ArticlePDF Available

Exact Outage Probability of Cognitive Two-Way Relaying Scheme with Opportunistic Relay Selection under Interference Constraint

Wiley
IET Communications
Authors:

Abstract and Figures

In this study, the authors analyse the outage performance of a cognitive two-way relaying system under an interference constraint. In the proposed protocol, the best relay which is chosen by an opportunistic relay selection strategy, combines the received packets using XOR operation and then forwards the combined packet to two secondary sources. The authors derive an exact closed-form expression of outage probability over flat and block Rayleigh fading channels. Various Monte-Carlo simulations are presented to verify the theoretical analyses and to compare the performance of the proposed protocol with that of the two-way relaying protocol without network coding.
Content may be subject to copyright.
Published in IET Communications
Received on 2nd May 2012
Revised on 21st July 2012
doi: 10.1049/iet-com.2012.0235
ISSN 1751-8628
Exact outage probability of cognitive two-way relaying
scheme with opportunistic relay selection under
interference constraint
T.T. Duy H.Y. Kong
Department of Electrical Engineering, University of Ulsan, Ulsan, South Korea
E-mail: hkong@mail.ulsan.ac.kr
Abstract: In this study, the authors analyse the outage performance of a cognitive two-way relaying system under an interference
constraint. In the proposed protocol, the best relay which is chosen by an opportunistic relay selection strategy, combines the
received packets using XOR operation and then forwards the combined packet to two secondary sources. The authors derive
an exact closed-form expression of outage probability over flat and block Rayleigh fading channels. Various Monte-Carlo
simulations are presented to verify the theoretical analyses and to compare the performance of the proposed protocol with that
of the two-way relaying protocol without network coding.
1 Introduction
Cognitive radio is a promising technique for improving
spectrum utilisation efficiency [1 3]. Conventionally,
cognitive users (secondary users) sense the presence and
absence of licensed users (primary users). If no primary
activity is sensed, then a cognitive user can access a
licensed band. Recently, underlay spectrum-sharing
protocols have been proposed and analysed [4, 5]. In such
schemes, the secondary transmitters must adapt their
transmit power so that the interference created at the
primary user is below the maximum allowable interference.
Owing to the constraint on the transmit power, the
performance of cognitive underlay protocols is severely
degraded in fading environments [6 10].
One efficient method to improve the performance of the
secondary network is to use cooperative communication
protocols with multiple relays [11– 13]. As we know,
cooperative communication is able to improve the channel
capacity and achieve higher diversity gains in fading
environments [14, 15]. By exploiting the broadcast nature
of a wireless channel, cooperative diversity allows single-
antenna radios to form a virtual antenna array. In
cooperative multi-relay protocols, relay selection is an
important issue for improving system performance. The full
relay selection methods [16, 17] have the advantage of
significantly improving the performance and obtaining the
full diversity order, compared with the partial relay
selection method [18]. In the relay selection method
presented in [17], the best relay is selected to support the
data transmission between the source and the destination,
relying on the channel state information across two hops of
each relay. This method can be called opportunistic relay
selection.
Recently, two-way relaying transmissions have attracted
considerable interest [19 21]. In such schemes, two
sources exchange their data with help of one or multiple
relays. In digital network coding [19], two sources
separately transmit their packets to relays. Then, the best
relay is chosen to decode the received packets, combine
decoded packets using XOR operation and then broadcast
the combined packet back to both sources. In analog
network coding [20, 21], two sources first broadcast their
signals to relays at the same time. The best relay receives a
superimposed signal, then amplifies the received signal, and
forwards it back to both sources [20, 21]. Hence, the analog
network coding only uses two time slots to relay the signals
whereas the number of time slots is used in the digital
network coding is three.
In this paper, we propose a cognitive two-way relaying
scheme with relay selection under interference constraint. In
the proposed protocol, we use the digital network coding to
relay packets to two secondary sources. The reason is that if
we use the analog network coding in cognitive underlay
network, the interferences caused by the transmission of
two secondary sources at the first time slot are summed up
at the primary receiver. Hence, implementation of such a
protocol requiring a transmit power allocation strategy for
two secondary sources so that the total interference at the
primary user is below the maximum allowable interference
is a difficult work. In the proposed protocol, we also
propose the relay selection methods that choose a best relay
for forwarding the received packets to intended sources by
using network coding. To evaluate the performance of the
2750 IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759
&The Institution of Engineering and Technology 2012 doi: 10.1049/iet-com.2012.0235
www.ietdl.org
proposed protocol, we derive the exact closed-form
expression of outage probability. Then, various Monte-
Carlo simulations are presented to verify the mathematical
expressions. The results show that the simulation and
theoretical results are in good agreement. In addition, the
proposed protocol obtains better performance than a two-
way relaying protocol in which the network coding is not
used.
The rest of this paper is organised as follows. The system
model and the proposed schemes are described in Section 2.
In Section 3, the performance evaluation of the protocols is
analysed. The simulation results are presented in Section 4.
Finally, conclusions are drawn in Section 5.
2 System model
Fig. 1 presents the system model for the cognitive two-way
relaying scheme under an interference constraint. In this
figure, there are two secondary sources S
1
and S
2
attempting
to transmit their packet to each other. We assume that there
is no direct link between the sources and hence the data
transmission between these sources is realised with the help
of Mavailable relays, for example, R
1
,R
2
,...,R
M
.Itis
assumed that each node is equipped with a single antenna
and operates in half-duplex mode.
For ease of analysis, we assume the distances between each
source and all relays are same. As presented in Fig. 1,we
denote d
1
,d
2
,d
3
,l
1
and l
2
as the distances between links
S
1
R
i
,S
2
R
i
,PRR
i
,S
1
PR and S
2
PR, respectively,
where i[{1, 2, ...,M}. We also denote h
1,i
,h
2,i
,h
3,i
,g
1
and g
2
as Rayleigh fading channel coefficients of links S
1
R
i
,S
2
R
i
,PRR
i
,S
1
PR and S
2
PR, respectively. We
assume that all the channels are modelled by flat and block
fading channels in which the channel coefficients remain
constant during a transmission of a packet but change
independently from one packet to another [21]. We set
c
a,i
¼|h
a,i
|
2
and
w
b
¼|g
b
|
2
,a[{1, 2, 3}and b[{1, 2};
similar to [6, 7],
c
a,i
and
w
b
are exponential random
variables with parameters
l
a=d
b
aand Vb=l
b
b,
respectively, where
b
is path-loss exponent.
The operation of the proposed protocol, called PR1, is split
into time slots as follows. In the first time slot, the source S
1
broadcasts its packet L
1
to all the relays. Next, the packet L
2
of
the source S
2
is sent to all relays in the second time slot. In the
third time slot, a relay is chosen to transmit the combined
packet to the sources S
1
and S
2
by using XOR operation.
The relay selection method will be presented in detail in the
next section.
For a baseline, we compare the performance of the
proposed protocol with the two-way relaying protocol
without network coding (named PR0). In the PR0 protocol,
the operation of data transmission is divided into four time
slots. In the first time slot, the source S
1
broadcasts the
packet L
1
to all the relays. In the second time slot, one of
relays which decodes successfully is chosen to forward this
packet to the source S
2
. Similarly, in the third and fourth
time slots, the source S
2
transmits the packet L
2
to all the
relays and one of the successful relays is selected to
transmit the packet L
2
to the source S
1
.
3 Performance analysis
In the underlay approaches [4 13], the secondary sources and
secondary relays must adapt their transmit power so that the
interference caused at the PR is below a threshold I
PR
. The
threshold I
PR
which is given by the PR is maximum
tolerable interference level at which the PR can still
maintain the reliable decoding. In [22], the authors
proposed a method to determine the interference level I
PR
in cognitive radio networks.
Similar to [5, Eq. (1)], the received signal-to-noise ratios
(SNR) at relay R
i
of the transmissions from the sources S
1
and S
2
are, respectively, given as
g
1,i=IPR|h1,i|2
N0|g1|2=Q
c
1,i
w
1
and
g
2,i=IPR|h2,i|2
N0|g2|2=Q
c
2,i
w
2
(1)
where N
0
is the variance of additive white Gaussian noise at
the secondary receivers and Q¼I
PR
/N
0
.
Therefore the achievable rates of the links S
1
R
i
and S
2
R
i
are formulated as
B1,i=1
3log2(1 +
g
1,i) and B2,i=1
3log2(1 +
g
2,i) (2)
where the ratio 1/3 represents the fact that data transmission is
split into three time slots.
We assume that relay R
i
decodes the packet L
1
(L
2
)
successfully if the data rate B
1,i
(B
2,i
) is larger than the target
rate Bof the system. Let us denote D
1
as a set of relays
decoding the packet L
1
successfully. Since D
1
is a random
decoding relay set, the size of D
1
is a random variable, that
is, |D
1
|¼k
1
,k
1
[{0, 1, ...,M}. Without loss of
generality, we assume that D1={R1,R2,...,Rk1}.
Now, it is noted from (1) that the random variables
g
1,i
are
not independent because they contain a common random
variable
w
1
. Hence, unlike [5, Eq. (6)], we find another
method to calculate the probability of the set D
1
, which can
be expressed as follows
Pr[D1]=Pr B1,1 .B,B1,2 .B,...,B1,k1
.B,
B1,k1+1,B,B1,k1+2,B,...,B1,M,B

(3)
Fig. 1 System model for cognitive two-way relaying scheme under
interference constraint
IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759 2751
doi: 10.1049/iet-com.2012.0235 &The Institution of Engineering and Technology 2012
www.ietdl.org
Substituting (2) into (3), we obtain (4) as
Pr[D1]=Pr min
t=1,2,...,k1
Q
r
1
c
1,t

.
w
1max
v=k1+1,...,M
Q
r
1
c
1,v

(4)
where
r
1
¼2
3B
21.
Setting Z1=mint=1,2,...,k1(Q
c
1,t/
r
1) and T1=
maxv=k1+1,...,M(Q
c
1,v/
r
1), the cumulative density functions
(CDF) of Z
1
and T
1
are, respectively, expressed as
FZ1(z)=Pr[Z1z]=1exp k1
l
1
r
1z
Q

(5)
FT1(t)=Pr[T1t]=1exp
l
1
r
1t
Q

Mk1
=
Mk1
v=0
(1)vCv
Mk1exp v
l
1
r
1t
Q
 (6)
where Cx
y=y!/x!(yx)!with xy.
Combining (4)(6), we can calculate Pr[D
1
]as
Pr[D1]=Pr[Z1.
w
1T1]
=+1
0
V1exp (V1x)(1 FZ1(x))FT1(x)dx
=
Mk1
v=0
(1)vCv
Mk1
V1Q
V1Q+(v+k1)
l
1
r
1
(7)
We note that when |D
1
|¼k
1
, there are Ck1
Mpossible cases for
the decoding set D
1
. Hence, from (7), it can be obtained the
probability Pr[|D
1
|¼k
1
]as
Pr[|D1|=k1]=Ck1
M
Mk1
v=0
(1)vCv
Mk1
V1Q
V1Q+(v+k1)
l
1
r
1
(8)
Similarly, if we denote D
2
as a set of relays decoding the
packet L
1
successfully, the probability Pr[|D
2
|¼k
2
],
k
2
[{0, 1, ...,M}, is calculated as
Pr[|D2|=k2]=Ck2
M
Mk2
v=0
(1)vCv
Mk2
V2Q
V2Q+(v+k2)
l
2
r
1
(9)
If we denote D¼D
1
>D
2
, the set Dis the set of relays
successfully decoding both packets L
1
and L
2
. Now, we
derive the probability Pr[|D|¼k], k[{0, 1, ...,M},
kk
1
,kk
2
. Without loss of generality, we assume that
D¼{R
1
,R
2
,...,R
k
},D
1
¼{R
1
,R
2
,...,R
k
,R
k+1
,...,
R
k+t
}D
2
¼{R
1
,R
2
,...,R
k
,R
k+t+1
,...,R
k+t+v
},
0tM2k,0vM2k2t. Similar to (4)–(7), the
probability of the decoding set Dcan be calculated as
Pr[D]=Pr min
z=1,...,k+t
Q
r
1
c
1,z

.
w
1max
w=k+t+1,...,M
Q
r
1
c
1,w

×Pr min
z=1,...,k,k+t+1,...,k+t+v
Q
r
1
c
2,z

.
w
2
max
w=k+1,...,k+t,k+t+v+1,...,M
Q
r
1
c
2,w

=
Mkt
z=0
(1)zCz
Mkt
V1Q
V1Q+(z+k+t)
l
1
r
1

×
Mkv
w=0
(1)wCw
Mkv
V2Q
V2Q+(w+k+v)
l
2
r
1

(10)
In addition, we can observe that there are Ck
Mpossible choices
for event |D|¼k. After this choice, there are Ct
Mkpossible
choices of relays which only successfully decode the packet
L
1
. Finally, there remains Cv
Mktpossible choices of relays
which only successfully decode the packet L
2
. Hence, the
probability Pr[|D|¼k] can be calculated as
Pr[|D|=k]=Ck
M
Mk
t=0
Mkt
v=0
Ct
MkCv
MktPr[D]
=Ck
M
Mk
t=0
Mkt
v=0
Ct
MkCv
Mkt
×
Mkt
z=0
(1)zCz
MktV1Q
V1Q+(z+k+t)
l
1
r
1

×
Mkt
w=0
(1)wCw
MktV2Q
V2Q+(w+k+v)
l
2
r
1

(11)
Next, similar to (1), the instantaneous received SNR at the
sources S
1
and S
2
because of the transmission of the relay
R
i
are, respectively, given as
x
1,i=IPR|h1,i|2
N0|h3,i|2=Q
c
1,i
c
3,i
and
x
2,i=IPR|h2,i|2
N0|h3,i|2=Q
c
2,i
c
3,i
(12)
As mentioned above, all the channels which are modelled by
flat and block fading channels, change after each time slot.
Therefore it is noted that the values of h
1,i
and h
2,i
in (1)
are different from those in (12). However, for ease of
presentation, we will not use an indicator of time in this paper.
Next, we consider two cases as follows: In the first case, no
relay can decode successfully both packets L
1
and L
2
, that is,
D¼{Ø},D
1
¼{R
k+1
,...,R
k+t
}D
2
¼{R
k+t+1
,...,R
k+t+v
}.
In this case, only one relay is selected to transmit the packet
L
1
(or L
2
) to the source S
1
(or S
2
). Hence, we propose a
relay selection strategy as follows
Rj:max
z=k+1,k+2,...,k+t;
w=k+t+1,...,k+t+v
(
x
1,w,
x
2,z) (13)
2752 IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759
&The Institution of Engineering and Technology 2012 doi: 10.1049/iet-com.2012.0235
www.ietdl.org
Equation (13) implies that the relay having the best channel
to its intended receiver (S
1
or S
2
) is chosen to forward the
successfully decoded packet in the third time slot. It is also
noted that the relay selection processes in this paper can be
executed in a distributed manner [16].
Now, setting Z2=maxz=k+1,k+2,...,k+t(
x
2,z) and T2=
maxw=k+t+1,...,k+t+v(
x
1,w), combining (12) and [5, Eq. (3)],
the CDFs FZ2(z) and FT2(t) can be derived as
FZ2(x)=Pr max
z=k+1,k+2,...,k+t(
x
2,z),x

=
l
2x
l
2x+
l
3Q

t
(14)
FT2(x)=Pr max
w=k+t+1,...,k+t+v(
x
1,w),x

=
l
1x
l
1x+
l
3Q

v
(15)
In addition, from (13), we can observe that the probability that
the source S
2
cannot receive the packet L
1
successfully can be
formulated as follows
pout
1=Pr[Z2,T2]+Pr Z2T2,1
3log2(1 +Z2),B

=Pr[Z2,T2]+Pr[T2Z2,
r
1]
(16)
In (16), the term Pr[Z
2
,T
2
] can be calculated as
Pr[Z2,T2]=+1
0
fT2(x)FZ2(x)dx(17)
where fT2(t) is the probability density function (PDF) of T
2
and is given as
fT2(x)=FT2(x)
x=v
l
v
1
l
3Qxv1
(
l
1x+
l
3Q)v+1(18)
Substituting (14) and (18) into (17), we have
Pr[Z2,T2]=+1
0
v
l
v
1
l
t
2
l
3Qxv+t1
(
l
1x+
l
3Q)v+1(
l
2x+
l
3Q)tdx(19)
From (19), we consider more two cases as follows:
Case 1: If
l
1
¼
l
2
¼
l
, (19) can be calculated as
Pr[Z2,T2]=+1
0
v
l
v+t
l
3Qxv+t1
(
l
x+
l
3Q)v+t+1dx
=v
l
3Q+1
l
3Q
(x
l
3Q)v+t1dx
xv+t+1
=v
l
3Q
v+t1
a=0
(1)aCa
v+t1(
l
3Q)a+1
l
3Q
dx
xa+2
=v
v+t1
a=0
(1)aCa
v+t1
a+1(20)
Case 2: If
l
1
=
l
2
, using Appendix 1, we obtain (see (21))
Next, we consider the probability Pr[T
2
Z
2
,
r
1
] in (16).
Similarly, we have
Pr[T2Z2,
r
1]=
r
1
0
fT2(x)dx
r
1
x
fZ2(y)dy
=FT2(
r
1)FZ2(
r
1)
r
1
0
fT2(x)FZ2(x)dx
(22)
Substituting (14), (15) and (18) into (22), we can obtain
Pr[T2Z2,
r
1]=
l
2
r
1
l
2
r
1+
l
3Q

t
l
1
r
1
l
1
r
1+
l
3Q

v
r
1
0
v
l
v
1
l
t
2
l
3Qxv+t1
(
l
1x+
l
3Q)v+1(
l
2x+
l
3Q)tdx
(23)
Similar to calculate Pr[Z
2
,T
2
], we consider two cases as
follows (see (24))
Case 1: If
l
1
¼
l
2
¼
l
, (23) can be calculated as
Pr[Z2,T2]=v
l
v
1
l
2
l
3Q
×
v1
a=0
v1a
b=0
(1)a+b
a+b+1Ca
v+t1Cb
v1a
(
l
2
l
1)b
l
va
1
l
a+b+1
2
l
3Q
+
v+t1
a=v
(1)aCa
v+t1(
l
3Q)a
v+1
b=2
mb
(b1)
l
1(
l
2
l
3Q)b1+
1+av
b=2
nb
(b1)(
l
3Q)b1+n1ln
l
2
l
1

(21)
Pr[T2Z2,
r
1]=
lr
1
lr
1+
l
3Q

v+t
r
1
0
v
l
v+t
l
3Qxv+t1
(
l
x+
l
3Q)v+t+1dx=
lr
1
lr
1+
l
3Q

v+t
v
v+t1
a=0
(1)aCa
v+t1
a+11
l
3Q
lr
1+
l
3Q

a+1
 (24)
IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759 2753
doi: 10.1049/iet-com.2012.0235 &The Institution of Engineering and Technology 2012
www.ietdl.org
Case 2: If
l
1
=
l
2
, similarly to (45), we can calculate (23) as
follows
Pr[T2Z2,
r
1]=
l
2
r
1
l
2
r
1+
l
3Q

t
l
1
r
1
l
1
r
1+
l
3Q

v
v
l
v
1
l
2
l
3Q
v1
a=0
(1)aCa
v+t1(
l
3Q)aI3
+
v+t1
a=v
(1)aCa
v+t1(
l
3Q)aI4
(25)
where integrals I
3
and I
4
can be calculated, similarly to
(46)–(49), as
I3=
l
2
r
1+
l
3Q
l
3Q
xv1adx
(
l
1x+
l
3Q(
l
2
l
1))v+1
=
v1a
b=0
(1)bCb
v1a
a+b+1
(
l
2
l
1)b
l
va
1
l
a+b+1
2(
l
3Q)a+1
1
l
3Q
l
1
r
1+
l
3Q

a+b+1

(26)
I4=
l
2
r
1+
l
3Q
l
3Q
dx
(
l
1x+
l
3Q(
l
2
l
1))v+1x1+av
=n1ln
l
2
r
1+
l
3Q
l
1
r
1+
l
3Q

+
v+1
b=2
mb
(b1)
l
1(
l
2
l
3Q)b11
l
3Q
l
1
r
1+
l
3Q

b1

+
1+av
b=2
nb
(b1)(
l
3Q)b11
l
3Q
l
2
r
1+
l
3Q

b1

(27)
Since we finish calculating the probabilities Pr[Z
2
,T
2
] and
Pr[T
2
Z
2
,
r
1
], from (11) and (16), the outage
probability at the source S
2
, in the case that there is no
relay which can decode both packets successfully, is given as
PPR1,1
S2=
M
t=0
Mt
v=0
Ct
MCv
Mt
Mt
z=0
(1)zCz
MtV1Q
V1Q+(z+t)
l
1
r
1

×
Mt
w=0
(1)wCw
MtV2Q
V2Q+(w+v)
l
2
r
1

pout
1
(28)
Next, we consider the outage probability at the source S
2
when |D|¼k.0. In this case, the best relay selection
strategy is chosen by the opportunistic strategy as [17]
Rj: min (
x
1,j,
x
2,j)=max
i=1,2,...,kmin (
x
1,i,
x
2,i) (29)
Let us denote W
i
¼min(
x
1,i
,
x
2,i
), then using (12), the CDF
FWi(x) is given as (see (30))
In (30), the probability Pr[
c
2,i
min(
c
1,i
,(x/Q)
c
3,i
)] can
be given as
Pr
c
2,imin
c
1,i,x
Q
c
3,i

=+1
0
f
c
2,i(t)Pr min
c
1,i,x
Q
c
3,i

t

dt
=+1
0
l
2exp (
l
2t) exp
l
1+Q
x
l
3

t

dt
=
l
2x
(
l
1+
l
2)x+
l
3Q
(31)
Also, we can easily calculate the probability Pr[
c
1,i
,
min(
c
2,i
,(x/Q)
c
3,i
)] in (30) as
Pr
c
1,i,min
c
2,i,x
Q
c
3,i

=
l
1x
(
l
1+
l
2)x+
l
3Q(32)
Substituting (31) and (32) into (30), we obtain
FWi(x)=(
l
1+
l
2)x
(
l
1+
l
2)x+
l
3Q(33)
Hence, if W
j
¼max(W
i
), the CDF FWj(x) is expressed as
FWj(x)=(
l
1+
l
2)x
(
l
1+
l
2)x+
l
3Q

k
(34)
Differentiating (33) and (34) with respect to x, the
corresponding PDFs fWi(x) and fWj(x) are, respectively,
obtained by (35) and (36) as follows
fWi(x)=FWi(x)
x=(
l
1+
l
2)
l
3Q
((
l
1+
l
2)x+
l
3Q)2(35)
fWj(x)=
FWj(x)
x=k(
l
1+
l
2)k
l
3Qxk1
((
l
1+
l
2)x+
l
3Q)k+1(36)
Since the achievable rate of the link between the chosen relay
R
j
and the source S
2
is (1/3)log
2
(1 +
x
2,j
), the outage
probability at the source S
2
can be formulated as
Pr 1
3log2(1 +
x
2,j),B

=Pr[
x
2,j,
r
1] (37)
Similar to [17, Eq. (16)], the probability Pr[
x
2,j
,
r
1
] can be
FWi(x)=Pr[min (
x
1,i,
x
2,i),x]=Pr
c
1,i
c
2,i,
c
2,i
c
3,i
,x
Q

+Pr
c
1,i,
c
2,i,
c
1,i
c
3,i
,x
Q

=Pr
c
2,imin
c
1,i,x
Q
c
3,i

+Pr
c
1,i,min
c
2,i,x
Q
c
3,i

(30)
2754 IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759
&The Institution of Engineering and Technology 2012 doi: 10.1049/iet-com.2012.0235
www.ietdl.org
formulated as
Pr[
x
2,j,
r
1]=+1
0
Pr[
x
2,i,
r
1, min(
x
1,i,
x
2,i),z]
z
fWj(z)
fWi(
r
1)dz
(38)
Using Appendix 2, we have (see (39))
Now, using (11), we obtain the outage probability at the
source S
2
when |D|¼k.0as
PPR1,2
S2=Ck
M
Mk
t=0
Mkt
v=0
Ct
MkCv
Mkt
×
Mkt
z=0
(1)zCz
MktV1Q
V1Q+(z+k+t)
l
1
r
1

×
Mkt
w=0
(1)wCw
MktV2Q
V2Q+(w+k+v)
l
2
r
1

Pr[
x
2,j,
r
1]
(40)
From (28) and (40), the average outage probability at the
source S
2
is calculated as PPR1
S2=PPR1,1
S2+PPR1,2
S2. It is noted
that the outage probability at the source S
1
is easily
obtained by replacing
l
1
with
l
2
and vice versa in the
expression of PPR1
S2.
For the PR0 protocol, it is also assumed that at the end of
the first time slot, the set of successful relay is
D1={R1,R2,...,Rk1
}. The strategy of the best relay
selection is expressed as follows:
Rb:
g
2,b=max
i=1,2,...,k1
Q
c
2,i
c
3,i
 (41)
Since the data transmission in the PR0 protocol is split into
four time slots, the achievable rates of the links S
1
R
i
and
R
b
S
2
are (1/4)log
2
(1 +Q(
c
1,i
/
w
1
)) and (1/4)log
2
(1 +
g
2,b
).
Therefore the outage probability at the source S
2
in each
case of the set D
1
is formulated as follows:
PPR0
S2=
D1
Pr[D1]Pr 1
4log2(1 +
g
2,b),B|D1

(42)
Combining (8) and Pr[(1/4) log2(1 +
g
2,b),B|D1]=
(((
l
2
r
0)/(
l
2
r
0+V2Q)))k1with
r
0
¼2
4B
21, we obtain the
average outage probability at the source S
2
as
PPR0
S2=
M
k1=0
Ck1
M
Mk1
v=0
(1)vCv
Mk1
V1Q
V1Q+(v+k1)
l
1
r
0
l
2
r
0
l
2
r
0+
l
3Q

k1
(43)
From (43), if we replace
l
1
with
l
2
and vice versa in the
expression of PPR0
S2, we can obtain the outage probability at
the source S
1
.
4 Simulation results
In this section, we describe the Monte-Carlo simulations
performed to evaluate and compare the performances of the
presented protocols above. Theoretical results were obtained
from the equations derived above. In all simulations, we
assume that a path-loss exponential
b
equal to 3.
In a two-dimensional plane, assume that the co-ordinates of
S
1
,S
2
,R
i
and PR are (0,0), (1,0), (x
1
, 0) and (x
2
,y
2
),
respectively, where 0 ,x
1
,x
2
,1. Therefore d
1
¼x
1
,
d2 ¼12d1, d3=
(x1x2)2+y2
2
,l1=
x2
2+y2
2
and
l2=
(1 x2)2+y2
2
.
In Fig. 2, we present the probability Pr[|D|¼k]asa
function of the value Qin dB. In this figure, the parameters
Fig. 2 Probability Pr[|D|¼k] as a function of Q in dB when
x
1
¼0.5, B ¼1, M ¼3x
2
¼0.5 and y
2
¼0.25
Pr[
x
2,j,
r
1]=k(
l
1+
l
2)k1
l
3Q
×
(
l
1+
l
2)
k1
m=0
(1)mCm
k1
(m+1)
1
(
l
1+
l
2)k1
l
3Q1
l
3Q
(
l
1+
l
2)
r
1+
l
3Q

m+1

l
1
2
l=1
a
l
l
k1
1
(1)klCkl
k1(
l
2
r
1+
l
3Q)klln (
l
1+
l
2)
r
1+
l
3Q
l
2
r
1+
l
3Q

+
k1
q=0
(1)qCq
k1
kql(
l
2
r
1+
l
3Q)q[((
l
1+
l
2)
r
1+
l
3Q)kql(
l
2
r
1+
l
3Q)kql]
l
1
k1
l=1
b
l
(
l
1+
l
2)k1
(1)klCkl
k1(
l
3Q)qln (
l
1+
l
2)
r
1+
l
3Q
l
3Q

+
k1
q=0
(1)qCq
k1
kql(
l
3Q)q[((
l
1+
l
2)
r
1+
l
3Q)kql(
l
3Q)kql]
(39)
IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759 2755
doi: 10.1049/iet-com.2012.0235 &The Institution of Engineering and Technology 2012
www.ietdl.org
are set as x
1
¼x
2
¼0.5, y
2
¼0.25, B¼1 and M¼3. We
can see from this figure that when k¼0, the probability
Pr[|D|¼0] decreases with increasing Q. In a contrary, the
probability Pr[|D|¼3] increases with increasing Q.In
addition, when k¼1 and k¼2, with increasing Q,the
probability Pr[|D|¼k] increases to the maximum value and
then decreases to zero.
Figs. 3 and 4present the outage probability as a function of
Qin dB. In Fig. 3, we also consider the symmetric network,
that is, x
1
¼x
2
¼0.5, in which the outage probabilities at the
sources S
1
and S
2
are same. Here, we fix Band y
2
as 1 and
0.25, respectively, while changing the value of M.Aswe
can see, the protocols obtain better performance when Mis
higher. This is because they obtain higher diversity gain
with the increasing of M.InFig. 4, we investigate the effect
of the target rate on the outage performance. In this
simulation, an asymmetric network is considered, that is,
x
1
¼0.4, x
2
¼0.5, y
2
¼0.25 and M¼3. It can be
observed from this figure that the outage probability at the
sources S
1
and S
2
decreases with the decreasing of the
target rate. In addition, for both protocols, the outage
probability at the source S
1
is lower than that at the source
S
2
. It is because of the fact that relays are nearer the source
S
1
than S
2
.
In Fig. 5, we present the sum outage probability of the PR0
and PR1 protocols as a function of the target rate. In this
figure, the symmetric network with x
1
¼0.5 is simulated. In
addition, we assume that the PR is placed at the position of
(0.2, 0.25) and the number of relays Mis 3. Similar to
Fig. 4, we can see that the sum outage probability increases
with increasing of target rate. In addition, at low value of B,
the performances of the PR0 and PR1 protocols are quite
similar but at high values of B, the proposed protocol
outperforms the PR0 protocol.
In Figs. 6 and 7, we investigate the effect of the distances
on the performances of the PR0 and PR1 protocols. In
Fig. 6, we set the parameters as follows: M¼3, B¼1 and
Q¼0 dB. We assume that the position of the PU is (0.5,
0.25). As we can see, the sum outage probability of both
protocols has a maximum value at x
1
¼0.5. This is because
Fig. 3 Outage probability at S
1
and S
2
as a function of Q in dB
when x
1
¼0.5, B ¼1, x
2
¼0.5 and y
2
¼0.25
Fig. 4 Outage probability at S
1
and S
2
as a function of Q in dB
when x
1
¼0.4, M ¼3, x
2
¼0.5 and y
2
¼0.25
Fig. 5 Sum outage probability as a function of the target rate B
when x
1
¼0.5, M ¼3, x
2
¼0.2 and y
2
¼0.25
Fig. 6 Sum outage probability as a function of the distance d
1
(x
1
)
when M ¼3, B ¼1, Q ¼0 dB, x
2
¼0.5 and y
2
¼0.25
Fig. 7 Sum outage probability as a function of the distance d
1
(x
1
)
when M ¼3, B ¼1, Q ¼0 dB, x
2
¼0.3 and y
2
¼0.25
2756 IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759
&The Institution of Engineering and Technology 2012 doi: 10.1049/iet-com.2012.0235
www.ietdl.org
at this position, the distance between relays and the PU is
nearest and hence, the power of relays is smaller because of
the maximum interference constraint. Therefore it can also
be observed that the sum outage probability decreases when
relays are near the source S
1
or the source S
2
.InFig. 7,we
change the position of PR, that is, x
2
¼0.3. In this figure,
the maximum value of the sum outage probability is
obtained at d
1
¼x
1
¼0.35 and the minimum one is at
d
1
¼x
1
¼1. Therefore we can see that the performance of
the protocols is better when the relays are further from the
PR. In addition, from Figs. 6 and 7, it can be observed that
the proposed protocol outperforms the PR1 protocol.
Finally, it can be observed from Figs. 27that the
simulation and theoretical results are in good agreement.
This validates the correction of the theoretical analyses.
5 Conclusions
In this paper, we proposed a network coded protocol for a
cognitive two-way relaying system under an interference
constraint. In the proposed protocol, the best relay is chosen
by using the opportunistic relay selection strategy and it
forwards the combined packet to two secondary sources. To
evaluate and compare the performance of the proposed
protocol with one that does not use network coding, we
derived the exact closed-form expressions of outage
probability. Then, various Monte-Carlo simulations were
presented to verify the mathematical expressions. The
results show that the simulation results match very well
with the theoretical results. In addition, the proposed
protocol PR1, which uses network coding, outperforms the
PR0 protocol without network coding, in terms of the sum
outage probability while using fewer time slots.
6 References
1 Mitola, J., Maguire, G.Q.: ‘Cognitive radios: making software radios
more personal’, IEEE Pers. Commun., 1999, 6, (4), pp. 13– 18
2 Zhao, Q., Sadler, B.M.: ‘A survey of dynamic spectrum access: signal
processing, networking, and regulatory policy’, IEEE Signal Process.
Mag., 2007, 4, (3), pp. 79–89
3 Haykin, S.: ‘Cognitive radio: brain-empowered wireless
communications’, IEEE J. Sel. Areas Commun., 2005, 23, (2),
pp. 201–220
4 Duan, Z.G.: ‘Performance enhancement with cooperation based
transmission in the cognitive radio networks’. ICIE’09, Taiyuan,
Shanxi, 2009, 1, pp. 359–362
5 Guo, Y., Kang, G., Zhang, N., Zhou, W., Zhang, P.: ‘Outage
performance of relay-assisted cognitive-radio system under spectrum-
sharing constraints’, Electron. Lett., 2010, 46, (2), pp. 182– 183
6 Duong, T.Q., Bao, V.N.Q., Zepernick, H.-J.: ‘Exact outage probability
of cognitive AF relaying with underlay spectrum sharing’, Electron.
Lett., 2012, 47, pp. 1 –2
7 Duong, T.Q., Bao, V.N.Q., Tran, H., Alexandroppoulos, G.C.,
Zepernick, H.-J.: ‘Effect of primary network on performance of
spectrum sharing AF relaying’, Electron. Lett., 2012, 48, pp. 1– 2
8 Zhong, C., Ratnarajah, T., Wong, K.-K.: ‘Outage analysis of decode-
and-forward cognitive dual-hop systems with the interference
constraint in nakagami-mfading channels’, IEEE Trans. Veh.
Technol., 2011, 60, (6), pp. 2875– 2879
9 Duong, T.Q., da Costa, D.B., Elkashlan, M., Bao, V.N.Q.: ‘Cognitive
amplify-and-forward relay networks over nakagami-m fading’, IEEE
Trans. Veh. Technol., 2012, 61, (5), pp. 2368– 2374
10 He, Y.Y., Dey, S.: ‘Throughput maximization in cognitive radio under
peak interference constraints with limited feedback’, IEEE Trans. Veh.
Technol., 2012, 61, (3), pp. 1287– 1305
11 Lee, J., Wang, H., Andrews, J.G., Hong, D.: ‘Outage probability of
cognitive relay networks with interference constraints’, IEEE Trans.
Wirel. Commun., 2011, 10, (2), pp. 390– 395
12 Li, D.: ‘Outage probability of cognitive radio networks with relay
selection’, IET Commun., 2011, 5, (18), pp. 2730– 2735
13 Xia, M., Ai
¨ssa, S.: ‘Cooperative AF relaying in spectrum-sharing
systems: performance analysis under average interference power
constraints and nakagami-m fading’, IEEE Trans. Commun., 2012, 60,
(6), pp. 1523– 1533
14 Laneman, J.N., Tse, D.N.C., Wornell, G.W.: ‘Cooperative diversity in
wireless networks: efficient protocols and outage behavior’, IEEE
Trans. Inf. Theory, 2004, 50, (12), pp. 3062– 3080
15 Laneman, J.N., Wornell, G.W.: ‘Distributed space-time-coded protocols
for exploiting cooperative diversity in wireless networks’, IEEE Trans.
Inf. Theory, 2003, 49, pp. 2415– 2425
16 Bletsas, A., Khisti, A., Reed, D.P., Lippman, A.: ‘A simple cooperative
diversity method based on network path selection’, IEEE J. Sel. Areas
Commun., 2006, 24, pp. 659– 672
17 Tourki, K., Yang, H.-C., Alouini, M.-S.: ‘Accurate outage analysis of
incremental decode-and-forward opportunistic relaying’, IEEE Trans.
Wirel. Commun., 2011, 10, pp. 1021– 1025
18 Suraweera, H.A., Michalopoulos, D.S., Karagiannidis, G.K.: ‘Semi-
blind Amplify-and-forward with partial relay selection’, Electron. Lett,
2009, 45, pp. 1– 2
19 Li, Y., Louie, R., Vucetic, B.: ‘Relay selection with network coding in
two-way relay channels’, IEEE Trans. Veh. Technol., 2010, 59, (9),
pp. 4489– 4499
20 Song, L.: ‘Relay selection for two-way relaying with amplify-and-
forward protocols’, IEEE Trans. Veh. Technol., 2011, 60, (4),
pp. 1954– 1959
21 Zhou, M., Cui, Q., J
¨antti, R., Tao, X.: ‘Energy-efficient relay selection
and power allocation for two-way relay channel with analog network
coding’, IEEE Commun. Lett., 2012, 16, (6), pp. 816–819
22 Si, J., Li, Z., Chen, X., Hao, B., Liu, Z.: ‘On the performance of
cognitive relay networks under primary user’s outage constraint’,
IEEE Commun. Lett., 2011, 15, (4), pp. 422– 424
7 Appendix 1
7.1 Derivation of (21)
From (19), we have
Pr[Z2,T2]=v
l
v
1
l
2
l
3Q+1
l
3Q
(x
l
3Q)v+t1
xt(
l
1x+
l
3Q(
l
2
l
1))v+1dx
=v
l
v
1
l
2
l
3Q
v+t1
a=0
(1)aCa
v+t1(
l
3Q)a
×+1
l
3Q
xv1adx
(
l
1x+
l
3Q(
l
2
l
1))v+1
(44)
In addition, we can rewrite (44) in the following form (see (45))
To calculate the probability Pr[Z2 ,T2] in (45), we have
to calculate the integrals I
1
and I
2
. First, considering the
Pr[Z2,T2]=v
l
v
1
l
2
l
3Q×
v1
a=0
(1)aCa
v+t1(
l
3Q)a+1
l
3Q
xv1adx
(
l
1x+
l
3Q(
l
2
l
1))v+1
 !
I1
+
v+t1
a=v
(1)aCa
v+t1(
l
3Q)a+1
l
3Q
dx
(
l
1x+
l
3Q(
l
2
l
1))v+1x1+av
 !
I2
(45)
IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759 2757
doi: 10.1049/iet-com.2012.0235 &The Institution of Engineering and Technology 2012
www.ietdl.org
integral I
1
, we have
I1=+1
l
2
l
3Q
(x
l
3Q(
l
2
l
1))v1adx
l
va
1xv+1
=
v1a
b=0
(1)bCb
v1a
a+b+1
(
l
2
l
1)b
l
va
1
l
a+b+1
2(
l
3Q)a+1
(46)
Now, considering the integral I
2
; we first rewrite the integrand
of I
2
into the partial expansion as follows
1
(
l
1x+
l
3Q(
l
2
l
1))v+1x1+av
=
v+1
b=1
mb
(
l
1x+
l
3Q(
l
2
l
1))b+
1+av
b=1
nb
xb
(47)
where
mb=(1)a+1v
(v+1b)!"v+1b
c=1(av+c)
l
a+1v
1
[
l
3Q(
l
2
l
1)]a+2b,nb
=(1)abv+1"abv+1
c=1(v+c)
l
abv+1
1
(abv+1)![
l
3Q(
l
2
l
1)]a+2b
(48)
Using (47) and (48), we can calculate the integral I
2
as
I2=+1
l
3Q
dx
(
l
1x+
l
3Q(
l
2
l
1))v+1x1+av
=+1
l
3Q
m1dx
l
1x+
l
3Q(
l
2
l
1)++1
l
3Q
n1dx
x
+
v+1
b=2+1
l
3Q
mb
(
l
1x+
l
3Q(
l
2
l
1))b+
1+av
b=2+1
l
3Q
nb
xbdx
=
v+1
b=2
mb
(b1)
l
1(
l
2
l
3Q)b1+
1+av
b=2
nb
(b1)(
l
3Q)b1
+n1ln
l
2
l
1
 (49)
Now, substituting (46) and (49) into (45), we can obtain
Pr[Z2 ,T2] in the case that
l
1=
l
2 as presented in (21).
8 Appendix 2
8.1 Derivation of (39)
Substituting (35) and (36) into (38), we have
Pr[
x
2,j,
r
1]=k(
l
1+
l
2)k1
+1
0
Pr[
x
2,i,
r
1, min (
x
1,i,
x
2,i),z]
z
zk1dz
((
l
1+
l
2)z+
l
3Q)k1
(50)
Next, we can rewrite the term Pr[
x
2
,i ,
r
1, min(
x
1
,i,
x
2
,i) ,z] in (50) as
Pr[
x
2,i,
r
1, min (
x
1,i,
x
2,i),z]
=Pr Q
c
2,i
c
3,i
,
r
1,min Q
c
1,i
c
3,i
,Q
c
2,i
c
3,i

,z

=Pr
c
3,i.max Q
r
1
c
2,i,Q
z
c
1,i

,
c
1,i,
c
2,i

 !
J1
+Pr
c
3,i.max Q
r
1
c
2,i,Q
z
c
2,i

,
c
1,i
c
2,i

 !
J2
(51)
Considering the probability J
1
in (51), it can be formulated as
(see (52))
Now, to calculate the probability J
3
, we consider two more
cases as follows:
Case 1: if z
r
1, we can obtain J
3
by
J3=t
r
1
Q
0
l
2exp(
l
2v)dvv
0
l
1exp(
l
1w)dw
=
l
1
l
1+
l
2
exp
l
2
t
r
1
Q

+
l
2
l
1+
l
2
exp (
l
1+
l
2)t
r
1
Q

(53)
Substituting (53) into (52), we obtain
J1=
l
1
l
1+
l
2
l
3Q
l
2
r
1+
l
3Q
+
l
2
l
1+
l
2
l
3Q
(
l
1+
l
2)
r
1+
l
3Q(54)
Case 2: If z ,
r
1, we calculate the probability J
3
as
J3=zt/Q
0
l
1exp (
l
1v)dvt
r
1/Q
v
l
2exp (
l
2w)dw
=
l
2
l
1+
l
2
+exp (
l
1z+
l
2
r
1)t
Q

exp
l
2
t
r
1
Q

l
1
l
1+
l
2
exp (
l
1+
l
2)t
r
1
Q
 (55)
Therefore substituting (55) into (52), we have
J1=
l
1
l
1+
l
2
l
3Q
l
2
r
1+
l
3Q+
l
3Q
l
1z+
l
2
r
1+
l
3Q
l
1
l
1+
l
2
l
3Q
(
l
1+
l
2)z+
l
3Q
(56)
J1=+1
0
l
3exp (
l
3t)Pr max Q
r
1
c
2,i,Q
z
c
1,i

,t,
c
1,i,
c
2,i

 !
J3
dt(52)
2758 IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759
&The Institution of Engineering and Technology 2012 doi: 10.1049/iet-com.2012.0235
www.ietdl.org
Similarly, the probability J
2
can be calculated as follows
J2=
l
2
r
1
(
l
1+
l
2)
r
1+
l
3Qif z
r
1
l
2z
(
l
1+
l
2)z+
l
3Qif z,
r
1
(57)
Substituting (56) and (57) into (51), we obtain the probability
Pr[
c
2
,i ,x, min(
c
1
,i,
c
2
,i) ,z]. Next, differentiating
Pr[
c
2
,i ,x, min(
c
1
,i,
c
2
,i) ,z] with respect to zand then
substituting the obtained result into (50), we obtain (see (58))
In (58), the integral J
4
can be calculated as
J4=1
(
l
1+
l
2)k1(
l
1+
l
2)
r
1+
l
3Q
l
3Q
(z
l
3Q)k1dz
zk+1
=
k1
m=0
(1)mCm
k1(
l
3Q)m
(
l
1+
l
2)k1(
l
1+
l
2)
r
1+
l
3Q
l
3Q
dz
zm+2
=
k1
m=0
(1)mCm
k1
(m+1)
1
(
l
1+
l
2)k1
l
3Q
1
l
3Q
(
l
1+
l
2)
r
1+
l
3Q

m+1

(59)
Next, we calculate the integral J
5
in (58). Also, we first
rewrite the integrand of J
5
into the partial expansion as
follows
1
(
l
1z+
l
2
r
1+
l
3Q)2((
l
1+
l
2)z+
l
3Q)k1
=
a
1
(
l
1z+
l
2
r
1+
l
3Q)+
a
2
(
l
1z+
l
2
r
1+
l
3Q)2
+
k1
l=1
b
l
((
l
1+
l
2)z+
l
3Q)l
(60)
where
a
1=(1)k1(k1)(
l
1+
l
2)
l
k1
1
l
k
2(
l
3Q+(
l
1+
l
2)
r
1)k
a
2=(1)k1
l
k1
1
l
k1
2(
l
3Q+(
l
1+
l
2)
r
1)k1
and
b
l=(1)kl1(kl)(
l
1+
l
2)2
l
kl1
1
l
kl+1
2(
l
3Q+(
l
1+
l
2)
r
1)kl+1
Hence, the integral J
5
can be rewritten as (see (61))
From (61), after some manipulation, we obtain J
5
as
(see (62))
Substituting (59) and (62) into (58), the outage probability
Pr[
x
2
,j ,
r
1] can be given as in (39).
Pr[
x
2,j,
r
1]=k(
l
1+
l
2)k1
l
3Q
×(
l
1+
l
2)
r
1
0
zk1dz
((
l
1+
l
2)z+
l
3Q)k+1
 !
J4
l
1
r
1
0
zk1dz
(
l
1z+
l
2
r
1+
l
3Q)2((
l
1+
l
2)z+
l
3Q)k1
 !
J5
(58)
J5=
2
l=1
a
lx
0
zk1dz
(
l
1z+
l
2
r
1+
l
3Q)l+
k1
l=1
b
lx
0
zk1dz
((
l
1+
l
2)z+
l
3Q)l=
2
l=1
a
l
l
k1
1(
l
1+
l
2)
r
1+
l
3Q
l
1z+
l
3Q
(z
l
2
r
1
l
3Q)k1dz
zl
+
k1
l=1
b
l
(
l
1+
l
2)k1(
l
1+
l
2)
r
1+
l
3Q
l
3Q
(z
l
3Q)k1
zldz=
2
l=1
a
l
l
k1
1
k1
q=0
(1)qCq
k1(
l
2
r
1+
l
3Q)q(
l
1+
l
2)
r
1+
l
3Q
l
2
r
1+
l
3Q
zk1qldz
+
k1
l=1
b
l
(
l
1+
l
2)k1
k1
q=0
(1)qCq
k1(
l
3Q)q(
l
1+
l
2)
r
1+
l
3Q
l
3Q
zk1qldz
(61)
J5=
2
l=1
a
l
l
k1
1
(1)klCkl
k1(
l
2
r
1+
l
3Q)klln (
l
1+
l
2)
r
1+
l
3Q
l
2
r
1+
l
3Q

+
k1
q=0
(1)qCq
k1
kql(
l
2
r
1+
l
3Q)q[((
l
1+
l
2)
r
1+
l
3Q)kql(
l
2
r
1+
l
3Q)kql]
+
k1
l=1
b
l
(
l
1+
l
2)k1
(1)klCkl
k1(
l
3Q)qln (
l
1+
l
2)
r
1+
l
3Q
l
3Q

+
k1
q=0
(1)qCq
k1
kql(
l
3Q)q[((
l
1+
l
2)
r
1+
l
3Q)kql(
l
3Q)kql]
(62)
IET Commun., 2012, Vol. 6, Iss. 16, pp. 2750–2759 2759
doi: 10.1049/iet-com.2012.0235 &The Institution of Engineering and Technology 2012
www.ietdl.org
... Chuyển tiếp hai chiều (BR: Bidirectional Relaying) [1] thường được áp dụng trong mạng chuyển tiếp, trong đó, hai nút có dữ liệu muốn truyền đến nhau thông qua sự hỗ trợ của các nút trung gian. Mạng BR thông thường sẽ sử dụng 04 pha truyền [2], trong đó mỗi 02 pha được dùng để gửi dữ liệu giữa hai nguồn. Mô hình BR 04 pha đạt được thông lượng 02/04, tức truyền được 02 dữ liệu trên 04 pha truyền. ...
... Do đó, R sẽ chuyển tiếp 2 x đến 1 S trong pha 3, và dung lượng kênh đạt được là: x đến cả 1 ...
... x và 2 x , và các dung lượng kênh được thiết lập như sau: ...
Conference Paper
Full-text available
Bài báo này đánh giá hiệu năng dừng cho các mạng chuyển tiếp hai chiều sử dụng mã Rateless (Rateless Codes). Trong mô hình nghiên cứu, hai nút nguồn gửi các gói mã hóa cho nhau, với sự hỗ trợ của 01 nút chuyển tiếp trung gian. Chúng tôi nghiên cứu hai kỹ thuật phổ biến trong truyền thông hai chiều đó là chuyển tiếp 03 pha dùng mã hóa mạng số và chuyển tiếp 04 pha. Hiệu năng dừng của các mô hình được đánh giá bằng phân tích toán học và mô phỏng kiểm chứng. Chúng tôi cũng nghiên cứu bài toán phân bổ công suất cho các nút nguồn và nút chuyển tiếp. Những kết quả đạt được cho thấy rằng mô hình 03 pha đạt được hiệu năng dừng thấp hơn mô hình 04 pha tương ứng.
... Investigations on performance of underlay two-way relaying systems have been considered in [7][8][9][10][11]. System performance of secondary two-way networks under an interference constraint of a primary receiver was improved by combining digital network coding and opportunity relay selection in which a selected secondary relay created a new data by XOR operation after decoding received data successfully [7]. ...
... Investigations on performance of underlay two-way relaying systems have been considered in [7][8][9][10][11]. System performance of secondary two-way networks under an interference constraint of a primary receiver was improved by combining digital network coding and opportunity relay selection in which a selected secondary relay created a new data by XOR operation after decoding received data successfully [7]. Effects of multiple primary receivers have been investigated in [8,9]. ...
... al in [11] exploited direct links to build adaptive protocols under average interference constraints. The transmit powers of the secondary sources and the secondary relays were set independently to maximum of achievable thresholds [7,10,11] or minimum of internal powers and mutual interference constraints [8,9]. In addition, most of these investigations have been proposed on three-phase solutions, and therefore the bandwidth utilization is divided by three times. ...
Article
In this paper, we analyze an underlay two-way decode-and-forward scheme in which secondary relays use successive interference cancellation (SIC) technology to decode data of two secondary sources sequentially, and then generate a coded signal by superposition coding (SC) technology, denoted as SIC-SC protocol. The SIC-SC protocol is designed to operate in two time slots under effects from an interference constraint of a primary receiver and residual interference of imperfect SIC processes. Transmit powers provided to carry the data are allocated dynamically according to channel powers of interference and transmission, and a secondary relay is selected from considering strongest channel gain subject to increase in decoding capacity of the first data and decrease in collection time of channel state information. Closed-form outage probability expressions are derived from mathematical manipulations and verified by performing Monte Carlo simulations. An identical scheme of underlay two-way decodeand-forward relaying with random relay selection and fixed power allocations is considered to compare with the proposed SIC-SC protocol, denoted as RRS protocol. Simulation and analysis results show that the non-identical outage performances of the secondary sources in the proposed SIC-SC protocol are improved by increasing the number of the secondary relays and the interference constraint as well as decreasing the residual interference powers. Secondly, the performance of the nearer secondary source is worse than that of the farther secondary source. In addition, the proposed SIC-SC protocol outperforms the RRS comparison protocol, and effect of power allocations through channel powers is discovered. Finally, derived theory values are precise to simulation results. Keywords: Successive interference cancellation, superposition coding, power allocation, underlay cognitive radio, non-orthogonal multiple access, outage probability. References [1] Popovski, H. Yomo, Physical Network Coding in Two-Way Wireless Relay Channels, presented at 2007 IEEE International Conference on Communications (ICC), Glasgow, 2007, pp. 707-712. https://doi.org/10.1109/ICC.2007.121. [2] Cao, X. Ji, J. Wang, S. Zhang, Y. Ji, J. Wang, Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks, IEEE Transactions on Wireless Communications 18(12) (2019) 6030-6042. https://doi.org/10.1109/ TWC.2019.2941944. [3] Mitola, G.Q. Maguire, Cognitive radio: making software radios more personal, IEEE Personal Communications 6(4) (1999) 13-18. https://doi. org /10.1109/98.788210. [4] M.C. Chu, H. Zepernick, Performance Optimization for Hybrid Two-Way Cognitive Cooperative Radio Networks With Imperfect Spectrum Sensing, IEEE Access 6 (2018) 70582-70596. https://doi.org/10.1109/ICC.2007.121. [5] Ho-Van, T. Do-Dac, Security Analysis for Underlay Cognitive Network with Energy-Scavenging Capable Relay over Nakagami-m Fading Channels, Wireless Communications and Mobile Computing 2019 1-16. https://doi.org/ 10.1155/2019/5080952. [6] Zhang, Z. Zhang, J. Xing, R. Yu, P. Zhang, W.Wang, Exact Outage Analysis in Cognitive Two-WayRelay Networks With Opportunistic Relay SelectionUnder Primary User’s Interference, IEEE Transactionson Vehicular Technology 64(6) (2015) 2502-2511. https://doi.org/10.1109/2014.2346615. [7] T. Duy, H.Y. Kong, Exact outage probability of cognitive two-way relaying scheme with opportunistic relay selection under interference constraint, IET Communications 6(16) (2012), 2750-2759. https://doi.org/ 10.1049/iet-com. 2012.0235. [8] V. Toan, V.N.Q. Bao, Opportunistic relaying for cognitive two-way network with multiple primary receivers over Nakagami-m fading, presented at 2016 International Conference on Advanced Technologies for Communications (ATC), Hanoi city, 2016, pp.141-146. https://doi.org/1109/ATC.2016.7764762. [9] V. Toan, V.N.Q. Bao, H. Nguyen-Le, Cognitive two-way relay systems with multiple primary receivers: exact and asymptotic outage formulation, IET Communications 11(16) (2017) 2490-2497. https://doi.org/10.1049/iet-com.2017. 0400. [10] V.Toan, V.N.Q. Bao, K.N. Le,Performance analysis of cognitive underlay two-wayrelay networks with interference and imperfect channelstate information, EURASIP Journal on WirelessCommunications and Networking 2018 53 (2018).https://doi.org/10.1186/s13638-018-1063-z. [11] Solanki, P.K. Sharma, P.K. Upadhyay,Adaptive Link Utilization in Two-Way SpectrumSharing Relay Systems Under Average Interference Constraints, IEEE Systems Journal 12(4) (2018) 3461-3472. https://doi.org/10.1109/ JSYST.2017.2713887. [12] Yue, Y. Liu, S. Kang, A. Nallanathan, Y. Chen, Modeling and Analysis of Two-WayRelay Non-Orthogonal Multiple Access Systems, IEEETransactions on Communications 66(9) (2018) 3784-3796. https://doi.org/10.1109/TCOMM. 2018.2816063. [13] Zou, B. He, H. Jafarkhani, An Analysis of TwoUser Uplink Asynchronous Non-orthogonal MultipleAccess Systems, IEEE Transactions on WirelessCommunications 18(2) (2019) 1404-1418. https://doi.org/10.1109/TWC.2019.2892486. [14] Yang, Z. Ding, P. Fan, N. Al-Dhahir, TheImpact of Power Allocation on Cooperative Nonorthogonal Multiple Access Networks With SWIPT,IEEE Transactions on Wireless Communications 16(7) (2017) 4332-4343. https://doi.org/10.1109/TWC.2017.2697380. [15] N. Son, T.T. Duy, K. Ho-Van, SIC-Coding Schemes for Underlay Two-Way Relaying Cognitive Networks, Wireless Communications and Mobile Computing 2020, pp.1-24. https://doi.org/ 10.1155/2020/8860551. [16] F. Kader, M.B. Shahab, S.Y. Shin, ExploitingNon-Orthogonal Multiple Access in Cooperative RelaySharing, IEEE Communications Letters 21(5) (2017) 1159-1162. https://doi.org/1109/LCOMM.2017.2653777. [17] Yue, Y. Liu, S. Kang, A. Nallanathan, Z. Ding,Spatially Random Relay Selection for Full/Half-DuplexCooperative NOMA Networks, IEEE Transactions onCommunications 66(8) (2018) 3294-3308. https://doi.org/10.1109/TCOMM. 2018.2809740. [18] Liu, Z. Ding, M. Elkashlan, J. Yuan,Nonorthogonal Multiple Access in Large-Scale UnderlayCognitive Radio Networks, IEEE Transactions onVehicular Technology 65(12) (2016)10152-10157. https://doi.org/10.1109/ TVT.2016.2524694. [19] Song, W. Yang, Z. Xiang, N. Sha, H. Wang, Y.Yang, An Analysis on Secure Millimeter Wave NOMACommunications in Cognitive Radio Networks, IEEE Access 8 (2020), 78965-78978. https://doi.org/10.1109/ACCESS.2020.2989860. [20] Ding, T. Song, Y. Zou, X. Chen, L. Hanzo,Security-Reliability Tradeoff Analysis of Artificial NoiseAided Two-Way Opportunistic Relay Selection, IEEE Transactions on Vehicular Technology 66(5) (2017) 3930-3941. https://doi.org/10.1109/TVT.2016.2601112. [21] Zheng, M. Wen, F. Chen, J. Tang, F. Ji, SecureNOMA Based Full-Duplex Two-Way Relay Networkswith Artificial Noise against Eavesdropping, presented at 2018IEEE International Conference on Communications(ICC), Kansas City, 2018,pp.1-6. https://doi.org/ 10.1109/ICC.2018.8422946. [22] N. Son,H.Y. Kong, Exact Outage Analysisof Energy Harvesting Underlay Cooperative CognitiveNetworks, IEICE Transactions on Communications E98-B(4) (2015),pp.661-672. https://doi.org/10.1587/transcom.E98.B.661. [23] Tourki, K.A. Qaraqe, M. Alouini, OutageAnalysis for Underlay Cognitive Networks UsingIncremental Regenerative Relaying, IEEE Transactions on Vehicular Technology 62(2) (2013) 721-734. https://doi.org/10.1109/TVT. 2012.2222947. [24] Papoulis, S.U. Pillai, Probability, randomvariables and stochastic processes, 4th ed., McGrawHill, New York, 2002. [25] Pei, T. Zhifeng, L. Zinan, E. Erkip, S.Panwar, Cooperative wireless communications: a cross-layer approach, IEEE Wireless Communications 13(4) (2006) 84-92. https://doi.org/10.1109/2006.1678169. [26] Ghasemi, E.S. Sousa, Fundamental limitsof spectrum-sharing in fading environments, IEEETransactions on Wireless Communications 6(2) (2007) 649-658. https://doi.org/10.1109/TWC. 2007.05447. [27] M. Peha, Approaches to spectrum sharing, IEEECommunications Magazine 43(2) (2005) 10-12. https://doi.org/10.1109/MCOM.2005. 1391490. [28] Kim, S. Lim, H. Wang, D. Hong, Optimal PowerAllocation and Outage Analysis for Cognitive FullDuplex Relay Systems, IEEE Transactions on Wireless Communications 11(10) (2012) 3754-3765. https://doi.org/10.1109/TWC. 2012.083112.120127. [29] N. Son,T.T. Duy, Performance analysisof underlay cooperative cognitive full-duplexnetworks with energy-harvesting relay, ComputerCommunications 122 (2018) 9-19. https://doi.org/1016/j.comcom.2018.03.003. [30] V. Nguyen, T. Do, V.N.Q. Bao, D.B.d.Costa, B. An, On the Performance of MultihopCognitive Wireless Powered D2D Communications inWSNs, IEEE Transactions on Vehicular Technology 69(3) (2020) 2684-2699. https://doi.org/10.1109/TVT.2020.2963841. [31] Ruan, Y. Li, C. Wang, R. Zhang, H.Zhang, Energy Efficient Power Allocation for DelayConstrained Cognitive Satellite Terrestrial NetworksUnder Interference Constraints, IEEE Transactions on Wireless Communications 18(10) (2019) 4957-4969. https://doi.org/10.1109/TWC. 2019.2931321. [32] Gao, S. Zhang, Y. Su, M. Diao, M. Jo, Joint Multiple Relay Selection and Time Slot Allocation Algorithm for the EH-Abled Cognitive Multi-User Relay Networks, IEEE Access 7 (2019) 111993- 112007. https://doi.org/10.1109/2019.2932955. [33] Arezumand, H. Zamiri-Jafarian, E. Soleimani-Nasab, Exact and Asymptotic Analysis of Partial Relay Selection for Cognitive RF-FSO Systems With Non-Zero Boresight Pointing Errors, IEEE Access 7 (2019) 58611-58625. https://doi.org/1109/ACCESS.2019.2914480. [34] N. Son, H.Y. Kong, Energy-Harvesting Relay Selection Schemes for Decode-and-Forward Dual-Hop Networks, IEICE TRANSACTIONS on Communications E98-B(12) (2015) 2485-2495. https://doi.org/10.1587/transcom.E98.B.2485. [35] N. Nguyen, T.H. Quang Minh, P.T. Tran, M. Voznak, T.T. Duy, T.-L. Nguyen, P.T. Tin, Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods, Ad Hoc Networks 84 (2019) 178-187. https://doi.org/10.1016/j.adhoc.2018.10.005. [36] Pan, Z. Li, Z. Wang, F. Zhang, Joint Relay Selection and Power Allocation for the Physical Layer Security of Two-Way Cooperative Relaying Networks, Wireless Communications and Mobile Computing, 2019, pp. 1-7. https://doi.org/10.1155/2019/1839256. [37] A. Nasir, Z. Xiangyun, S. Durrani, R.A. Kennedy, Relaying Protocols for Wireless Energy Harvesting and Information Processing, IEEE Transactions on Wireless Communications 12(7) (2013) 3622-3636. https://doi.org/10.1109/TWC. 2013.062413.122042. [38] I. Gradshteyn, I.M. Ryzhik, A.Jeffrey, D. Zwillinger, Table of integral, series and products, 7th ed., Elsevier, Amsterdam, 2007. [39] Haiyan, L. Zan, S. Jiangbo, G. Lei, Underlay cognitive relay networks with imperfect channel state information and multiple primary receivers, IET Communications 9(4) (2015) 460-467. https://doi.org/10.1049/iet-com.2014.0429. [40] Zhong, Z. Zhang, Opportunistic Two-Way Full-Duplex Relay Selection in Underlay Cognitive Networks, IEEE Systems Journal 12(1) (2018) 725-734.https://doi.org/10.1109/JSYST. 2016.2514601.
... In contrast to [27][28][29][30][31], in this paper, ICT is used to reduce one transmission time slot for the DNC TWR networks. Unlike [33][34][35], our proposed scheme applies PRS to the secondary network. ...
... Moreover, this paper considers block fading channels, in which channel coefficients do not change during one data transmission cycle, but independently change after each cycle. Although the published works [27,36,37] were concerned with TWR in the underlay CRNs, these references did not study ICT. Moreover, Ref. [36] studied the two-phase TWR model exploiting a direct link between the sources, while Ref. [37] considered a single-relay model operating on the RF-EH environment. ...
... From Figure 2, we can observe that the simulation results validate the theoretical ones of OP P1 , OP P2 , and OP P0 derived in Section 3. Now, we consider an optimization problem for the primary OP performance, where the total number of transmit and receive antennas is fixed by N T + N R = N tot , and N tot is a constant. From (24), (25), and (27), OP P1 , OP P2 , and OP P0 obtain the lowest value when ...
Article
Full-text available
In this paper, we propose a two-way relaying scheme using digital network coding in an underlay cognitive radio network. In the proposed scheme, the transmit antenna selection and selection techniques are combined using a primary transmitter and a primary receiver, respectively. In the secondary network, two source nodes that cannot directly communicate attempt to exchange their data with each other. As a result, the relaying technique using partial relay selection is applied to assist the data exchange. Particularly, at the first time slot, the selected secondary relay applies an interference cancellation technique to decode the data received from the secondary sources. Then, the selected relay uses digital network coding to send XOR-ed data to the sources at the second time slot. We first derive the outage probability of the primary network over block the Rayleigh fading channel. Then, the transmit power of the secondary transmitters including the source and relay nodes are calculated to guarantee the quality of service of the primary network. Finally, the exact closed-form formulas of the outage probability of the secondary sources over the block Rayleigh fading channel are derived, and then verified by computer simulations using the Monte Carlo method.
... For the sake of better spectral efficiency and considerable diversity gain, cooperative relays are always been exploited in CRN. Furthermore, as an efficient cooperation strategy, twoway relaying is widely investigated for promoting the channel capacity and spectral efficiency [15][16][17][18]. In [16], an accurate result of outage probability of a DF-based underlay cognitive two-way relaying system is derived. ...
... Furthermore, as an efficient cooperation strategy, twoway relaying is widely investigated for promoting the channel capacity and spectral efficiency [15][16][17][18]. In [16], an accurate result of outage probability of a DF-based underlay cognitive two-way relaying system is derived. In addition, the max-min (MM) opportunistic relay selection strategy is used in the article to combat the channel fading. ...
... In addition, the max-min (MM) opportunistic relay selection strategy is used in the article to combat the channel fading. Based on [16], the authors considered the interference from the primary transmitter (PT) to SUs and also analysed outage performance of the DF-based underlay cognitive two-way relaying system in [17]. Besides, the performance of an underlay cognitive network is analysed in [18] by utilising the MM opportunistic selection and two-way full-duplex (FD)-based AF relays. ...
Article
Full-text available
Abstract The authors investigate an overlay cognitive two‐way relaying system where max‐min (MM) relay selection scheme is employed for improving the reliability of the considered system. Furthermore, they design the process of the data forwarding and relay selection in the overlay cognitive two‐way relaying system. Based on the MM relay selection criterion, the exact close‐form expression of outage probability is derived. From numerical simulations, it is observed that there is an outage probability floor appearing in the high signal‐to‐noise ratio (SNR) region, and the reason for its occurrence is stated. Besides, the approximate result of outage probability in high SNR is provided, which shows that the ratio of interference channel' transmit power and main channel' transmit power will not affect the outage probability in low SNR region, but it will significantly affect it in the high SNR region. Although each individual channel state information (CSI) will not be able to control the outage performance of this considered system in the high SNR region, the ratio of each channel's CSI will be able to do the same.
... However, the sources in ANC have to perform interference cancellation (IC) before decoding the desired data. In [14]- [16], the authors proposed two-way relaying protocols in the UCR networks. In [14], an opportunistic relay selection at the third phase is studied to decrease the OP performance for underlay DNC networks. ...
... In [14]- [16], the authors proposed two-way relaying protocols in the UCR networks. In [14], an opportunistic relay selection at the third phase is studied to decrease the OP performance for underlay DNC networks. The authors of [15] analyzed OP and symbol error rate (SER) for various DNC based secondary two-way networks over Nakagami-m fading channels. ...
... • As mentioned above, we propose the IC-based two-way relaying protocol in the UCR networks to obtain higher data rate for the secondary network. Moreover, different with [14]- [16], the proposed protocol considers a primary multiple input multiple output (MIMO) network employing transmit antenna selection (TAS) and selection combining (SC) techniques [17]. • Different with our previous work [18], we consider the UCR environment, and propose an efficient transmit power allocation strategy for the secondary nodes to guarantee QoS of the primary network as well as to improve the OP performance for the secondary network, under joint impact of the interference constraint and cochannel interference from the primary transmitter. ...
... Proposals for increasing performance in the underlay two-way relaying networks have been studied in [12][13][14][15][16][17][18]. The authors in [12] combined DNC and opportunistic relay selection (ORS) to decrease the outage performance of the secondary two-way relaying network under the interference constraint required by the primary receiver. ...
... Proposals for increasing performance in the underlay two-way relaying networks have been studied in [12][13][14][15][16][17][18]. The authors in [12] combined DNC and opportunistic relay selection (ORS) to decrease the outage performance of the secondary two-way relaying network under the interference constraint required by the primary receiver. Moreover, the best relay selection strategy in the third time slot, which follows a max-min criterion, was proposed in [12] to significantly decrease the system outage probabilities, as compared with the traditional DNC approach [12]. ...
... The authors in [12] combined DNC and opportunistic relay selection (ORS) to decrease the outage performance of the secondary two-way relaying network under the interference constraint required by the primary receiver. Moreover, the best relay selection strategy in the third time slot, which follows a max-min criterion, was proposed in [12] to significantly decrease the system outage probabilities, as compared with the traditional DNC approach [12]. By expanding the published work [12], Toan et al. in [13,14] analyzed the performance of the underlay two-way relaying communication systems with the presence of multiple primary receivers. ...
Article
Full-text available
In this paper, we propose an underlay two-way relaying scheme with the successive interference cancellation (SIC) solution in which two secondary sources transmit simultaneously their data to each other through secondary relays. The proposed scheme is operated in only two time slots and under an interference constraint of a primary receiver, denoted as the UTW-2TS scheme. In the UTW-2TS scheme, the secondary relays employ the SIC operation to decode successively the data from received broadcast signals and then encode these data by two techniques: digital network coding (DNC) enforced by XOR operations (denoted as the UTW-2TS-DNC protocol) and superposition coding (SC) enforced by power domain additions (denoted as the UTW-2TS-SC protocol). A selected secondary relay which subjects to maximize decoding capacities and to minimize collection time of channel state information in two protocols UTW-2TS-DNC and UTW-2TS-SC experiences residual interferences from imperfect SIC operations. Outage probabilities and throughputs are solved in terms of exact closed-form expressions to evaluate the system performance of the proposed protocols. Simulation and analysis results provide performance enhancement of the proposed protocols UTW-2TS-DNC and UTW-2TS-SC owing to increase the number of the cooperative secondary relays, the interference constraints, and the distances from the secondary network to the primary receiver. The best throughputs are pointed at optimal interference power allocation coefficients and optimal locations of the selected secondary relay. Considering the same power consumption, the UTW-2TS-DNC protocol outperforms the UTW-2TS-SC protocol. Finally, the simulation results are collected to confirm the exact analysis values of the outage probabilities and throughputs.
... The results demonstrated that the use of SWIPT did not jeopardize the diversity gain compared to the conventional NOMA. In addition, relaying communications was also widely utilized in different networks/topics, such as cognitive radio networks [16], [17], physical layer security, device-to-device (D2D) and cellular networks [20], [21]. The secrecy performance with relay selection under impact of co-channel interference was investigated in [18] and the maximum capacity of relay-aided D2D communications was studied in [19]. ...
... and it is computed in (17) at the top of the next page. ...
... We now formulate an optimization problem that maximizes the coverage probability in (17) with respect to the location of the relay in the different zones as 1 maximize vx,vy ...
Article
Full-text available
In this work, the performance evaluation and the optimization of dual-hop LoRa network are investigated. In particular, the coverage probability (Pcov) of edge end-devices (EDs) is computed in closed-form expressions under various fading channels, i.e., Nakagami-m and Rayleigh fading. The Pcov under Nakagami-m fading is computed in the approximated closed-form expressions; the Pcov under Rayleigh fading, on the other hand, is calculated in the exact closed-form expressions. In addition, we also investigate the impact of different kinds of interference on the performance of the Pcov, i.e., intra-SF interference, inter-SF interference (or capture effect) and both intra- and inter-SF interference. Our findings show that the impact of imperfect orthogonality is not non-negligible, along with the intra-SF interference. Moreover, based on the proposed mathematical framework, we formulate an optimization problem, which finds the optimal location of the relay to maximize the coverage probability. Since it is a mixed integer program with a non-convex objective function, we decompose the original problem with discrete optimization variables into sub-problems with a convex feasible set. After that, each sub-problem is effectively solved by utilizing the gradient descent approach. Monte Carlo simulations are supplied to verify the correctness of our mathematical framework. In addition, the results manifest that our proposed optimization algorithm converges rapidly, and the coverage probability is significantly improved when the location of relay is optimized.
... Cooperative models show that the selection of the bestrelaying devices, including partial relay selection and opportunistic relay selection, is necessary to improve system performance [5,[11][12][13][14][15][16][17][18][19]. These methods are based on the collection of channel state information to select the optimal relay to support communication. ...
... In Figure 4, we consider the outage probabilities of the two sources S 1 and S 2 in the proposed SIC-2TS and CONV-4TS protocols as a function of P S /N 0 (dB) with assuming perfect SIC ðε = 0Þ when Ω = −10 (dB), d 1 = 0:4, d 2 = 1 − d 1 , N = 6, and α 1 = α 2 = η = 1 [5,13] in both pCSI case (ρ = 1) and ipCSI case (ρ = 0:92). Considering the SIC-2TS protocol in Figure 4, firstly, the outage probabilities of two sources in the pCSI case are smaller than those in the ipCSI case and all of them have the floor values when P S / N 0 (dB) is large. ...
Article
Full-text available
This paper considers the effects of perfect/imperfect successive interference cancellation (SIC) and perfect/imperfect ' information (CSI) in a multiple-relay two-way cooperative network using nonorthogonal multiple access (NOMA) and digital network coding (DNC). In this model, a relay is selected by maximizing estimated channel gains to enhance the decoding capacity of the nearer source and minimize the collection time of imperfect CSI. Spectrum utilization efficiency is enhanced two times by a mixture of the SIC and DNC techniques at the selected relay (called as the SIC-2TS protocol). The system performance is considered through analysis of the exact and asymptotic expressions of the system outage probabilities and throughput. The major thing is exposed as the proposed SIC-2TS protocol can reach the best performance at optimal positions of the selected relay. Besides, the system throughput of the proposed protocol outperforms a SIC-utilized two-way relaying scheme without the DNC (called as the SIC-3TS protocol) and a conventional two-way scheme (called as the CONV-4TS protocol) for all signal-to-noise ratio regions. Lastly, the validity of the analytical expressions is verified by the Monte Carlo simulation results.
Article
Full-text available
In this paper, we study an opportunistic decode-and-forward (DF) system allowing intra-link errors, referred as opportunistic lossy-forwarding (OLF) system. Multiple relays are available but only one "best relay" is selected to forward the decoded information to the destination. The forwarded information may be erroneous. The relay selection strategy is built using source coding with a helper theorem. We evaluate the outage probability of OLF relaying system, and derive an approximated theoretical outage probability bound. For practical deployment, a statistical learning algorithm for selection relay is designed. The practical performance loss is negligible compared to the optimal selection case. The OLF system outperforms the existing opportunistic DF system in terms of outage performance. Both theoretical and numerical results show that full diversity can be achieved. Finally, we investigate the position of deploying relays by minimizing the outage probability from simulation results.
Article
Full-text available
In this letter, we consider a two-way relay channel (TWRC) with two end nodes and k relay nodes, where end nodes have the full channel-state information (CSI) and relay nodes only have the channel-amplitude information (CAI). With the objective of minimizing transmit power consumption at required end-to-end rates, energy-efficient relay selection (RS) and power allocation (PA) scheme is studied for TWRC based on analog network coding (ANC). Firstly, we propose an energy-efficient single RS and PA (E-SRS-PA) scheme, where the best relay node is selected to minimize total transmit power. Then, we prove that E-SRS-PA scheme is the optimal energy-efficient RS and PA (OE-RS-PA) scheme in ANC-based TWRC, and thus the optimal number of relay nodes to be selected in energy efficiency sense is equal to one. In addition, the closed-form expressions of optimal power allocation of E-SRS-PA scheme are derived. Numerical simulations confirm the optimality of proposed E-SRS-PA and demonstrate the energy efficiency of ANC-based TWRC compared with the other relaying schemes.
Article
Full-text available
Since the electromagnetic spectrum resource is becoming more and more scarce, improving spectral efficiency is becoming extremely important for the sustainable development of wireless communication systems and services. Integrating cooperative relaying techniques into spectrum-sharing cognitive radio systems sheds new light on higher spectral efficiency. In this paper, we analyze the end-to-end performance of cooperative amplify-and-forward (AF) relaying in spectrum-sharing systems. In order to achieve the optimal end-to-end performance, the transmit powers of the secondary source and the relays are optimized with respect to average interference power constraints at primary users and Nakagami-m fading parameters of interference channels (for mathematical tractability, the desired channels from secondary source to relay and from relay to secondary destination are assumed to be subject to Rayleigh fading). Also, both partial and opportunistic relay-selection strategies are exploited to further enhance system performance. Based on the exact distribution functions of the end-to-end signal-to-noise ratio (SNR) obtained herein, the outage probability, average symbol error probability, diversity order, and ergodic capacity of the system under study are analytically investigated. Our results show that system performance is dominated by the resource constraints and it improves slowly with increasing average SNR. Furthermore, larger Nakagami-m fading parameter on interference channels deteriorates system performance slightly. On the other hand, when interference power constraints are stringent, opportunistic relay selection can be exploited to improve system performance significantly. All analytical results are corroborated by simulation results and they are shown to be efficient tools for exact evaluation of system performance
Article
Full-text available
In this correspondence, the outage probability (OP) of dual-hop cognitive amplify-and-forward (AF) relay networks subject to independent non-identically distributed (i.n.i.d.) Nakagami-m fading is examined. We assume a spectrum-sharing environment, where two different strategies are proposed to determine the transmit powers of the secondary network. Specifically, the transmit power conditions of the proposed spectrum-sharing network are governed by either the combined power constraint of the interference on the primary network and the maximum transmission power at the secondary network or the single power constraint of the interference on the primary network. Closed-form lower bounds and asymptotic expressions for the OP are derived. Regardless of the transmit power constraint, we reveal that the diversity order is strictly defined by the minimum fading severity between the two hops of the secondary network. This aligns with the well-known result for conventional dual-hop AF relaying without spectrum sharing. Furthermore, the impact of the primary network on the diversity-multiplexing tradeoff is investigated. We confirm that the diversity-multiplexing tradeoff is independent of the primary network.
Article
Full-text available
Most of the research in spectrum sharing has neglected the effect of interference from primary users. In this reported work, the performance of spectrum sharing amplify-and-forward relay networks under interference-limited environment, where the interference induced by the transmission of primary networks is taken into account, is investigated. In particular, a closed-form expression tight lower bound of outage probability is derived. To reveal additional insights into the effect of primary networks on the diversity and array gains, an asymptotic expression is also obtained.
Article
Full-text available
The performance of the dual-hop semi-blind amplify-and-forward relay channel, where the intermediate relay node is selected depending on the instantaneous and partial channel knowledge, is investigated. Using closed-form expressions for the cumulative distribution function of the end-to-end signal-to-noise ratio (SNR), outage probability, SNR moments and average bit error rate are derived.
Article
Cognitive radio has been considered as a promising paradigm to achieve efficient spectrum usage by allowing the coexistence of the primary and secondary networks. One fundamental challenge is to ensure the quality of service (QoS) of the primary link while maximizing the transmission rate of the secondary links. In this paper, we investigate cooperation based spectrum access at the secondary networks. If the QoS requirement of primary link is stringent, low power is allowed at the cognitive radio user and the transmission rate is limited. It is beneficial that the cognitive radio user obtains cooperation from the surrounding users to increase the rate. The best relay which provides the maximal transmission rate is selected for cooperation. The transmission rate performance is investigated under the peak and average interference constraints (IC). The simulation results show that the transmission rate of cognitive radio link can be improved by cooperation, especially when the power of the direct link is limited. The achieved transmission rate under the average IC is higher than that under the peak IC, due to power adaptation between the transmitter and relay. And higher gain can be obtained as the number of potential relays increases.
Article
A spectrum-sharing scenario in a cognitive radio (CR) network where a secondary user (SU) shares a narrowband channel with $N$ primary users (PUs) is considered. We investigate the SU ergodic capacity maximization problem under an average transmit power constraint on the SU and $N$ individual peak interference power constraints at each primary-user receiver (PU-Rx) with various forms of imperfect channel-state information (CSI) available at the secondary-user transmitter (SU-Tx). For easy exposition, we first look at the case when the SU-Tx can obtain perfect knowledge of the CSI from the SU-Tx to the secondary-user receiver link, which is denoted as $g_{1}$, but can only access quantized CSI of the SU-Tx to PU-Rx links, which is denoted as $g_{0i}$, $i = \hbox{1}, \ldots, N$, through a limited-feedback link of $B = \log_{2}L$ b. For this scenario, a locally optimum quantized power allocation (codebook) is obtained with quantized $g_{0i}$, $i = \hbox{1}, \ldots, N$ information by using the Karush–Kuhn–Tucker (KKT) necessary optimality conditions to numerically solve the nonconvex SU capacity maximization problem. We derive asymptotic approximations for the SU ergodic capacity performance for the case when the number of feedback bits grows large $(B \rightarrow \infty)$ and/or there is a large number of PUs $(N \rightarrow \infty)$ that operate. For the interference-limited regime, where the average transmit power constraint is inactive, an alternative locally optimum scheme, called the quantized-rate allocation strategy, based on the quantized-ratio $g_{1}/\max_{i}g_{0i}$ information, is proposed. Subsequently, we relax the strong assumption of full-CSI knowledge of $g_{1}$ at the SU-Tx to imperfect $g_{1}$ knowledge that is also available at the SU-Tx. Depending on the way the SU-Tx obtains the $g_{1}$ information, the following two different suboptimal quantized power codebooks are derived for the SU ergodic capacity maximization problem: 1) the power codebook with noisy $g_{1}$ estimates and quantized $g_{0i}$, $i = \hbox{1}, \ldots, N$ knowledge and 2) another power codebook with both quantized $g_{1}$ and $g_{0i}$, $i = \hbox{1}, \ldots, N$ information. We emphasize the fact that, although the proposed algorithms result in locally optimum or strictly suboptimal solutions, numerical results demonstrate that they are extremely efficient. The efficacy of the proposed asymptotic approximations is also illustrated through numerical simulation results.
Article
In this study, the author investigates the outage performance of cognitive relay networks, in which the best relay is selected based on full and partial channel state information, respectively. The author derives exact closed-form expressions for both relay selection schemes, and study their asymptotic performance in terms of the diversity order based on the performance bound analysis. Simulation results are provided to confirm the accuracy of the analytical results, and highlight performance gains provided by the relay selection in cognitive radio networks.
Article
The exact closed-form expression for the outage probability (OP) of cognitive radio dual-hop amplify-and-forward (AF) relay networks is derived. The tractable expression of the OP, given in the form of elementary functions, readily enables evaluating the effect of primary users on the secondary system performance. It has been shown that the use of AF relaying significantly improves the performance of cognitive radio networks compared to its direct transmission counterpart.
Article
This paper studies the outage probability performance of decode-and-forward (DF) cognitive dual-hop systems for Nakagami- m fading channels, with consideration of an interference temperature limit. An exact outage probability expression is derived, and the impact of various key system parameters, such as interference temperature and fading severity, is investigated. Our results show that the interference temperature constraint causes the outage saturation phenomenon, but the outage performance gets better when the channel quality of the secondary transmission links improves. However, how the channel quality of the interfering links affects the outage performance depends on the channel quality of the secondary transmission links, as well as the interference temperature constraint and maximum transmit power.