Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Protocol design and throughput analysis for multi-user cognitive cooperative systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Krikidis, I. ; Inst. for Digital Commun., Univ. of Edinburgh, Edinburgh, UK ; Laneman, J.N. ; Thompson, J.S. ; Mclaughlin, S.

This paper deals with protocol design for cognitive cooperative systems with many secondary users. In contrast with previous cognitive configurations, the channel model considered assumes a cluster of secondary users which perform both a sensing process for transmitting opportunities and can relay data for the primary user. Appropriate relaying improves the throughput of the primary users and can increase the transmission opportunities for the cognitive users. Based on different multi-access protocols, the schemes investigated enable relaying either between the primary user and a selected secondary user or between two selected secondary users. This collaboration can be a simple distributed multiple-input single-output transmission of the primary data or a simultaneous transmission of primary and secondary data using dirty-paper coding (DPC). The parametrization of DPC as well as its combination with opportunistic relay selection yields an interesting trade-off between the primary and the secondary performance which is investigated by theoretical and simulation results under the perspective of a desired primary throughput. The proposed protocols are studied from a networking point of view and the stable throughput for primary and secondary users is derived based on the principles of queueing theory.

Published in:

Wireless Communications, IEEE Transactions on  (Volume:8 ,  Issue: 9 )