Professional Documents
Culture Documents
The Impact of Queue On Opportunistic Based Cognitive Radio Networks JOC-2011
The Impact of Queue On Opportunistic Based Cognitive Radio Networks JOC-2011
The Impact of Queue On Opportunistic Based Cognitive Radio Networks JOC-2011
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG
1 INTRODUCTION
raditional wireless networks use fixed spectrum allocation methods for licensed users. Recent studies on
the measurement of the spectrum show that by conventional spectrum allocation methods, the average utilization of the spectrum is low [1], [2]. Nowadays, exploiting the scarce spectrum resources has been significantly
improved with emergence of dynamic spectrum access
methods [3], [4] as well as cognitive radio technology [5].
Networks with opportunistic access to the spectrum allow the secondary users to use the primary users spectrum, if they are idle in a specific time or location. Each
secondary user is supposed to have the capability of realization and usage of these idle channels [5]. Thus, secondary users can coexist with primary users in a given
service area and share the spectrum with primary users
without any harmful impact on them.
A number of schemes related to opportunistic spectrum access have been investigated in the literature. For
example, [6] analyzed the modeling of interference in
spectrum access based on the listen before talk scheme. In
[7], a measurement-based model for statistically describing the idle and busy periods of a WLAN is proposed. [8]
proposed a network in which a primary user coexists
with N secondary users with different types of traffic.
They showed that the spectral efficiency can be increased
by giving permission to reuse free bands of secondary
users [9]. In [10], a channel reservation method for a spectrum sharing system has been introduced. Also several
works has been done to use queues in cognitive radio
networks; [11] analyzes the performance of the network
with a delay and discard queue. Authors in [12] have
10
(1)
11
p
p
s
,
(+ )s
,+
p
(+ )p
+ ,
s
,
( j ) p
+ ,
N)
(b) (k1 + k2 =
where ( k 2 ) = 0 for every k 2 = 0 and is equal to 1 in (Tkk1, k+1, k2 + Tkk1, k1, k2 + Tkk1, k+1, k2 1 + Tkk1, k, k2 +1 + Tkk1, k, k2 1 ) I{k , k }
1 2
1 2
1 2
1 2
1 2
1 2
other cases. A forced SU disconnection depends on the
k1 , k2
k1 , k2
{k1 , k2 } Tk1 +1,k2 I{k1 +1,k2 } {k1 + 1, k2 } + Tk1 1,k2 I{k1 1,k2 }
remaining number of channels and users in the system.=
The transitions rate Tkk1, k+1, k2 1
, represent the state in
1
2
{k1 1, k2 } + Tkk11,k,k22+1 I{k1 ,k2 +1} {k1 , k2 + 1} + Tkk11,k,k221
which a secondary user is interrupted from the system.
{k , k }I
1
=
k 2 0=
k1 0
{ k1 , k2 }
=1
(4)
In this section we describe different measures of interest, such as blocking and dropping probabilities for two
cases of with and without queue, as well as channel utilization.
= k1 p 1{1 k1 N ,0 k2 N }
and
3 PERFORMANCE METORICS
(3)
k2 s 1{0 k1 N 1,1 k2 N k1 } +
(k , N k )
k1 = 0
PBSU =
k1= 0 k2= N k1
(5)
(k1 , k2 )
(6)
s
,
s +s
(a)
,+
s +(+ + )s
(b)
(9)
1 N N k1
k0 ((k1 + k2 ) (k1 , k2 ))I{k1 ,k2 }
N=
k1 0=
2
(10)
1 N N k1
[ ((k1 + k2 ) (k1 , k2 ))I{k1 ,k2 }
=
N=
k1 0=
k2 0
N
p
( + )p
+
+ ,
(k1 + k2 > N )
PB
=
=
(k1 N=
, k2 0)
PU
(7)
and
N
(N , k )
2
k1 =1 k2 = N k1 +1
(11)
,+
k2 = 0
(N k , k )
k2 =1
and
PBPU =
(k1 + k2 =
N)
+ ,
(+ )p
s +( + )s
,
=
PDSU
12
(8)
13
0.9
0.45
0.35
0.3
0.8
0.25
0.2
0.15
0.75
0.7
0.65
0.6
0.1
0.55
0.05
0.5
0
100
200
800
700
600
500
400
300
Number of SUs per cell (numer of PUs=500)
with queue
without queue
0.85
channel utilization
0.4
900
0.45
100
1000
200
900
1000
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
100
200
300
800
700
600
500
400
number of SUs (number of PUs = 500)
900
1000
0.14
both calculated and simulated over a wide range of the users traffic with different populations. Fig. 4 shows a good
compatibility between numerical and simulation results of
the proposed schemes. The simulation was performed in
MATLAB.
Fig. 5 shows the channel utilization for two cases of with
and without queue. It can be observed that the channel utilization is slightly increased when queue is used for SUs. This
is due to SUs reconnection into the channel that increases
the probability of busy channel consequently.
Fig. 6 shows the blocking probability of the PUs and SUs
in two cases of with and without queue. It can be seen that in
both cases, increasing the SUs number has no effect on
blocking probability of the PUs. The reason is that we have
assumed an ideal channel sensing performed by SUs. The
blocking probability of the SUs in the case of using queue is
more than the case of without it. This can be explained as
follows. When there is a queue in the system, the channel
utilization increases and this will increase the probability of
busy channels. Then at the SUs arrival times, there is more
probability for them to see the channel busy and therefore
the blocking probability will increase.
Fig. 7 demonstrates the call dropping probability of the
SUs as the SUs traffic increase in both cases. According to
this figure, the dropping probability of the SUs in the case of
using queue is dramatically lower than the case with no
queue, because as the SUs are dropped by the PUs, they
move to the queue and the queued secondary calls reconnect
back to the system as soon as they find an idle channel.
Fig. 8 shows the mean waiting time of the SUs in the
queue. It can be seen that as the SUs population increases,
the mean waiting time will increase as well.
According to the results of figures 5 to 8, it can be said
that an increase of the SUs population does not affect the
performance of the primary users. If there is a queue, the
dropping probability of the SUs will significantly reduce at
300
400
500
600
700
800
number of SUs (number of PUs = 500)
0.12
0.1
0.08
0.06
0.04
0.02
100
200
800
600
700
400
500
300
number of SUs (number of PUs = 500)
900
1000
0.5
[4]
0.45
[5]
0.4
0.35
[6]
0.3
[7]
0.25
0.2
[8]
0.15
0.1
100
[9]
200
300
400
500
600
700
800
number of SUs (number of PUs = 500)
900
1000
5 CONCLUSION
In this paper, we used Markov model to evaluate the impact of using queue in opportunistic radio management of
secondary users in a cognitive radio network. Metrics such
as the blocking and dropping probabilities for users in cases
of with and without queue are derived and computed. Both
numerical and simulation results show that opportunistic
spectrum sharing increases the channel utilization and if
there is a queue for SUs, this increase is even more. It also
showed that the presence of queue reduces the dropping
probability of SUs while slightly increases their blocking
probability and leads to experiencing some delays for SUs,
which is a well-known trade-off between blocking and
dropping probabilities. In general, it is demonstrated in this
paper that at least as far as we assume a perfect channel
sensing mechanism, using queue for SUs is beneficial for
secondary network users.
ACKNOWLEDGMENT
This work is supported by Iranian Education and Research Institute for Information and Communication Technology (ERICT), under the grant number 500/8974.
REFERENCES
[1]
[2]
[3]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
14
network: a survey, Elsevier Computer Networks, vol. 50, pp. 21272159, Sept.2006.
A. Attar, M. S.A. Ghorashi, Sooriyabandara and A.H. Aghvami,
Challenges of real-time secondary usage of spectrum, Computer
Networks 52 (2008) 816830.
J.Mitola III, Cognitive radio: an integrated agentarchitecture for
software defined radio, PhD thesis, KTHRoyal Institute of Technology, Stockholm, Sweden, 2000.
A. E. Leu, M. McHenry, and B. L. Mark, Modeling and analysis of
interference in listen-before-talk spectrum access schemes, Int. J.
Network Mgmt, vol. 16, pp. 131147, 2006.
S. Geirhofer, L. Tong, and B. Sadler, A measurement-based model
for dynamic spectrum access in WLAN channels, in Proc. IEEE
MILCOM06, pp. 17, Oct. 2006.
A. S. Zahmati, X. Fernando, and A. Grami Steady-State markov
chain analysis for heterogeneous cognitive radio networks, IEEE
sarnoff symposium, Princeton, pp. 1-5, May, 2010.
S. Tang and B. L. Mark, Performance analysis of a wireless network with opportunistic spectrum sharing, in Proc. IEEE Globecom07, Washington, D.C., USA, Nov. 2007.
X. Zhu, L. Shen and T.-S. P. Yum, Analysis of cognitive radio
spectrum access with optimal channel reservation, IEEE Commun.
Letters, vol. 11, no.4, pp.304-306, Apr. 2007.
M. Zhang, Sh. Jiang, G. Wei, and H. Wang, Performance analysis of the
cognitive radio network with a call level queue for secondary users,
Wireless communications, Networking and Mobile computing, Wicom09,
IEEE. Beijing, pp. 1-4, Sept. 2009.
L. J. Pla, V. Li, and F. Y, Analysis on channel bonding/aggregation
for multi-channel cognitive radio networks, IEEE (EW), European.
Lucca, pp. 468-474, Apr. 2010.
L. Jongheon, S. Jaewoo, Analysis of cognitive radio networks with
channel aggregation, IEEE (WCNC). Sydney, Australia. pp. 1-6,
Apr. 2010.
S. Tang and B. L. Mark, Performance analysis of a wireless network with opportunistic spectrum sharing, in Proc. IEEE Globecom'07, Washington, D.C., USA, Nov. 2007.
S. Tang, M. B. L, Modeling and analysis of opportunistic spectrum
sharing with unreliable spectrum sensing, IEEE Trans. On wireless
communication, pp. 1934-1943, Apr. 2009.
S. Tang, Performance modeling of an opportunistic spectrum
sharing wireless network with unreliable sensing, IEEE (ICNSC),
pp. 101-106, Apr. 2010.
Y. Fang, Y.-B. Lin, and I. Chlamtac, Channel occupancy timesand
handoff rate for mobile computing and PCS networks, IEEE Trans.
on Computers, vol. 47, pp. 679692, June 1998.
Samira Homayouni is a M.Sc. student in Cognitive Telecommunications Research Group, at the Department of Electrical Engineering,
Shahid Beheshti University, Tehran, Iran. Her research is focusedon
Cognitive Radio Networks, opportunistic spectrum access, dynamic
spectrum sharing and queuing theory.
Seyed Ali Ghorashi Received his B.Sc. and M.Sc. Degrees in electrical engineering from the university of Tehran, Iran, in 1992
and1995, respectively. Then, he joined SANA Pro. Inc., where he
worked on m odeling and s imulation of OFDM based wireless LAN
systems and interference cancellation methods in WCDMA systems.
Since2000, he worked as a research associate at Kings College
London on Capacity enhancement methods in Multi-leyer WCDMA
systemssponsored by Mobile VCE. In 2003 he received his PHD at
Kings College and since then he worked at Kings College as a
research fellow. In 2006 he joined Samsung Electronics (UK) Ltd as
a senior researcher and no w he is a f aculty member of Cognitive
Telecommunications Research Group, Department of Electrical
Engineering, Shahid Beheshti University G.C., at Tehran, Iran, working on wireless communication.