motbanner.jpg

A proper throughput-leakage balance for downlink cellular networks

A novel transmission scheme is developed for the downlink frame of cellular networks. Each base station (BS) aims at iteratively balancing the throughput at the mobile stations (MSs) of its cell with the interference it causes at the MSs of the neighboring cells, requiring negligible coordination between the BSs. A simplified version of the scheme that neither requires iterations nor cooperation is also proposed. Simulation results show that the proposed schemes achieve substantial gains over well-known schemes in the literature. © 2014 IEEE.

Software and Communications

On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation

In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues: a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node, which harvests energy packets

Software and Communications

Achievable secrecy rate regions for the two-way wiretap channel

The two-way wiretap channel is considered in this paper. Two legitimate users, Alice and Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, where each node can transmit and receive simultaneously, new achievable secrecy rate regions are obtained based on the idea of allowing the two users to jointly optimize their channel prefixing distributions and binning codebooks in addition to key sharing. The new regions are shown to be strictly larger than the known ones for a wide class of discrete memoryless and Gaussian channels. In the

Software and Communications

On orthogonal band allocation for multiuser multiband cognitive radio networks: Stability analysis

In this work, we study the problem of band allocation of Mi buffered (i.e., with data queues capable of storing incoming traffic packets) secondary users (SUs) to Mp primary frequency bands licensed to (owned by) Mp buffered primary users. The bands are assigned to SUs in an orthogonal (one-to-one) fashion, such that neither band sharing nor multiband allocations are permitted. In order to study the stability region of the secondary network, the optimization problem used to obtain the stability region's envelope (closure) is established and is shown to be a linear program, which can be solved

Software and Communications

Using network coding to achieve the capacity of deterministic relay networks with relay messages

In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network that consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single-sided genie. In the course of the achievability proof, we also derive the deterministic capacity of a four-user relay network (without private messages at the relay). The capacity achieving schemes

Software and Communications

On spectrum sharing between energy harvesting cognitive radio users and primary users

This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources and primary radio frequency (RF) transmissions. We propose a power allocation policy at the PU and analyze its effect on the throughput of both the PU and SU Furthermore, we study the impact of the bursty arrivals at the PU on the energy harvested by the SU from RF transmissions. Moreover, we investigate the impact of the rate of energy harvesting

Software and Communications

Impact of nonzero boresight and jitter pointing errors on the performance of M-ary ASK/FSO system over Málaga (M) atmospheric turbulence

In free-space optical (FSO) communication, Distribution models such as lognormal, gamma-gamma, and k-distribution describe weak, moderate, and strong turbulence, respectively. Whereas Málaga (M) distribution is a powerful statistical model repeatedly mentioned in the literature due to its generality, Málaga (M) describes the three turbulence conditions while considering the pointing errors, represented by the jitter boresight displacement, of the communication beam. Exact and closed-form expressions for symbol error rate and outage probability are presented in this paper—furthermore, cases

Software and Communications

On the Degrees of Freedom of the Two-Cell Two-Hop MIMO Network with Dedicated and Shared Relays

We investigate the degrees of freedom (DoF) of the downlink of a cellular relay network. In this network, two base stations transmit to two mobile stations via relays due to the absence of a direct communication link. Each base station and mobile station is equipped with M antennas. Each base station has two messages; one to each mobile station, and uses two relays to transmit to the mobile stations. The relays are half duplex, decode-and-forward and equipped with N antennas each. We consider two configurations of the relays; shared and dedicated relays. In the shared relays configuration, the

Software and Communications

Stability and delay analysis for cooperative relaying with multi-access transmission

We consider a cooperative relaying system with two source terminals, one full duplex relay, and a common destination. Each terminal has a local traffic queue while the relay has two relaying queues to store the relayed source packets. We assume that the source terminals transmit packets in orthogonal frequency bands. In contrast to previous work which assumes a time division multi-access cooperation strategy, we assume that the source terminals and the relay simultaneously transmit their packets to the common destination through a multi-access channel (MAC). A new cooperative MAC scheme for

Software and Communications

Adaptive training-based collaborative mimo beamforming for multiuser relay networks

In this paper, we consider a cooperative relaying scenario with multiple sources transmitting to one or more destination nodes through several relay terminals. Each relay is equipped with multiple receive and transmit antennas. We assume that the relays can estimate their uplink (relay-destination) channels with enough accuracy and that they have access to the training sequences transmitted by the sources. We present two adaptive training-based algorithms for multiuser relay beamforming. Both algorithms use Kalman filtering to estimate the beamforming matrices iteratively. The first algorithm

Software and Communications