Cognitive Communications -  - E-Book

Cognitive Communications E-Book

0,0
125,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

This book discusses in-depth the concept of distributed artificial intelligence (DAI) and its application to cognitive communications

In this book, the authors present an overview of cognitive communications, encompassing both cognitive radio and cognitive networks, and also other application areas such as cognitive acoustics. The book also explains the specific rationale for the integration of different forms of distributed artificial intelligence into cognitive communications, something which is often neglected in many forms of technical contributions available today. Furthermore, the chapters are divided into four disciplines: wireless communications, distributed artificial intelligence, regulatory policy and economics and implementation. The book contains contributions from leading experts (academia and industry) in the field.

Key Features:

  • Covers the broader field of cognitive communications as a whole, addressing application to communication systems in general (e.g. cognitive acoustics and Distributed Artificial Intelligence (DAI)
  • Illustrates how different DAI based techniques can be used to self-organise the radio spectrum
  • Explores the regulatory, policy and economic issues of cognitive communications in the context of secondary spectrum access
  • Discusses application and implementation of cognitive communications techniques in different application areas (e.g. Cognitive Femtocell Networks (CFN)
  • Written by experts in the field from both academia and industry

Cognitive Communications will be an invaluable guide for research community (PhD students, researchers) in the areas of wireless communications, and development engineers involved in the design and development of mobile, portable and fixed wireless systems., wireless network design engineer. Undergraduate and postgraduate students on elective courses in electronic engineering or computer science, and the research and engineering community will also find this book of interest.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 804

Veröffentlichungsjahr: 2012

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Contents

Cover

Title Page

Copyright

List of Figures

List of Tables

About the Editors

Preface

Part I: Introduction

Chapter 1: Introduction to Cognitive Communications

1.1 Introduction

1.2 A New Way of Thinking

1.3 History of Cognitive Communications

1.4 Key Components of Cognitive Communications

1.5 Overview of the Rest of the Book

1.6 Summary and Conclusion

References

Part II: Wireless Communications

Chapter 2: Cognitive Radio and Networks for Heterogeneous Networking

2.1 Introduction

2.2 Cognitive Radio for Heterogeneous Networks

2.3 Applying Cognitive Networks to Heterogeneous Networks

2.4 Performance Evaluation

2.5 Conclusion

References

Chapter 3: Channel Assignment and Power Allocation Algorithms in Multi-Carrier-Based Cognitive Radio Environments

3.1 Introduction

3.2 The Orthogonal Frequency-Division Multiplexing (OFDM) Transmission Scheme

3.3 Resource Management in Non-Cognitive OFDM Environments

3.4 Resource Management in OFDM-Based Cognitive Radio Systems

3.5 Conclusions

References

Chapter 4: Filter Bank Techniques for Multi-Carrier Cognitive Radio Systems

4.1 Introduction

4.2 Basic Features of Filter Banks-Based Multi-Carrier Techniques

4.3 Adaptive Threshold Enhanced Filter Bank for Spectrum Detection in IEEE 802.22 [32]

4.4 Transform Decomposition for Spectrum Interleaving in Multi-Carrier Cognitive Radio Systems

4.5 Remaining Problems in Filter Banks-Based Multi-Carrier Systems

4.6 Summary and Conclusion

References

Chapter 5: Distributed Clustering of Cognitive Radio Networks: A Message-Passing Approach

5.1 Introduction

5.2 Clustering Techniques for Cognitive Radio Networks

5.3 A Message-Passing Clustering Approach Based on Affinity Propagation

5.4 Case Studies

5.5 Implementation Challenges

5.6 Conclusions

References

Part III: Application of Distributed Artificial Intelligence

Chapter 6: Machine Learning Applied to Cognitive Communications

6.1 Introduction

6.2 State of the Art

6.3 Learning Techniques

6.4 Advantages and Disadvantages of Applying Machine Learning to Cognitive Radio Networks

6.5 Conclusions

Acknowledgement

References

Chapter 7: Reinforcement Learning for Distributed Power Control and Channel Access in Cognitive Wireless Mesh Networks

7.1 Introduction

7.2 Applying Reinforcement Learning to Distributed Power Control and Channel Access

7.3 Future Challenges

7.4 Conclusions

References

Chapter 8: Reinforcement Learning-Based Cognitive Radio for Open Spectrum Access

8.1 Open Spectrum Access

8.2 Reinforcement Learning-Based Spectrum Sharing in Open Spectrum Bands

8.3 Exploration Control and Efficient Exploration for Reinforcement Learning-Based Cognitive Radio

8.4 Conclusion

References

Chapter 9: Learning Techniques for Context Diagnosis and Prediction in Cognitive Communications

9.1 Introduction

9.2 Prediction

9.3 Future Problems

9.4 Conclusions

References

Chapter 10: Social Behaviour in Cognitive Radio

10.1 Introduction

10.2 Social Behaviour in Cognitive Radio

10.3 Social Network Analysis

10.4 Conclusions

References

Part IV: Regulatory Policy and Economics

Chapter 11: Regulatory Policy and Economics of Cognitive Radio for Secondary Spectrum Access

11.1 Introduction

11.2 Spectrum Regulations: Why and How?

11.3 Overview of Regulatory Bodies and Their Inter-Relation

11.4 Why Secondary Spectrum Access?

11.5 Candidate Bands for Secondary Access

11.6 Regulatory and Policy Issues

11.7 Technology Enablers and Options for Secondary Sharing

11.8 Economic Impact and Business Opportunities of SSA

11.9 Outlook

11.10 Conclusions

Acknowledgements

References

Part V: Implementation

Chapter 12: Cognitive Radio Networks in TV White Spaces

12.1 Introduction

12.2 Research and Development Challenges

12.3 Regulation and Standardization

12.4 Quantifying Spectrum Opportunities

12.5 Commercial Use Cases

12.6 Conclusions

Acknowledgement

References

Chapter 13: Cognitive Femtocell Networks

13.1 Introduction

13.2 Femtocell Network Architecture

13.3 Interference Management Strategies

13.4 Self Organized Femtocell Networks (SOFN)

13.5 Future Research Directions

13.6 Conclusion

References

Chapter 14: Cognitive Acoustics: A Way to Extend the Lifetime of Underwater Acoustic Sensor Networks

14.1 The Concept of Cognitive Acoustics

14.2 Underwater Acoustic Communication Channel

14.3 Some Distinct Features of Cognitive Acoustics

14.4 Fundamentals of Reinforcement Learning

14.5 An Application Scenario: Underwater Acoustic Sensor Networks

14.6 Numerical Results

14.7 Conclusion

Acknowledgements

References

Chapter 15: CMOS RF Transceiver Considerations for DSA

15.1 Introduction

15.2 DSA Transceiver Requirements

15.3 Mathematical Abstraction

15.4 Filters

15.5 Receiver Considerations and Implementation

15.6 Cognitive Radio Receivers

15.7 Transmitter Considerations and Implementation

15.8 Cognitive Radio Transmitters

15.9 Spectrum Sensing

15.10 Summary and Conclusions

References

Index

This edition first published 2012

© 2012 John Wiley and Sons Ltd

Registered office

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom

For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.

The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book's use or discussion of MATLAB® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.

Library of Congress Cataloging-in-Publication Data

Cognitive communications : distributed artificial intelligence (DAI),

regulatory policy and economics, implementation / [edited by] David Grace,

Honggang Zhang.

p. cm.

Includes bibliographical references and index.

ISBN 978-1-119-95150-6 (hardback)

1. Cognitive radio networks. 2. Distributed artificial intelligence. 3. Telecommunication policy. I. Grace, David, 1970- II. Zhang, Honggang, 1967-

TK5103.4815.C45 2012

621.384–dc23

2012012165

A catalogue record for this book is available from the British Library.

ISBN (H/B): 9781119951506

List of Figures

Figure 1.1 Example of how distributed artificial intelligence is used in a cognitive network

Figure 2.1 Cognitive radio cycle

Figure 2.2 A heterogeneous network

Figure 2.3 Cross-tier interference and intra-tier interference

Figure 2.4 Example of ABSFs in time domain techniques for heterogeneous networks

Figure 2.5 Example of lightly loaded PDCCH for heterogeneous network

Figure 2.6 Example of OFDM symbol muting in time domain techniques for heterogeneous networks

Figure 2.7 Example of consecutive subframe blanking in time domain techniques for heterogeneous networks

Figure 2.8 Example of frequency domain techniques for heterogeneous networks

Figure 2.9 Macrocell and femtocell model as cognitive radio concepts

Figure 2.10 The shaded area satisfying the first constraint

Figure 2.11 The shaded area satisfying the second constraint

Figure 2.12 The shaded area satisfying both constraints

Figure 2.13 The shaded area satisfying the first constraint (a) and the second constraint (b)

Figure 2.14 Conventional transparent relay (a) and transparent relay using cooperative strategy (b)

Figure 2.15 System model of transparent relay using cooperative strategy

Figure 2.16 Three cell model (a) and user allocation of OFDMA packet for FFR and SFR (b)

Figure 2.17 Self-organization cycle

Figure 2.18 Heterogeneous network handover example

Figure 2.19 SINR CDF of the macrocell with femtocells

Figure 2.20 SINR CDF of the macrocell only

Figure 2.21 Average throughput at one sector of centre cell for macrocell only and macrocell with femtocell (uniformly and cell edge deployed)

Figure 3.1 OFDM system block diagram

Figure 3.2 CP insertion in the OFDM symbol by copying the last part in the beginning of the symbol

Figure 3.3 Description of the waterfilling principle. Pmax is the total system power budget and SNR denotes the inverse of the sub-carriers' signal-to-noise ratio

Figure 3.4 Underlay and overlay spectrum sharing schemes

Figure 3.5 Downlink\uplink CR network

Figure 3.6 Frequency distribution of the active and non-active primary bands

Figure 3.7 Example of the SU's allocated power using PI-algorithm

Figure 3.8 Frequency distribution with two active PU bands

Figure 3.9 Achieved capacity versus allowed interference threshold: two active PU bands

Figure 3.10 Total interference introduced to the PU1 versus interference threshold

Figure 3.11 Total interference introduced to the PU2 versus interference threshold

Figure 3.12 Achieved CR versus allowed interference threshold (low): two active bands

Figure 3.13 Frequency distribution with one active PU band

Figure 3.14 Achieved capacity versus allowed interference threshold: one active PU band

Figure 3.15 Achieved capacity versus allowed interference threshold (low): One active PU band

Figure 3.16 An example of the SU's allocated power using the power allocation algorithm

Figure 3.17 Achieved capacity versus allowed interference thresholds

Figure 3.18 Outage probability versus allowed interference thresholds

Figure 3.19 Achieved capacity versus number of SU's

Figure 3.20 Achieved capacity versus per-user power

Figure 3.21 Instantaneous rates over time

Figure 4.1 Frequency response comparison between OFDM and FBMC in one sub-carrier

Figure 4.2 Typical structure of multi-carrier system

Figure 4.3 Frequency response of prototype filter

Figure 4.4 Illustration of amplitude of frequency response in M-band filter banks

Figure 4.5 Polyphase structure of M-band filter banks

Figure 4.6 Basic structure of FBMC transmitter

Figure 4.7 Basic structure of FBMC receiver

Figure 4.8 System diagram of a filter bank-based multi-carrier (FBMC) system

Figure 4.9 The scheme of proposed multi-stage DFTFB

Figure 4.10 (a) Brief structure of proposed multi-stage DFT filter banks (b) Structure of DFT filter banks with modulation component in stage L

Figure 4.11 TV bands division in IEEE 802.22 WRAN and fractional bandwidth usage

Figure 4.12 Architecture of two stage DFTFB (TS-DFTFB)

Figure 4.13 (a) Detection performance of 32 band t-DFTFB and TS-DFTFB (b) Number of multiplications of 32 band t-DFTFB and TS D TFB

Figure 4.14 Detailed power estimator module in Figure 4.12

Figure 4.15 (a) Threshold and AWGN curves, where the initial threshold is varying with respect to the actual noise power. (b) Threshold and AWGN curves, where the initial threshold is much bigger than the noise power. The values of adaptive parameters are

Figure 4.16 The usage of a spectrum band for second user

Figure 4.17 Block diagram of transform decomposition

Figure 4.18 Block diagram of decimation transform decomposition

Figure 4.19 The number of complex multiplications that CTR2-FFT, conventional TD (CTD) and our proposed method (DTD) need under the hypothesis that was mentioned previously

Figure 4.20 The number of complex multiplications that DTD needs at different distribution degrees

Figure 4.21 Symbol Error Rate versus the number of impulse noise for different auxiliary sub-carrier assignation schemes, M = 256, m = 20, SNR = 20 dB

Figure 5.1 Connectivity in a CRN composed of three primary (squares) and eight secondary (circles) nodes. Channels in use by primaries and those available to secondaries are indicated in brackets below the nodes. Solid lines indicate nodes that are connected. The dashed lines between nodes 5 and 7 and between nodes 3 and 8 indicate that even though these node pairs are within radio range of each other, they are not connected as they do not have a common available channel

Figure 5.2 An ad hoc CRN scenario with three primary (squares) and 16 secondary nodes (circles) generated using link model parameters Dp = 0.5, Ds = 0.3, κ = 1. The clustering solution is illustrated in the bottom plot. Large circles denote the clusterheads (a) Primary transmission ranges and CRN connectivity. (b) Clusters formed by distributed AP

Figure 5.3 Impact of Δ on the number of clusters formed by the distributed AP technique

Figure 5.4 Effect of the number of AP iterations on the number of clusters formed

Figure 5.5 Clustering efficiency of the distributed AP and centralized greedy techniques for single channel ad hoc networks

Figure 5.6 The node connectivities for a typical CRN scenario with 100 randomly deployed nodes in a unit square simulation area

Figure 5.7 Cooperative sensing nodes chosen by each of the various selection techniques. Reporting nodes are indicated by solid circles. Brightness denotes the probability of detection (Qd) at each location for a false alarm rate (Qf) of 1% (a) All nodes reporting (b) AP with 38 reporting nodes (c) K-means with 38 reporting nodes (d) Random with 38 reporting nodes

Figure 5.8 Detection performance of the various sensor selection techniques

Figure 5.9 Effect of the number of reporting nodes on the detection performance

Figure 6.1 Typical neural network structure [12]

Figure 6.2 The inserted data sample x affects its BMU and its neighbourhood. The black and the grey dots represent state of the map before and after the input of the data sample, respectively, while the arrows stand for the direction and the intensity (length of the arrow) of the adjustment during the training [30]

Figure 7.1 Cognitive wireless mesh networking (CogMesh) scenarios

Figure 7.2 Cluster-based network formation in CogMesh

Figure 7.3 Reinforcement learning

Figure 7.4 Performance, when : Impact of the temperature to expected rewards achieved by SU 1

Figure 7.5 Performance, when : Impact of the temperature to expected rewards achieved by SU 1

Figure 7.6 Performance comparison between the proposed algorithm and the system's optimum

Figure 7.7 The expected rewards of the SU's versus the PU's behavior factor

Figure 7.8 Channel model of the primary users

Figure 7.9 Cognitive radio network with N = 4 and M = 5 at time slot k. Collision occurs when more than one secondary user transmits over the same free channel

Figure 7.10 Strategy dynamics of Algorithms 1 and 2

Figure 7.11 Strategy dynamics of Algorithms 1 and 2 with different initial values of and

Figure 7.12 Strategy dynamics of Algorithms 1 and 2 with the same belief parameter

Figure 7.13 Comparison of the accumulated utilities corresponding to different OSA schemes

Figure 7.14 Comparison of the achieved fairness index of different OSA schemes

Figure 8.1 The reinforcement learning model in a cognitive radio scenario

Figure 8.2 Reinforcement learning-based spectrum sharing algorithm

Figure 8.3 Point-to-point architecture

Figure 8.4 Channel usage at (1) Event 50, (2) Event 100, (3) Event 500, (4) Event 1000

Figure 8.5 Cumulative distribution function of system blocking probability at discrete points over the service area

Figure 8.6 Cumulative distribution function of system dropping probability at discrete points over the service area

Figure 8.7 Algorithm flowchart

Figure 8.8 Cumulative distribution function of system blocking probability of transmitter and receiver pairs

Figure 8.9 Cumulative distribution function of system dropping probability of transmitter and receiver pairs

Figure 8.10 Average values of Ustd through thousands of events

Figure 8.11 Average blocking probability with different preferred channel weight thresholds

Figure 8.12 Average dropping probability with different preferred channel weight thresholds

Figure 8.13 Percentage of activation with different preferred channel weight thresholds

Figure 8.14 Average blocking probability with different size of preferred channel set

Figure 8.15 Average dropping probability with different size of preferred channel set

Figure 8.16 System blocking probability of uniform random exploration at different offered traffic levels

Figure 8.17 System dropping probability of uniform random exploration at different offered traffic levels

Figure 8.18 Exploration costs (number of trials required per task) for a learning agent

Figure 8.19 System blocking probability at different offered traffic levels

Figure 8.20 System dropping probability at different offered traffic levels

Figure 8.21 Percentage of activation in exploitation at different offered traffic levels

Figure 9.1 CPT of i-th configuration

Figure 9.2 Test Case 1: Scenario 1: No prior knowledge of the system capacity under the specific configuration [1]

Figure 9.3 Test Case 2: Scenario 2: With prior knowledge of the system capacity of being 6 Mbps under the specific configuration [1]

Figure 9.4 Generalized scheme of the under question NN-based pattern [4]

Figure 9.5 Performance of the ‘winning’ scheme with respect to the training (known) data set [4]

Figure 9.6 Performance of the ‘winning’ scheme with respect to validation (unknown) data set [4]

Figure 9.7 MATLAB Data File: the number of the first line refers to the number of the input variables, here equal to 5 (RSSI, Input PacKeTS, Output PacKeTS, Input BYTES, Output BYTES), and the last column refers to the bit rate (used only for labelling reasons). Each Line is a data sample and each column is a different input variable [9]

Figure 9.8 SOM visualizations: (a) only the label with the most instances appear in the cells, (b) all labels that have at least one instance appear in the cell and (c) SOM of (b) is supplemented with the number of instances that each label has in the cell [9,10]

Figure 9.9 Comparative diagram of the predicted (solid line) and measured (dotted line) values of bitrate [10]

Figure 9.10 Inference of user preferences

Figure 9.11 View of CTMS implementation used for the derivation of results: (a) Retrieval of profile information; (b) Collection of user feedback [16]

Figure 9.12 User feedback for professional user role and high, medium and low QoS

Figure 9.13 Adapted conditional probabilities for Utility Volume in professional context given (a) high, (b) medium and (c) Low QoS

Figure 9.14 Network topology which was used during the simulation

Figure 9.15 SOM depicting the congestion levels (0 in blue labels when the link can serve all the traffic, 1 in lighter labels when some packets drop but yet is not treated as a congested link and 2 in darker labels when the link is expected to become congested) of the link under question

Figure 10.1 An illustration of collaborative spectrum sensing and coalition

Figure 10.2 Illustration of channel selection

Figure 10.3 Spectrum access success probabilities for different P_rec

Figure 10.4 Performance gain of adaptive branching probability with a bandit algorithm

Figure 10.5 An illustration of the evolution of default channel

Figure 10.6 Three realizations of user proportion evolution

Figure 10.7 The evolution of user proportion with different parameters

Figure 10.8 Upper bound of user proportion

Figure 11.1 Spectrum allocation in the United Kingdom prior to digital switchover

Figure 11.2 Metrological radar stations in Europe [18]

Figure 11.3 Time/frequency (right) and spatial opportunity for interweaving secondary transmissions in primary spectrum [1]

Figure 11.4 A typical interference margin/temperature at primary receiver creates spectrum opportunities for underlay sharing by secondary systems [38]

Figure 11.5 An illustration of the overlay approach for secondary spectrum sharing where cognition of primary signals at secondary transmitter enables interference cancellation at primary receiver [38]

Figure 11.6 The concept of a spectrum quasi-continuum consisting of elementary sub-channels that could be dynamically pooled by cognitive radio in response to user requirements

Figure 12.1 UK UHF spectrum after the completion of the digital switchover (courtesy Neul)

Figure 12.2 TVWS potential range due to lower frequency and higher power in comparison with WiFi. Tx power = 4W EIRP, frequency = 700 MHz, Tx antenna 25 m, Rx antenna 4 m

Figure 12.3 Typical output of a geolocation database (BT) showing free channels at a given location

Figure 12.4 Hidden node problem of cognitive radio [8]

Figure 12.5 Probability of detection of a DVB-T signal is plotted against the signal-to-noise ratio for several sensing algorithms. Arrow marks the SNR ratio that corresponds to Ofcom's requirement [11]

Figure 12.6 Coverage map of DTT transmitter located in Guildford, Surrey [27]

Figure 12.7 Aggregate interference levels at the edge of DTTV coverage area plotted as a function of total service area for different deployment densities. The keep out distance is 30 km. Conservative and liberal regulatory caps to interference are shown as thick dark lines

Figure 12.8 Aggregate interference levels at the edge of DTTV coverage area plotted as a function of total service area for different deployment densities. The keep out radius is 70 km. Conservative and liberal regulatory caps to interference are shown as thick dark lines

Figure 12.9 White space roadmap (courtesy Cambridge Consultants, April 2010)

Figure 12.10 Usage example of the IEEE 802.19af in TVWS frequencies [30]

Figure 12.11 UHF channels availability map for cognitive access to TVWS in Germany (left panel) and Sweden, computed for WSD with 20 dBm transmit power and 1.5 Tx height [38]

Figure 12.12 Left panel shows UHF channels availability map for secondary spectrum access to TV white spaces in the UK [41] Results are calculated using Ofcom's database of transmitters, Dark: < 50 MHz, Light > 150 MHz. Right panel shows population-weighted cumulative distribution

Figure 12.13 TVWS channels available for low-power cognitive access in Central London [14]

Figure 12.14 Home distribution using a TVWS system

Figure 12.15 TVWS systems could be used for micro-/metrocell backhaul

Figure 12.16 Rural not-spot coverage with TVWS

Figure 12.17 TVWS for rural broadband: home equipment

Figure 12.18 BT trial on the Isle of Bute

Figure 12.19 Terminal to terminal ‘hopping’ with TVWS (e.g. different frequencies)

Figure 12.20 A 1 km2 area of London (Bayswater). The shading shows the coverage possible when 20% of premises have an indoor transmitter for WiFi or LTE in TVWS spectrum [46]

Figure 13.1 Illustrative example showing the data rate requirement (dotted line) and available throughput due to received signal to interference and noise ratio (SINR) (solid line), between indoor and outdoor scenarios for a cellular base station

Figure 13.2 A joint macro-femtocell deployment architecture

Figure 13.3 Macrocell to femtocell interference variations with FAP distance for different BS transmission powers

Figure 13.4 Femtocell to femtocell interference variations together with safety distance

Figure 13.5 Impact of wall penetration loss on received signal

Figure 13.6 Example showing various femtocell deployments: (a) overlapped, (b) overlapped but not interfering, and (c) non-overlapped

Figure 13.7 Interference scenario in joint macro-femto deployments

Figure 13.8 FFR-based resource sharing in joint macro femto deployments

Figure 13.9 An example of the graph colouring problem for 5 FAP

Figure 13.10 Logical diagram showing a virtual clustered femtocell network system

Figure 13.11 FAP deployment scenarios: (a) before cluster formation, (b) after clustering (applying VCF), and (c) the non-clustered system (NCS) where the shading represents channels of a VCC

Figure 13.12 Performance comparison between clustered and non-clustered network for various FAP deployments

Figure 13.13 SINR performance comparison for clustered and non-clustered systems at different deployment densities

Figure 13.14 Spectral efficiency performance comparison for clustered and non-clustered system at different deployment densities

Figure 13.15 Coverage optimization to minimize the interference for two co-located femtocells: (a) before and (b) after optimization

Figure 13.16 (a) Before load balancing, (b) after load balancing, and (c) joint load balancing and coverage optimization

Figure 13.17 Interference scenario for SISO-based omni-directional and MIMO-based directional transmission

Figure 13.18 The generalized Enhanced FFR (EFFR) scheme

Figure 14.1 Frequency-dependent attenuation and noise level for different transmission distances (spreading factor k = 1.5)

Figure 14.2 The optimal carrier frequency and the corresponding product of attenuation and noise versus the propagation distance

Figure 14.3 A simple scenario

Figure 14.4 Bandwidth of underwater acoustic channel

Figure 14.5 Number of collisions versus number of nodes

Figure 14.6 Energy consumption versus time slot length

Figure 14.7 Number of retransmissions versus time slot length

Figure 14.8 Delivery delay versus time slot length

Figure 14.9 Throughputs versus time slot length

Figure 15.1 The LNA is a crucial component of receivers, as it should provide gain and have a low NF to keep receiver NF low enough, while at the same time it should be very linear. The spectra are drawn on a dB-scale, while the time-signals are drawn on a linear scale. (a) The LNA mitigates the effect of noise added by the following stages of the receiver. (b) Nonlinearity in the LNA distorts the spectrum, and hence increases BER

Figure 15.2 State-of-the-art ADC-performance (a) Currently, no ADC achieves a DR of 100 dB and a BWof 6 GHz. (b) A 2 times higher bandwidth-resolution product requires roughly twice the power. (from [4] which is regularly updated)

Figure 15.3 Our mathematical abstraction of a transmitter and receiver

Figure 15.4 A BPF transfer characteristic and terminology

Figure 15.5 Example transfer of a SAW-filter for the 850 MHz GSM-band

Figure 15.6 The goal of a receiver is to amplify the weak signal to be demodulated and to suppress other signals

Figure 15.7 A sub-sampling receiver performs frequency conversion and sampling in one step, but requires a dedicated high-Q filter for each band. It suffers severely from noise folding

Figure 15.8 A heterodyne receiver performs a frequency conversion on the signal to be demodulated in order to facilitate further processing

Figure 15.9 A block schematic showing the possible DSP-steps in a heterodyne receiver to obtain

Figure 15.10 The position of flo with respect to fc determines how well the image and interference close to the desired signal can be suppressed

Figure 15.11 The zero-IF receiver rejects the image by using a complex frequency translation. For zero-IF, fif = 0 and the image is the signal itself

Figure 15.12 Some possible implementations for creating I and Q baseband signals

Figure 15.13 Two main architectures exist to combine the I and Q signals to a single real analogue output signal where the image is rejected. (a) Hartley architecture (b) Weaver architecture

Figure 15.14 Image frequency suppression as a function of IQ-mismatch. The phase error is ϕ and the gain error is 10 log10(1 + ε)

Figure 15.15 Wideband matching can be obtained with different methods (a) Using a resistor. (b) Using feedback. (c) Using a common-gate amplifier

Figure 15.16 The noise-cancelling LNA of [19]. The signal is amplified, and the noise from the transistor (modelled as a current source) is cancelled by proper choice of the parallel amplifier gain A

Figure 15.17 Using a good SA, the effect of the receiver linearity on each vacant channel can be calculated, allowing the selection of a channel with achievable requirements. In the scenario shown here, with three large primary signals, only channels 3, 4, 8, 9, 16, and 17 will be usable

Figure 15.18 High linearity can be obtained by keeping voltage swings low as long as possible

Figure 15.19 Harmonic downmixing is a fundamental problem when RF-filtering is lacking

Figure 15.20 Appropriate weighting of different square wave LO-phases yields a closer approximation to a sine wave, effectively removing tthird, fifth, eleventh, thirteenth, (and so on) harmonics, leaving the seventh and ninth harmonics as the first uncancelled ones

Figure 15.21 Beamforming provides a means for spatial filtering to suppress interferers and lowers the NF by providing passive gain

Figure 15.22 Applying complex weight to signals can be implemented in several ways

Figure 15.23 The use of a rational function to approximate the sine function allows complex weights to be easily generated in the analogue domain, thus reducing DR-requirements further on in the analogue receiver [31]

Figure 15.24 A tuneable BPF can be implemented as the cascade of a downconversion mixer, LPF, and upconversion mixer, with a surprisingly simple circuit implementation. (a) BPF implemented as LPF with down/upconversion (b) Straightforward implementation (c) Using a shared resistor and removing redundant switches

Figure 15.25 Measurements of the 65 nm CMOS implementation of [34] (the circuit shown in Figure 15.24c)

Figure 15.26 The quad-band receiver of Broadcom [13] extensively uses tuneable BPFs to implement a SAW-less receiver

Figure 15.27 An LC-oscillator occupies a significant portion of chip area. (a) Typical circuit schematic. (b) Circuit layout

Figure 15.28 The bimodal LC-oscillator of [1] and frequency coverage. (a) Schematic. (b) Frequency coverage

Figure 15.29 Block diagram of a standard transmitter

Figure 15.30 The Kahn transmitter separates the phase and envelope of the baseband signal to allow the use of a high-efficiency nonlinear PA

Figure 15.31 Predistortion is a widely applied technique to linearize transmitters

Figure 15.32 The DDRF-architecture as proposed by [41] combines most of the analogue functionality of a direct-conversion transmitter in a single block (1) Architecture. (2) Implementation of DRFC-block

List of Tables

Table 2.1 Six different scenarios internetworking between 3GPP and WLANs

Table 2.2 Transmission power for different cell types

Table 2.3 Stand-alone channel sensing

Table 2.4 Cooperative channel sensing

Table 2.5 Timing for the transparent relay in IEEE802.16j

Table 2.6 Timing for the transparent relay with cooperative strategy

Table 2.7 Simulation configuration

Table 3.1 Complexity comparison

Table 4.1 Coefficients of the prototype filter

Table 6.1 Organization of the basic information elements (for arbitrary network i) on which the cognitive mechanisms are based

Table 8.1 Weighting factor values

Table 8.2 Simulation parameters

Table 8.3 Simulation parameters

Table 8.4 Simulation parameters

Table 9.1 Possible values of the under investigation parameters [4]

Table 9.2 Values of the predefined parameters

Table 9.3 ‘Winning’ test case

Table 9.4 Values of the batch training algorithm for the test case with the best performance [10]

Table 9.5 Instance of the monitoring procedure for learning user preferences

Table 9.6 Variables that were/could be used for the tests

Table 10.1 Comparison between cognitive radio and electronic commerce

Table 10.2 Differences between the recommendation propagation and epidemic propagation

Table 11.1 Four different scenarios for dynamic spectrum access

Table 11.2 Necessary conditions for secondary spectrum access in various regulatory regimes

Table 12.1 Ofcom's proposed parameters for licence-exempt access to TVWS using sensing and geolocation database methods

Table 12.2 Possible applications for TVWS spectrum

Table 13.1 The network environment parameters used in all simulations

Table 13.2 Comparison of the three different access mechanisms

Table 13.3 Summary of the various interference scenarios in a joint macro-femtocell deployment

Table 14.1 The feasible bandwidth Btx(d) corresponding to propagation distance d

Table 15.1 CR requirements set by different authorities assuming mobile devices that rely on spectrum sensing

About the Editors

David Grace is Head of Communications Research Group and a Senior Research Fellow within the Department of Electronics at the University of York. He is also a Co-Director of the York-Zhejiang Lab on Cognitive Radio and Green Communications, and a Guest Professor at Zhejiang University. He received his PhD from University of York in 1999, the subject of his thesis being Distributed Dynamic Channel Assignment for the Wireless Environment. Current research interests include cognitive communications, including cognitive radio and cognitive networks, specifically applying distributed artificial intelligence to resource and topology management to improve overall capacity; cognitive green radio; architectures for beyond 4G wireless networks; dynamic spectrum access and interference management. He is currently a co-investigator of the FP7 BuNGee project dealing with broadband next generation access, and recently he was the principal investigator of a UK MOD project on Cognitive Routing for Tactical Ad Hoc Networks.

In 2000, he jointly founded SkyLARC Technologies Ltd, and was one of its directors. From 2003–2007 he was the technical lead for the 14-partner FP6 CAPANINA project. He is an author of over 160 papers, and a co-author on Broadband Communications via High Altitude Platforms, also published by John Wiley & Sons, Ltd. From 2005–2009 he was COST 297 WG1 Chair which dealt with radio communications for high altitude platforms. He currently chairs the Worldwide Universities Network Cognitive Communications Consortium (WUN CogCom), which has members from more than 90 organizations worldwide, and is a member of COST IC0902. He is the WUN CogCom Liaison Chair for IEEE Committee on Cognitive Networks, and is a founding member of the new IEEE Technical Sub-Committee on Green Communications and Computing (GCC). In 2013, he will be an IEEE ICC Symposium Co-Chair: Cognitive Networks Track.

Honggang Zhang is a Full Professor of Department of Information Science and Electronic Engineering as well as the Co-Director of York-Zhejiang Lab for Cognitive Radio and Green Communications at the Zhejiang University, China. He is an Honorary Visiting Professor of the University of York, UK. He received the PhD degree in Electrical Engineering from Kagoshima University, Japan, in March 1999. From October 1999 to March 2002, he was with the Telecommunications Advancement Organization (TAO) of Japan, as a TAO Research Fellow. From April 2002 to November 2002, he joined the TOYOTA IT Centre. From December 2002 to August 2004, he was with the UWB Research Consortium, the Communications Research Laboratory (CRL) and the National Institute of Information and Communications Technology (NICT) of Japan. He was the principle author and contributor for proposing DS-UWB in IEEE 802.15 WPAN standardization task group. From September 2004 to February 2008, he has been with CREATE-NET (Italy), where he lead its wireless teams in exploring Cognitive Radio (CR) and UWB technologies while participated the European FP6/FP7 projects (EUWB, PULSERS 2). Dr. Zhang serves as the Chair of Technical Committee on Cognitive Networks (TCCN) of the IEEE Communications Society (ComSoc). He was the founding TPC Co-Chair of CrownCom 2006 as well as the Steering Committee Member of CrownCom 2006–2009. He was the Co-Chair of IEEE Globecom 2008 Symposium. In the area of green communications, Dr. Honggang Zhang was the Lead Guest Editor of the IEEE Communications Magazine special issues on ‘Green Communications’. He was the General Chair of IEEE/ACM GreenCom 2010 (2010 IEEE/ACM International Conference on Green Computing and Communications) and the Co-Chair of the IEEE International Workshop on Green Communications (GreenComm 2010–2011) in conjunction with IEEE ICC/Globecom. He is the co-author/editor of the book Green Communications: Theoretical Fundamentals, Algorithms and Applications (CRC Press).

Preface

Cognitive Communications promises to revolutionize the way wireless communication devices and networks behave through ‘intelligent’ assignment of communication resources and operation. Much of the discussion within the research community today is on the narrower subject of cognitive radio, but what we hope to demonstrate with this book is a wider perspective.

Cognitive communications has its history in the early adaptive/dynamic channel assignment schemes that were used to assign, allocated radio spectrum to different devices, which were particularly popular in the early to mid 1990s. These schemes, especially in distributed form, exhibited many of the features we see in cognitive radio schemes put forward today, namely the ability to sense or be aware of the radio spectrum environment, and based on the outcome of the this sense select the most appropriate spectrum (or channel) to use. Such techniques are now widely used in short range systems, for example DECT (Digital Enhanced Cordless Telecommunications) and IEEE 802.11 (WiFi). Parallels with these early technologies are not often drawn, with many researchers instead choosing to specify the origin of the field with cognitive radio, a phrase coined by Dr Joseph Mitola III in 1999. His real contribution to the field was the incorporation of Distributed Artificial Intelligence (DAI), which he used as a way of learning about the radio environment and then acting on the findings, thereby giving devices even more flexibility and autonomy.

We now see cognitive communications, especially in the form of cognitive radio, applied to the distributed selection of the radio spectrum, which is put forward as a way of overcoming spectrum shortages seen by many, due to command and control regulation. Such regulation permits a primary user to have sole right to an allocation of spectrum within a specific geographical area (often on a country or at least region basis). Today, some radio regulators such as Ofcom in the UK and FCC in USA are ‘cognitive friendly’, with the understanding that by allowing more flexibility in how radio spectrum is assigned, coupled with intelligence or at least spectrum awareness and the ability to act and react, could potentially significantly increase the efficient utilization of spectrum. Studies have shown up to 90% of the radio spectrum might be unused at a particular time and geographical area, with conventional techniques. Early suggestions for use include the TV white space spectrum, where cognitive secondary devices share the radio spectrum with the primary TV systems, and also more efficient use of certain unlicensed spectrum bands.

Over the next few years one can expect to see the field grow even further, spurred on by various practical use cases, including the use of TV White Spaces in particular. We can also see the field widening to include application of cognition to other areas of communications, for example cognitive networks and cognitive acoustics, even its application to control of the propagation environment in smart buildings. One can also see cognition being applied to ‘green’ radio for energy efficiency improvement. The ability to be ‘smart’ should deliver significant energy savings. This especially includes the development of power efficient spectrum assignment, instead of the pursuance of ever higher spectral efficiencies, achieved through high order modulation schemes, where transmissions are artificially constrained in bandwidth, requiring higher power transmissions. Instead cognitive devices will have the ability to exploit excess bandwidth available locally to operate with much more power efficient low order modulation. Such techniques are likely to be readily exploited alongside cognitive topology management, where traffic is rerouted to optimize the power consumption of devices and networks, allowing underused and hence often, energy inefficient devices, to sleep.

This book has emerged out of the activities of the WUN Cognitive Communications Consortium (WUN CogCom) – www.wun-cogcom.org. A research discussion forum designed to bring together researchers from the different disciplines of wireless communications, artificial intelligence, regulation and economics. WUN CogCom was established in January 2009 and now has members from over 90 organizations. The editors and lead authors of the book are all members, and it was felt that this opportunity to write a book in this area was a timely way to disseminate the latest thinking from a subset of its members. Although officially classed as an edited book, it is hoped that through tight selection and control of its contents, coupled with strict editing, the book is comparable in style to authored books often seen in the technical literature. The editors and authors, many of them leading experts, are all highly active in this area, and regularly participate in related activities be they research projects, practical implementations, or regulatory/standards contributions. When writing the material we made every effort to suitably reference other publicly available information sources such as journal and conference papers, technical reports and recommendations from various international bodies. It is recommended that these be used for an even more detailed treatment of a specific subject.

The book is aimed at serving as a reference book and it is our hope that it will enthuse a new generation of researchers and PhD students to take up this exciting research area, as well as providing informative advice to motivate the existing research, regulatory and business communities to take forward the state-of-the-art in new ways.

The book is structured in five parts and provides a comprehensive overview of the state-of-the-art of cognitive communications and its key enabling technologies. The parts of the book are of differing lengths intentionally, which has allowed us to place greater emphasis on those areas which we feel are most under-represented in the literature today and those that will be of greater importance in the years to come. The first part of the book provides a short introduction to the area of cognitive communications. This is followed by the wireless communications part where we discuss key wireless aspects of the field. In Part Three we discuss in detail the application of Distributed Artificial Intelligence, and how it can be applied in different forms to communications systems. Part Four examines the current regulatory thinking behind the application of cognitive communications, particularly the latest initiatives of applying cognitive radio to TV White Space. The final part of the book addresses implementation aspects. We look at several examples of proposed application of cognitive communications, from its more conventional application to TV white space, electronic device implications, to the novel subject area of cognitive acoustics.

Although overall the book is edited by us, and we also contribute as authors, it would not have been possible to publish a book of this quality and breadth without the other authors contributing to each chapter. We are also very grateful to other long-time collaborators in several projects and WUN CogCom in general, for their contributions, guidance and valuable advice.

Finally we would like to thank the John Wiley & Sons, Ltd editorial team, who showed a lot of patience, enthusiasm and support during the preparation of this book, especially Susan Barclay and Anna Smart.

David Grace and Honggang ZhangYork, UK and Hangzhou, China

Part I

Introduction

Chapter 1

Introduction to Cognitive Communications

David Grace

Department of Electronics, University of York, Heslington, UK

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!