru8 .oles5 9hich are fully used and dominated by high)power Llocal L interference some of the time. . Gray s/e1tru8 .oles5 9hich are partially used and dominated by low)power interference. $. ,.ite s/e1tru8 .oles5 9hich are not fully used and free of $ interference except for 9hite @aussian noise. Among these three, 9hite spectrum holes and @ray spectrum holes are can be used by unlicensed operators if accurate sensing technique is designed, and ,lac# spectrum holes cannot be used because usage of this space will cause interference to the <>. If the band is used more by a <>, the C moves to another spectrum hole as shown in $igure 0.8I/2J. $ is classifying the spectrum holes into
0;
Four 8ost /ro8ising a//li1ations are /. &ultimedia downloads 0. .mergency communications !with priority flag" 1. ,roadband wireless services 2. &ultimedia wireless networ#ing. A02antages of CR Cognitive radios are expected to be powerful tools for mitigating and solving general and selective spectrum access issues
0/
Improves current spectrum utilization !$ill in unused spectrum and move away from occupied spectrum" Improves wireless data networ# performance through increased user throughput and system reliability &ore adaptability and less coordination required between wireless networ#s.
Dra6ba1=s of CR %ecurity %oftware reliability Beeping up with higher data rates +oss of control egulatory concerns $ear of undesirable adaptations %ignificant research remains to be done to realize commercially practical Cognitive radio.
.1
Ra0io
%ome of the important institutions, forums and research organizations where extensive research is going on are listed below I/4J I/6J. DAR%A) is exploring many different aspects of Cognitive radio as part of the -@ program and other ongoing programs. >nfortunately, many of the results of the 5A <A programs are not currently in the public domain I""") has started the I... /8;; group to study the issue of Cognitive radio and giving standard li#e =;0.00 SDR Foru8) chartered two groups in 0;;2 to explore Cognitive radio issuesC the Cognitive adio 9or#ing @roup and the Cognitive adio %pecial Interest @roup. The wor#ing group is tas#ed with standardizing a definition of Cognitive radio and identifying the enabling technologies for Cognitive radio. FCC) 3n &ay /8, 0;;1, the $CC convened a wor#shop to examine the impact that Cognitive radio could have on spectrum utilization and to study the practical regulatory issues that Cognitive radio would raise.
00
!irginia Te1., 9or# is being performed exploring techniques to exploit collaborative radio to improve networ# performance. ,in lab Rutgers Uni2ersity is developing a Cognitive radio test bed for disaster response using commercially available components. " R).uropean initiative into supporting .nd)to).nd econfigurability with numerous participating .uropean universities and companies. B,RC),er#eley wireless research center is currently developing a Cognitive radio for sensing and opportunistically using the spectrum.
01
The main challenge to the Cognitive radios is the spectrum sensing. In spectrum sensing there is a need to find spectrum holes in the radio environment for C users. :owever it is difficult for C to have a direct measurement of channel between primary transmitter and receiver I/J. A C cannot transmit and detect the radio environment simultaneously, thus, we need such spectrum sensing techniques that ta#e less time for sensing the radio environment. In literature the spectrum sensing techniques have been classified is shown in the following $igure 1./ I/J.
02
:/Cy!t"FhQx!t"Ow!t"
!1./"
9here :; represents the hypothesis corresponding to Lno signal transmittedM, and :/ to Lsignal transmittedM, y!t" is received signal, x!t" is transmitted signal, w!t" is an Additive 9hite @aussian *oise !A9@*" with zero mean and variance RS0, and ThH is the amplitude of channel gain !channel coefficient"I/=J. 3n the basis of this hypothesis model we generally use three transmitter detection techniques I/8JC &atched $ilter 5etection, .nergy 5etection and Cyclostationary $eature 5etector. The #ey metric in spectrum sensing are the probability of correct detection !<d" and two types of errors in spectrum sensor, the first error occurs when the channel is vacant !:;"but the spectrum sensor can decide the channel is occupied, the probability of this event is the probability of false alarm !<f" , the second error when channel is occupied ! :/" the spectrum sensor can decide the channel is unoccupied, the probability of this event is probability of misdetection !<m" I01J. <d Fprob U5ecisionF :/D:/V <f Fprob U5ecisionF :/D:;V <m FprobU5ecisionF:;D:/V !1.0"
04
$igure 1.0 ,loc# 5iagram of &atched $ilter A &atched filter is an optimal detector in an A9@* channel if the waveform of primary user is previously #nown by C . It means that C order, the pulse shape and the pac#et format. %o if C should have #nowledge about the waveform of primary user such as modulation type and doesnHt have this type of prior information then itHs difficult to detect the primary user. 9e can still use &atched $ilter 5etection because in most of the communication networ#s we can achieve this coherency by introducing pilots, preambles, synchronization or word spreading codes in the waveform of primary users. %till there are limitations in matched filter because each C should have the information of all the primary users present in the radio environment. Advantage of matched filter is that it ta#es less time for high processing gain. :owever ma'or drawbac# of &atched $ilter is that a C would need a dedicated receiver for every primary user class I/8J.
$igure 1.1 ,loc# 5iagram of .nergy 5etector In a non fading environment where h is amplitude gain o f the channel, probability of detection <d and probability of false alarm <f are given by following formulas I0/JC !1.1"
06
!1.2" 9here Z is the %* , m F T9 is the !observationDsensing" time bandwidth product [!." and [!.,." are complete and incomplete gamma functions, generalized &arcum E)function. In a fading environment h is the amplitude gain of the channel that varies due to the shadowing or fading effect which ma#es the %* variable. <f is the same as that of non fading case because <f is independent of %* . <d gives the probability of detection conditioned on instantaneous %* . In this case average probability of detection may be derived by averaging !1.1" over fading statisticsC !1.4" 9here f Z !x" is the probability distribution function of %* under fading. A low value of means that the C indicates an absence of primary user with high probability, it user can use that spectrum. A high value of indicates ! " is the
minimal use of spectrum. In I0;J the authors suggest that in fading environment, where different C users need to cooperate in order to detect the presence of the primary user. In such a scenario a comprehensive model relating different parameters such as detection probability, number and spatial distribution of spectrum sensors and more importantly propagation characteristics are yet to be found. 3ne of the main problems of energy detection is that performance is susceptible to uncertainty in noise power. It cannot differentiate between signal power and noise power rather it 'ust tells us about absence or presence of the primary user.
07
hoping sequences, or cyclic prefixes which result in built)in periodicity. .ven though the data is a wide)sense stationary random process, these modulated signals are characterized as Cyclostationary, since their statistics, mean and autocorrelation, exhibit periodicity. This periodicity is introduced intentionally in the signal format so that a receiver can exploit for estimation such as carrier phase and pulse timing I02J. !1.6" $or some period \ ; where !1.7" 9here .I.J is expectation operation. %ince x is periodic, it can be represented as a $ourier %eries as !1.=" 9here the sum over ] includes all integer multiples of the reciprocal of the fundamental period . The $ourier coefficient also #nown as cyclic
autocorrelation is given by !1.8" Cyclostationary signals exhibit correlation between widely separated spectral components due to spectral redundancy caused by periodicity. The $ourier transform of the cyclic autocorrelation is spectral correlation function and is given by, !1./;"
0=
$igure 1.2 ,loc# 5iagram of Cyclostationary $eature detection >nli#e power spectrum density, which is real)valued one dimensional transform, the spectral correlation function in !7" is a two dimensional transform. In general it is complex)valued and the parameter ] is called cycle frequency. <ower spectral density is a special case of a spectral correlation function for ] F ;. 5ifferent types of modulated signals !such as ,<%B, E<%B, %E<%B" that have identical power spectral density functions can have highly distinct spectral correlation functions. $urthermore, stationary noise and interference exhibit no spectral correlation. @iven * samples, the spectral correlation function I04J. !1.//" !%C$" is estimated as
9here is the +)point discrete $ourier transform !5$T" around the nth the received signal, and
!1./0" sample of
corresponding to the cyclic frequency ]. The %C$ of received signal is then correlated with the %C$ of the signal !#nown priori" and then compared to a threshold to detect if the primary signal is present.
A collaborative spectrum sensing method has been first proposed by @hasemi and %ousain I0;J. C cooperative spectrum sensing occurs when a group or networ# of C users share the sense information they gain for <> detection. This provides a more accurate spectrum sensing over the area where the C s are located. Cooperative spectrum sensing plays a very important role in the research of C due to its ability in improving sensing performance especially in the $igure 1.4 illustrated multipath fading, shadowing and receiver^s uncertainty. As shown in the $igure 1.4, C / and C 0 are placed inside the transmission range of the <> transmitter !<> T-" while C 1 is outside the range. 5ue to multiple attenuated copies of the <> signal and the bloc#ing of a house, C 0 experiences multipath and shadow fading such that the <>Hs signal may not be correctly detected. &oreover, C 1 suffers from the receiver uncertainty problem because it is unaware of the <>Hs transmission and the existence of the primary receiver !<> -". As a result, the transmission from C 1 may interfere with the reception at <> -. If C users, most of which observe a strong <> signal li#e C / in the $igure 1.4, can cooperate and share the sensing results with other users, the combined cooperative decision derived from the spatially collected observations can overcome the deficiency of individual observations at each C user I/J, I0=J. fading, shadowing and noise uncertaintyI06J, I07J.
1;
sending the sensing results is called a reporting channel as shown in $igure 1.6!a". $C then analyses the information and determines the bands that can and cannot be used I0=J, I08J. . Distribute0 a//roa1.5 >nli#e centralized approach, distributed cooperative sensing does not depend on a $C for ma#ing the cooperative decision. >sing the distributed approach for C cooperative spectrum sensing, no one C ta#es control. .ach C sends its specific data of sensing to other C s, merges its data with the received data of sensing, and decides whether or not the <> is present by using a local condition as shown in $igure 1.6 !b". :owever this approach requires for the individual C s to have a much higher level of independence, and possibly setting themselves up as an ad)hoc networ# I0=J, I08J.
1/
10
The first step is to chec# the radio environment whether there is any waveform present or not. $or experimentation purposes, various types of primary userHs waveforms have been developed. adio environment is searched by Cognitive radio and from radio environment primary users wave form is extracted.
12
$.+.# Classifi1ation
The purpose of this module is to classify the primary userHs waveform using features extracted from the previous module. The classifier should #now about the features of well #nown wireless technologies e.g. 9ireless +A*, ,luetooth etc. 3nce it ta#es features from previous module it can classify the technology used by primary user using previously stored information about technology.
14
$igure 1.8 Algorithm for minimizing sensing time for detection The received signal is first passed through &atched $ilter, as it ta#es least time for sensing among all three mentioned techniques. If output is T:H or T+H then itHs fine that we concluded about presence or absence of primary user. If output is T&H then we have to go for some other technique. As .nergy detection technique ta#es less sensing time compared to Cyclostationary feature detection. Then signal is passed through energy detection filter and if its output is T+H or T:H then again there is no need to go for another detection technique. $inally if energy detectors output is T&H then go for Cyclostationary feature detection. If its output is T: Hor T&H then we said that primary user is present, otherwise primary user is not present.
C.a/ter ) I&%L"&"NTATION
16
).1 Intro0u1tion
This chapter concentrates on the implementation of spectrum sensing techniques to obtain results for all designed classifiers and subsequent analysis. $irst, overall program structure has been discussed followed by the algorithms and flow charts.
17
_!t`t/", it has the equivalent discrete domain c F Izeros!*;,/"( a; ( zeros!*/,/" ( a/J, where *; and */ are t; and t/ in unit of Ts. Ste/ *5 The channel noise is assumed to be Additive 9hite @aussian with signal strength 0d,. In &AT+A, TawgnH function is used for this purpose.
$igure 2./ $low chart for Implementation of <rimary Transmitter The &AT+A, program code simulates two types of <rimary transmitter for %pectrum %ensing in Cognitive adio *etwor#s, one using ,<%B &odulation technique and other using E<%B &odulation technique.
1=
discussed in Chapter 1 energy detector measures the energy received from primary user during the observation interval. If energy is less then certain threshold value then it declares it as spectrum hole. +et r!t" is the received signal which we have to pass from energy detector. The procedure for implementation of the .nergy 5etector is as follows. Ste/ 15 $irst estimate <ower %pectral 5ensity !<%5" by using periodogram function in &AT+A,. <xx F <eriodogram !r" Ste/ 5 The power spectral density !<%5" is intended for continuous spectra. The integral of the <%5 over a given frequency band computes the average power in the signal over that frequency band. :psdF5spdata.psd!<xx" Ste/ $5 *ow one frequency component ta#es almost 0; points in &AT+A,. %o for each frequency there points are summed and get the result. Ste/ )5 3n experimental basis when results at low and high %* then threshold X is set to be 4;. Ste/ #5 $inally the output of the integrator, Y is compared with a threshold value X to decide whether primary user is present or not. $low chart for the implementation of .nergy 5etector is shown in $igure 2.0. are compared
18
2;
20
$igure 2.2 $low chart for the Implementation of Cyclostationary $eature 5etection
21
9here rnm!Ns" are the elements of the sample covariance matrix Rx!Ns". Ste/ #5 5etermine the presence of the signal based on T/!Ns", T0!Ns", and threshold /. That is, if T0!Ns" >/, the signal exists( otherwise, the signal does not exist.
22
to compute the above parameters in a single cloc# pulse, we should be able to have the samples from c*s to O*s so, we should have all the 0*s samples at a time. %o instead of am only one possible way is to use a shift register with length 0* s. so the hardware structure will be as shown in $igure 2.4.
$igure 2.4 Architecture of .nergy 5etection without A& $igure 2.4 clearly represents the hardware architecture for energy detection scheme for cognitive radio. 9hereas -in is an =)bit sample inputs applied to the shift register for every cloc# pulse. The shift register outputs have previous and present samples in that xp/, xp0,Axp7 represents previous samples and xm/, xm0Axm7 represents the present samples. After the X; is calculation performed by using threshold Z and T0 !X;" to ta#e decision on signal presents a subtraction is performed between threshold and t0 if borrow exists primary user is present else there is no primary user. .quation represents the calculation for the test statistic of T0 for a smoothing factor of +F= and *s F =. T0 F /D=!X;OX;OX;OX;O d d d d =times" F X;
24
$igure 2.6 5igital Implementation of an .nergy 5etector .nergy detector based approach is the most common way of spectrum sensing because of its low computational and implementation complexities. 9hen the primary user signal is un#nown or the receiver cannot gather sufficient information about the primary user signal, the energy detection method is used. About the primary user signal, the energy detection method is used. This method is optimal for detecting any un#nown zero)mean constellation signals and can be applied to Cognitive radios !C s" I/J. The process flow of the energy detector is, the received signal is passed through the A5C then calculate the $$T coefficient values then squared those values and average over the observation interval. Then the output of the detector is compared to a pre)defined threshold value to decide whether the primary user is present or not.
26
#.
&ATLAB
To understand the basic concepts associated with Cognitive adio and &AT+A, we initially implemented basic %pectrum %ensing algorithms as discussed belowC
27
$igure 4./ .nergy 5etector 3utput at %* 1;d, for ,<%B when primary user is present at 0;;:z $igure 4.0 shows the output of energy detector when there is a primary user at 0;;:z using ,<%B is present with very poor %* . It is very clear in the $igure 4.0 that there are so many pea#s in whole figure. %o energy detector compared value of each point with threshold, in this case its greater then threshold at many points. :ence, energy detector said that primary users are present at all along the spectrum.
2=
$igure 4.0 .nergy 5etector 3utput at %* )1;d, for ,<%B when primary user is present at 0;;:z
$igure 4.1 .nergy 5etector 3utput at %* 1;d, for E<%B when primary user is present at 0;;:z
28
$igure 4.1 shows the output of energy detector when there is a primary user at 0;; :z using E<%B is present with very good %* . ItHs very clear in the $igure 4.1 that there is pea# at exactly 0;;:z. %o energy detector compared value of each point with threshold, in this case its greater then threshold at 0;;:z. :ence, energy detector said that primary user is present at 0;;:z.
$igure 4.2 .nergy 5etector 3utput at %* )1;d, for E<%B when primary user is present at 0;;:z $igure 4.2 shows the output of energy detector when there is a primary user at 0;;:z using E<%B is present with very poor %* . ItHs very clear in the $igure 4.2 that there are so many pea#s in whole figure. %o energy detector compared value of each point with threshold value, in this case its greater then threshold at many points. :ence, energy detector said that primary users are present at all along the spectrum. 9hen there is no primary user, even the energy detector detects that primary user is present under low %* conditions. This is the main drawbac# of energy detection that it canHt distinguish between noise and energy of the signal. >nder low %* conditions energy detector told that primary user is present in all around the spectrum if it is white noise.
4;
10
-8
10
-6
10 P
fa
-4
10
-2
10
$igure 4.4 3C curves of energy detection scheme with different %* In the graph probability of false alarm on -)axis and probability of detection on Y)axis as shown in $igure 4.4. :ere we have ta#en probability of false alarm is !;,/", and the %* at four different values are 6d,, =d,, /;d,, /0d, from the figure it is observed that detection performance improved by increasing %* value.
4/
In p u t S ig n a l 1
#. . &at1.e0 Filter Si8ulation Results
The &AT+A, program simulates the &atched $ilter for %pectrum %ensing in Cognitive adio *etwor#s. $or the case of ,<%B in which the two pulses are p!t" conditions the receiver computes the correlation between p!t" and received pulse. If correlation -0 .5 is / we decide p!t" is received as in $igure 4.6, otherwise we will decide that cp!t" is received. 9hen %* conditions are not good then correlation coefficient -1 is no longer O/ or )/, but has smaller magnitude, thus reducing the
0 .5
0 2 0 $igure 4 0 4.6 6 0shows 8 0 the correlation 1 0 0 1 2 0 of1 4received 0 1 6 0 signal 1 8 0 with 2 0 0 signal distinguishability.
generated at cognitive radio under good S a%* m p le sconditions.
A m p litu d e
0 The correlation coefficient c of these pulses is )/. >nder good %* and cp!t".
M a tc h e d F ilte r O u tp u t 100
50 A m p litu d e
-5 0
20
40
60
80
100 120 S a m p le s
140
160
180
200
40
of detection is less because %* value is less so the signal strength is poor. %o at that frequency band primary user is absent.
Nonfluctuating Noncoherent Receiver Operating Characteristic (ROC) Curves 1 0.9 0.8 0.7 0.6 P 0.5 0.4 0.3 0.2 0.1 0 -4 10 SNR=3dB
d
10
-3
10 Pfa
-2
10
-1
10
$igure 4.7 3C curve for &atched filter detection at %* F1d, $igure 4.= shows that probability of detection is very high because %* value is more so the signal strength is high. %o at that frequency band primary user is present.
41
Nonfluctuating Noncoherent Receiver Operating Characteristic (ROC) Curves 1 0.95 0.9 0.85 0.8 0.75 0.7 0.65 SNR=10dB
d
10
-4
10
-3
10 Pfa
-2
10
-1
10
42
$igure 4.8 Cyclostationary $eature 5etector 3utput at %* 1;d, for ,<%B when primary user is present at 0;;:z $igure 4.8 shows the output of Cyclostationary feature detection when there is a primary user at 0;;:z using ,<%B is present with very good %* . ItHs very clear in the $igure 4.8 that there is pea# in the center and there is a pea# at double of the frequency as well. *ow we have to compare second pea# with threshold value. %o Cyclostationary feature detection compared value of each pea# with threshold, in this case its greater then threshold at 0;;:z. :ence, Cyclostationary feature detection said that primary user is present at 0;;:z. $igure 4./; shows the output of Cyclostationary feature detection when there is a primary user at 0;; :z using ,<%B is present with very poor %* . ItHs very clear in the $igure 4./; that itHs very difficult to detect second pea# at 2;;:z. %o we have to compare second pea# with threshold value. :ence, Cyclostationary feature detection compared value of each pea# with threshold, in this case no pea# is greater than threshold. :ence, Cyclostationary feature detection said that primary user is not present.
$igure 4./; Cyclostationary $eature 5etector 3utput at %* )1;d, for ,<%B when primary user is present at 0;;:z
44
$igure 4.// Cyclostationary $eature 5etector 3utput at %* 1;d, for E<%B when <rimary user is present at 0;;:z $igure 4.// shows the output of Cyclostationary feature detection when there is a primary user at 0;;:z using E<%B is present with very good %* . ItHs very clear in the $igure 4.// that there is pea# in the center and there are two pea#s at double of the frequency as well. %o we have to compare second pair of pea#s with threshold value. %o Cyclostationary feature detection compared value of each pea# with threshold, in this case its greater then threshold at 2;;:z. :ence, Cyclostationary feature detection said that primary user is present at 0;;:z.
46
$igure 4./0 Cyclostationary $eature 5etector 3utput at %* )1;d, for E<%B when primary user is present at 0;;:z $igure 4./0 shows the output of Cyclostationary feature detection when there is a primary user at 0;;:z using E<%B is present with very poor %* . ItHs very clear in the $igure 4./0 that there is pea# in the center and itHs very difficult to see two pea#s at double frequency. %o we have to compare second pea# with threshold value. %o Cyclostationary feature detection compared value of each pea# with threshold, in this case its less then threshold. :ence, Cyclostationary feature detection said that primary user is not present.
#.$ Results of "nergy Dete1tion /rogra88ing using !"RILOG 0one in Hilin9 IS"
As explained in the chapter2, implementation algorithm for .nergy detection the code is written in ?. I+3@ and simulated using -ilinx I%. and the simulation results are obtatained. :ere the input is ta#en as = bit binary input that is process through the energy detector algorithm and calculated the value. After the X; is calculation
47
performed by using threshold Z and X; to ta#e decision on signal present or not, a subtraction operation is performed between threshold Z and X; if borrow exists primary user is present else there is no primary user. $igure 4./1 shows that simulated wave form for primary user is present or absent. %I&>+AT.5 9A?. $3 & $3 .*. @Y 5.T.CTI3*
4=
&inimum periodC ;.700ns !&aximum $requencyC /1=2.;=1&:z" &inimum input arrival time before cloc#C ;.72/ns &aximum output required time after cloc#C /;.010ns &aximum combinational path delayC *o path found T+ %chematics for .nergy 5etection Algorithm
48
6;
3 F r e q u e n c y( M H z )
$igure 4./7!a" used bands !/st and 2th", unused bands !0nd, 1rdand 4th". adio system will search the first available gap !%pectrum hole" in the spectrum and automatically assign it to the secondary user. As the first available gap was occupied by the secondary user/ it is shown in the $igure 4./7!b".
6/
P o w e rS p e c tr a lD e n s ity 1 0 P o w e r /fr e q u e n c y( d B /H z )
1 0
2 0
3 0
4 0
5 0 0
3 F r e q u e n c y( M H z )
$igure 4./7!b" /st unused band is assigned to %econdary user/. adio system will search the next available gap in the spectrum and automatically assign it to the secondary user. As the next available gap was occupied by the secondary user0 it is shown in the $igure 4./7!c".
P o w e rS p e c tr a lD e n s ity 5 P o w e r /fr e q u e n c y( d B /H z ) 0 5 1 0 1 5 2 0 2 5 3 0 3 5 0
3 F r e q u e n c y( M H z )
n0
$igure 4./7!c" 0nd unused band is assigned to %econdary user0. *ow we have 'ust one empty slot left which will get filled by addition of another %econdary user as shown in $igure 4./7!d". It shows that all of the frequency bands are efficiently in use after the last spectrum hole is occupied by the secondary user1.
60
0 Power/frequency (dB/Hz)
-5
-10
-15
-20
-25
-30 0
3 Frequency (MHz)
$igure 4./7!d" All of the %pectrum bands are in use. :ere, low pea#s in $igure 4./7!a" are for 0nd, 1rd and 4th primary users who are not present and high pea#s for the present ones. In $igure 4./7!b", you can see that after allocating the 0nd slot to secondary user/, there is an increase in the pea# of 0nd slot. %imilarly in $igure 4./7!c", there is an increase in the pea# of 1rd slot allocating it to the secondary user0. *ow at this instant 4th primary user leaves the slot. %o, finally, $igure 4./7!d" shows the allotment of 4 th slot to secondary user1 by the cognitive radio networ#. *ow we have to ta#e %ignal to noise ratio !%* " values are 4d, and/2d,. Then, the following results are shown in the $igure 4./7!e" and $igure 4./7!f".
P ow er S pec tral Dens ity 10 5 P ower S pectral Dens ity
-5
-5
-10
-10
-15
-15
-20
-20
-25
-25
-30
3 Frequenc y (M Hz)
4./7!e" %* F4d,
61
*ow we have to attenuate the received signal with attenuation percentage values are /;G and /4G. Then, the following results are shown in the $igure 4./7!g" and $igure 4./7!h".
P ow er S pe c tral D ens ity 5 5 P o w er S pe c tral D ens ity
-5
-5
P ow er/frequenc y (dB /H z )
-15
-10
-10
-15
-20
-20
-25
-25
-30
-30
3 F requ enc y (M H z )
62
*. .1 Sensing Ti8e
5uring communication Cognitive radio continuously sense the radio environment for spectrum holes and C canHt transmit and sense at the same time. Therefore we need sensing time as small as possible. &atched $iltering is a good technique for spectrum sensing in Cognitive radio networ#s if we have prior #nowledge about primary users waveform. ,ut in most of cases we have no prior #nowledge about primary userHs waveform which ma#es it difficult for the use of spectrum sensing. It requires least sensing time to
64
achieve high processing gain due to coherency. Comparing .nergy 5etector and &atched $iltering, .nergy 5etector requires a longer sensing time to achieve good results as shown in Table 6./. Cyclostationary $eature 5etection is also a non coherent technique which ma#es it superior to &atched $iltering. Cyclostationary $eature 5etection technique is computationally very complex and it ta#es long observation time for sensing. Table 6./ %ensing time for Transmitter 5etection Techniques %r. *o. / 0 Type of <rimary %ignal ,<%B E<%B .nergy 5etection /.0; sec /.01 sec &atched $ilter ;./7 sec ;.0 sec Cyclostationary $eature 5etector 8.4; sec //.0/ sec
:ence from the experimental results in Table 6./ shows that &atched filter requires least among the all sensing techniques and Cyclostationary ta#es most.
*. . Dete1tion Sensiti2ity
As matched filter required prior #nowledge about primary userHs waveform but in comparison with energy detector it is still better under noisy environment. The ma'or drawbac# of the energy detector is that it is unable to differentiate between sources of received energy i.e. it cannot distinguish between noise and primary user. %o this ma#es it susceptible technique when there are uncertainties in bac#ground noise power, especially at low %* . Cyclostationary $eature 5etector is good technique under noisy environment as it is able to distinguish between noise energy and signal energy. $igure 6.0 shows comparison of transmitter detection techniques when there is primary user is present under different %* s. esults shows that at low %* when primary user is present cyclostationary and matched filtering are unable to detect primary user but energy detector still detect it. $igure 6.1 shows when there is no primary user present even then energy detector detects primary user at low %* , which ma#es energy detector unreliable technique under low %* values. :ence, when we have no prior #nowledge about primary userHs waveform then best technique is Cyclostationary feature detection.
66
$igure 6.0 Comparison of Transmitter 5etection Techniques when <rimary >ser is <resent
$igure 6.1 Comparison of Transmitter 5etection Techniques when <rimary >ser is absent
67
C.a/ter +
6=
+. Future ,or=
In this further I want to do the wor# for other detection techniques wavelet based detection, covariance absolute method and eigen value based detection also these spectrum sensing techniques implementation in :ardware. In which one of the transmitter detection techniques, .nergy 5etection implementation is in :ardware <latform. &ost of the research on spectrum sensing is mainly focused on reliable sensing to meet the regulatory requirements. 3ne of the important areas for the research is to focus on user level cooperation among Cognitive radios and system level co)operation among different Cognitive radio networ#s to overcome the noise level uncertainties. In this wor#, the noise level uncertainties are catered by
68
a proper combination of spectrum sensing techniques. Another area for research is cross layer communication in which spectrum sensing and higher layer functionalities can help in improving quality of service !Eo%".
7;
%ubli1ations5
/. .eru . +avudiya, 5r. B.5. Bulat and Kagdish 5. Bene, LImplementation and adio %ystem using &AT+A,M, International Kournal of Analysis of Cognitive 0;/1.
7/
Referen1es5
I/J A.$.A#yildiz, 9. +ee, &.C.?uran, % &ohanty, L*ext @enerationD 5ynamic spectrum accessDcognitive radio wireless networ#sC A surveyM, Computer *etwor#s, &ay 0;;6. I0J $ederal Communications Commission !$CC", e %pectrum <olicy Tas# $orce, eport, pp.0)/14, 0;;0. I1J :. :arada, L esearch and development on cognitive and software radio technologies, 5evice and hardware platform )M, @eneral assembly of > %I, August 0;;=. I2J III, Thomas Clancy, 5ynamic %pectrum Access in Cognitive adio *etwor#s, 0;;6. I4J The %oftware 5efined adio $orum Inc, N%5 $ Cognitive adio 5efinitionsN, %5 $);6) );;//)?/.;.;, 0;;7. I6J $ederal Communications Commission, N$acilitating 3pportunities for $lexible, .fficient, and 100, 0;;1. I7J K. &itola III and @. E. &aguire, LCognitive radioC &a#ing software radios more personalN, I... <ersonal Communications &agazine, vol.6, no.2, pp./1)/=, August /888. I=J %. :ay#in, LCognitive radioC brain)empowered wireless communicationsM, I... K, %elect.Areas in Communication, vol.01, no.0, pp.0;/c00;, $ebruary 0;;4. I8J K.&itola, LCognitive radio an integrated agent architecture for software definedM, <h.5. dissertation, BT: %weden, 0;;;. I/;J B.@. %mitha and A.<. ?inod, LCluster based power efficient cooperative spectrum sensing under reduced bandwidth using location informationM, A.>. ) International Kournal of .lectronics and Communications, vol.66, no.=, pp. 6/8)602, 0;/0. I//J <. 9ang and I. $. A#yildiz, L3n the 3rigins of :eavy)Tailed 5elay in 5ynamic %pectrum Access *etwor#sM, I... Transactions on &obile Computing, vol.//, no.0, pp.0;2)0/7, 0;/0. 70 oyal Institute of Technology, %toc#holm, eliable %pectrum >se .mploying Cognitive adio TechnologiesN, *otice of <roposed ule &a#ing and 3rder .T 5oc#et *o.;1)
I/0J K. &a, @.Ye +i, and ,.:. Kuang, LI*?IT.5 <A<. C %ignal <rocessing in Cognitive 0;;8. I/1J K.Ch. Clement, B.?. Brishnan, and A. ,agubali, LCognitive Computer Applications, vol.2;, no./6, pp.17)2;, 0;/0. I/2J ,. 9ang and B. K. pp.4 ) 01, 0;//. I/4J ,. A. $ette, Cognitive adio, /st ed. *ewness, 0;;6. I/6J K.3. *eel, LAnalysis and design of cognitive radio networ#s and distributed radio esource management algorithmsM, 5octoral 5issertation, ?irginia <olytechnic Institute and %tate >niversity, %eptember 0;;6. I/7J T. Yuce# and :. Arsla, LA survey of spectrum sensing algorithms for Cognitive adio applicationsM, I... Communications %urveys P Tutorials, vol.//, no./, pp.//6c/1;, &arch 0;;8. I/=J A. %ahai and 5. Cabric, L%pectrum sensingC fundamental limits and practical challengesM, I... <roceedings of International %ymposium on *ew $rontiers in 5ynamic %pectrum Access *etwor#s!5y%<A*", ,altimore, &5, *ovember 0;;4. I/8J 5. Cabric, %.&. &ishra, and %pectrum %ensing for Cognitive .9. ,rodersen, MImplementation Issues in adiosM, in <roc.1=th Asilomar Conference on ay +iu, LAdvances in Cognitive adio *etwor#sC A %urveyM, I... Kournal of %elected Topics in %ignal <rocessing, vol.4, no./, adioC %pectrum %ensing <roblems in %ignal <rocessingM, International Kournal of adioM, Kournal <roceedings of the I..., vol.87, no.4, pp.=;4)=01,
%ignals, %ystems and Computers, pp.770)776, *ovember 0;;2. I0;J A. @hasemi and ..%. %ousa,M Collaborative %pectrum %ensing for 3pportunistic Access in $ading .nvironmentM, in <roc. I... 5y%<A*, pp./1/) /16, *ovember 0;;4. I0/J $.$. 5igham, &.% Alouini and &.B %imon, M3n the energy detection of un#nown signals over fading channelsM, in <roc I... International Conference on Communication !ICC;;1", pp. 1474)1478, &ay 0;;1. I00J ,. %a#lar, M 5igital CommunicationsC $undamentals and ApplicationsM !0nd .dition" !<rentice :all Communications .ngineering and .merging Technologies %eries".
71
I01J -.C.-. 9ang, :.:.Chen and &. @uifani, LCognitive radio networ# managementM, I... ?ehicular Technology &agazine, vol.1, no./, pp.0=c14, 0;;=. I02J 9. @ardner and C. %pooner, L%ignal interceptionC performance advantages of cyclic)feature detectorsM, I... Transactions on Communications, vol.2;, no./, pp. /28c/48, Kanuary /880. I04J :. <. fhiEuan, %huguang Cui and A. %ayed, LCollaborative wideband sensing for Cognitive radiosM, I... %ignal <rocessing &agazine, vol.04, no.6, pp.6;c71, *ovember 0;;=. I06J K. >nni#rishnan, and ?. ?eeravalli LCooperative sensing for primary detection in Cognitive radioM, I... Kournal on %elected Areas in %ignal <rocessing, vol.0, no./, pp./=)07, 0;;=. I07J Y. Chen, E. fhao, and A. %wami L5istributed spectrum sensing and access in Cognitive radio networ#s with energy constraintM, I... Transactions on %ignal <rocessing, vol.47, no.0, pp.7=1)787, 0;;8. I0=J $. A#yildiz, ,.$. +o, and . ,ala#rishnan, LCooperative spectrum sensing in Cognitive radio networ#sC A surveyM, <hysical Communication, vol.2, no./, pp. 2;)60, 0;//. I08J *. *oorshams, &. &alboubi, and A. ,ahai, LCentralized and decentralized cooperative spectrum sensing in Cognitive radio networ#sC A novel approachM, I... //th International 9or#shop on %ignal <rocessing Advances in 9ireless Communications!%<A9C", pp./)4, 0;/;. I1;J Kames3H5onnell *eel, LAnalysis and 5esign of Cognitive and 5istributed adio adio *etwor#s esource &anagement AlgorithmsM, <h5 5issertation, . &aha'an, L,uilding Cognitive adio %ystem >sing
?irginia <olytechnic Institute and %tate >niversity, ,lac#sburg, ?A, 0;;6. I1/J A. ,ansal, &s. &atlabM, K.C%., ?ol./, no.1, 0;/0.
72