-
Wireless energy and information transfer in networks with hybrid ARQ
Authors:
Mehdi Salehi Heydar Abad,
Ozgur Ercetin,
Tamer Elbatt,
Mohammed Nafie
Abstract:
In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and identically distributed (i.i.d.) channel. The transm…
▽ More
In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and identically distributed (i.i.d.) channel. The transmitter is assumed to have a constant energy source while the receiver relies, solely, on the RF energy harvested from the received signal. At each time slot, the incoming RF signal is split between information accumulation and energy accumulation with the objective of minimizing the expected number of re-transmissions. A major finding of this work is that the optimal policy minimizing the expected number of re-transmissions utilizes the incoming RF signal to either exclusively harvest energy or to accumulate mutual information. This finding enables achieving an optimal solution in feasible time by converting a two dimensional uncountable state Markov decision process (MDP) with continuous action space into a countable state MDP with binary decision space.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Cache-Aided Combination Networks with Interference
Authors:
Ahmed Roushdy,
Abolfazl Seyed Motahari,
Mohammed Nafie,
Deniz Gunduz
Abstract:
Centralized coded caching and delivery is studied for a radio access combination network (RACN), whereby a set of $H$ edge nodes (ENs), connected to a cloud server via orthogonal fronthaul links with limited capacity, serve a total of $K$ user equipments (UEs) over wireless links. Each user, equipped with a cache of size $μ_R N F$ bits, is connected to a distinct set of $r$ ENs each of which equip…
▽ More
Centralized coded caching and delivery is studied for a radio access combination network (RACN), whereby a set of $H$ edge nodes (ENs), connected to a cloud server via orthogonal fronthaul links with limited capacity, serve a total of $K$ user equipments (UEs) over wireless links. Each user, equipped with a cache of size $μ_R N F$ bits, is connected to a distinct set of $r$ ENs each of which equipped with a cache of size $μ_T N F$ bits, where $μ_T$, $μ_R \in [0,1]$ are the fractional cache capacities of the UEs and the ENs, respectively. The objective is to minimize the normalized delivery time (NDT. Three coded caching and transmission schemes are considered, namely the\textit{ MDS-IA}, \textit{soft-transfer} and \textit{ zero-forcing (ZF)} schemes. The achievable NDT for MDS-IA scheme is presented for $r=2$ and arbitrary fractional cache sizes $μ_T$ and $μ_R$, and also for arbitrary value of $r$ and fractional cache size $μ_T$ when the cache capacity of the UE is above a certain threshold. The achievable NDT for the soft-transfer scheme is presented for arbitrary $r$ and arbitrary fractional cache sizes $μ_T$ and $μ_R$. The last scheme utilizes ZF between the ENs and the UEs without the participation of the cloud server in the delivery phase. The achievable NDT for this scheme is presented for an arbitrary value of $r$ when the total cache size at a pair of UE and EN is sufficient to store the whole library, i.e., $μ_T+μ_R \geq 1$. The results indicate that the fronthaul capacity determines which scheme achieves a better performance in terms of the NDT, and the soft-transfer scheme becomes favorable as the fronthaul capacity increases.
△ Less
Submitted 28 September, 2019; v1 submitted 15 December, 2018;
originally announced December 2018.
-
A Converse Bound for Cache-Aided Interference Networks
Authors:
Antonious M. Girgis,
Ozgur Ercetin,
Mohammed Nafie,
Tamer ElBatt
Abstract:
In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content popularity. For the peak NDT, we show that our lower…
▽ More
In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content popularity. For the peak NDT, we show that our lower bound is strictly tighter than the bound in the literature for small cache sizes. Moreover, we show that the feasibility region on the expected NDT is bigger than that of the peak NDT.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Cache-Aided Fog Radio Access Networks with Partial Connectivity
Authors:
Ahmed Roushdy,
Abolfazl Seyed Motahari,
Mohammed Nafie,
Deniz Gunduz
Abstract:
Centralized coded caching and delivery is studied for a partially-connected fog radio access network (F-RAN), whereby a set of H edge nodes (ENs) (without caches), connected to a cloud server via orthogonal fronthaul links, serve K users over the wireless edge. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size MF bits, is co…
▽ More
Centralized coded caching and delivery is studied for a partially-connected fog radio access network (F-RAN), whereby a set of H edge nodes (ENs) (without caches), connected to a cloud server via orthogonal fronthaul links, serve K users over the wireless edge. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size MF bits, is connected to a distinct set of r ENs; or equivalently, the wireless edge from the ENs to the users is modeled as a partial interference channel. The objective is to minimize the normalized delivery time (NDT), which refers to the worst case delivery latency, when each user requests a single file from the library. An achievable coded caching and transmission scheme is proposed, which utilizes maximum distance separable (MDS) codes in the placement phase, and real interference alignment (IA) in the delivery phase, and its achievable NDT is presented for r = 2 and arbitrary cache size M, and also for arbitrary values of r when the cache capacity is sufficiently large.
△ Less
Submitted 25 February, 2018;
originally announced February 2018.
-
On the Capacity Region of the Deterministic Y-Channel with Common and Private Messages
Authors:
Mohamed S. Ibrahim,
Mohammed Nafie,
Yahya Mohasseb
Abstract:
In multi user Gaussian relay networks, it is desirable to transmit private information to each user as well as common information to all of them. However, the capacity region of such networks with both kinds of information is not easy to characterize. The prior art used simple linear deterministic models in order to approximate the capacities of these Gaussian networks. This paper discusses the ca…
▽ More
In multi user Gaussian relay networks, it is desirable to transmit private information to each user as well as common information to all of them. However, the capacity region of such networks with both kinds of information is not easy to characterize. The prior art used simple linear deterministic models in order to approximate the capacities of these Gaussian networks. This paper discusses the capacity region of the deterministic Y-channel with private and common messages. In this channel, each user aims at delivering two private messages to the other two users in addition to a common message directed towards both of them. As there is no direct link between the users, all messages must pass through an intermediate relay. We present outer-bounds on the rate region using genie aided and cut-set bounds. Then, we develop a greedy scheme to define an achievable region and show that at a certain number of levels at the relay, our achievable region coincides with the upper bound. Finally, we argue that these bounds for this setup are not sufficient to characterize the capacity region.
△ Less
Submitted 12 January, 2018;
originally announced January 2018.
-
Degrees of Freedom of Interference Networks with Transmitter-Side Caches
Authors:
Antonious M. Girgis,
Ozgur Ercetin,
Mohammed Nafie,
Tamer ElBatt
Abstract:
This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and the transmitters are responsible for delivering the…
▽ More
This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and the transmitters are responsible for delivering the requested files from their caches to the receivers. The objective is to design schemes for the placement and delivery phases to maximize the sum degrees of freedom (sum-DoF) which expresses the capacity of the interference network at the high signal-to-noise ratio regime. Our work mainly focuses on a commonly used uncoded placement strategy. We provide an information-theoretic bound on the sum-DoF for this placement strategy. We demonstrate by an example that the derived bound is tighter than the bounds existing in the literature for small cache sizes. We propose a novel delivery scheme with a higher achievable sum-DoF than those previously given in the literature. The results reveal that the reciprocal of sum-DoF decreases linearly as the transmitter cache size increases. Therefore, increasing cache sizes at transmitters translates to increasing the sum-DoF and, hence, the capacity of the interference networks.
△ Less
Submitted 16 December, 2017;
originally announced December 2017.
-
SWIPT using Hybrid ARQ over Time Varying Channels
Authors:
Mehdi Salehi Heydar Abad,
Ozgur Ercetin,
Mohamed Nafie,
Tamer Elbatt
Abstract:
We consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a two-state time-varying channel. A receiver, with no power source, relies on the energy transferred by a Simultaneous Wireless Information and Power Transfer (SWIPT) enabled transmitter to \emph{receive} and \emph{decode} information. Under the two-sta…
▽ More
We consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a two-state time-varying channel. A receiver, with no power source, relies on the energy transferred by a Simultaneous Wireless Information and Power Transfer (SWIPT) enabled transmitter to \emph{receive} and \emph{decode} information. Under the two-state channel model, information is received at two different rates while it is only possible to harvest energy in one of the states. The receiver aims to decode its messages with minimum expected number of re-transmissions. Dynamic and continuous nature of the problem motivated us to use a novel Markovian framework to bypass the complexities plaguing the conventional approaches such as MDP. Using the theory of absorbing Markov chains, we show that there exists an optimal policy utilizing the incoming RF signal solely to harvest energy or to accumulate mutual information. Hence, we convert the original problem with continuous action and state space into an equivalent one with discrete state and action space. For independent and identically distributed channels, we prove the optimality of a simple-to-implement {\em harvest-first-store-later} type policy. However, for time-correlated channels, we demonstrate that statistical knowledge of the channel may significantly improve the performance over such policies.
△ Less
Submitted 12 February, 2019; v1 submitted 8 November, 2017;
originally announced November 2017.
-
Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations
Authors:
Osama A. Hanna,
Amr El-Keyi,
Mohammed Nafie
Abstract:
The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that…
▽ More
The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that cooperates with the BSs. We first propose a cache-assisted relaying protocol that improves the cooperation opportunity between the BSs and the relay. Next, we consider the cache content placement problem that aims to design the cache content at the relay such that the DoF gain is maximized. We propose an optimal algorithm and a near-optimal low-complexity algorithm for the cache content placement problem. Simulation results show significant improvement in the DoF gain using the proposed relay-caching protocol.
△ Less
Submitted 17 February, 2017;
originally announced February 2017.
-
Decentralized Coded Caching in Wireless Networks: Trade-off between Storage and Latency
Authors:
Antonious M. Girgis,
Ozgur Ercetin,
Mohammed Nafie,
Tamer ElBatt
Abstract:
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of $K_r$ users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off…
▽ More
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of $K_r$ users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off-peak hours. After that, we design a coded delivery scheme in order to deliver the user demands during the peak-hours under the objective of minimizing the normalized delivery time (NDT), which refers to the worst case delivery latency. An information-theoretic lower bound on the minimum NDT is derived for arbitrary number of ENs and users. We evaluate numerically the performance of the decentralized scheme. Additionally, we prove the approximate optimality of the decentralized scheme for a special case when the caches are only available at the ENs.
△ Less
Submitted 25 January, 2017; v1 submitted 23 January, 2017;
originally announced January 2017.
-
Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Yahya Mohasseb,
Tamer ElBatt,
Mohammed Nafie,
Karim G. Seddik,
Tamer Khattab
Abstract:
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is wh…
▽ More
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
△ Less
Submitted 31 July, 2016;
originally announced August 2016.
-
Optimal Energy Allocation For Delay-Constrained Traffic Over Fading Multiple Access Channels
Authors:
Antonious M. Girgis,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, we consider a multiple-access fading channel where $N$ users transmit to a single base station (BS) within a limited number of time slots. We assume that each user has a fixed amount of energy available to be consumed over the transmission window. We derive the optimal energy allocation policy for each user that maximizes the total system throughput under two different assumptions o…
▽ More
In this paper, we consider a multiple-access fading channel where $N$ users transmit to a single base station (BS) within a limited number of time slots. We assume that each user has a fixed amount of energy available to be consumed over the transmission window. We derive the optimal energy allocation policy for each user that maximizes the total system throughput under two different assumptions on the channel state information. First, we consider the offline allocation problem where the channel states are known a priori before transmission. We solve a convex optimization problem to maximize the sum-throughput under energy and delay constraints. Next, we consider the online allocation problem, where the channels are causally known to the BS and obtain the optimal energy allocation via dynamic programming when the number of users is small. We also develop a suboptimal resource allocation algorithm whose performance is close to the optimal one. Numerical results are presented showing the superiority of the proposed algorithms over baseline algorithms in various scenarios.
△ Less
Submitted 12 September, 2016; v1 submitted 3 July, 2016;
originally announced July 2016.
-
Proactive Location-Based Scheduling of Delay-Constrained Traffic Over Fading Channels
Authors:
Antonious M. Girgis,
Amr El-Keyi,
Mohammed Nafie,
Ramy Gohary
Abstract:
In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival $T_p$ slots ahead, where $T_p$ denotes the prediction window (PW) size. T…
▽ More
In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival $T_p$ slots ahead, where $T_p$ denotes the prediction window (PW) size. The source allocates energy to transmit some bits proactively for each time slot of the PW with the objective of reducing the transmission energy over the non-predictive case. The requests are predicted based on the user location utilizing the prior statistics about the user requests at each location. We also assume that the prediction is not perfect. We propose proactive scheduling policies to minimize the expected energy consumption required to transmit the requested packets under two different assumptions on the channel state information at the source. In the first scenario, offline scheduling, we assume the channel states are known a-priori at the source at the beginning of the PW. In the second scenario, online scheduling, it is assumed that the source has causal knowledge of the channel state. Numerical results are presented showing the gains achieved by using proactive scheduling policies compared with classical (reactive) networks. Simulation results also show that increasing the PW size leads to a significant reduction in the consumed transmission energy even with imperfect prediction.
△ Less
Submitted 1 July, 2016;
originally announced July 2016.
-
On the Degrees of Freedom of SISO X-networks with Synergistic Alternating Channel State Information at transmitters
Authors:
Ahmed Wagdy Shaban,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work togethe…
▽ More
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work together cooperatively. These states are associated with fractions of time denoted by $λ_P$, $λ_D$ \text{and} $λ_N$, respectively. For the two-user $X$-channel, simple upper bound is developed to prove the tightness of the achievability result of $4/3$ DoF under a certain distribution of the availability of three CSIT states for $Λ(λ_P=1/3, λ_D= 1/3, λ_N=1/3)$. For the $K$-user $X$-network, it is shown that the sum Degrees of freedom (DoF) is at least $2K/(K + 1)$, using two-phase transmission schemes over finite symbols channel extension and under the same distribution of the availability of $Λ(λ_P=1/3, λ_D= 1/3, λ_N=1/3)$.This achievability result, can be considered as a tight lower bound, coincides with the best lower bound known for the same network but with partial output feedback in stead of alternating CSIT. Hence, we show that the role of synergistic alternating CSIT with distribution $Λ(1/3,1/3,1/3)$ is equivalent to the partial output feedback. Also, this lower bound is strictly better than the best lower bound known for the case of delayed CSI assumption for all values of $K$. All the proposed transmission schemes are based on two phases transmission strategy, namely, interference creation and interference resurrection, which exploit the synergy of instantaneous CSI and delay CSIT to retrospectively align interference in the subsequent channel uses.
△ Less
Submitted 23 May, 2016;
originally announced May 2016.
-
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alternating CSIT via Interference Creation-Resurrection
Authors:
Mohamed Seif,
Amr El-Keyi,
Mohammed Nafie
Abstract:
Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT…
▽ More
Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT (D) and no CSIT (N) among different time slots. For the K-user MISO BC, we show that the total achievable degrees of freedom (DoF) are given by $\frac{K^{2}}{2K-1}$ through utilizing the synergistic benefits of CSIT patterns. We compare the achievable DoF with results reported previously in the literature in the case of delayed CSIT and hybrid CSIT models.
△ Less
Submitted 10 May, 2016;
originally announced May 2016.
-
Achievable Degrees of Freedom on K-user MIMO Multi-way Relay Channel with Common and Private Messages
Authors:
Mohamed Salah,
Amr El-Keyi,
Yahya Mohasseb,
Mohammed Nafie
Abstract:
This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links…
▽ More
This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links between the users, communication occurs through the relay in two phases; a multiple access channel phase (MAC) and a broadcast (BC) phase. We drive cut-set bounds on the total DoF of the network, and show that the network has DoF less than or equal to K min(N,M). Achievability of the upper bound is shown by using signal space alignment for network coding in the MAC phase, and zero-forcing precoding in the BC phase. We show that introducing the common messages besides the private messages leads to achieving higher total DoF than using the private messages only.
△ Less
Submitted 15 October, 2015; v1 submitted 1 October, 2015;
originally announced October 2015.
-
Sensing/Decision-Based Cooperative Relaying Schemes With Multi-Access Transmission: Stability Region And Average Delay Characterization
Authors:
Mohamed Salman,
Amr El-Keyi,
Mohammed Nafie,
Mazen Omar Hasna
Abstract:
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay sense…
▽ More
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay senses the channel at the beginning of each time slot. In the idle time slots, the relay transmits the packet at the head of its queue, while in the busy one, the relay decides either to transmit simultaneously with the source terminal or to listen to the source transmission. The SBC scheme is a novel paradigm that utilizes the spectrum more efficiently than the other cooperative schemes because the relay not only exploits the idle time slots, but also has the capability to mildly interfere with the source terminal. On the other hand, in the DBC scheme, the relay does not sense the channel and it decides either to transmit or to listen according to certain probabilities. Numerical results reveal that the two proposed schemes outperform existing cooperative schemes that restrict the relay to send only in the idle time slots. Moreover, we show how the MPR capability at the destination can compensate for the sensing need at the relay, i.e., the DBC scheme achieves almost the same stability region as that of the SBC scheme. Furthermore, we derive the condition under which the two proposed schemes achieve the same maximum stable throughput.
△ Less
Submitted 29 June, 2015;
originally announced June 2015.
-
Maximum Throughput Opportunistic Network Coding in Two-Way Relay Networks
Authors:
Maha Zohdy,
Tamer ElBatt,
Mohamed Nafie
Abstract:
In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an average packet delay constraint. Towards this objectiv…
▽ More
In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an average packet delay constraint. Towards this objective, first, we consider a pair of nodes communicating through a common relay and develop a two dimensional Markov chain model capturing the buffers' length states at the two nodes. Second, we formulate an optimization problem for the delay constrained optimal throughput. Exploiting the structure of the problem, it can be cast as a linear programming problem. Third, we compare the optimal policy to two baseline schemes and show its merits with respect to throughput, average delay and power consumption. First, the optimal policy significantly outperforms the first baseline with respect to throughput, delay and power consumption. Moreover, it outperforms the second baseline with respect to the average delay and power consumption for asymmetrical traffic arrival rates.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
A Probabilistic MAC for Cognitive Radio Systems with Energy Harvesting Nodes
Authors:
Ramy E. Ali,
Fadel F. Digham,
Karim G. Seddik,
Mohammed Nafie,
Amr El-Keyi,
Zhu Han
Abstract:
In this paper, we consider a cognitive radio (CR) system where the secondary user (SU) harvests energy from both the nature resources and the primary user (PU) radio frequency(RF) signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate th…
▽ More
In this paper, we consider a cognitive radio (CR) system where the secondary user (SU) harvests energy from both the nature resources and the primary user (PU) radio frequency(RF) signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate the problem of maximizing the SU's success rate provided that the PU average quality of service (QoS) constraint is satisfied. We also assume multi-packet reception (MPR) capability and sensing errors under a Rayleigh fading channel. Numerical results show the effectiveness of the proposed probabilistic access scheme.
△ Less
Submitted 29 October, 2014; v1 submitted 1 August, 2014;
originally announced August 2014.
-
On the Degrees of Freedom of SISO X-Channel with Alternating CSIT
Authors:
Ahmed Wagdy,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $λ_P, λ_D$ and $λ_N $, respectively. We provide new results for D…
▽ More
In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $λ_P, λ_D$ and $λ_N $, respectively. We provide new results for DoF of the two-user SISO X-channel when the available CSIT alternates between these three cases under a certain distribution $Λ(λ_P, λ_D, λ_N )$. Specifically, we show that the X-channel with alternating CSIT for $Λ(1/8, 3/8, 1/2)$ can achieve $5/4$ DoF. The interesting thing about $5/4$ is that it represents a position of compromise or a middle ground between the channel knowledge that transmitters need to steer interference and the degrees of freedom that the network can achieve. Moreover, $5/4$ is strictly greater than $6/5$ which is the upper bound for the X-channel with \textit{fixed} delayed CSIT.
△ Less
Submitted 31 July, 2014;
originally announced July 2014.
-
The asymmetric DoF Region for the 3-user MxN Interference Channel
Authors:
Mohamed Khalil,
Tamer Khattab,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assum…
▽ More
In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. The region of the achievable DoF tuple $(d_1; d_2; d_3)$ is presented.
△ Less
Submitted 10 July, 2014;
originally announced July 2014.
-
A DoF-Optimal Scheme for the two-user X-channel with Synergistic Alternating CSIT
Authors:
Ahmed Wagdy,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates be…
▽ More
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates between these three cases. For some patterns of alternating CSIT, the proposed scheme achieves $4/3$ DoF, and hence, coincides with the information theoretic upper bound on the DoF of the two-user X-channel with perfect and instantaneous CSIT. The CSIT alternation patterns are investigated where the patterns that provide extraordinary synergistic gain and dissociative ones are identified.
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
Using Network Coding to Achieve the Capacity of Deterministic Relay Networks with Relay Messages
Authors:
Ahmed A. Zewail,
Yahya Mohasseb,
Mohammed Nafie,
Hesham El Gamal
Abstract:
In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network which consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single…
▽ More
In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network which consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single sided genie. In the course of the achievability proof, we also derive the deterministic capacity of a 4-user relay network (without private messages at the relay). The capacity achieving schemes use a combination of two network coding techniques: the Simple Ordering Scheme (SOS) and Detour Schemes (DS). In the SOS, we order the transmitted bits at each user such that the bi-directional messages will be received at the same channel level at the relay, while the basic idea behind the DS is that some parts of the message follow an indirect path to their respective destinations. This paper, therefore, serves to show that user cooperation and network coding can enhance throughput, even when the users are not directly connected to each other.
△ Less
Submitted 26 April, 2014; v1 submitted 18 April, 2014;
originally announced April 2014.
-
A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game
Authors:
Ramy E. Ali,
Karim G. Seddik,
Mohammed Nafie,
Fadel F. Digham
Abstract:
We consider the problem of cooperative spectrum sharing among a primary user (PU) and multiple secondary users (SUs) under quality of service (QoS) constraints. The SUs network is controlled by the PU through a relay which gets a revenue for amplifying and forwarding the SUs signals to their respective destinations. The relay charges each SU a different price depending on its received signal-to-in…
▽ More
We consider the problem of cooperative spectrum sharing among a primary user (PU) and multiple secondary users (SUs) under quality of service (QoS) constraints. The SUs network is controlled by the PU through a relay which gets a revenue for amplifying and forwarding the SUs signals to their respective destinations. The relay charges each SU a different price depending on its received signal-to-interference and-noise ratio (SINR). The relay can control the SUs network and maximize any desired PU utility function. The PU utility function represents its rate, which is affected by the SUs access, and its gained revenue to allow the access of the SUs. The SU network can be formulated as a game in which each SU wants to maximize its utility function; the problem is formulated as a Stackelberg game. Finally, the problem of maximizing the primary utility function is solved through three different approaches, namely, the optimal, the heuristic and the suboptimal algorithms.
△ Less
Submitted 28 March, 2014; v1 submitted 19 December, 2013;
originally announced December 2013.
-
The Deterministic Capacity of Relay Networks with Relay Private Messages
Authors:
Ahmed A. Zewail,
Y. Mohasseb,
M. Nafie,
H. EL Gamal
Abstract:
We study the capacity region of a deterministic 4-node network, where 3 nodes can only communicate via the fourth one. However, the fourth node is not merely a relay since it can exchange private messages with all other nodes. This situation resembles the case where a base station relays messages between users and delivers messages between the backbone system and the users. We assume an asymmetric…
▽ More
We study the capacity region of a deterministic 4-node network, where 3 nodes can only communicate via the fourth one. However, the fourth node is not merely a relay since it can exchange private messages with all other nodes. This situation resembles the case where a base station relays messages between users and delivers messages between the backbone system and the users. We assume an asymmetric scenario where the channel between any two nodes is not reciprocal. First, an upper bound on the capacity region is obtained based on the notion of single sided genie. Subsequently, we construct an achievable scheme that achieves this upper bound using a superposition of broadcasting node 4 messages and an achievable "detour" scheme for a reduced 3-user relay network.
△ Less
Submitted 8 August, 2013;
originally announced August 2013.
-
On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi,
Mohamed Nafie
Abstract:
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for sto…
▽ More
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node which harvests energy packets from the environment. In addition to its data queues, the SU has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete time queue with Markov arrival and service processes. Due to the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.
△ Less
Submitted 27 July, 2014; v1 submitted 6 July, 2013;
originally announced July 2013.
-
Achievable Degrees of Freedom Region of the MIMO Relay Networks using the Detour Schemes
Authors:
Ahmed A. Zewail,
M. Nafie,
Y. Mohasseb,
H. EL Gamal
Abstract:
In this paper, we study the degrees of freedom (DoF) of the MIMO relay networks. We start with a general Y channel, where each user has $M_i$ antennas and aims to exchange messages with the other two users via a relay equipped with $N$ antennas. Then, we extend our work to a general 4-user MIMO relay network. Unlike most previous work which focused on the total DoF of the network, our aim here is…
▽ More
In this paper, we study the degrees of freedom (DoF) of the MIMO relay networks. We start with a general Y channel, where each user has $M_i$ antennas and aims to exchange messages with the other two users via a relay equipped with $N$ antennas. Then, we extend our work to a general 4-user MIMO relay network. Unlike most previous work which focused on the total DoF of the network, our aim here is to characterize the achievable DoF region as well. We develop an outer bound on the DoF region based on the notion of one sided genie. Then, we define a new achievable region using the Signal Space Alignment (SSA) and the Detour Schemes. Our achievable scheme achieves the upper bound for certain conditions relating $M_i$'s and $N$.
△ Less
Submitted 28 February, 2014; v1 submitted 2 July, 2013;
originally announced July 2013.
-
The Deterministic Multicast Capacity of 4-Node Relay Networks
Authors:
Ahmed A. Zewail,
M. Nafie,
Y. Mohasseb,
H. El Gamal
Abstract:
In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that ach…
▽ More
In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that achieve the upper bound by routing specific bits via indirect paths instead of sending them directly.
△ Less
Submitted 16 April, 2013;
originally announced April 2013.
-
Cognitive Radio Transmission Strategies for Primary Markovian Channels
Authors:
Ahmed ElSamadouny,
Mohammed Nafie,
Ahmed Sultan
Abstract:
A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and, hence, of the amount of actual harm it inflicts on the primary license holder. Sensing the primary transmitter does not help in this regard. To tackle this issue, we assume in this paper that the cognitive user can eavesdrop on the ACK/NACK Automatic Repeat reQuest (ARQ) fed b…
▽ More
A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and, hence, of the amount of actual harm it inflicts on the primary license holder. Sensing the primary transmitter does not help in this regard. To tackle this issue, we assume in this paper that the cognitive user can eavesdrop on the ACK/NACK Automatic Repeat reQuest (ARQ) fed back from the primary receiver to the primary transmitter. Assuming a primary channel state that follows a Markov chain, this feedback gives the cognitive radio an indication of the primary link quality. Based on the ACK/NACK received, we devise optimal transmission strategies for the cognitive radio so as to maximize a weighted sum of primary and secondary throughput. The actual weight used during network operation is determined by the degree of protection afforded to the primary link. We begin by formulating the problem for a channel with a general number of states. We then study a two-state model where we characterize a scheme that spans the boundary of the primary-secondary rate region. Moreover, we study a three-state model where we derive the optimal strategy using dynamic programming. We also extend our two-state model to a two-channel case, where the secondary user can decide to transmit on a particular channel or not to transmit at all. We provide numerical results for our optimal strategies and compare them with simple greedy algorithms for a range of primary channel parameters. Finally, we investigate the case where some of the parameters are unknown and are learned using hidden Markov models (HMM).
△ Less
Submitted 24 November, 2012;
originally announced November 2012.
-
Maximum Secondary Stable Throughput of a Cooperative Secondary Transmitter-Receiver Pair: Protocol Design and Stability Analysis
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi,
Mohamed Nafie
Abstract:
In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter (PT) on the maximum stable throughput of the primary-secondary network. Each transmitter, primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter (ST) has a buffer for storing a fraction of the undelivered p…
▽ More
In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter (PT) on the maximum stable throughput of the primary-secondary network. Each transmitter, primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter (ST) has a buffer for storing a fraction of the undelivered primary packets due to channel impairments. Moreover, the secondary destination has a relaying queue for storing a fraction of the undelivered primary packets. In the proposed cooperative system, the ST and the secondary destination increase the spectrum availability for the secondary packets by relaying the unsuccessfully transmitted packets of the PT. We consider two multiple access strategies to be used by the ST and the secondary destination to utilize the silence sessions of the PT. Numerical results demonstrate the gains of the proposed cooperative system over the non-cooperation case.
△ Less
Submitted 9 June, 2014; v1 submitted 27 June, 2012;
originally announced June 2012.
-
On the Diversity Gain Region of the Z-interference Channels
Authors:
Mohamed S. Nafea,
Karim G. Seddik,
Mohammed Nafie,
Hesham El Gamal
Abstract:
In this work, we analyze the diversity gain region (DGR) of the single-antenna Rayleigh fading Z-Interference channel (ZIC). More specifically, we characterize the achievable DGR of the fixed-power split Han-Kobayashi (HK) approach under these assumptions. Our characterization comes in a closed form and demonstrates that the HK scheme with only a common message is a singular case, which achieves t…
▽ More
In this work, we analyze the diversity gain region (DGR) of the single-antenna Rayleigh fading Z-Interference channel (ZIC). More specifically, we characterize the achievable DGR of the fixed-power split Han-Kobayashi (HK) approach under these assumptions. Our characterization comes in a closed form and demonstrates that the HK scheme with only a common message is a singular case, which achieves the best DGR among all HK schemes for certain multiplexing gains. Finally, we show that generalized time sharing, with variable rate and power assignments for the common and private messages, does not improve the achievable DGR.
△ Less
Submitted 3 April, 2012; v1 submitted 12 February, 2012;
originally announced February 2012.
-
A Diversity-Multiplexing-Delay Tradeoff of ARQ Protocols in The Z-interference Channel
Authors:
Mohamed S. Nafea,
D. Hamza,
Karim G. Seddik,
Mohammed Nafie,
Hesham El Gamal
Abstract:
In this work, we analyze the fundamental performance tradeoff of the single-antenna Automatic Retransmission reQuest (ARQ) Z-interference channel (ZIC). Specifically, we characterize the achievable three-dimensional tradeoff between diversity (reliability), multiplexing (throughput), and delay (maximum number of retransmissions) of two ARQ protocols: A non-cooperative protocol and a cooperative on…
▽ More
In this work, we analyze the fundamental performance tradeoff of the single-antenna Automatic Retransmission reQuest (ARQ) Z-interference channel (ZIC). Specifically, we characterize the achievable three-dimensional tradeoff between diversity (reliability), multiplexing (throughput), and delay (maximum number of retransmissions) of two ARQ protocols: A non-cooperative protocol and a cooperative one. Considering no cooperation exists, we study the achievable tradeoff of the fixed-power split Han-Kobayashi (HK) approach. Interestingly, we demonstrate that if the second user transmits the common part only of its message in the event of its successful decoding and a decoding failure at the first user, communication is improved over that achieved by keeping or stopping the transmission of both the common and private messages. We obtain closed-form expressions for the achievable tradeoff under the HK splitting. Under cooperation, two special cases of the HK are considered for static and dynamic decoders. The difference between the two decoders lies in the ability of the latter to dynamically choose which HK special-case decoding to apply. Cooperation is shown to dramatically increase the achievable first user diversity.
△ Less
Submitted 3 April, 2012; v1 submitted 8 February, 2012;
originally announced February 2012.
-
Achievable Degrees of Freedom of the K-user Interference Channel with Partial Cooperation
Authors:
Ahmed A. Naguib,
Khaled Elsayed,
Mohammed Nafie
Abstract:
In this paper, we consider the K-user interference channel with partial cooperation, where a strict subset of the K users cooperate. For the K-user interference channel with cooperating subsets of length M, the outer bound of the total degrees of freedom is KM/(M+1). In this paper, we propose a signal space-based interference alignment scheme that proves the achievability of these degrees of freed…
▽ More
In this paper, we consider the K-user interference channel with partial cooperation, where a strict subset of the K users cooperate. For the K-user interference channel with cooperating subsets of length M, the outer bound of the total degrees of freedom is KM/(M+1). In this paper, we propose a signal space-based interference alignment scheme that proves the achievability of these degrees of freedom for the case K=M+2. The proposed scheme consists of a design for the transmit precoding matrices and a processing algorithm which we call the Successive Interference Alignment (SIA) algorithm. The decoder of each message uses the SIA algorithm to process the signals received by the M cooperating receivers in order to get the maximum available degrees of freedom.
△ Less
Submitted 1 June, 2011;
originally announced June 2011.
-
Distributed Spectrum Sensing with Sequential Ordered Transmissions to a Cognitive Fusion Center
Authors:
Laila Hesham,
Ahmed Sultan,
Mohammed Nafie
Abstract:
Cooperative spectrum sensing is a robust strategy that enhances the detection probability of primary licensed users. However, a large number of detectors reporting to a fusion center for a final decision causes significant delay and also presumes the availability of unreasonable communication resources at the disposal of a network searching for spectral opportunities. In this work, we employ the i…
▽ More
Cooperative spectrum sensing is a robust strategy that enhances the detection probability of primary licensed users. However, a large number of detectors reporting to a fusion center for a final decision causes significant delay and also presumes the availability of unreasonable communication resources at the disposal of a network searching for spectral opportunities. In this work, we employ the idea of sequential detection to obtain a quick, yet reliable, decision regarding primary activity. Local detectors take measurements, and only a few of them transmit the log likelihood ratios (LLR) to a fusion center in descending order of LLR magnitude. The fusion center runs a sequential test with a maximum imposed on the number of sensors that can report their LLR measurements. We calculate the detection thresholds using two methods. The first achieves the same probability of error as the optimal block detector. In the second, an objective function is constructed and decision thresholds are obtained via backward induction to optimize this function. The objective function is related directly to the primary and secondary throughputs with inbuilt privilege for primary operation. Simulation results demonstrate the enhanced performance of the approaches proposed in this paper. We also investigate the case of fading channels between the local sensors and the fusion center, and the situation in which the sensing cost is negligible.
△ Less
Submitted 30 May, 2011;
originally announced May 2011.
-
A New Achievable DoF Region for the 3-user MxN Symmetric Interference Channel
Authors:
Mohamed Amir,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed sche…
▽ More
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed scheme achieve higher number of DoF than are currently achievable, while for other values it meets the best known upperbound. Simulation results are presented showing the superior performance of the proposed schemes to earlier approaches.
△ Less
Submitted 20 May, 2011;
originally announced May 2011.
-
On Rate-Splitting by a Secondary Link in Multiple Access Primary Network
Authors:
John Tadrous,
Mohammed Nafie
Abstract:
An achievable rate region is obtained for a primary multiple access network coexisting with a secondary link of one transmitter and a corresponding receiver. The rate region depicts the sum primary rate versus the secondary rate and is established assuming that the secondary link performs rate-splitting. The achievable rate region is the union of two types of achievable rate regions. The first typ…
▽ More
An achievable rate region is obtained for a primary multiple access network coexisting with a secondary link of one transmitter and a corresponding receiver. The rate region depicts the sum primary rate versus the secondary rate and is established assuming that the secondary link performs rate-splitting. The achievable rate region is the union of two types of achievable rate regions. The first type is a rate region established assuming that the secondary receiver cannot decode any primary signal, whereas the second is established assuming that the secondary receiver can decode the signal of one primary receiver. The achievable rate region is determined first assuming discrete memoryless channel (DMC) then the results are applied to a Gaussian channel. In the Gaussian channel, the performance of rate-splitting is characterized for the two types of rate regions. Moreover, a necessary and sufficient condition to determine which primary signal that the secondary receiver can decode without degrading the range of primary achievable sum rates is provided. When this condition is satisfied by a certain primary user, the secondary receiver can decode its signal and achieve larger rates without reducing the primary achievable sum rates from the case in which it does not decode any primary signal. It is also shown that, the probability of having at least one primary user satisfying this condition grows with the primary signal to noise ratio.
△ Less
Submitted 7 February, 2011;
originally announced February 2011.
-
Adaptive Sensing and Transmission Durations for Cognitive Radios
Authors:
Wessam Afifi,
Ahmed Sultan,
Mohammed Nafie
Abstract:
In a cognitive radio setting, secondary users opportunistically access the spectrum allocated to primary users. Finding the optimal sensing and transmission durations for the secondary users becomes crucial in order to maximize the secondary throughput while protecting the primary users from interference and service disruption. In this paper an adaptive sensing and transmission scheme for cognitiv…
▽ More
In a cognitive radio setting, secondary users opportunistically access the spectrum allocated to primary users. Finding the optimal sensing and transmission durations for the secondary users becomes crucial in order to maximize the secondary throughput while protecting the primary users from interference and service disruption. In this paper an adaptive sensing and transmission scheme for cognitive radios is proposed. We consider a channel allocated to a primary user which operates in an unslotted manner switching activity at random times. A secondary transmitter adapts its sensing and transmission durations according to its belief regarding the primary user state of activity. The objective is to maximize a secondary utility function. This function has a penalty term for collisions with primary transmission. It accounts for the reliability-throughput tradeoff by explicitly incorporating the impact of sensing duration on secondary throughput and primary activity detection reliability. It also accounts for throughput reduction that results from data overhead. Numerical simulations of the system performance demonstrate the effectiveness of adaptive sensing and transmission scheme over non-adaptive approach in increasing the secondary user utility.
△ Less
Submitted 3 December, 2010; v1 submitted 2 December, 2010;
originally announced December 2010.
-
Cognitive Radio Transmission Strategies for Primary Erasure Channels
Authors:
Ahmed El-Samadony,
Mohammed Nafie,
Ahmed Sultan
Abstract:
A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and the interference it inflicts on the primary license holder. In this paper we assume that the primary transmitter sends packets across an erasure channel and the primary receiver employs ACK/NAK feedback (ARQ) to retransmit erased packets. The cognitive radio can eavesdrop on th…
▽ More
A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and the interference it inflicts on the primary license holder. In this paper we assume that the primary transmitter sends packets across an erasure channel and the primary receiver employs ACK/NAK feedback (ARQ) to retransmit erased packets. The cognitive radio can eavesdrop on the primary's ARQs. Assuming the primary channel states follow a Markov chain, this feedback gives the cognitive radio an indication of the primary link quality. Based on the ACK/NACK received, we devise optimal transmission strategies for the cognitive radio so as to maximize a weighted sum of primary and secondary throughput. The actual weight used during network operation is determined by the degree of protection afforded to the primary link. We study a two-state model where we characterize a scheme that spans the boundary of the primary-secondary rate region. Moreover, we study a three-state model where we derive the optimal strategy using dynamic programming. We also show via simulations that our optimal strategies achieve gains over the simple greedy algorithm for a range of primary channel parameters.
△ Less
Submitted 24 August, 2010;
originally announced August 2010.
-
Power Control for Maximum Throughput in Spectrum Underlay Cognitive Radio Networks
Authors:
John Tadrous,
Ahmed Sultan,
Mohammed Nafie,
Amr El-Keyi
Abstract:
We investigate power allocation for users in a spectrum underlay cognitive network. Our objective is to find a power control scheme that allocates transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service (QoS) of the primary users greater than a certain minimum limit. Since an optimum solution to our problem…
▽ More
We investigate power allocation for users in a spectrum underlay cognitive network. Our objective is to find a power control scheme that allocates transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service (QoS) of the primary users greater than a certain minimum limit. Since an optimum solution to our problem is computationally intractable, as the optimization problem is non-convex, we propose an iterative algorithm based on sequential geometric programming, that is proved to converge to at least a local optimum solution. We use the proposed algorithm to show how a spectrum underlay network would achieve higher throughput with secondary users operation than with primary users operating alone. Also, we show via simulations that the loss in primary throughput due to the admission of the secondary users is accompanied by a reduction in the total primary transmit power.
△ Less
Submitted 8 February, 2010;
originally announced February 2010.
-
Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks
Authors:
Ahmed Ahmedin,
Marwa Ali,
Ahmed Sultan,
Mohammed Nafie
Abstract:
We consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined by the minimum rate required by the primary terminals. The primary transmitter send…
▽ More
We consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined by the minimum rate required by the primary terminals. The primary transmitter sends at a fixed power and a fixed rate. Its on/off durations follow an exponential distribution. Two sensing schemes are considered: perfect sensing in which the actual state of the primary channel is revealed, and soft sensing in which the secondary transmission power and time are determined based on the sensing metric directly. We use an upperbound for the secondary throughput assuming that the secondary receiver tracks the instantaneous secondary channel state information. The objective function is non-convex and, hence, the optimal solution is obtained via exhaustive search. Our results show that an increase in the overall weighted throughput can be obtained by allowing the secondary to transmit even when the channel is found to be busy. For the examined system parameter values, the throughput gain from soft sensing is marginal. Further investigation is needed for assessing the potential of soft sensing.
△ Less
Submitted 11 November, 2009; v1 submitted 4 November, 2009;
originally announced November 2009.
-
Cognitive Power Control Under Correlated Fading and Primary-Link CSI
Authors:
Doha Hamza,
Mohammed Nafie
Abstract:
We consider the cognitive power control problem of maximizing the secondary throughput under an outage probability constraint on a constant-power constant-rate primary link. We assume a temporally correlated primary channel with two types of feedback: perfect delayed channel state information (CSI) and one-bit automatic repeat request (ARQ). We use channel correlation to enhance the primary and…
▽ More
We consider the cognitive power control problem of maximizing the secondary throughput under an outage probability constraint on a constant-power constant-rate primary link. We assume a temporally correlated primary channel with two types of feedback: perfect delayed channel state information (CSI) and one-bit automatic repeat request (ARQ). We use channel correlation to enhance the primary and secondary throughput via exploiting the CSI feedback to predict the future primary channel gain. We provide a numerical solution for the power control optimization problem under delayed CSI. In order to make the solution tractable under ARQ-CSI, we re-formulate the cognitive power control problem as the maximization of the instantaneous weighted sum of primary and secondary throughput. We propose a greedy ARQ-CSI algorithm that is shown to achieve an average throughput comparable to that attained under the delayed-CSI algorithm, which we solve optimally.
△ Less
Submitted 29 September, 2009;
originally announced September 2009.