You are on page 1of 13

Cognitive Radio

1 Introduction
Todays wireless networks are not using the spectrum efficiently . The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. This new networking paradigm is referred to as NeXt Generation Networks i.e. cognitive radio networks.

What a Cognitive Radio is A Cognitive Radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. From this definition, two main characteristics of the cognitive radio can be defined Cognitive capability: Cognitive capability refers to the ability of the radio technology to capture the information from its radio environment. Through this capability, the portions of the spectrum that are unused at a specific time can be identified. Consequently, the best spectrum and appropriate operating parameters can be selected.

Cognitive Cycle Reconfigurability: The cognitive capability provides spectrum awareness whereas reconfigurability enables the radio to be dynamically programmed according to the radio environment. More specifically, the cognitive radio can be programmed to transmit and receive on a variety of frequencies and to use different transmission access technologies supported by its hardware design The main functions for cognitive radios can be summarized as follows: Spectrum sensing: Detecting unused spectrum and sharing the spectrum without harmful interference with other users. Spectrum management: Capturing the best available spectrum to meet user communication requirements. Spectrum mobility: Maintaining seamless requirements during the transition to better spectrum. communication

Spectrum sharing: Providing the fair spectrum scheduling method among coexisting CR users. 1.1 Spectrum sensing

An important requirement of the CR network is to sense the spectrum holes.A cognitive radio is designed to be aware of and sensitive to the changes in its surrounding. The spectrum sensing function enables the cognitive radio to adapt to its environment by detecting spectrum holes.

The most efficient way to detect spectrum holes is to detect the primary users that are receiving data within the communication range of an CR user. In reality, however, it is difficult for a cognitive radio to have a direct measurement of a channel between a primary receiver and a transmitter. Thus, the most recent work focuses on primary transmitter detection .

1.1.1 Matched filter detection

The optimal way for any signal detection is a matched filter since it maximizes received signal-to-noise ratio. However, a matched filter effectively requires demodulation of a primary user signal. This means that cognitive radio has a

priori knowledge of modulation type and order, pulse shaping, packet format and achieve coherency with primary user signal by performing timing and carrier synchronization, even channel equalization. It is possible since most primary users have pilots, preambles, synchronization words or spreading codes that can be used for coherent detection.

1.1.2 Energy detection

One approach to simplify matched filtering approach is to perform non-coherent detection through energy detection. This sub-optimal technique has been extensively used in radiometry. An energy detector can be implemented similar toa spectrum analyzer by averaging frequency bins of a Fast Fourier Transform (FFT)Processing gain is proportional to FFT size N and observation/averaging time T. Increasing N improves frequency resolution which helps narrowband signal detection.

Implementation of an energy detector using Welch periodogram averaging

1.1.3 Cyclostationary Feature Detection Modulated signals are in general coupled with sine wave carriers, pulse trains, repeating spreading, hoping sequences, or cyclic prefixes which result in built-in periodicity. Even though the data is a stationary random process, these modulated signals are characterized as cyclostationary, since their statistics, mean and autocorrelation, exhibit periodicity. This periodicity is typically introduced intentionally in the signal format so that a receiver can exploit it for: parameter estimation such as carrier phase, pulse timing, or direction of arrival.

1.2 Spectrum management

In CR networks, the unused spectrum bands will be spread over wide frequency range including both unlicensed and licensed bands. These unused spectrum bands detected through spectrum sensing show different characteristics according to not only the time varying radio environment but also the spectrum band information such as the operating frequency and the bandwidth.

1.3 Spectrum mobility

CR networks target to use the spectrum in a dynamic manner by allowing the radio terminals, known as the cognitive radio, to operate in the best available frequency band. This enables Get the Best Available Channel concept for communication purposes. To realize the Get the Best Available Channel concept, an CR radio has to capture the best available spectrum. Spectrum mobility is

defined as the process when an CR user changes its frequency of operation.

1.4 Spectrum sharing

In CR networks, one of the main challenges in open spectrum usage is the spectrum sharing. The coexistence with licensed users and the wide range of available spectrum are two of the main reasons for these unique challenges.

The spectrum sharing process consists of five major steps.

1. 2. 3. 4. 5.

Spectrum sensing Spectrum allocation Spectrum access Transmitter-receiver handshake Spectrum mobility

2 Objective
2.1 Multiple Access Techniques

Multiple Access could be defined as a means of allowing multiple users to simultaneously share the finite bandwidth with least possible degradation in the performance of the system. There are several techniques how multiple accessing can be achieved. Some basic schemes are Frequency Division Multiple Access (FDMA) Time Division Multiple Access (TDMA) Code Division Multiple Access (CDMA) Carrier Sense Multiple Access (CSMA) FDMA In this technique the bandwidth is divided into a number of channels and distributed among users with a finite portion of bandwidth for permanent use. TDMA In TDMA, the entire bandwidth is available to the user but only for a finite period of time. CDMA In CDMA, all the users occupy the same bandwidth, however they are all assigned separate codes, which differentiates them from each other. Pseudo Random Noise Code (PN code) are used in this.

FDMA

TDMA

CDMA

CSMA
Carrier Sense Multiple Access (CSMA) is method in which a node verifies the absence of other traffic before transmitting on a shared transmission medium. "Carrier Sense" describes the fact that a transmitter uses feedback from a receiver that detects a carrier wave before trying to send. If a carrier is sensed as busy, the station waits for the transmission in progress to finish before initiating its own transmission. "Multiple Access" describes the fact that multiple stations send and receive on the medium. Further protocol modifications can be done as : Carrier sense multiple access with collision detection (CSMA/CD) is a modification of CSMA. CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a collision is detected, and reducing the probability of a second collision on retry. Carrier sense multiple access with collision avoidance (CSMA/CA) is a modification of CSMA. Collision avoidance is used to improve the performance of CSMA by attempting to be less "greedy" on the channel. If the channel is sensed busy before transmission then the transmission is deferred for a "random" interval. This reduces the probability of collisions on the channel.

CSMA

2.2 Performance Evaluation


Calculating how a system is performing comes under Performance Evaluation. In this how we solve problem of maximizing the ergodic throughput of the cognitive radio system proposed. in under both average transmit and interference power constraints. More specifically, we focus on determining the optimal power allocation strategy for the proposed cognitive radio system, as well as the optimal target detection probability, which under the imposed average interference power constraint becomes an additional optimization variable and capacity is also seen.

2.3 Quality of Service

Maintaining the QoS of a secondary communication despite various changes is challenging, and possible only by using some level of over-provisioning of spectral resources for the secondary communication session. In this paper, we give an overview of how spectrum sensing and secondary link maintenance can be organized to ensure protection of the PU communication and maintain a given QoS despite the challenges explained above. More precisely, we investigate the spectral overhead needed for secondary QoS support under the constraint of a proper protection of the PU communication. The overhead used for sensing (e.g., time of sensing, number of sensors) has an influence on the quality of the sensing results, measured by the probability of false positives, i.e., the probability of reporting the presence of a PU although the PU is not present. Following phenomenon can be used A. Sensing Performance Metrics B. Diversity Approaches C. Periodic Sensing Organization

2.4 Result Optimozation

Finding an alternative with the most cost effective or highest achievable performance under the given constraints, by maximizing desired factors and minimizing undesired ones Following methods can be used for this: A.Fuzzy Logic Fuzzy logic is a form of many-valued logic; it deals with reasoning that is approximate rather than fixed and exact. In contrast with traditional logic theory, where binary sets have two-valued logic: true or false, fuzzy logic variables may have a truth value that ranges in degree between 0 and Fuzzy logic has been extended to handle the concept of partial truth, where the truth value may range between completely true and completely false. Furthermore, when linguistic variables are used, these degrees may be managed by specific functions. B. A genetic algorithm (GA) is a search and experience-based techniques that mimics the process of natural evolution. This heuristic is routinely used to generate useful solutions to optimization and search problems. Genetic algorithms belong to the larger class of evolutionary algorithms (EA), which generate solutions to optimization problems using techniques inspired by natural evolution, such as inheritance, mutation, selection, and crossover.

C.ns-2 ns (from network simulator) is a name for series of discrete event network simulators, specifically ns-1, ns-2 and ns-3. These simulators are used in the simulation of routing protocols, among others, and are heavily used in ad-hoc networking research, and support popular network protocols, offering simulation results for wired and wireless networks alike. ns-2 was built in C++ and provides a simulation interface through OTcl, an object-oriented dialect of Tcl.

You might also like