On cognitive channels with an oblivion constraint

Daniela Tuninetti, N. Devroye, Yasaman Keshtkarjahromi
{"title":"On cognitive channels with an oblivion constraint","authors":"Daniela Tuninetti, N. Devroye, Yasaman Keshtkarjahromi","doi":"10.4108/ICST.CROWNCOM.2011.245872","DOIUrl":null,"url":null,"abstract":"We consider a Gaussian point-to-point secondary link which co-exists with a Gaussian point-to-point primary link, and is permitted to transmit within the primary user's interference margin — a simple but realistic channel model for underlay cognitive systems. Under this assumption, we are interested in quantifying the secondary user rate gains when the secondary users have knowledge of the primary link's codebook. This may be exploited at the secondary transmitter or receiver — we focus on the latter. As first proposed by Popovski et al., this codebook knowledge may be exploited to opportunistically — when channel conditions permit — either fully cancel the primary user interference at the secondary receiver, or otherwise treat it as noise. In this work, we propose an achievable rate region in which the primary user transmits according to an information theoretic broadcast strategy, but otherwise remains oblivious to the secondary user operation. The secondary receiver exploits the primary codebooks, together with its broadcast strategy transmission to decode a portion of the primary message, thereby opportunistically partially canceling the primary user interference seen at the secondary receiver and thus straddles the two extremes between fully decoding and treating the interference as noise as presented by Popovski et al. Interestingly, it is shown that this broadcast strategy does not outperform Popovski et al.'s simple “all or nothing” strategy. We thus seek to tighten outer bounds on the secondary user's channel capacity. The inclusion of an average power constraint on the secondary link furthermore allows us to develop a new, tighter outer bound for this channel, which is numerically evaluated and compared to the inner bounds.","PeriodicalId":249175,"journal":{"name":"2011 6th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 6th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/ICST.CROWNCOM.2011.245872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

We consider a Gaussian point-to-point secondary link which co-exists with a Gaussian point-to-point primary link, and is permitted to transmit within the primary user's interference margin — a simple but realistic channel model for underlay cognitive systems. Under this assumption, we are interested in quantifying the secondary user rate gains when the secondary users have knowledge of the primary link's codebook. This may be exploited at the secondary transmitter or receiver — we focus on the latter. As first proposed by Popovski et al., this codebook knowledge may be exploited to opportunistically — when channel conditions permit — either fully cancel the primary user interference at the secondary receiver, or otherwise treat it as noise. In this work, we propose an achievable rate region in which the primary user transmits according to an information theoretic broadcast strategy, but otherwise remains oblivious to the secondary user operation. The secondary receiver exploits the primary codebooks, together with its broadcast strategy transmission to decode a portion of the primary message, thereby opportunistically partially canceling the primary user interference seen at the secondary receiver and thus straddles the two extremes between fully decoding and treating the interference as noise as presented by Popovski et al. Interestingly, it is shown that this broadcast strategy does not outperform Popovski et al.'s simple “all or nothing” strategy. We thus seek to tighten outer bounds on the secondary user's channel capacity. The inclusion of an average power constraint on the secondary link furthermore allows us to develop a new, tighter outer bound for this channel, which is numerically evaluated and compared to the inner bounds.
遗忘约束下的认知通道研究
我们考虑一个与高斯点对点主链路共存的高斯点对点副链路,并允许在主用户的干扰范围内传输——这是一个简单但现实的底层认知系统信道模型。在这个假设下,我们感兴趣的是量化当次要用户知道主链接的码本时的次要用户速率增益。这可以在二级发射机或接收机上利用-我们关注的是后者。正如Popovski等人首先提出的那样,这种码本知识可以被投机地利用——当信道条件允许时——要么完全取消辅助接收器上的主用户干扰,要么将其视为噪声。在这项工作中,我们提出了一个可实现的速率区域,在该区域中,主用户根据信息论广播策略进行传输,但对次要用户的操作保持遗忘。辅助接收器利用主码本及其广播策略传输来解码一部分主消息,从而偶然地部分消除在辅助接收器上看到的主要用户干扰,从而跨越完全解码和将干扰视为噪声之间的两个极端,如Popovski等人所提出的那样。有趣的是,研究表明,这种广播策略并不优于Popovski等人的简单的“全有或全无”策略。因此,我们寻求收紧辅助用户信道容量的外部界限。在次要链路上包含平均功率约束进一步允许我们为该信道开发一个新的,更严格的外部边界,并对其进行数值评估并与内部边界进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信