Sie sind auf Seite 1von 5

Performance Analysis of Cognitive Radio Spectrum Access with

Prioritized Traffic
Vamsi Krishna Tumuluru, Ping Wang, and Dusit Niyato
Center for Multimedia and Network Technology (CeMNeT)
School of Computer Engineering, Nanyang Technological University, Singapore.
AbstractDynamic spectrum access (DSA) is an important design aspect for the cognitive radio networks. Most of the existing
DSA schemes are to govern the unlicensed user (i.e., secondary
user) traffic in a licensed spectrum without compromising the
transmissions of the licensed users, in which all the unlicensed
users are typically treated equally. In this paper, prioritized
unlicensed user traffic is considered. Specifically, we prioritize
the unlicensed user traffic into two priority classes (i.e., high
and low priority). Two different DSA policies are proposed to
manage the handoff for prioritized unlicensed user traffic (i.e.,
reassigning new channels to the secondary users which paved
way for licensed user). These two policies are different in which
one allows to drop the ongoing low priority secondary users to
accommodate more high priority secondary users being replaced
by the presence of licensed user while the other does not allow
that. We also study the impact of sub-channel reservation for
the high priority secondary users in both DSA policies. Both
DSA policies are analyzed using Markov chain. For performance
measures, we derive the blocking probability, the probability of
forced termination and the throughput for both high and low
priority unlicensed users. The numerical results are verified using
simulations.

the corresponding channel are either reassigned1 to another


unused licensed channel or terminated. Recently, some works
dealt with the performance evaluation of the CRN under
different DSA policies, using continuous time Markov chain
(CTMC) analysis [4]-[7]. According to the DSA policy in [4],
the secondary users which experience unsuccessful handoff are
queued till they find the transmission opportunities. In [5],
DSA policy considered channel reservation for secondary user
handoff. In [6], the secondary user arrivals wait in a queue
when a channel2 is not available. In [7], the DSA policy
assigns variable bandwidth to the secondary users. In all these
works, the CRN was modeled as a call admission control
system which receives calls from both primary users (PUs)
and secondary users (SUs). During the spectrum access, the
PU calls have a higher priority over the SU calls.
Unlike the above works, in this paper, we consider prioritization among the SUs while accessing the licensed spectrum.
For example, the SUs with real-time traffic have higher priority
than those with non real-time traffic. To date, only a few
works ([8] and [9]) have taken prioritized SU traffic into
consideration. However, these works have not addressed the
issue of spectrum handoff under prioritized SU traffic. For
the simplicity of presentation, we consider that the SU traffic
is composed of two priority classes3 (i.e., high and low
priority). We propose two DSA policies to handle the spectrum
access for the SUs in the licensed spectrum. The two DSA
policies have different SU handoff mechanisms. Further, we
also introduce sub-channel reservation for the high priority SU
call arrivals in both the DSA policies. We develop analytical
models for the CRN under both the DSA policies using CTMC
models. The performance of the DSA policies is evaluated in
terms of the blocking probability, the probability of forced
termination, and the throughput for both high and low priority
SUs.

Keywords Cognitive radio, dynamic spectrum access,


Markov chain analysis, priority.

I. I NTRODUCTION
In recent years, several spectrum surveys have been conducted to understand the spectrum utilization in the licensed
and unlicensed portions of the radio spectrum [1], [2]. These
surveys revealed that under the present spectrum regulatory
policies, major portions of the licensed spectrum are underutilized for most of the time, while the unlicensed spectrum
is heavily used and is often insufficient. Among the efforts to
improve the overall spectrum utilization, the concept of cognitive radio is gaining much importance [3]. The cognitive radio
network (CRN) is composed of licensed users and unlicensed
users sharing the licensed spectrum. In most cases, the licensed
users (also called primary users) are oblivious of the existence
of the unlicensed users (also called secondary users). In the
CRN, the secondary users are allowed to dynamically access
unused channels (i.e., frequency bands) in the primary user
spectrum, thereby improving the overall spectrum utilization.
Secondary user transmissions in the CRN can be effectively
managed by a dynamic spectrum access (DSA) policy. Using
the DSA policy, the secondary users are assigned unused
channels in the primary user spectrum. In the event of a
primary users arrival, the secondary users transmissions on

II. S YSTEM M ODEL


The licensed spectrum is divided into M channels, each
of which is further divided into N sub-channels, as shown in
Fig. 1. A PU call is assigned one channel whereas a SU call is
assigned one sub-channel for data transmission. The licensed

1 The process of reassigning a displaced secondary user transmission is


referred to as handoff.
2 In this paper, the terms licensed channel and channel are used interchangeably.
3 Please note that the proposed analytical model is not restricted to the two
priority class case and can be extended to the case of more than two priority
classes.

III. P ERFORMANCE A NALYSIS

spectrum is shared by the PUs and SUs. The PUs have the
highest priority in accessing the channels. The secondary users
are classified into two priority classes. The high priority SUs
are denoted as SU1 while the low priority SUs are denoted as
SU2 . Similar to [4], we assume that a central controller exists
to implement the DSA policy. The objective of the DSA policy
is to assign idle sub-channels to the incoming SU calls, and
moderate their handoff. We consider two DSA policies for our
system model. They are denoted as DSA-C1 and DSA-C2.

In this section, we develop analytical models for the CRN


corresponding to each DSA policy using continuous time
Markov Chain (CTMC).
The state of the CTMC (for both DSA policies) is defined as
z = [i, j, k]. Here, i {0, 1, . . . , M N }, j {0, 1, . . . , M N
} and k {0, 1, . . . , M } represent the number of ongoing
SU1 , SU2 , and PU calls in the system, respectively. The total
number of occupied sub-channels in the state z is calculated
as Y = i + j + kN . For a valid state, Y should not
exceed M N . Let l (where l {0, 1, . . . , N }) and m (where
m {0, 1, . . . , N }) denote respectively the number of SU1
and SU2 calls displaced by an incoming PU call when the state
is [i, j, k]. l and m should satisfy the following conditions:

sub-channel
1

N(M-1)+1

MN

channel

l i, m j and l + m {0, 1, . . . , N }
r = M N Y (N (l + m)) and r 0
s = (l + m) min(r, l + m) .

Licensed spectrum
Fig. 1. System model.

A. Sub-channel Reservation under DSA-C1 and DSA-C2

In Eq. (1), the first condition gives the maximum number of


SUs that can be displaced upon a PU arrival whereas the second condition gives the number of sub-channels available for
handoff (denoted as r) for the displaced SU calls. Accordingly,
the total number of unsuccessful handoff calls (denoted as s)
is calculated.
The evolution of the state [i, j, k] of the CTMC is presented
under three cases of Y :
1) Y N (M 1): The system has at least N idle subchannels.
2) N (M 1) < Y < M N : The system has idle subchannel in the range {1, . . . , N 1}.
3) Y = M N : The system has no idle sub-channel.
For the case Y N (M 1), all displaced SU1 and SU2
calls perform successful handoff (i.e., s = 0) when displaced
by a PU arrival. In other words, no calls are terminated (under
both DSA-C1 and DSA-C2) due to an incoming PU call. For
the case N (M 1) Y M N , s = {1, . . . , N 1}
number of SU calls experience unsuccessful handoff, whereas
when Y = M N , s = N SU calls experience unsuccessful
handoff. The exact number of terminated SU1 and SU2 calls
under each centralized DSA policy are explained later. Let l0
and m0 denote the number of terminated SU1 and SU2 calls,
respectively. Thus, l0 + m0 = s.

Under both the DSA policies, a number of sub-channels are


reserved for high priority secondary user SU1 , i.e., when the
total number of idle sub-channels is less than which is the
number of sub-channels reserved for SU1 , the new SU2 call
will be rejected. In this way, we provide higher priority for the
SU1 calls over the SU2 calls4 .
Call arrivals occur independently as Poisson processes with
mean arrival rates p , 1 and 2 for PU, SU1 and SU2 , respectively. The service times independently follow exponential
distributions with mean service rates of p , 1 and 2 for PU,
SU1 and SU2 calls, respectively. The number of ongoing PU
calls is denoted as k and the number of occupied sub-channels
is denoted as Y . The new calls are dropped when the system
becomes full (i.e., Y = M N for SU1 call, Y = M N for
SU2 calls and kN = M for PU calls).
B. Handoff Mechanism under DSA-C1
When a new PU call claims a channel occupied by the SUs,
the handoff mechanism is initiated. During handoff, the idle
sub-channels (if any) are first assigned to the displaced SU1
calls. Thereafter, the remaining idle sub-channels are assigned
to the displaced SU2 calls. If the required idle sub-channels are
not available for SU1 handoff, then some ongoing SU2 calls
are terminated and the resulting idle sub-channels are assigned
to the displaced SU1 calls. When the idle sub-channels are not
enough to accommodate all the displaced SU1 or SU2 calls,
some of the displaced calls will be terminated.

A. State Transitions under DSA-C1 Policy

C. Handoff Mechanism under DSA-C2


DSA-C2 policy is similar to DSA-C1 policy except that no
ongoing SU2 calls are terminated for the sake of SU1 handoff.
In other words, if a displaced SU1 call does not find an idle
sub-channel, it is terminated.
4 Note

that the PUs are not affected by such sub-channel reservation.

(1)

Under the DSA-C1 policy, the transitions for the state


[i, j, k] for different cases of Y are explained in Fig. 2.
State transitions from/to the state [i, j, k] occur due to any
of the six possible events, namely PU arrival, SU1 arrival,
SU2 arrival, PU departure, SU1 departure and SU2 departure.
Each state transition is represented by its corresponding rate.
Taking as an example, a SU2 arrival in state [i, j 1, k]
causes transition to state [i, j, k] with a rate 1 2 , where
1 = 1(i+(j1)+kN <M N ) specifies the condition for subchannel reservation (i.e., a new SU2 call is accepted by the
system only when the condition i + (j 1) + kN < M N

(s0 j 0 ), j + j 0 , k 1]. During this state transition, s0 j 0


SU1 calls and j 0 SU2 calls are terminated.

holds), where 1() is the indicator function which returns the


value 1 when the condition given inside the parenthesis is true
and returns 0 otherwise. In Fig. 2, 2 = 1(i+j+kN <M N )
(condition for sub-channel reservation in state [i, j, k]) and
3 = 1(i+j+(k1)N N (M 1)) .
The transition rate li,j,k
0 ,m0 from state [i, j, k] to state [i
0
l , j m0 , k + 1] is calculated as follows:
1) Let Nl0 ,m0 denote the set containing the valid combinations of (l0 , m0 ).
2) For every valid pair of (l0 , m0 ) in the set Nl0 ,m0 , find
Rl0 ,m0 which represents the number of valid combinations of l, m, r and s = l0 + m0 . Valid l, m, r and s for
given [i, j, k] found using Eq. (1).
3) Then, the transition rate li,j,k
0 ,m0 is given by
Rl0 ,m0
X

li,j,k
0 ,m0 =

Rl0 ,m0

p .

B. State Transitions under DSA-C2 Policy


Fig. 2 also represents the state transitions under the DSA-C2
policy for the various cases of Y . According to the handoff
mechanism under DSA-C2 policy, the number of terminated
SU1 and SU2 calls are given as l0 = l min(r, l) and m0 =
max(0, m max(0, r l)), respectively. All state transitions
shown in Fig. 2 occur similar to the DSA-C1 policy. Apart
from the state transitions given in Fig. 2, transitions occur from
states [i+i0 , j +j 0 , k 1] (in which i+j +(k 1)N = N (M
1)) to the state [i, j, k] when Y = M N , where 0 i0 , j 0 < N
and 0 < i0 + j 0 < N .
C. Performance Measures

(2)

The performance measures for each DSA policy are expressed using the steady state probability distribution of its
corresponding CTMC. We derive performance measures (for
both SU1 and SU2 calls) such as blocking probability, probability of forced termination, and throughput.
Let z denote the steady state distribution of a CTMC
whose state is denoted as z = [i, j, k]. To simplify the
presentation, we use the same notations under all DSA policies.
For any DSA policy, the corresponding steady state probability
distribution z is obtained by finding the corresponding transition rate matrix Q and applying the Gauss-Seidel algorithm
[10]. Each row of Q represents the transitions with respect to
a specific state z, as a balance equation. For example, referring
to Fig. 2, one balance equation with respect to the state [i, j, k]
under the DSA-C1 policy is expressed as follows:

(l0 ,m0 )Nl0 ,m0

Taking into consideration the handoff mechanism explained in


Section II-B, the variables l0 and m0 in Eq. (2) are given by
l0 = s min(j, s) and m0 = min(j, s). The value of s is
determined by Eq. (1).
i, j , k 1

i 1, j , k

k p

(i + 1) 1

i, j , k

1 2

2 2
j 2

( j + 1) 2
j,k
li,, m

i l , j m , k + 1

Fig. 2.

i + 1, j , k

i1

i, j 1, k

3 p

i, j + 1, k

[kp + 2 2 + 1 + p + i1 + j2 ] [i,j,k] =
p [i,j,k1] + (j + 1)2 [i,j+1,k] + (i + 1)1 [i+1,j,k] +
(k + 1)p [i,j,k+1] + 1 [i1,j,k] + 1 2 [i,j1,k]
(3)

( k + 1) p
i, j , k + 1

State transitions for the DSA policies, DSA-C1 and DSA-C2.

where [i,j,k] represents the steady state probability for state


[i, j, k] under DSA-C1 policy.
1) Blocking Probability: The blocking probability represents the probability that an incoming SU call (SU1 or
SU2 ) is not permitted to enter into the system. The blocking
probability
P of SU1 calls denoted as PB1 is expressed as
PB1 =
z . The blocking probability of SU2 calls
z
Y =M N
P
denoted as PB2 is expressed as PB2 =
z .
z

For the cases Y N (M 1) and N (M 1) < Y < M N ,


all the transitions shown in Fig. 2 are valid. For the case Y =
M N , the transitions between the states [i, j, k] and [i+1, j, k],
and between [i, j, k] and [i, j + 1, k] are not considered as
the system is full (i.e., idle sub-channels not available). Apart
from the state transitions shown in Fig. 2, when Y = M N
few transitions occur from the states in which the number of
ongoing calls is greater than N (M 1) to the state [i, j, k]
due to a PU arrival. These transitions are described below.
0
Transition from state [i, j+j , k1] to state [i, j, k] occurs
i,j+j 0 ,k1
with rate 0,j 0
, where j > 0 and 0 < j 0 < N . The
i,j+j 0 ,k1
rate 0,j 0
is calculated using Eq. (2) corresponding
to the state [i, j + j 0 , k 1]. During this state transition,
j 0 SU2 calls are terminated.
0
0
0
Transition from state [i + (s j ), j + j , k 1] to state
i+(s0 j 0 ),j+j 0 ,k1
[i, j, k] occurs with rate s0 j 0 ,j 0
, where j = 0,

Y M N

2) Probability of Forced Termination: The probability of


forced termination represents the probability that an ongoing
SU call (SU1 or SU2 ) is terminated by an incoming PU
call. The probability of forced termination for the SU1 calls,
denoted as PF 1 , is expressed as follows:
PF 1 =

z
il0 , jm0

i+(s0 j 0 ),j+j 0 ,k1

0 < s0 < N and 0 j 0 < s0 . The rate s0 j 0 ,j 0


is calculated using Eq. (2) corresponding to the state [i +

l0 li,j,k
0 ,m0 z
1 (1 PB1 )

(4)

In Eq. (4), the numerator denotes the rate that l0 SU1 calls
are terminated in state z whereas the denominator denotes the

effective rate with which a new SU1 call is assigned a subchannel.


Similarly, the probability of forced termination for the SU2
calls, denoted as PF 2 , is expressed as follows:
m0 li,j,k
0 ,m0 z

PF 2 =

z
il0 , jm0

2 (1 PB2 )

(5)

In Eqs. (4) and (5), l0 and m0 depend on the DSA policy.


3) Throughput: The throughput under a given SU priority
class is expressed as the mean number of ongoing calls in
the system. Let 1 and 2 denote the throughput for SU1 and
SU2 calls, respectively. The throughput 1 is given by 1 =
1 (1 PB1 )(1 PF 1 ) whereas The throughput 2 is given by
2 = 2 (1 PB2 )(1 PF 2 ).

B. Forced Termination Probabilities


Fig. 4 and Fig. 5 respectively show the forced termination
probabilities of the SU1 and SU2 calls under both DSA
policies with various PU arrival rate p . The following parameters are set for this experiment: 1 = 0.8, 2 = 0.8,
p [0.03, 0.12], 1 = 0.35, 2 = 0.35, p = 0.09
and = 2. It can be observed that as p increases, the
forced termination probabilities of SU1 and SU2 calls also
increase with both DSA policies. Fig. 4 shows that DSAC1 policy has lower force termination probability for the
SU1 calls compared to DSA-C2 policy. Fig. 5 shows higher
force termination probability of the SU2 calls using DSAC1 policy compared to DSA-C2 policy. Such observations
accord with our expectation. Compared to the DSA-C2 policy,
DSA-C1 policy reduces handoff failures for the SU1 calls by
terminating some ongoing SU2 calls during handoff. Again,
the analysis and simulation results match well.

IV. R ESULTS AND D ISCUSSION

A. Blocking Probabilities
The blocking probabilities corresponding to the DSA-C2
policy are same as that corresponding to the DSA-C1 policy
(because the DSA policies only differ in the handoff mechanism), and hence they are not shown for brevity of paper.
Fig. 3 shows the blocking probabilities of the SU1 and SU2
calls under the DSA-C1 policy with various PU arrival rate
(p ). The following parameters are chosen for this experiment:
1 = 0.4, 2 = 0.4, p [0.03, 0.12], 1 = 0.8, 2 = 0.8,
p = 0.09, and = 2. It can be seen that all the blocking
probabilities (i.e., for both SU classes) increase as the PU
arrival rate increases. This is because the number of busy
sub-channels increases with an increase in the PU arrival
rate, resulting in higher blocking probabilities for the SUs.
Fig. 3 also shows that the analysis results match well with the
simulation results.

DSA-C1 (a)
0.08

DSA-C1 (s)
DSA-C2 (a)

0.07

DSA-C2 (s)
0.06

0.05

0.04

0.03

0.02

0.01

0
0.02

0.03

0.04

0.05

0.06

0.07

0.08

0.09

0.1

0.11

0.12

PU arrival rate, p

Fig. 4. Forced termination probability of SU1 calls under both DSA policies.
0.08

Forced termination probability of SU2 calls, PF2

In this section, we compare the two DSA policies based on


the performance measures described in Section III-C. The accuracy of the analytical models is verified through simulations.
In the experiments, we set M = 3 and N = 5. The symbols
(a) and (s) in the figures indicate analytical and simulation
results, respectively.

Forced termination probability of SU1 calls, PF1

0.09

DSA-C1 (a)
0.07

DSA-C1 (s)
DSA-C2 (a)

0.06

DSA-C2 (s)

0.05

0.04

0.03

0.02

0.01

0
0.02

0.03

0.04

0.05

0.06

0.07

0.08

0.09

0.1

0.11

0.12

PU arrival rate, p

Fig. 5. Forced termination probability of SU2 calls under both DSA policies.

0.14

PB1 , DSA-C1 (s)

0.12

0.05

PB2 , DSA-C1 (a)


PB2 , DSA-C1 (s)

0.1

0.08

0.06

0.04

0.02

0
0.02

0.03

0.04

0.05

0.06

0.07

0.08

0.09

0.1

0.11

0.12

PU arrival rate, p

Fig. 3.
Blocking probabilities of SU1 and SU2 calls under both DSA
policies.

Forced termination probability of SU2 calls, PF2

Blocking probabilities of SU1 and SU2 calls

PB1 , DSA-C1 (a)

DSA-C1 (a)
0.045

DSA-C1 (s)
DSA-C2 (a)

0.04

DSA-C2 (s)

0.035

0.03

0.025

0.02

0.015
0.4

0.6

0.8

1.2

1.4

1.6

1.8

S U1 arrival rate, 1

Fig. 6. Effect of SU1 arrival rate on forced termination probability of SU2

4 calls under both DSA policies.

from the analysis: 1 = 0.9975 and 2 = 0.3462 for DSA-C1


policy whereas 1 = 0.7819 and 2 = 0.3997 for DSA-C2
policy.
In the simulation, under DSA-C1 policy, 797929 SU1 calls
and 277086 SU2 calls completed service whereas under DSAC2 policy, 638938 SU1 calls and 312457 SU2 calls completed service. Therefore, from simulations, 1 = 0.9974 and
2 = 0.3464 for DSA-C1 policy whereas 1 = 0.7986 and
2 = 0.3906 for DSA-C2 policy. The analysis results and
simulation results for the throughput of the SUs correspond
closely. As expected, DSA-C1 policy gives higher throughput
for SU1 compared to DSA-C2 policy, at the expense of
sacrificing the throughput of SU2 . This phenomenon holds
under various parameter settings.

Fig. 6 shows the effect of SU1 arrival rate (1 ) on the forced


termination probability of the low priority SU2 calls. In this
experiment, we set p = 0.06 and vary 1 . It can be seen that
as 1 increases, the forced termination probability of SU2 calls
also increases with both DSA policies. This is because when
1 increases, the number of SU2 calls entering the system
decreases. This leads to an increase in PF 2 along with 1 .
With DSA-C1 policy, apart from terminations caused by the
PU arrivals, the SU2 calls are also terminated by SU1 calls
during handoff. Thus, PF 2 of DSA-C1 policy is higher than
that of DSA-C2 policy.
C. Optimal Sub-channel Reservation
As mentioned in Section II-A, some sub-channels () are
reserved for the SU1 call arrivals. Using the sub-channel
reservation, we block some low priority SU calls to improve
the performance of the high priority SU calls. Based on the
given parameter settings and blocking probability requirement
of the SU1 calls, an optimal number of sub-channels ()
to be reserved under the DSA policies can be determined
from our analysis. Here, optimal number means the minimum
number of sub-channels to be reserved in order to guarantee
that the blocking probability requirement of the SU1 calls
is satisfied. For instance, consider the following parameter
setting: 1 = 1.8, 2 = 1.8, p = 0.06, 1 = 0.8, 2 = 0.3,
p = 0.09 and a desired blocking probability of 5% for the
SU1 calls. From the analysis, we found that the optimal value
of is 4 for both DSA policies. The analysis results can be
verified from simulation. Fig. 7 shows the simulation results
for the above parameter settings under different values of .
Fig. 7 shows that the desired blocking probability of 5% for
the SU1 calls is satisfied when = 4 sub-channels.

V. C ONCLUSION
We have investigated the dynamic spectrum access in the
cognitive radio networks under a special case in which the SU
traffic is prioritized. Two different DSA policies have been
developed to handle the spectrum assignment and handoff for
the SU traffic with two priority classes. We have developed the
analytical models for two proposed DSA policies. For performance evaluation, we have derived the blocking probability,
the forced termination probability, and the throughput for the
two priority classes of SU traffic. We have also investigated the
case of sub-channel reservation for the high priority SUs and
obtained the optimal sub-channel reservation. The analytical
results have been verified through simulations.
R EFERENCES
[1] Federal Communications Commission, Spectrum policy task force, in
Rep. OET Docket No. 02-135, Nov.2002.
[2] S. D. Jones, E. Jung, X. Liu, N. Merhab and I-J. Wang, Characterization
of spectrum activities in the U.S. public safety band for opportunistic
spectrum access, in 2nd International Symposium on New Frontiers in
Dynamic Spectrum Access Networks (DySPAN),pp. 137146, April 2007.
[3] S. Haykin, Cognitive radio: Brain-empowered wireless communications, in IEEE Journal on Selected Areas in Communication, vol. 23,
no. 2, pp. 210230, 2005.
[4] E. W. M. Wong and C. H. Foh, Analysis of cognitive radio spectrum
access with finite user polulation, in IEEE Communications Letters, vol.
15, no. 5, pp. 294296, May 2009.
[5] X. Zhu, L. Shen and T-S. P. Yum, Analysis of cognitive radio spectrum
access with optimal channel reservation, in IEEE Communications
Letters, vol. 11, no. 4, pp. 304306, April 2007.
[6] Y. Zhang, Dynamic spectrum access in cognitive radio wirless networks, in IEEE International Conference on Communications, pp.
49274932, May 2008.
[7] S. M. Kannappa and M. Saquib, Performance analysis of a cognitive
network with dynamic spectrum assignment to secondary users, in IEEE
International Conference on Communications, pp. 15, July 2010.
[8] U. Wiggins, R. Kannan, V. Chakravarthy and A. V. Vasilakos, Datacentric prioritization in a cognitive radio network: A quality-of-service
based design and integration, in 3rd IEEE Symposium on on New
Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 111,
Oct. 2008.
[9] C. Gosh, S. Chen, D. P. Agarwal and A. M. Wyglinski, Priority-based
spectrum allocation for cognitive radio networks employing NC-OFDM
transmission, in IEEE Military Communications Conference, pp. 15,
Oct. 2009.
[10] W. J. Stewart, Introduction to the numerical solution of Markov chains,
Princeton University Press, 1994.

0.13

DSA-C1 (s)

Blocking probability of SU1 calls, PB1

0.12

DSA-C2 (s)
0.11

0.1

0.09

0.08

0.07

0.06

0.05

0.04

Number of sub-channels reserved for S U1 calls ()

Fig. 7. Effect of on blocking probability of SU1 calls under both DSA


policies.

D. Throughput Evaluation
We verify the throughput calculated in the analysis with
the simulation results. For the simulation, the throughput for
a given SU priority class is calculated by taking the ratio of
the total number of SU calls corresponding to that priority
class completing service, to the total duration of the simulation.
In our simulations, call arrivals are generated for a duration
of 800000 time units. For the parameter setting 1 = 1.8,
2 = 1.8, p = 0.3, 1 = 0.3, 2 = 0.06, p = 0.4 and
= 0, we obtained the following values for the throughput

Das könnte Ihnen auch gefallen