Professional Documents
Culture Documents
Presented By:-
Pramod Kumar Gupta
Scholar No.172114112
Department of Electronics and Communication Engineering
M.Tech, Digital communication
• Introduction
• Objective
• Functions of CR
• Results
• Conclusion
• References
INTRODUCTION
frequency bands that are not being used by their licensed users can be
external wireless network. The cognitive radio users can be divided into
• Proper sensing of the spectrum is the integral part of this software defined
radio.
• Observing the unused spectrum of a licensed user is crucial for the concept
of cognitive radio to be a success.
Spectrum management
Spectrum Management: Provides the fair spectrum scheduling method
among coexisting users.
Spectrum Sharing
Cognitive Radio assigns the unused spectrum (spectrum hole) to the
secondary user (SU) as long as primary user (PU) does not use it.
Spectrum Mobility
This is the process that allows the Cognitive Radio user to change its
operating frequency.
SPECTRUM SENSING TECHNIQUES
MATCHED-FILTER DETECTION
• The receivers do not need any previous knowledge about the primary users.
An energy detector (ED) simply treats the primary signal as noise and
decides on the presence or absence of the primary signal based on the
energy of the observed signal.
Process flow diagram of Energy Detection.
CYCLOSTATIONARY DETECTION
• Man-made signals are normally not stationary, but some of them are
cyclostationary, i.e., they show periodicity in their statistics.
• This periodicity can be utilized for the detection of a random signal which
has a particular modulation type in a background of noise. Such detection is
called cyclostationary detection.
• The signal of the PU can be detected at very low SNR values if it exhibits
strong cyclostationary properties.
Flow diagram of Cyclostationary feature Detection.
RESULTS
• The cognitive radio system continuously searches the spectrum hole where
primary user is not present and is determined by the spectrum sensing
techniques. When it finds out the spectrum hole, immediately it allots to
the Secondary User (SU) and whenever Primary User (PU) wants to
occupy the slot, Secondary User immediately leaves it.