Loading [MathJax]/extensions/MathMenu.js
Underlay Interference Analysis of Power Control and Receiver Association Schemes | IEEE Journals & Magazine | IEEE Xplore

Underlay Interference Analysis of Power Control and Receiver Association Schemes


Abstract:

In this paper, we present a precise comprehensive analysis of the aggregate interference I generated from an underlay network of cognitive radio (CR) nodes employing seve...Show More

Abstract:

In this paper, we present a precise comprehensive analysis of the aggregate interference I generated from an underlay network of cognitive radio (CR) nodes employing several transmit power control and receiver association schemes. Importantly, we consider spatial randomness by modeling CR transmitter nodes and receiver nodes as two independent Poisson point processes (PPPs). For the cognitive nodes, we investigate receiver association based on the distance or the instantaneous received power and power control based on the maximum possible transmitter-receiver distance, fixed or location-dependent cutoff power levels, feedback from the primary system, or the maximum number of available receivers. For each of these schemes, the exact moment generating function (mgf) and mean of aggregate I power are derived for links with Rayleigh fading and exponential path loss. The resulting primary outage and the probability of secondary transmitter cutoff are also derived. Numerical results show that the secondary power thresholds and node densities significantly affect the aggregate I, the primary receiver (PR) outage, and the secondary transmitter cutoff arising from the different schemes.
Published in: IEEE Transactions on Vehicular Technology ( Volume: 65, Issue: 11, November 2016)
Page(s): 8978 - 8991
Date of Publication: 18 January 2016

ISSN Information:


I. Introduction

Since spectrum scarcity and under utilization are two factors inhibiting the growth of wireless networks, more dynamic and agile ways to utilize wireless spectrum are necessary [2]. Thus, in cognitive radio (CR), a node can automatically detect which spectrum slots are in use by licensed (primary) users and which are not, and it can opportunistically transmit over vacant channels. This mode of operation clearly optimizes the spectrum usage while minimizing interference to licensed users [2]. Such nodes are referred to as cognitive or secondary nodes. The standardization of cognitive networks has already begun with IEEE 802.22 (television white spaces), ECMA 392, IEEE 802.11af, and DySPAN 1900.7 coming into the fray [3]. Cognitive concepts may also feature in the development of fifth generation cellular networks [4].

References

References is not available for this document.