Recent Researches in Electrical Engineering Impact of Primary Users on Secondary Users Channels in a Centralized Cognitive Radio networks ESENOGHO EBENEZER, TOM WALINGO AND FAMBIRAI TAKAWIRA Discipline of Electrical, Electronics and Computer Engineering University of KwaZulu-Natal, 4041, Durban King George Avenue South Africa [email protected], tom@ukzn,ac.za Abstract: - Cognitive radio network is a research paradigm in solving the problem of TV white space spread across spectrum. However, this underutilized resources that is facing scarcity is being used by unlicensed secondary users opportunistically when the primary users are idle i.e., when the channels are not occupied by primary users (PUs). Thus, maximizing the spectrum and vacating the channels before the primary users arrives since they have higher priority. If primary user arrives and the secondary user is till transmitting packets, by the principle of overlay, the SU is forcefully terminated or buffered and if the PU arrives and enough channel exist how does it affect the SU performance. This paper investigates the impact of the primary users on the secondary channel in a cognitive radio network in terms of the throughput, average service time, delay etc. The occupancy of the primary channel is modelled as a discrete-time two Markov chain also, a simplified analytical model is presented to obtain the performance of an Opportunistic spectrum sharing or access (OSA) using the secondary and incumbent channels, and is validated with analysis. Key-Words: - Cognitive Radio Network (CRNs), Primary users, Secondary Users, discrete-time, Markov chain, channels. wireless services and applications with limited resources (spectrum) [5] [6] 1 Introduction The demand for radio band has rapidly been on the rise. This is not far from the fact that wireless network are speedily gaining popularity over their wired counterpart mainly due to the low cost and portability, which, in turn has exponentially increase the demand for spectrum [1]. Also, wireless application and services are rapidly on the rise in size, number and complexity thereby are band width hungry which in turn demand for more spectrums. However, extensive measurement shows that the fixed frequency allocation results in low utilization (only 6%) of the license radio band in most of the time [2] [3]. Moreover the remaining portion of the unlicensed band is being used-up by these evolving wireless services and application, hence leading to the problem of spectrum scarcity and hence call for a better spectrum management strategies and policies[4][3]. The Cognitive Radio system uses OSA [7] [5] which is an optimal way to exploit the temporary unused spectral resources by constantly sensing the primary user band. Also the sensing information which is like a feedback to the cognitive radio base station (CRBS) of the secondary users form an awareness map of all the licensed band that is not in used or idle and so manageability massive unused resources become less of a problem. But this primary uses are not aware of the existence of the secondary users and so, no pre-notice is given before they arrives to occupy their channels, these raise the question of how the secondary users will react when the primary users appears? This paper, we investigates to show the impact of primary users on the secondary user performance through simulations and carefully worked-out model couple with a simplified discrete–time two state Markov chain to analyse the PU channels occupancy. The channel takes the value of 1or 2 subject to whether the channels are in BUSY-state or IDLE-state respectively In other to better maximize the license band, a promising approach which improves spectrum utilization, by dynamically allowing spectrum sharing between the licensed users known as the primary users PUs and the unlicensed users called the secondary users SUs is proposed, all in the bid to cope with rapid growth in multimedia and ISBN: 978-960-474-392-6 284 Recent Researches in Electrical Engineering 2 the channel is at busy state or at idle state, respectively. It transits from Busy-state to Idle-state with probability and stays in idlestate with probability . Fig .2a and 2b shows a transition diagram and the sensing of secondary users. Note that busy/on and idle /off are interchange respectively. We considered a secondary user looking for spectrum opportunities in the primary channel. However, prior to sensing and gaining access to the primary user channel, the secondary users initially harmonize with the slot arrangement of the incumbent channel. If the primary user is sensed to be busy, the cognitive users can send its packet. But if the channel or slot is busy, cognitive users restrain from sending data to avoid interference. However, the cognitive users keep sensing the channel/slot by keeping the packet at the head-of line position of the queue, and sense the primary channels again at the next slot see Fig. 2a.The cognitive users senses the primary channels at an average interval of sequentially for each time slots at the beginning of each fixed queue for a secondary users packet for each slot beginning of the queue, where [11]. However a secondary user have not send packet for succeeding time slots, it will sent in the next time slot. Related Work The underutilization of spectrum under the present fixed spectrum management strategy has spur many research work especially on dynamics of accessing the primary user channels [10]. In [7] the authors proposed a two cognitive MAC protocol scheme to support voice services in the presence of the primary user .In [8] the author came up with a simple approximated model for un-slotted OSA networks under a non-saturated condition. In [9] the author classifies secondary users as high and low priority respectively and buffers the secondary users with low priority. In [11] the author did a unique performance analysis but did not consider if it is a centralized setup and also did not consider delay as one of his performance metrics. A catalogue of dynamic spectrum access is found in author [12]. Lastly, the OSA is one of the several approaches to dynamic spectrum access. 3 System Model and Assumptions Considered in this work is an infrastructure-based cognitive radio network scenario where a PU channel are sensed by secondary user and send sensed information to the cognitive based station which grant access to the primary channel see Fig. 1. Note, when the PU is idle or not occupying its channel the channel becomes that of the secondary user at that time. Though, when the primary user arrives, by the principle of overlay, the secondary user will vacate its channel due to PU high priority even if SU has packet to transmit. Fig. 2a ON/OFF slots diagram showing SU sensing Fig. 2b ON/OFF Markov transition diagram The system assumptions are as follows: Fig. 1 Network Model/Architecture • This paper considered a single primary channel and secondary channel. The time is partitioned in slots, and each time slot the primary user is either busy (occupied) or not. The primary channel is at Busystate if it is used by primary users, and at idle-state when is not using or transmitting packets and secondary users are making use of its channel. The occupancy of the primary channel is modeled as a discrete-time two-state Markov chain. The channel state takes the value 1 or 2 depending on whether ISBN: 978-960-474-392-6 • • • 285 The secondary channel is dedicated to the secondary users. Precise sensing of primary users channel by the secondary users. The cognitive user operates under overload condition where it has packet to waiting to be sent. An infrastructure-based cognitive radio network. Recent Researches in Electrical Engineering • • The secondary users could be real time users (packetize voice call like Skype, viber etc.) or non-real time or elastic (file downloading, browsing etc.) Secondary users transmit in Packets. is the transition probability form state 1 to 2 or respectively, for the hidden markov chain { expressed as; 4 Performance Analysis of the System (8) Model In this section, we analyse the performance of the system model by using a hidden Markov chain (HMC). Also, considered, is a fixed interval points hidden at the start of the time slot after a packet leaves the queue illustrated in Fig. 2a. Denote the order of hidden points. Let be the order of the hidden points and be the state of the primary channel at the hidden point . (9) (10) (11) From the problem formulation, we are dealing with discrete random variable. However, the conditional probability mass function, Then, we define our state as as a birth death process whose behaviour guided by the Markov kernel or transition matrix. Expressed [11] as For and transition matrix kernel is expressed as: For , given that is gotten as .the (13) In this work, we introduce the service time and the delay between transitions these two are essential performance metrics when considering quality of service of cognitive users. However, the delay is the difference in time between transitions for example from ON-OFF with probabilities of (0.2, 0.8, 0.8, 0.2 and 0.5, 0.5) respectively, although, we obtained the delay from our simulations. The service time could be express as the time frame required for a packet to be effectively sent after it is positioned in the head-of-line [11] of the queue at the inception, which depends on the state of primary channel when it move to the head-of line position. Let the state probability be , the probability of the channel in state will be where then, the state of the channel when a secondary user packet moves to the head-of -line of the queue is expressed as, Where (5) Therefore, ISBN: 978-960-474-392-6 286 Recent Researches in Electrical Engineering The secondary user total throughput of the secondary user, defined as the number of secondary user packet successfully sent per slot, is expressed as, Haven established that the state of the channel is when the secondary user packet moves to the headof-line position of the queue, the conditional probability that the service time of the packet is is precisely the same as the probability of . However, conditioning the state of the primary channel, the probability distribution can be determined for the service time of the secondary user packets. The probability of that the service time of a secondary user packet is expressed as, 5 Numerical Result and Discussion In this section, we present a numerical result to illustrate the performance of the SU using total throughput of PU and SU, throughput of SU Separately, delays, and average service time. All the illustrated analysis results are based on theoretical analysis and have been verified to a large extent by simulations. Fig.1 illustrate the average service time under different occupancy statistics of the primary channel. With a large probability of 0.8, there is likelihood of the PU state to remain unchanged. This relates to a long tailed traffic arrivals in the primary channel [10]. In the second instance, there are equal chances for it to change state or remain in its current state and lastly, the state of the primary users renaming unchanged with a small probability of 0.2. The time slot λ is varied from 1 to 20. Form the result in fig.1 it shows that different traffic statistics of the primary channels have different performance, but have consistence after a point along λ that is, as λ increase the average service time of the SU packet increase and at a point remain constant. Fig.2 shows that as λ increases, the throughputs Tp and T increases but the saturation throughput over secondary channel Ts which is the difference between Tp and T decreases to 0 as λ increases as shown in fig. 3 And lastly, in fig. 4 it shows the delays for each of the probability as it transits from one state to another. A 0.8 probability indicate that, there are higher changes for it to spend more time than other probability but as λ increases the delay becomes almost uniform indicating saturation. The average service time of the secondary user packet is expressed as Hence, the saturation throughput and which is the throughput of the secondary user over the primary channel and the secondary channel respectively, defined as the number of secondary users packets successfully sent on the primary (respectively secondary) channel per slot. Thus, the saturated throughput and can be expressed as, ISBN: 978-960-474-392-6 287 Recent Researches in Electrical Engineering Acknowledgement This work is supported by Telkom SA and Alcatel Lucent in the Centre for Radio Access & Rural Technologies, Centre for Engineering Postgraduate Studies (CEPS HVDC/smart grid centre). 6 Conclusion We have shown the impact of the primary users on the secondary channel through and analytical and simulation approach. Also, evaluate the secondary user through their performance metrics like delay, throughput and service time. Shown the performance of an OSA scheme, Work is in progress is on channel assembling strategies in an MF-TDMA based CRN, where identified Idle/OFF mini-slots in a sub-channel are assembled for use by real-time and non-real time secondary users respectively. . ISBN: 978-960-474-392-6 288 Recent Researches in Electrical Engineering [11] Yutae Lee “Performance Analysis of Cognitive Network with Primary and Secondary Channels” East Asian Mathematical Journal Vol. 29 (2013), No. 1, pp. 101-107 References: [1] Bechir Hamdaoui and Kang G. Shin “OSMAC: An Efficient MAC Protocol for Spectrum –Agile Wireless Networks” IEEE Transactions on Mobile Computing VOL. 7. NO. 8, AUGUST 2008, Page 915-930. [2] Linbo Zhai, Kaiming Liu, Yuanan Liu, Ming Yang, Lin Zhuang. “A Slot-Based MAC Protocol in Cognitive Radio Wireless Networks” 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 2008 , Page(s): 1 - 4 [3] M. Mchenry “Spectrum white space measurements” New America Foundation Broadband Forum, June 2003. [4] Mehrdad Khaledi and Alhussein A. Abouzeid “Auction-Based Spectrum Sharing in Cognitive Radio Network with Heterogeneous Channels.” Information Theory and Applications Workshop (ITA), 2013 , Page(s): 1- 8 [5] Abdelaai Chaoub, Elhassane Ibn Elhaj, Jamal El Abbadi. “Multimedia traffic transmission over TDMA shared Cognitive Radio networks with Poisson Primary traffic.” International Conference on Multimedia Computing and Systems (ICMCS), 2011 Page(s): 1- 6. [12] Q. Zhao and B. Sadler “Dynamic Spectrum Access: Signal Processing, Networking and Regulation,” Signal Processing Magazine, IEEE, May 2007. Volume:24, Issue: 3 Page(s): 79- 89 [6] Mitola III, “Cognitive Radio: An Integrated Agent Architecture for Software Define Radio” Ph.D. Thesis KTH Royal institute of Technology, 2004 [7] P. Wang, D. Niyato and H. Jiang, Voiceservice capacity analysis for cognitive radio networks, IEEE Trans. Vehicular Technology 59 (2010), no. 4, 1779-1790. [8] Y. Lee, A simple model for non-saturated opportunistic spectrum access networks, IEICE Trans. Commun. E94-B (2011), No. 11, 3125-3127. [9] Y. Lee, C. G. Park and D. B. Sim, Cognitive radio spectrum access with prioritized secondary users, Applied Mathematics & Information Sciences 6 (2012), no. 5S, 601S-607S. [10] Q. Zhao, L. Tong, A. Swami and Y. Chen, Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a POMDP framework, IEEE Journal of Selected Areas on Communications 25 (2007), No. 3, 589-600. ISBN: 978-960-474-392-6 289
© Copyright 2026 Paperzz