4.7 Article

Interference Characterization in Underlay Cognitive Networks With Intra-Network and Inter-Network Dependence

期刊

IEEE TRANSACTIONS ON MOBILE COMPUTING
卷 20, 期 10, 页码 2977-2991

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2020.2993408

关键词

Interference; Transmitters; Mobile computing; Cellular networks; Computational modeling; Wireless networks; Complexity theory; Channel capacity; cognitive radio; coverage probability; interference modelling; poisson hole

资金

  1. SENTECH Chair in Broadband Wireless Multimedia Communications (BWMC), Department of Electrical, Electronics and Computer Engineering, University of Pretoria, South Africa

向作者/读者索取更多资源

The paper examines the dependence between primary and secondary networks to capture more system parameters related to system characterization. Two cases are considered - primary user interference control and primary user with secondary user interference control mechanisms. Overall, the accurate interference modeling is crucial for ensuring adequate coverage in cognitive radio networks.
Interference modeling in cognitive radio network is important to ensure adequate coverage in the network. A reliable interference model, however, depends on accurately characterizing the distribution of users. In this paper, the dependence between primary and secondary networks is examined in order to capture more system parameters related to system characterization. Hence, two cases are considered - primary user (PU) interference control and PU with secondary user (SU) interference control mechanisms. Under PU interference control, distributions of PUs follow the Matern hard core process while the distribution of SUs follow the Poisson hole process (PHP). However, under PU with SU interference control, the distribution of active SUs follow a modified PHP. Bound and approximate expressions were derived for coverage probability at both primary and secondary networks, while simple yet accurate expressions were obtained to depict the number of simultaneous active users supported for the two cases. The tight closeness between the bound and the approximate expressions shows the reliability of the presented theoretical analysis. Furthermore, the bipolar network model assumption was relaxed while the case of independence assumption among users was also considered. Numerical result showed close tightness when the bipolar network model assumption was relaxed while the independence assumption was shown to overestimate users' coverage probability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据