Professional Documents
Culture Documents
AbstractˉIn this paper, we develop a multi-user cognitive radio In our scenario model, we set the parameter of secondary
sharing network based on opportunistic spectrum access, where user’s sensing range which is related to the scale of
primary and secondary users can peacefully coexist in the same availability of spectrum holes and consider the interaction
system to share the spectrum and improve the utility of licensed between secondary users and primary users. To increase the
spectrum. Under this scenario, we introduce two constraints to probability of secondary user’s access and system throughput,
guarantee their successful transmission, interference temperature
we propose two system interference constraints respectively
limit at the primary users and SINR limit at the secondary users.
The objective of our interest is to obtain the number of secondary for primary users and secondary users, interference
users who can coexist peacefully with primary users, at the same temperature[8] and SINR limit. In this paper, we intend to
time maximize the total goodput under the two constraints. address a cognitive network with multiple primary users and
Through analysis and simulation, the new strategy of spectrum secondary users. When introducing the interference
sharing does improve the goodput performance as well as temperature and SINR constraints, the new spectrum sharing
guarantee the QoS of primary and secondary users. method with the combination of overlay and underlay
approach not only guarantees the QoS requirements but also
Keywords-spectrum sharing; interference temperature limit; enhances the system goodput and improves the spectrum
SINR limit; opportunistic spectrum access
utilization.
I. INTRODUCTION II. SYSTEM MODELING
With advances in wireless technologies the limited radio Consider a cognitive network that consists of Np
spectrum becomes increasingly crowded and spectrum sharing independent primary users (node-pairs) and Ns independent
arises whenever multiple wireless systems operate in the same secondary users (node-pairs) who want to share the licensed
frequency band and interfere with each other[1-2]. Due to mutual spectrum based on paper [5]. Node-pairs distribute uniformly
interference, the performance of the systems is a tradeoff in a circular area with unit radius r = 1 , i.e. the probability that
between the goodput and the interference to the primary users. any node is located at a distance dr from the center of the
Some related works have been done to study the
disc is given by p(dr ) = 2dr .In any time slot, a delay-sensitive
performance of secondary users in spectrum sharing with
primary users[3-7]. A Markov chain model with prioritized data packet is generated at the transmitting node of a node-pair
primary access and channel reservation was presented in paper with a probability pro , i.e. the nodes within a node-pair have
[3, 4], to estimate secondary users performance, a block call data to exchange for a fraction pro of the time. The spectrum
and drop call for secondary user was defined. However, if all is divided into Np sub-bands, and these Np sub-bands are
the available channels were occupied, the secondary user
licensed to primary users. Every primary user has its own sub-
would have no opportunity to access the system and the
band to transmit data. In each slot, if a secondary user has data
probability of block call was still large. And in paper [5],
to transmit, it has to sense the spectrum condition and explore
author solved how much spectrum sharing was optimal with
a spectrum opportunity to access.
fixed interference in cognitive radio network using interweave
approach, but it did not consider the different infection of The ( Np + Ns ) users in the unit circular can be described
inconstant interference to the secondary and primary users, by the location with the set of random variables as follows:
and could not guarantee the QoS of users with more D p,i = { xp(1,i ) , xp(2,i ) , yp(1,i ) , yp(2,i ) , ldpi } , 1 ≤ i ≤ Np where
transmission of secondary users in the system. Paper [6]
studied the problem of joint admission control and power ldpi = ( xp(1,i ) − xp(2,i ) )2 + ( yp(1,i ) − yp(2,i ) )2 is the link
allocation for cognitive radio networks. Game theory [7] was distance of primary node-pairs, and similarly we
define Ds , j = { xs(1, j ) , xs(2, j ) , ys(1, j ) , ys(2, j ) , lds j } , 1 ≤ j ≤ Ns for
also used for multi-user optimization for competitive spectrum
sharing in cognitive radio networks. Most of them focus on
spectrum allocation among secondary users without taking the secondary node-pairs, where ( xp(1,i ) , yp(1,i ) ) with
primary users’ activities into consideration. ( xp(2,i ) , yp(2,i ) ) , 1 ≤ i ≤ Np is the primary node-pairs and
by dss(i, j ) , 1 ≤ i, j ≤ Ns . {3} T
Rs
PU (3)
SU
We introduce the parameter Rs to specify the proper (2) R T
R
PU
sensing range that a secondary user searches for the transmit
R Rs
opportunities by sensing within the radius Rs [5]. If Rs = 0 ,
there is no detection, but if Rs = 2 , the secondary users can
sense all the primary users in the system and make a perfect
detection. And only if both the secondary transmitter and the Figure1. A cognitive network scenario. PUs and SUs connected with
lines represent primary and secondary node-pairs respectively, and dot line
secondary receiver do not detect primary users in the sensing means the sensing range. The numbers beside the node-pairs in brackets and
range, the secondary node-pairs can transmit data on the free braces respectively denote the primary and secondary users’ communication
sub-bands. The sensing range avoids the unwanted collision channel.
from neighboring nodes. The system scenario is depicted in
A. Interference temperature and SINR limit
Figure 1.
The secondary users observe the change of spectrum The interference temperature is a measure of the power
availability due to different sensing range and adapt their and bandwidth occupied by interference. In the given system
strategy accordingly. Two approaches to spectrum sharing model, we establish an interference temperature limit ITL . This
between primary and secondary users have been considered: bound is the maximum amount of tolerable interference for the
spectrum underlay and overlay[9]. In this paper, we combine primary users and will result in no noticeable impact on the
the underlay with overlay approach to improve the spectrum QoS. Any secondary user transmitting on this band must
efficiency. If there has free channel, the secondary user who guarantee that their interference caused by transmissions must
want to access exploits the free channel in terms of overlay
not exceed ITL at the primary receivers. Let P denotes
approach, and if there is no free channel, the secondary user
access with overlay approach. The detailed strategy is average transmission power intended for the secondary user
specified as follows: If the secondary node-pair finds there is and primary user, with bandwidth B , assume the sub-band is a
no primary user within the sensing range, the secondary user slow fading channel, so the interference temperature at the i th
can randomly select a channel to transmit. If more than one primary receiver is calculated as:
free sub-channel, the secondary user randomly select one of 2
j∈Λ i ¿
Similarly, the sum goodput of secondary users only
includes the users whose SINR satisfies the limit, and denoted
by:
Ns
Csums = E{ Dp ,i , Ds ,i } ®¦ pro ⋅ I ( SINR j ≥ SINRL )
¯ j =1
½ (7)
P / lds( j )2 °
⋅ B ⋅ log(1 + )¾
¦ P / dss (k , j )2 + P / dps (i, j )2 + σ 2 °
k∈Λi / j ¿
So, we have the sum good put of the system as follows:
Figure 3. Sum goodput vs. the number of secondary users
Csum = Csump + Csums (8)
( Rs = 1.1 , SINRL = 0.04 )
where I (⋅) is the indicator function, it is 1 if the inequation is Given a Rs , figure 3 considers the scenario where the
satisfied and 0 otherwise. Through applying Monte Carlo primary users have different ITL . The higher ITL means the
Simulation Method to solve the (6) and (7), we get statistical
higher interference tolerance at each primary user. So with the
mean of sum goodput of the system and the users. At the same
increasing ITL , the sum goodput is obviously increased, i.e.
V. CONCLUSION
In this paper, we investigate a cognitive network scenario
with multiple primary and secondary node-pairs. The entrance
of secondary users introduces the interference, but with the
interference tolerance of the users, spectrum sharing of
primary and secondary users not only enhances the spectrum
utilization but also increases the system goodput. Through
Monte Carlo simulations, we get numerical result of the
secondary users coexisting with primary users under the two
constraints and sum goodput. Numerical results demonstrate
that the strategy of spectrum sharing with the combination of
Figure 4. Sum goodput vs. the number of secondary users underlay and overlay approach does improve the goodput
( Rs = 1.1 , ITL = 0.6 ⋅1016 ) performance and guarantee the protection of primary users
form excessive interference by secondary users as well as
In Figure 5, we show the system primary and secondary
provide some QoS requirements of secondary users.
user’s goodput with the change of Rs and the different
number of secondary users in the system. From figure5 (a), we REFERENCES
can see that with few secondary users in the system, a larger [1] S. Haykin, “Cognitive radio: Brain-empowered wireless
sum goodput can be achieved by increasing Rs . When communications”. IEEE JSAC, vol. 23(2005). no. 2, pp. 201-220.
collision increases with larger entrance of secondary users, the [2] Raul Etkin, Abhay Parekh, David Tse, “Spectrum Sharing for
sum goodput gradually cuts down. At Ns = 8 , the sum Unlicensed Bands”, IEEE Journal on Selected Areas in
Communications, vol. 25(2007), no. 3.
goodput of the system is optimal. Figure 5 (b) depicts the [3] Pak Kay Tang, Yong Huat Chew, Ling Chuen Ong, “Performance of
primary user’s goodput with Rs . When there are no secondary Secondary Radios in Spectrum Sharing with Prioritized Primary
users in the system, the primary user’s goodput keeps Access”, Military Communications Conference, 2006.
[4] Xiaorong Zhu, Lianfeng Shen, Tak-Shing Peter Yum, “Analysis of
unchanged. With the more secondary users access the system Cognitive Radio Spectrum Access with Optimal Channel Reservation”,
to transmit, the primary user’s goodput gently decrease with IEEE communication letters, vol. 11(2007), no. 4.
the constraint of the same ITL and Rs . To secondary users, the [5] Sudhir Srinivasa, Syed Ali Jafar, “How much Spectrum Sharing is
Optimal in Cognitive Radio Networks?”,
goodput increased by increasing the secondary users, but duo http://newport.eecs.uci.edu/~syed/newpage/resume.html, 2007.9.
to the influence of interference, the secondary user’s goodput [6] Lan Zhang,Ying-Chang Liang,Yan Xin, “Joint Admission Control and
decreases at the same Rs in figure 5(c). With more secondary Power Allocation for Cognitive Radio Networks”, ICASSP 2007. IEEE
International Conference. vol. 3(2007), pp. III-673-III-676.
users in the system, the probability of the secondary user’s [7] Niyato, D. Hossain, E, “A Game-Theoretic Approach to Competitive
transmission in the same sub-band increases and the secondary Spectrum Sharing in Cognitive Radio Networks”, WCNC 2007.
users who meet the constraint of SINR will cut down. [8] Ben Flood, Simon. P. Wilson, Timothy K. Forde, “Spatio-temporal
Modeling of Interference Temperature for Reliable Reception”,
DRAFT, 2007.
[9] Qing Zhao, Swami, A, “A Survey of Dynamic Spectrum Access: Signal
Processing, Networking, and Regulatory Policy”, ICASSP 2007. vol:
4(2007), pp.IV-1349-IV-1352.
[10] T. Charles Clancy, “Achievable Capacity under the Interference
Temperature Model” in the IEEE INFOCOM 2007 proceedings.
[11] Yi ping Xing, Chetan N. Mathur, M.A. Haleem, R. Chandramouli, K.P.
Subbalakshmi, “Dynamic Spectrum Access with QoS and Interference
Temperature Constraints”, IEEE transactions on mobile computing,
vol. 6(2007), no. 4.