The effect of cooperation at the network protocol level
Proceedings of the 4th Annual International Conference on Wireless Internet
Achieving Secondary Capacity under Interference from a Primary Base Station
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Proceedings of the 7th ACM international symposium on Mobility management and wireless access
Content-aware multiple access protocol for cooperative packet speech communications
IEEE Transactions on Wireless Communications
On Opportunistic Cooperation for Improving the Stability Region with Multipacket Reception
NET-COOP '09 Proceedings of the 3rd Euro-NF Conference on Network Control and Optimization
Cooperation above the physical layer: the case of a simple network
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Protocol-level cooperation in wireless networks: stable throughput and delay analysis
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Distributed transmit power allocation for multihop cognitive-radio systems
IEEE Transactions on Wireless Communications
Protocol design and throughput analysis for multi-user cognitive cooperative systems
IEEE Transactions on Wireless Communications
Stable throughput of secondary user in cognitive relay system
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Cooperative cognitive radio with priority queueing analysis
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Stability analysis for cognitive radio with multi-access primary transmission
IEEE Transactions on Wireless Communications
A geometric approach to improve spectrum efficiency for cognitive relay networks
IEEE Transactions on Wireless Communications
Cooperation for transmission scheduling in wireless networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Exploiting cooperative advantages in slotted ALOHA random access networks
IEEE Transactions on Information Theory
Protocol design and delay analysis of half-duplex buffered cognitive relay systems
IEEE Transactions on Wireless Communications
Scheduling in Wireless Networks
Foundations and Trends® in Networking
Cognitive MIMO Radio: Performance Analysis and Precoding Strategy
International Journal of Cognitive Informatics and Natural Intelligence
Hi-index | 754.90 |
In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore, no extra channel resources are allocated for cooperation and the system encounters no bandwidth losses. Two protocols are developed to implement the proposed multiple-access strategy. The maximum stable throughput region and the delay performance of the proposed protocols are characterized. The results reveal that the proposed protocols provide significant performance gains over conventional relaying strategies such as selection and incremental relaying, specially at high spectral efficiency regimes. The rationale is that the lossless bandwidth property of the proposed protocols results in a graceful degradation in the maximum stable throughput with increasing the required rate of communication. On the other hand, conventional relaying strategies suffer from catastrophic performance degradation because of their inherent bandwidth inefficiency that results from allocating specific channel resources for cooperation at the relay. The analysis reveals that the throughput region of the proposed strategy is a subset of its maximum stable throughput region, which is different from random access, where both regions are conjectured to be identical.