You are on page 1of 10

Cognitive Radio Based Wireless Ad

Hoc Networks
Prepared by Aswad A. Shakur
Advised by Dr. Fan Jiang

Tuskegee University, Department of Electrical


Eng
12/07/2021
Overview
 Existing spectrum policy forces  Recent measurements by the FCC
spectrum to behave like a show that 70% of the allocated
fragmented disk. spectrum is not utilized.
 Bandwidth is expensive and good  New radio design technology –
frequencies are taken Cognitive radio technology
 Unlicensed bands – biggest provides a means to effectively
innovations in spectrum efficiency utilize the system resources.

2 12/07/2021
What is cognitive Radio(CR)?
 CR is a technique that allows users to dynamically sense the frequency
spectrum, find the available spectrum bands in a target spectral range,
and then transmit without introducing excessive interference to the
existing users.

 Cognitive radio requirements


– Co-exists with legacy wireless systems
– Uses their spectrum resources
– Does not interfere with them

 Cognitive radio properties


– RF technology that senses the entire spectrum
– Knowledge of the primary users’ spectrum usage as a function of
location and time
3
– Rules of sharing the available resources(time,frequency,space)
Tuskegee University, Department of Electrical
12/07/2021
Engineering
System Description
 We consider a multicarrier DS CDMA  Let Fi be the set of free subcarriers
system in conjunction with a wireless available to user i with Ai free
ad hoc network subcarriers in that set
 The wireless channel is modeled as  Let Pi(k) , Si(k) (f), and bi(k) be the
frequency-selective, Rayleigh fading transmit power, noise PSD, and bits-
channel. per-symbol transmitted respectively
 The available frequency spectrum is by CR user i on its k-th subcarrier,
divided into M equi-width frequency k=1,….Ai
bands each with bandwidth B  αij(k) indicates the channel gain
 Assume each subcarrier experiences between the i-th transmiter and j-th
flat fading reciever on subcarrier k
 At time t, assume N CR transmitter-  We employ M-ary quadrature
reciever pairs want to access the amplitude modulation(MQAM)
channel, and the i-th pair, i=1,…,N
has a specified data rate requirement,
Ri and BERi

4 Tuskegee University, Department of Electrical Engineering 12/07/2021


Problem Formulation
 By appropriately selecting the subcarriers, the objective is to minimize the required power consumption of all
the CR users while satisfying the data rate requirement of each of them.
 Mathematically, the problem is formulated as follows:

subject to,

 In order to solve this constrained optimization problem, we must know F i, Si(k)(f), and αij(k)
 We employ multitaper spectrum estimation method (MTM) to determine
 Available subcarrier set Fi
 Channel state information
 Noise power at the receiver

5 Tuskegee University, Department of Electrical


Engineering 12/07/2021
Spectrum Management and Power Control

 An indicator of the quality of the k-th subcarrier of i-th user is defined as

is the channel gain and is the noise power


 A CR user assumes that no other users will share the resources with it, then
sorts its available subcarriers from best to worst based on the IQ values.
 A CR user selects the best subcarriers for its transmission with minimal power
 For N CR users with k free subcarriers for their transmission from a common
available subcarrier set F of size m,

 are the power vector, the data rate vector and SINR
threshold vector, respectively, for the Q users on the conflicting subcarrier.
 For user i, i=1,…,Q, the received SINR is

6 Tuskegee University, Department of Electrical 12/07/2021


Engineering
Cont’d
 Data rate requirement of user i is
 Some natural questions are:
1. How to protect the primary users when a subcarrier detection
error occurs
2. How to protect the CR user once it is admitted to the system
3. How to find when it is not possible to find an optimal power
vector for all the Q users with the current data rate.
4. What the effect is of a maximum power constraint.

7 Tuskegee University, Department of Electrical 12/07/2021


Engineering
Adaptive Power Control Algorithm with User Protection and Adaptive Rate Control(APC/UP/ARC)

 User i, i=1,…,Q, is in the active user set X(k) iff user i is originally a primary
user or user i is a cognitive radio user such that its

 User i,i=1,…,Q, is in the transition user set Y(k) iff user i is originally a CR user
and its

 The APC/UP is described as

 The protection margin δ is used to compensate for the interference induced by


CR users(δ is slightly larger than 1)

Tuskegee University, Department of Electrical


8 12/07/2021
Engineering
Cont’d
 Adaptive Rate Control(ARC)
 A CR user pre-sets a time duration Ti within which to access the system
 After Ti steps, if it does not gain access, compute ∆Ti which is a decreasing function of the difference between
its current SINR and its target one
 If after Ti + ∆Ti steps, it still not gain access, decrease data rate by ∆B
 Repeat the above process until a CR user gains access successfully or stops transmission because B i ≤ 0

 Distress signaling concept is used to overcome the maximum power constraint


Pi_max
 When user i is approaching power constraint Pi_max
 a distress signal is broadcast and each CR user in the vicinity of user i will decrease its data rate by ∆B and
thus decrease its power
 User i will experience less interference and decrease its power level
 If after user i broadcast the distress signal, the power is still increasing, it then decreases it data rate by
∆B

9 Tuskegee University, Department of Electrical Engineering 12/07/2021


THANK YOU

10 Tuskegee University, Department of Electrical Engineering 12/07/2021

You might also like