Outage Performance of a Two-branch Cooperative Energy-constrained Relaying Network with Selection Combining at Destination
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2018, Vol 5, Issue 14
Abstract
In this paper, we investigate two-branch cooperative DF relaying networks with selection combining at the destination. Two intermediate relay-clusters (a conventional relay cluster and an energy-constrained relay cluster) are utilized to aid the communication between the source and the destination. We study two cases: direct link (DR) and no direct link (NDR) between the source and the destination. In each case, we consider two relay selection schemes: best sourceâ´Çrelay channel gain (BSR) and random relay selection (RAN). Thus, we have 4 protocols: DR-BSR, DR-RAN, NDR-BSR, and NDR-RAN. For the performance evaluation, we derive a closed-form expression for the outage probability of each of the four protocols. Our analysis is substantiated via a Monte Carlo simulation. As expected, the results show that the DR case outperforms the NDR case, and the BSR scheme outperforms the RAN scheme. The outage performances of the protocols are evaluated based on the system parameters, including the transmit power, the number of relays in each cluster, the energy harvesting eÿciency, the position of the two clusters, and the target rate. The outage performance of the system is improved when the transmit power increases, the energy harvesting eÿciency increases, the distance between the two clusters and the source and destination decreases, or the target rate decreases. We found good matches between the theoretical and Monte Carlo simulation results, verifying our mathematical analysis.
Authors and Affiliations
Sang Quang Nguyen, Hyung Yun Kong
Ant Colony Optimization Based Model Checking Extended by Smell-like Pheromone
Model Checking is a technique for automatically checking the model representing software or hardware about whether they satisfy the corresponding specifications. Traditionally, the model checking uses deterministic algor...
Security and Privacy in Online Social Networks: A Survey
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs...
Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection
This paper evaluates outage probability (OP) of a cooperative underlay cognitive radio network in the presence of a passive secondary eavesdropper under joint impacts of limited interference from a primary network and ha...
Comparative Study on Power Gating Techniques for Lower Power Delay Product, Smaller Power Loss, Faster Wakeup Time
The power gating is one of the most popular reduction leakage techniques. We make comparison among various power gating schemes in terms of power delay product, energy loss, and wake-up time using the 45-nm Predictive Te...
A Survey of System Level Power Management Schemes in the Dark-Silicon Era for Many-Core Architectures
Power consumption in Complementary Metal Oxide Semiconductor (CMOS) technology has escalated to a point that only a fractional part of many-core chips can be powered-on at a time. Fortunately, this fraction can be increa...