Spectrum Distribution in Cognitive Radio: Error Correcting Codes Perspective

Cognitive radio is a growing zone in wireless communication which offers an opening in complete utilization of incompetently used frequency spectrum: deprived of crafting interference for the primary (authorized) user, the secondary user is indorsed to use the frequency band. Though, scheming a model with the least interference produced by the secondary user for primary user is a perplexing job. In this study we proposed a transmission model based on error correcting codes dealing with a countable number of pairs of primary and secondary users. However, we obtain an effective utilization of spectrum by the transmission of the pairs of primary and secondary users' data through the linear codes with different given lengths. Due to the techniques of error correcting codes we developed a number of schemes regarding an appropriate bandwidth distribution in cognitive radio.


Introduction
Cognitive radio is the latest technology in wireless communication by which the spectrum is dynamically utilized whenever the primary user, the authorized holder of the spectrum, is not consumed. The idea of cognitive radio is initiated in [1]. Rendering to this notion the cognitive radio has the competence to judge the radio environs and step up the decision according to the transmission parameters such as code rate, modulation scheme, power, carrier frequency, and bandwidth. By [2], power is allotted to total bandwidth power is allotted to total bandwidth; order to increase capacity, retain the interference at the primary user at the given inception and make the entire transmission power inside the preset limits.
Alternative clue of the interference temperature model of [3] is essential for the primary receiver to fix the interference boundary and hence the secondary user can transmit under the set level. The central plan in [4] is to issue license spectrum to secondary users and bound the interference observed through primary users. To shield the primary user from the interference triggered by the secondary user during transmission, Srinivasa and Jafar [5] presented an organization of transmission models as interweave, underlay, and overlay.
By [1], in the interweave model the secondary user has opportunistic access to the spectrum slum, whenever the primary user is out and pull out when the primary wants to utilized the spectrum again. Wisely watching and sensing primary user is very noteworthy for interweave case. Thus dissimilar type of the sensing methods is used to identify the primary user and evade the interference shaped by the secondary user. By [6] two leading methods are receiving attention for primary user uncovering, known as energy detection, feature detection, and match filter. In cognitive radio secondary user is permissible to use a spectrum of primary user without making interference with the primary user. However, the secondary users have to frequently screen 2 International Journal of Distributed Sensor Networks the management of the spectrum to keep away from snooping with the primary user (see [7]). Underlay and overlay are argued with spectrally modulated and spectrally encoding (SMSE) procedure all along with code division multiple access (CDMA) and orthogonal frequency division multiple access (OFDMA). According to [8], in underlay, concurrent transmission of primary and secondary user happens underneath the situation that the secondary user interferes less than a positive beginning with the primary user. Spectrum sensing is not obligatory for underlay. Only the interference limit is compulsory for the secondary user for proficient utilization of the spectrum. Hence, this interference limitation confines the communication of secondary user to minute range. However, by [2], some amount of the power should be allowed to the subcarrier of underlay as it also creates extra interference with the primary user. The demand of wireless devices is increasing every day. Therefore, efficient utilization of spectrum is a burring subject to reduce the spectrum over crowdedness. By [9], the overlay model allows the simultaneous transmission of primary and secondary users. The secondary transmitter is assumed to have awareness of the primary message and use for reducing the interference at its receiver. Specifically, in underlay and overlay models the secondary users can transmit their data simultaneously with the primary users under some constraints: in case of underlay, secondary users can transmit with sufficient power due to interference limit fixed at the primary receiver while in the case of overlay transmission of secondary users is only possible if secondary transmitter knows the codebooks and channel information. Furthermore, both of these models do not ensure that secondary user will not create interference with primary user during simultaneous transmission. Likewise, enabling grounds for these models may harm the transmission of both primary and secondary user.
In [10] wireless mesh network is used for end to end bandwidth allocation which used the routing and scheduling algorithms. The max-min model is used for selection of a fair bandwidth allocation. In [11] TV band is used for the cognitive radio through sensing and opportunistically utilizing the unused frequencies. The different types of protocols are used for centralized and decentralized spectrum allocations.
By using the secret messages for cognitive radio channels first of all set the limits for channel capacity. Two transmitters having the primary and secondary messages pass through the channel which was received at the receivers with separate primary and secondary messages. By [12], enhancement of spectral efficiency in cognitive radio can be obtained by the secondary user through the permission to utilize the shiftless part of the spectrum which is allotted to the primary user. Hence the optimum bandwidth is required from the many bandwidths allocated to the primary and secondary users. Moreover, the secondary users try to opt for the best possible bandwidth out of the different many sets of bandwidths. Furthermore in [12], different spectrum sharing protocol is designed to enhance the cognitive radio networks.
An introduction of a transmission model in cognitive radio based on error correcting codes is presented in [13]. However, in continuation of [13], in this study we proposed a novel transmission model in cognitive radio based on error correcting codes which provides an effective utilization of the spectrum. Furthermore it brings comfort to the secondary users of each pair by many restrictions which are imposed in the underlay and overlay models. The strategies adopted are dealing with a pair of users (a primary and a secondary) transmitting the data through linear codes having fixed given lengths. By this proposed model, despite of existing techniques, first we allocate a pair of linear codes for each pair of a primary user and a secondary user of the given family. Secondly for each pair of these linear codes, there is a transforming code. However, this transforming code carries all the information/data possessed by its corresponding pair of linear codes. Accordingly all the data on a whole family of pairs of a primary user and a secondary user is transmitted through these different transforming codes. Nevertheless, irrespective of using individual data transmission technique of primary and secondary users, we use the simultaneous data transmission technique for primary and secondary users of each pair of the family. Owing to this plausible procedure of error correcting codes we settled a number of arrangements vis-à-vis suitable bandwidth dispersal in cognitive radio. We use the method which opportunistically works in such a way that there is precise pattern of bandwidths 1 , 2 , . . . , available against the different transforming codes 1 , 2 , . . . , corresponding to the pairs of primary and secondary users. Thus, if this total bandwidth 1 + 2 + ⋅ ⋅ ⋅ + is greater than the bandwidth of another transforming code , then the code could send its data through 1 + 2 + ⋅ ⋅ ⋅ + . Hence the enhancement of spectral efficiency in cognitive radio is obtained by the pseudo cognitive user through the approval to utilize the idle part of the spectrum which is allotted to the transforming codes 1 , 2 , . . . , , the pseudo primary users. Consequently we established a method which provides efficient utilization of spectrum as described in [12].

Preliminaries
This section contains some of the basic results related to monoid ring and polynomial codes and some on transmission parameters.
To construct a polynomial ( , )-code over a finite field F , where is power of some prime, we select a polynomial A message is represented by a polynomial, called the message polynomial, ( ), of degree less than or equal to − 1. The code polynomial corresponding to this ( ) is V( ) and is equal to ( ) + − ( ), where ( ) is the remainder of − ( ) after dividing it by ( ). A polynomial code is an error correcting code whose codewords consist of multiple of a given fixed polynomial ( ) known as the generator polynomial.
Let (S, * ) and (R, +, ⋅) be a commutative semigroup and an associative unitary commutative ring, respectively. The set T of all finitely nonzero functions from S into R is a ring with respect to binary operations addition and multiplication defined as ( + )( ) = ( )+ ( ) and ( )( ) = ∑ * = ( ) ( ), where the symbol ∑ * = indicates that the sum is taken over all pairs ( , ) of elements of S such that * = and it is settled that in the situation where is not expressible in the form * for any , ∈ S, ( )( ) = 0. T is called a unitary commutative semigroup ring of S over R. If S is a monoid, then T is called monoid ring. This ring T is represented as R[S] whenever S is a multiplicative semigroup and elements of T are written either as ∑ ∈S ( ) or as ∑ =1 ( ) . The representation of T will be R[ ; S] whenever S is an additive semigroup. A nonzero element of R[ ; S] is uniquely represented in the canonical form Of course, the monoid ring R[ ; S] is a polynomial ring in one indeterminate if S is the additive monoid Z 0 of nonnegative integers.
The concept of degree and order is not generally defined in a semigroup ring. But if S is a totally ordered semigroup, the degree and order of an element of semigroup ring R[ ; S] are defined as follows: if = ∑ =1 is the canonical form of the nonzero element ∈ R[ ; S], where 1 < 2 < ⋅ ⋅ ⋅ < , then is called the degree of and we write deg( ) = and similarly the order of is written as ord We initiate by an observation that, for a field F and an integer ≥ 0, the structures of a polynomial ring F[ ] and a monoid ring F[ , (1/ )Z 0 ] have many cohesions; for instance, for an ordered monoid S, the monoid ring F[ , S] is a Euclidean domain if F is a field and S ≅ Z or S ≅ Z 0 (cf. [14,Theorem 8.4]). Of course here (1/ )Z 0 is totally ordered and has an isomorphism with Z 0 .
Let F be any field and (1/ )Z 0 the additive monoid; then In [15][16][17][18][19][20][21][22] certain cyclic codes are considered as the ideals in the factor ring of some monoid rings R[ ; (1/ )Z 0 ], where is prime, is positive integer, and R is a local finite commutative ring or a binary field. Subsequently these studies addressed the strategies in enhancing the code rate and error correction capability of the codes under consideration.
Definition 4. The bandwidth required for an ( , ) code is = ( / ) , where = log 2 and is the source data rate [24].

The Transformation Model for Primary and Secondary Users' Pairs
In this section, we propose a simultaneous transmission model by using error correcting codes. The proposed model also ensures the noninterference across the pairs. For any positive integer , let ( ( 1/ )) be the family of degree (generalized) polynomials  (2) For a sequence { , } ≥1 of pairs of codes of primary and secondary users we may opt for any of the schemes from { } ≥1 (i) with fixed or (ii) by varying . However the second option has complexities.
(3) In (2) (i) for different transforming codes there are varying codes of primary and secondary users. For instance (3,2) is code for primary user with code (4, 3) of secondary user having transforming code (7,5). At the same time (3, 2) is the code for secondary user corresponding to the transforming code (5, 3) having its primary user's code (2, 1).

The Model.
In this work we advocated a transmission model in cognitive radio focused on error correcting codes for the solid utilization of the spectrum with no interference between primary and secondary users. Instead of a single pair of users (one primary and one secondary) we Universal receiver and vector separator decider . Universal receiver and vector separator decider (URVSD): all the transmitted codewords from UT will be received at URVSD. The URVSD will analyze the length of each vector and send them to their respective vector separators. For example, if the length of received vector is ( −1)+1, then URVSD will send it to VS , the vector separator of th pair for each , which separates decoder of primary user (DP ) and decoder of secondary user (DS ) of th pair for each .

The Schemes for Effective Use of Bandwidths.
The interference triggered by secondary user for primary user is tiny, as in case of simultaneous transmission the messages of secondary and primary users are linked together to make a message of the code and then transmitted, in its place of transmitting them individually. Similarly the primary user need not picture its messages at secondary transmitter or secondary user need not sense primary user for simultaneous transmission as in the case of overlay model. The only constraint on primary and secondary users of th pair is that the primary user ought to use code and the secondary should use .
Here under the proposed model we discuss two different schemes for transmitting data of family of pairs of primary and secondary users regarding smart usage of bandwidths.
With MPSK modulation, where = log , is in the power of (= 2), and also coding rate / , where is the number of information bits and is the number of coded bits, the required bandwidth = , ( / ), where , is the data transmission rate (or bit rate).

Scheme 9.
If there is no order in the set of bandwidth { 1 , 2 , . . . , ℎ }, then the scheme will be as follows: This scheme proposes that there is only possible to a pair of primary and secondary users that to use bandwidth allotted against it.
The following theorems explain the efficiency of Scheme 9 in terms of bandwidth which is the actual benefit of cognitive radio.  Remark 11. It is apparent by Theorem 10 that it is most appropriate to send data of both types of users through as it requires less bandwidth than that of the combined 6 International Journal of Distributed Sensor Networks . . , ℎ}, then the data transmission scheme will be as follows: (1) If ≤ for < , then < .
Initially, this scheme is working the same as Scheme 9; however, it opportunistically works in such a way that whenever there is of specific pattern of bandwidths is available against the pairs of primary and secondary users. That is, if the total bandwidth required for data transmission of codes 1 and 2 is 1 + 2 and 1 + 2 ≥ 3 , where 3 is the bandwidth required for transmission of data for the code 3 , then the code 3 could send its data through 1 + 2 after the transmission of the codes 1 and 2 . In a similar manner we continue this method for combinations larger than this one. The gain of this scheme is the saving of the bandwidth 3 and hence of in general. Despite all of this, it is possible on the compromise that larger code in each transmission process must use the sum of bandwidths of the preceding codes after their spectrum utilization.

Remark 14.
If the bandwidth 1 + 2 is equal to or greater than the bandwidth sum of codes of primary and secondary users corresponding to the transforming code 3 , then we could transmit the data of the pair concern separately through respective codes of primary and secondary users.
Illustration. For fixed = 2, the relation between bandwidth and code rate is given as = ( /2)(1/ ), where is the bandwidth expansion, is the transmission rate, and = / is the code rate. The bandwidth with different code rates is given in Table 2 (chosen transforming codes are from  Table 1).
The rows in Table 2 are picked from Table 1. For = 1.2, = 64 kbps (Table 3). Corresponding to any pair ( , ) we can choose the most suitable transforming code 0 which requires the minimum bandwidth for data transformation. For instance, the pair ( , ) = ((2, 1), (3,2)) has the best option of 5 2 (Table 4). Now we are able to discuss Schemes 9 and 12 of data transmissions as follows: Since 1 + 2 = 117.76 kHz and 3 + 3 = 140.80 kHz, we could transmit the data of the pair concern with the transforming code 3 2 separately through respective codes ( 3 , 3 ) of primary and secondary users.
To obtain the essential bit error rate at the receiver end depends on the selection of the transmission power. When the transmission power is increased at the transmitter, the International Journal of Distributed Sensor Networks 7 Table 4 Transforming code kHz SNR increases at the receiving end, which causes strengthening in the quality of signals. The transmission power cannot increase up to a limit because when we increase the power in case of the transforming code designed for the pairs of the primary and secondary users, the interference may occur among the other transforming codes. When the multiple users access the spectrum via transforming code, the interferences are to be mitigated among the alternative transforming codes by reducing the transmission power up to some limits. Since the power required for bandwidth 1 + 2 + 3 is more than that of bandwidth 1 + 2 (cf. [2]), due to Scheme 12 of data transmission, we obtain two gains: (1) in power (i.e., the low power is required) and (2) in bandwidth. This means Scheme 12 is opportunistically working in such a way that there is a specific design of bandwidths 1 , 2 available for the different transforming codes 1 , 2 . Hence, if the bandwidth 1 + 2 is greater than the bandwidth 3 of another transforming code 3 , then the code 3 might send its data by 1 + 2 . Consequently the improvement of spectral efficacy in cognitive radio is attained by the pseudo cognitive user 3 through the agreement to utilize the shiftless part of the spectrum 1 + 2 which is allotted to the transforming codes 1 , 2 , the pseudo primary users.

Remark 15.
On every occasion there is clear-cut pattern of bandwidths 1 , 2 , . . . , existing alongside the diverse transforming codes 1 , 2 , . . . , against the pairs of primary and secondary users. Accordingly, if the bandwidth 1 + 2 + ⋅ ⋅ ⋅ + is greater than the bandwidth of a new transforming code , then the code may perhaps send its data by the shiftless part of the spectrum 1 + 2 + ⋅ ⋅ ⋅ + which is allotted to the pseudo primary users having codes 1 , 2 , . . . , . Henceforth the improvement of spectral efficiency in cognitive radio is achieved by the pseudo cognitive user . As a result we proved a process which offers an efficient utilization of spectrum as termed in [12].

Conclusion
This study proposes that there is an alternate way for transforming the data of a countable family of pairs of a primary user and a secondary user by a countable family of linear transforming codes instead of a countable family of the pairs of linear codes. For this purpose Table 1 provides a suitable transforming code corresponding to the chosen pairs of linear codes for each pair of a primary user and a secondary user. Simultaneously, these transforming codes carry all the information/data, possessed by their corresponding pair of linear codes.
The enhancement of spectral efficiency in cognitive radio is obtained in three different layers.
(1) Data transmission of both types of users through transforming code requires less bandwidth than that of the total bandwidth required for primary and secondary users of each pair of the family.
(2) Scheme 9 is offered whenever there is no order in the set of bandwidths required for the set of transforming codes; then, information/data will transmit independently.
(3) Scheme 12 works opportunistically in such a manner that there is an accurate configuration of bandwidths 1 , 2 , . . . , available and unfilled against the distinct transforming codes 1 , 2 , . . . , corresponding to the pairs of primary and secondary users. Accordingly, if this total bandwidth 1 + 2 +⋅ ⋅ ⋅+ is larger than the bandwidth of another transforming code , then code uses 1 + 2 + ⋅ ⋅ ⋅ + for its data transmission. During this strategy there is a further gain in spectrum saving than of Scheme 9.
This model can serve in a more complex situation whenever we consider a variation in the degree of the given polynomial ( ).