-
Spatial Configuration of Agile Wireless Networks with Drone-BSs and User-in-the-loop
Authors:
Irem Bor-Yaliniz,
Amr El-Keyi,
Halim Yanikomeroglu
Abstract:
Agile networking can reduce over-engineering, costs, and energy waste. Towards that end, it is vital to exploit all degrees of freedom of wireless networks efficiently, so that service quality is not sacrificed. In order to reap the benefits of flexible networking, we propose a spatial network configuration scheme (SNC), which can result in efficient networking; both from the perspective of networ…
▽ More
Agile networking can reduce over-engineering, costs, and energy waste. Towards that end, it is vital to exploit all degrees of freedom of wireless networks efficiently, so that service quality is not sacrificed. In order to reap the benefits of flexible networking, we propose a spatial network configuration scheme (SNC), which can result in efficient networking; both from the perspective of network capacity, and profitability. First, SNC utilizes the drone-base-stations (drone-BSs) to configure access points. Drone-BSs are shifting paradigms of heterogeneous wireless networks by providing radically flexible deployment opportunities. On the other hand, their limited endurance and potential high cost increase the importance of utilizing drone-BSs efficiently. Therefore, secondly, user mobility is exploited via user-in-the-loop (UIL), which aims at influencing users' mobility by offering incentives. The proposed uncoordinated SNC is a computationally efficient method, yet, it may be insufficient to exploit the synergy between drone-BSs and UIL. Hence, we propose joint SNC, which increases the performance gain along with the computational cost. Finally, semi-joint SNC combines benefits of joint SNC, with computational efficiency. Numerical results show that semi-joint SNC is two orders of magnitude times faster than joint SNC, and more than 15 percent profit can be obtained compared to conventional systems.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
3D Placement of an Unmanned Aerial Vehicle Base Station for Maximum Coverage of Users with Different QoS Requirements
Authors:
Mohamed Alzenad,
Amr El-Keyi,
Halim Yanikomeroglu
Abstract:
The need for a rapid-to-deploy solution for providing wireless cellular services can be realized by unmanned aerial vehicle base stations (UAV-BSs). To the best of our knowledge, this letter is the first in literature that studies a novel 3D UAV-BS placement that maximizes the number of covered users with different Quality-of-Service requirements. We model the placement problem as a multiple circl…
▽ More
The need for a rapid-to-deploy solution for providing wireless cellular services can be realized by unmanned aerial vehicle base stations (UAV-BSs). To the best of our knowledge, this letter is the first in literature that studies a novel 3D UAV-BS placement that maximizes the number of covered users with different Quality-of-Service requirements. We model the placement problem as a multiple circles placement problem and propose an optimal placement algorithm that utilizes an exhaustive search (ES) over a one-dimensional parameter in a closed region. We also propose a low-complexity algorithm, namely, maximal weighted area (MWA) algorithm to tackle the placement problem.
Numerical simulations are presented showing that the MWA algorithm performs very close to the ES algorithm with a significant complexity reduction.
△ Less
Submitted 15 September, 2017;
originally announced September 2017.
-
3D Placement of an Unmanned Aerial Vehicle Base Station (UAV-BS) for Energy-Efficient Maximal Coverage
Authors:
Mohamed Alzenad,
Amr El-Keyi,
Faraj Lagum,
Halim Yanikomeroglu
Abstract:
Unmanned Aerial Vehicle mounted base stations (UAV-BSs) can provide wireless services in a variety of scenarios. In this letter, we propose an optimal placement algorithm for UAV-BSs that maximizes the number of covered users using the minimum transmit power. We decouple the UAV-BS deployment problem in the vertical and horizontal dimensions without any loss of optimality. Furthermore, we model th…
▽ More
Unmanned Aerial Vehicle mounted base stations (UAV-BSs) can provide wireless services in a variety of scenarios. In this letter, we propose an optimal placement algorithm for UAV-BSs that maximizes the number of covered users using the minimum transmit power. We decouple the UAV-BS deployment problem in the vertical and horizontal dimensions without any loss of optimality. Furthermore, we model the UAV-BS deployment in the horizontal dimension as a circle placement problem and a smallest enclosing circle problem. Simulations are conducted to evaluate the performance of the proposed method for different spatial distributions of the users.
△ Less
Submitted 9 May, 2017;
originally announced May 2017.
-
Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations
Authors:
Osama A. Hanna,
Amr El-Keyi,
Mohammed Nafie
Abstract:
The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that…
▽ More
The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that cooperates with the BSs. We first propose a cache-assisted relaying protocol that improves the cooperation opportunity between the BSs and the relay. Next, we consider the cache content placement problem that aims to design the cache content at the relay such that the DoF gain is maximized. We propose an optimal algorithm and a near-optimal low-complexity algorithm for the cache content placement problem. Simulation results show significant improvement in the DoF gain using the proposed relay-caching protocol.
△ Less
Submitted 17 February, 2017;
originally announced February 2017.
-
Optimal Beamforming for MIMO Shared Relaying in Downlink Cellular Networks with ARQ
Authors:
Ahmed Raafat Hosny,
Ramy Abdallah Tannious,
Amr El-Keyi
Abstract:
In this paper, we study the performance of the downlink of a cellular network with automatic repeat-request (ARQ) and a half duplex decode-and-forward shared relay. In this system, two multiple-input-multiple-output (MIMO) base stations serve two single antenna users. A MIMO shared relay retransmits the lost packets to the target users. First, we study the system with direct retransmission from th…
▽ More
In this paper, we study the performance of the downlink of a cellular network with automatic repeat-request (ARQ) and a half duplex decode-and-forward shared relay. In this system, two multiple-input-multiple-output (MIMO) base stations serve two single antenna users. A MIMO shared relay retransmits the lost packets to the target users. First, we study the system with direct retransmission from the base station and derive a closed form expression for the outage probability of the system.We show that the direct retransmission can overcome the fading, however, it cannot overcome the interference. After that, we invoke the shared relay and design the relay beamforming matrices such that the signal-to-interference-and-noise ratio (SINR) is improved at the users subject to power constraints on the relay. In the case when the transmission of only one user fails, we derive a closed form solution for the relay beamformers. On the other hand when both transmissions fail, we pose the beamforming problem as a sequence of non-convex feasibility problems. We use semidefinite relaxation (SDR) to convert each feasibility problem into a convex optimization problem. We ensure a rank one solution, and hence, there is no loss of optimality in SDR. Simulation results are presented showing the superior performance of the proposed relay beamforming strategy compared to direct ARQ system in terms of the outage probability.
△ Less
Submitted 10 October, 2016;
originally announced October 2016.
-
Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Yahya Mohasseb,
Tamer ElBatt,
Mohammed Nafie,
Karim G. Seddik,
Tamer Khattab
Abstract:
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is wh…
▽ More
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
△ Less
Submitted 31 July, 2016;
originally announced August 2016.
-
Optimal Energy Allocation For Delay-Constrained Traffic Over Fading Multiple Access Channels
Authors:
Antonious M. Girgis,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, we consider a multiple-access fading channel where $N$ users transmit to a single base station (BS) within a limited number of time slots. We assume that each user has a fixed amount of energy available to be consumed over the transmission window. We derive the optimal energy allocation policy for each user that maximizes the total system throughput under two different assumptions o…
▽ More
In this paper, we consider a multiple-access fading channel where $N$ users transmit to a single base station (BS) within a limited number of time slots. We assume that each user has a fixed amount of energy available to be consumed over the transmission window. We derive the optimal energy allocation policy for each user that maximizes the total system throughput under two different assumptions on the channel state information. First, we consider the offline allocation problem where the channel states are known a priori before transmission. We solve a convex optimization problem to maximize the sum-throughput under energy and delay constraints. Next, we consider the online allocation problem, where the channels are causally known to the BS and obtain the optimal energy allocation via dynamic programming when the number of users is small. We also develop a suboptimal resource allocation algorithm whose performance is close to the optimal one. Numerical results are presented showing the superiority of the proposed algorithms over baseline algorithms in various scenarios.
△ Less
Submitted 12 September, 2016; v1 submitted 3 July, 2016;
originally announced July 2016.
-
Proactive Location-Based Scheduling of Delay-Constrained Traffic Over Fading Channels
Authors:
Antonious M. Girgis,
Amr El-Keyi,
Mohammed Nafie,
Ramy Gohary
Abstract:
In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival $T_p$ slots ahead, where $T_p$ denotes the prediction window (PW) size. T…
▽ More
In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival $T_p$ slots ahead, where $T_p$ denotes the prediction window (PW) size. The source allocates energy to transmit some bits proactively for each time slot of the PW with the objective of reducing the transmission energy over the non-predictive case. The requests are predicted based on the user location utilizing the prior statistics about the user requests at each location. We also assume that the prediction is not perfect. We propose proactive scheduling policies to minimize the expected energy consumption required to transmit the requested packets under two different assumptions on the channel state information at the source. In the first scenario, offline scheduling, we assume the channel states are known a-priori at the source at the beginning of the PW. In the second scenario, online scheduling, it is assumed that the source has causal knowledge of the channel state. Numerical results are presented showing the gains achieved by using proactive scheduling policies compared with classical (reactive) networks. Simulation results also show that increasing the PW size leads to a significant reduction in the consumed transmission energy even with imperfect prediction.
△ Less
Submitted 1 July, 2016;
originally announced July 2016.
-
On the Degrees of Freedom of SISO X-networks with Synergistic Alternating Channel State Information at transmitters
Authors:
Ahmed Wagdy Shaban,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work togethe…
▽ More
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work together cooperatively. These states are associated with fractions of time denoted by $λ_P$, $λ_D$ \text{and} $λ_N$, respectively. For the two-user $X$-channel, simple upper bound is developed to prove the tightness of the achievability result of $4/3$ DoF under a certain distribution of the availability of three CSIT states for $Λ(λ_P=1/3, λ_D= 1/3, λ_N=1/3)$. For the $K$-user $X$-network, it is shown that the sum Degrees of freedom (DoF) is at least $2K/(K + 1)$, using two-phase transmission schemes over finite symbols channel extension and under the same distribution of the availability of $Λ(λ_P=1/3, λ_D= 1/3, λ_N=1/3)$.This achievability result, can be considered as a tight lower bound, coincides with the best lower bound known for the same network but with partial output feedback in stead of alternating CSIT. Hence, we show that the role of synergistic alternating CSIT with distribution $Λ(1/3,1/3,1/3)$ is equivalent to the partial output feedback. Also, this lower bound is strictly better than the best lower bound known for the case of delayed CSI assumption for all values of $K$. All the proposed transmission schemes are based on two phases transmission strategy, namely, interference creation and interference resurrection, which exploit the synergy of instantaneous CSI and delay CSIT to retrospectively align interference in the subsequent channel uses.
△ Less
Submitted 23 May, 2016;
originally announced May 2016.
-
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alternating CSIT via Interference Creation-Resurrection
Authors:
Mohamed Seif,
Amr El-Keyi,
Mohammed Nafie
Abstract:
Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT…
▽ More
Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT (D) and no CSIT (N) among different time slots. For the K-user MISO BC, we show that the total achievable degrees of freedom (DoF) are given by $\frac{K^{2}}{2K-1}$ through utilizing the synergistic benefits of CSIT patterns. We compare the achievable DoF with results reported previously in the literature in the case of delayed CSIT and hybrid CSIT models.
△ Less
Submitted 10 May, 2016;
originally announced May 2016.
-
On Optimizing Cooperative Cognitive User Performance under Primary QoS Constraints
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Tamer ElBatt,
Karim G. Seddik
Abstract:
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint…
▽ More
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint on the primary user average delay. In spite of the complexity of the optimization problems, due to their non-convexity, we transform the first problem into a set of linear programs and the second problem into a set of quasiconvex optimization problems. We prove that both problems are equivalent with identical feasible sets and optimal solutions. We show, through numerical results, that the proposed cooperation policy represents the best compromise between enhancing the secondary users QoS and satisfying the primary users QoS requirements.
△ Less
Submitted 31 March, 2016;
originally announced March 2016.
-
Efficient 3-D Placement of an Aerial Base Station in Next Generation Cellular Networks
Authors:
R. Irem Bor Yaliniz,
Amr El-Keyi,
Halim Yanikomeroglu
Abstract:
Agility and resilience requirements of future cellular networks may not be fully satisfied by terrestrial base stations in cases of unexpected or temporary events. A promising solution is assisting the cellular network via low-altitude unmanned aerial vehicles equipped with base stations, i.e., drone-cells. Although drone-cells provide a quick deployment opportunity as aerial base stations, effici…
▽ More
Agility and resilience requirements of future cellular networks may not be fully satisfied by terrestrial base stations in cases of unexpected or temporary events. A promising solution is assisting the cellular network via low-altitude unmanned aerial vehicles equipped with base stations, i.e., drone-cells. Although drone-cells provide a quick deployment opportunity as aerial base stations, efficient placement becomes one of the key issues. In addition to mobility of the drone-cells in the vertical dimension as well as the horizontal dimension, the differences between the air-to-ground and terrestrial channels cause the placement of the drone-cells to diverge from placement of terrestrial base stations. In this paper, we first highlight the properties of the dronecell placement problem, and formulate it as a 3-D placement problem with the objective of maximizing the revenue of the network. After some mathematical manipulations, we formulate an equivalent quadratically-constrained mixed integer non-linear optimization problem and propose a computationally efficient numerical solution for this problem. We verify our analytical derivations with numerical simulations and enrich them with discussions which could serve as guidelines for researchers, mobile network operators, and policy makers.
△ Less
Submitted 26 February, 2016;
originally announced March 2016.
-
Interactive Multiple Model Estimation of Doubly-Selective Channels for OFDM systems
Authors:
Mahmoud Ashour,
Amr El-Keyi
Abstract:
In this paper, we propose an algorithm for channel estimation, acquisition and tracking, for orthogonal frequency division multiplexing (OFDM) systems. The proposed algorithm is suitable for vehicular communications that encounter very high mobility. A preamble sequence is used to derive an initial estimate of the channel using least squares (LS). The temporal variation of the channel within one O…
▽ More
In this paper, we propose an algorithm for channel estimation, acquisition and tracking, for orthogonal frequency division multiplexing (OFDM) systems. The proposed algorithm is suitable for vehicular communications that encounter very high mobility. A preamble sequence is used to derive an initial estimate of the channel using least squares (LS). The temporal variation of the channel within one OFDM symbol is approximated by two complex exponential basis expansion models (CE-BEM). One of the Fourier-based BEMs is intended to capture the low frequencies in the channel (slow variations corresponding to low Doppler), while the other is destined to capture high frequencies (fast variations corresponding to high Doppler). Kalman filtering is employed to track the BEM coefficients iteratively on an OFDM symbol-by-symbol basis. An interactive multiple model (IMM) estimator is implemented to dynamically mix the estimates obtained by the two Kalman filters, each of which matched to one of the BEMs. Extensive numerical simulations are conducted to signify the gain obtained by the proposed combining technique.
△ Less
Submitted 2 February, 2016;
originally announced February 2016.
-
Achievable Degrees of Freedom on K-user MIMO Multi-way Relay Channel with Common and Private Messages
Authors:
Mohamed Salah,
Amr El-Keyi,
Yahya Mohasseb,
Mohammed Nafie
Abstract:
This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links…
▽ More
This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links between the users, communication occurs through the relay in two phases; a multiple access channel phase (MAC) and a broadcast (BC) phase. We drive cut-set bounds on the total DoF of the network, and show that the network has DoF less than or equal to K min(N,M). Achievability of the upper bound is shown by using signal space alignment for network coding in the MAC phase, and zero-forcing precoding in the BC phase. We show that introducing the common messages besides the private messages leads to achieving higher total DoF than using the private messages only.
△ Less
Submitted 15 October, 2015; v1 submitted 1 October, 2015;
originally announced October 2015.
-
Sensing/Decision-Based Cooperative Relaying Schemes With Multi-Access Transmission: Stability Region And Average Delay Characterization
Authors:
Mohamed Salman,
Amr El-Keyi,
Mohammed Nafie,
Mazen Omar Hasna
Abstract:
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay sense…
▽ More
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay senses the channel at the beginning of each time slot. In the idle time slots, the relay transmits the packet at the head of its queue, while in the busy one, the relay decides either to transmit simultaneously with the source terminal or to listen to the source transmission. The SBC scheme is a novel paradigm that utilizes the spectrum more efficiently than the other cooperative schemes because the relay not only exploits the idle time slots, but also has the capability to mildly interfere with the source terminal. On the other hand, in the DBC scheme, the relay does not sense the channel and it decides either to transmit or to listen according to certain probabilities. Numerical results reveal that the two proposed schemes outperform existing cooperative schemes that restrict the relay to send only in the idle time slots. Moreover, we show how the MPR capability at the destination can compensate for the sensing need at the relay, i.e., the DBC scheme achieves almost the same stability region as that of the SBC scheme. Furthermore, we derive the condition under which the two proposed schemes achieve the same maximum stable throughput.
△ Less
Submitted 29 June, 2015;
originally announced June 2015.
-
On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Tamer ElBatt,
Karim G. Seddik
Abstract:
In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for…
▽ More
In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for maximizing the secondary user throughput while guaranteeing the stability of the primary user queue. We consider a general cooperation policy where the packet admission and queue selection probabilities, at the secondary user, are both dependent on the state (length) of the finite relaying buffer. Despite the sheer complexity of the optimization problem, attributed to its non-convexity, we transform it to a linear program. Our numerical results reveal a number of valuable insights, e.g., it is always mutually beneficial to cooperate in delivering the primary packets in terms of expanding the stable throughput region. In addition, the stable throughput region of the system, compared to the case of infinite relaying queue capacity, marginally shrinks for limited relaying queue capacity.
△ Less
Submitted 9 October, 2014;
originally announced October 2014.
-
A Probabilistic MAC for Cognitive Radio Systems with Energy Harvesting Nodes
Authors:
Ramy E. Ali,
Fadel F. Digham,
Karim G. Seddik,
Mohammed Nafie,
Amr El-Keyi,
Zhu Han
Abstract:
In this paper, we consider a cognitive radio (CR) system where the secondary user (SU) harvests energy from both the nature resources and the primary user (PU) radio frequency(RF) signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate th…
▽ More
In this paper, we consider a cognitive radio (CR) system where the secondary user (SU) harvests energy from both the nature resources and the primary user (PU) radio frequency(RF) signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate the problem of maximizing the SU's success rate provided that the PU average quality of service (QoS) constraint is satisfied. We also assume multi-packet reception (MPR) capability and sensing errors under a Rayleigh fading channel. Numerical results show the effectiveness of the proposed probabilistic access scheme.
△ Less
Submitted 29 October, 2014; v1 submitted 1 August, 2014;
originally announced August 2014.
-
On the Degrees of Freedom of SISO X-Channel with Alternating CSIT
Authors:
Ahmed Wagdy,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $λ_P, λ_D$ and $λ_N $, respectively. We provide new results for D…
▽ More
In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $λ_P, λ_D$ and $λ_N $, respectively. We provide new results for DoF of the two-user SISO X-channel when the available CSIT alternates between these three cases under a certain distribution $Λ(λ_P, λ_D, λ_N )$. Specifically, we show that the X-channel with alternating CSIT for $Λ(1/8, 3/8, 1/2)$ can achieve $5/4$ DoF. The interesting thing about $5/4$ is that it represents a position of compromise or a middle ground between the channel knowledge that transmitters need to steer interference and the degrees of freedom that the network can achieve. Moreover, $5/4$ is strictly greater than $6/5$ which is the upper bound for the X-channel with \textit{fixed} delayed CSIT.
△ Less
Submitted 31 July, 2014;
originally announced July 2014.
-
The asymmetric DoF Region for the 3-user MxN Interference Channel
Authors:
Mohamed Khalil,
Tamer Khattab,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assum…
▽ More
In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. The region of the achievable DoF tuple $(d_1; d_2; d_3)$ is presented.
△ Less
Submitted 10 July, 2014;
originally announced July 2014.
-
Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi
Abstract:
We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To…
▽ More
We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To satisfy certain quality of service (QoS) requirements, users share time slot duration and channel frequency bandwidth. Moreover, the SU may leverage the primary feedback message to further increase both its data rate and satisfy the PU QoS requirements. The proposed cooperative schemes are designed such that the SU data rate is maximized under the constraint that the PU average queueing delay is maintained less than the average queueing delay in case of non-cooperative PU. In addition, the proposed schemes guarantee the stability of the PU queue and maintain the average energy emitted by the SU below a certain value. The proposed schemes also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback decoding errors to the analysis of our proposed cooperative schemes. The optimization problems are solved offline and require a simple 2-dimensional grid-based search over the optimization variables. Numerical results show the beneficial gains of the cooperative schemes in terms of SU data rate and PU throughput, average PU queueing delay, and average PU energy savings.
△ Less
Submitted 26 October, 2017; v1 submitted 9 June, 2014;
originally announced June 2014.
-
A DoF-Optimal Scheme for the two-user X-channel with Synergistic Alternating CSIT
Authors:
Ahmed Wagdy,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates be…
▽ More
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates between these three cases. For some patterns of alternating CSIT, the proposed scheme achieves $4/3$ DoF, and hence, coincides with the information theoretic upper bound on the DoF of the two-user X-channel with perfect and instantaneous CSIT. The CSIT alternation patterns are investigated where the patterns that provide extraordinary synergistic gain and dissociative ones are identified.
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes
Authors:
Abdelrahman M. Ibrahim,
Tamer ElBatt,
Amr El-Keyi
Abstract:
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using s…
▽ More
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using stochastic geometry, the downlink probability of coverage under a Matern hardcore point process to ensure minimum distance between the randomly located base stations. Assuming a mobile user connects to the nearest base station and Rayleigh fading, we derive two lower bounds expressions on the downlink probability of coverage that is within 4% from the simulated scenario. To validate our model, we compare the probability of coverage of the Matern hardcore topology against an actual base station deployment obtained from a public database. The comparison shows that the actual base station deployment can be fitted by setting the appropriate Matern point process density.
△ Less
Submitted 13 September, 2013;
originally announced September 2013.
-
On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi,
Mohamed Nafie
Abstract:
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for sto…
▽ More
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node which harvests energy packets from the environment. In addition to its data queues, the SU has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete time queue with Markov arrival and service processes. Due to the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.
△ Less
Submitted 27 July, 2014; v1 submitted 6 July, 2013;
originally announced July 2013.
-
Maximum Secondary Stable Throughput of a Cooperative Secondary Transmitter-Receiver Pair: Protocol Design and Stability Analysis
Authors:
Ahmed El Shafie,
Tamer Khattab,
Amr El-Keyi,
Mohamed Nafie
Abstract:
In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter (PT) on the maximum stable throughput of the primary-secondary network. Each transmitter, primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter (ST) has a buffer for storing a fraction of the undelivered p…
▽ More
In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter (PT) on the maximum stable throughput of the primary-secondary network. Each transmitter, primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter (ST) has a buffer for storing a fraction of the undelivered primary packets due to channel impairments. Moreover, the secondary destination has a relaying queue for storing a fraction of the undelivered primary packets. In the proposed cooperative system, the ST and the secondary destination increase the spectrum availability for the secondary packets by relaying the unsuccessfully transmitted packets of the PT. We consider two multiple access strategies to be used by the ST and the secondary destination to utilize the silence sessions of the PT. Numerical results demonstrate the gains of the proposed cooperative system over the non-cooperation case.
△ Less
Submitted 9 June, 2014; v1 submitted 27 June, 2012;
originally announced June 2012.
-
A New Achievable DoF Region for the 3-user MxN Symmetric Interference Channel
Authors:
Mohamed Amir,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed sche…
▽ More
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed scheme achieve higher number of DoF than are currently achievable, while for other values it meets the best known upperbound. Simulation results are presented showing the superior performance of the proposed schemes to earlier approaches.
△ Less
Submitted 20 May, 2011;
originally announced May 2011.
-
Power Control for Maximum Throughput in Spectrum Underlay Cognitive Radio Networks
Authors:
John Tadrous,
Ahmed Sultan,
Mohammed Nafie,
Amr El-Keyi
Abstract:
We investigate power allocation for users in a spectrum underlay cognitive network. Our objective is to find a power control scheme that allocates transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service (QoS) of the primary users greater than a certain minimum limit. Since an optimum solution to our problem…
▽ More
We investigate power allocation for users in a spectrum underlay cognitive network. Our objective is to find a power control scheme that allocates transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service (QoS) of the primary users greater than a certain minimum limit. Since an optimum solution to our problem is computationally intractable, as the optimization problem is non-convex, we propose an iterative algorithm based on sequential geometric programming, that is proved to converge to at least a local optimum solution. We use the proposed algorithm to show how a spectrum underlay network would achieve higher throughput with secondary users operation than with primary users operating alone. Also, we show via simulations that the loss in primary throughput due to the admission of the secondary users is accompanied by a reduction in the total primary transmit power.
△ Less
Submitted 8 February, 2010;
originally announced February 2010.