Throughput Maximization for Opportunistic Spectrum Access via Transmission Probability Scheduling Scheme Yang Cao, Daiming Qu, Guohui Zhong, Tao Jiang Huazhong University of Science and Technology, Wuhan, China

Outline • Background • System Model • Transmission Probability Scheduling (TPS) Scheme • Hidden Markov Model (HMM) Based Predictor • Simulations • Conclusions

2010/8/27

2

Background

Spectrum Holes for Secondary User

Primary Packets

Time

• Opportunistic spectrum access • Fundamental challenges: – Protect the primary transmissions – Improve the spectrum efficiency as much as possible 2010/8/27

3

System Model Collision Occurs

L Primary Packets

Time Sensing sub-slot

Secondary Packets

• Network elements: – Primary user: • ON-OFF alternative process (ON-busy, OFF-idle)

– Secondary user: • Slotted transmission • The sensing capability is perfect 2010/8/27

4

Slot boundary

System Model (cont’d) • Performance metrics: – Average packet collision ratio (APCR) of the primary user NC

RC = lim

U →+∞

NP

– Normalized throughput of the secondary user

NS T = lim U →+∞ N IDLE

• Optimization aim: maximize T while keep RC under a preset threshold RTH NP NC NS N IDLE

--the number of the primary user’s packets during U --the number of collision events during U --the number of idle slots successfully utilized by the secondary user during U --the total number of idle slots during U

2010/8/27

5

TPS Scheme Spectrum Hole Identified

X (k − 1) = 1 X (k ) = 0

slot k-1

Primary Packets

step 1

step 2

PkT (0)

PkT (1)

slot k

slot k+1

step N-1

...

Sensing sub-slot

step N

PkT ( N − 1)

Time Slot boundary

• Calculate the transmission probabilities PkT (0), PkT (1),..., PkT ( N − 1)

at the N following data sub-slots according to the optimization aim. 2010/8/27

6

TPS Scheme (cont’d) • The definition of two probabilities – the probability that the primary user accesses the channel during the (k + i)-th data sub-slot 1) 1), = i 0 Pr( X (k + i + =  Bk (i ) =  (1) Pr( X (k += 1) 0,..., X (k += i ) 0, X (k + i += 1) 1), 0
– The probability that the primary user would not access the channel from the k-th to the (k + i)-th data sub-slot 1) 0),= i 0 Pr( X (k + i +=  I k (i ) =  (2) Pr( X (k += 1) 0,..., X (k += i ) 0, X (k + i += 1) 0), 0
7

TPS Scheme (cont’d) • The formulation of performance metrics – the collision probability for the coming primary packet PkC =

N −1

∑ B (i) ⋅ P

T k

k

i =0

PkC ⇔ RC

(i )

– the expected normalized throughput of the secondary N −1 user T Tk =

∑I i =0

k

(i ) ⋅ Pk (i )

Tk ⇔ T

N −1

∑I i =0

k

(i )

Max. Tk

Optimization problem

PkC ≤ RTH

s.t.

0 ≤ PkT (i ) ≤ 1, = i 0,1,..., N − 1. 2010/8/27

8

HMM-Based Predictor Make prediction

Train HMM



Primary Packets

Sensing sub-slot

Secondary Packets

Time

X (k − 1) X (k )

Slot boundary

• Make prediction based on the sensing history Z ( k= ) [ X (k − W + 1),..., , X (k − 1), X (k )]

• The channel usage pattern of the primary user is generated by a HMM, which is denoted as ξ 2010/8/27

9

HMM-Based Predictor (cont’d) • The process of making prediction Z(k ), ξ 0

Baum-Welch Algorithm (Expectation Maximization)

max . Pr(Z(k ) ξ j )

Forward-backward procedure

ξ∗

Pr( ⋅ ξ ∗ ) 2010/8/27

10

HMM-Based Predictor (cont’d) • The prediction of the two probabilities  Pr( X (k + i + 1) = 1, Z(k ) ξ ) , i=0  Pr(Z(k ) ξ )   Bˆ k (i ) =  (3)  Pr( X (k += i ) 0, X (k + i += 1) 0,..., X (k += 1) 1, Z(k ) ξ ))  , 0
11

Simulations Parameters: •The primary packet length is fixed to 4 slots •The mean duration of the primary user’s idle period is 8 slots •The prediction steps number is set to 40 •The training sequence length is set to 3000

• Case 1: Exponential distributed idle period baseline TPS(HMM)

0.2

Normalized Troughput

0.2

APCR

0.15

0.1

0.05

0 0

2010/8/27

0.05

0.1 APCR Threshold

0.15

f (t ) = e − λt

baseline TPS(HMM)

0.15

0.1

0.05

0.2

12

0 0

0.05

0.1 APCR Threshold

0.15

0.2

Simulations (cont’d) • Case 2: Hyper-Erlang-2-2 distribution idle period (k1λ1 ) k1 t k1 −1 − k1λ1t (k2 λ2 ) k2 t k2 −1 − k2 λ2t f (t ) α1 e e + α2 (k1 − 1)! (k2 − 1)! 0.35

0.2 baseline TPS(HMM)

0.3

Normalized Troughput

APCR

0.15

0.1

0.05

baseline TPS(HMM)

0.25 0.2 0.15 0.1 0.05

0 0

0.05

2010/8/27

0.1 APCR Threshold

0.15

0 0

0.2

13

0.05

0.1 APCR Threshold

0.15

0.2

Conclusions • The TPS scheme could maximize the throughput of the secondary user while constraining the APCR of the primary packet under a required threshold. • The maximum achievable throughput of the secondary user has a relationship with the distribution of the primary user’s idle period. • The accuracy of the HMM-based predictor is satisfactory.

Thanks for your time! Any questions? 2010/8/27

14

Throughput Maximization for Opportunistic Spectrum ...

Aug 27, 2010 - Throughput Maximization for Opportunistic. Spectrum Access via Transmission. Probability Scheduling Scheme. Yang Cao, Daiming Qu, Guohui Zhong, Tao Jiang. Huazhong University of Science and Technology,. Wuhan, China ...

162KB Sizes 0 Downloads 267 Views

Recommend Documents

Throughput Maximization for Opportunistic Spectrum ... - IEEE Xplore
Abstract—In this paper, we propose a novel transmission probability scheduling scheme for opportunistic spectrum access in cognitive radio networks. With the ...

Throughput Maximization for Multi-Hop Wireless ... - IEEE Xplore
Throughput Maximization for Multi-Hop Wireless. Networks with Network-Wide Energy Constraint. Canming Jiang, Yi Shi, Member, IEEE, Y. Thomas Hou, Senior ...

Throughput Maximization in Cognitive Radio System ...
lows the hyper-Erlang distribution [16]. – When the spectrum sensing at the SU is imperfect, we quantify the impact of sensing errors on the SU performance with ...

Choi, Hossain - 2011 - Opportunistic Access to Spectrum Holes ...
consecutive packets in an 802.11b-based WLAN, even when a. WLAN continuously uses a channel for packet transmissions. However, exploiting these spectrum opportunities poses sig- nificant challenges due to the following two characteristics of. a data-

Modeling of Opportunistic Spectrum Sharing with Sub ...
London on “Capacity enhancement methods in Multi-leyer WCDMA systems”sponsored by Mobile VCE. In 2003 he received his PHD at. King's College and since then he worked at King's College as a research fellow. In 2006 he joined Samsung Electronics (U

Extended Expectation Maximization for Inferring ... - Semantic Scholar
uments over a ranked list of scored documents returned by a retrieval system has a broad ... retrieved by multiple systems should have the same, global, probability ..... systems submitted to TREC 6, 7 and 8 ad-hoc tracks, TREC 9 and 10 Web.

Opportunistic Interference Alignment for Interference ...
This work was supported by the Industrial Strategic Technology Develop- ... [10033822, Operation framework development of large-scale intelligent and.

Opportunistic Interference Alignment for Interference ...
Simulation results show that the proposed scheme provides significant improvement in ... Section IV shows simulation results under the OIA scheme. Finally, we summarize the paper with some ..... [1] V. R. Cadambe and S. A. Jafar, “Interference alig

PENALTY FUNCTION MAXIMIZATION FOR LARGE ...
state-level Hamming distance versus a negative phone-level ac- curacy. Indeed ... The acoustic features for the English system are 40-dimensional vectors obtained via an .... [3] F. Sha and L. Saul, “Comparison of large margin training to other ...

Opportunistic Interference Alignment for MIMO ...
1School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected]. 2Dept. of CSE .... user feeds back the effective channel vector and quantity of inter-cell.

Opportunistic Interference Alignment for Random ... - IEEE Xplore
Dec 14, 2015 - the new standardization called IEEE 802.11 high-efficiency wireless ... Short Range Wireless Transmission Technology with Robustness to ...

PENALTY FUNCTION MAXIMIZATION FOR LARGE ...
on multiple LVCSR tasks show a good correlation between the ob- ..... tion procedure described in [11] (with a lattice n-best degree of 8). Next, we accumulate ...

Extended Expectation Maximization for Inferring ... - Semantic Scholar
Given a user's request, an information retrieval system assigns a score to each ... lists returned by multiple systems, and (b) encoding the aforementioned con-.

Opportunistic Interference Alignment for MIMO ...
usage is required for the decoding of one signal block [6]. In addition, global channel state .... K-cell MIMO Interfering MAC. We show that for the antenna ...

Power Management for Throughput Enhancement
consumption and end-to-end network throughput in a wireless ad-hoc en- vironment. This power management ..... ing factor that reflects the relative importance of the two com- ponents of the afore ..... lar Technology, Vol. 42, No. 4, Nov. 1993.

Opportunistic Interference Alignment for MIMO ...
Feb 15, 2013 - Index Terms—Degrees-of-freedom (DoF), opportunistic inter- ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of .... information of the channels from the transmitter to all receivers, i.e., its own ......

Opportunistic Interference Alignment for MIMO Interfering Multiple ...
Feb 15, 2013 - Interference management is a crucial problem in wireless ... of International Studies, Dankook University, Yongin 448-701, Republic of ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of this .... informat

R˜x = ˜y ˜x = ˜R ˜x = L(R Throughput Maximization in ...
wireless communications, and its effectiveness has been verified in laboratory experiments, with ...... technologies/future/toward/index.html. [5] S. Vishwanath, N.

Opportunistic Interference Mitigation
Then, their performance is analyzed in terms of degrees- of-freedom (DoFs). ..... For user j in the i-th cell, the user scheduling metric Li j is finally given by (2), ...

A Suboptimal Network Utility Maximization Approach for ...
Department of Computer Science, Princeton University, ... admission control approach for such utilities, called “self- ..... metrics and rate requirements. Recall that ...

A Suboptimal Network Utility Maximization Approach for ...
Department of Computer Science, Princeton University,. Emails: {mstalebi, ak, hajiesamaili}@ipm.ir, [email protected]. Abstract—Wired and wireless data ...

Repetition Maximization based Texture Rectification
Figure 1: The distorted texture (top) is automatically un- warped (bottom) using .... however, deals in world-space distorting and not with cam- era distortions as is ...

Repetition Maximization based Texture Rectification
images is an essential first step for many computer graph- ics and computer vision ... matrix based rectification [ZGLM10] can be very effective, most of our target ...

Power-Efficient Spectrum Sharing for Noncooperative Underwater ...
wi (n) + ∑j=iE {|hji(n)|2} pj(n) gi(n)E {|hii(n)|2}. ] +. ,. (7) where [x]+ is equivalent to max(0,x) and λi is chosen to satisfy the information rate constraint ui(pi, p−i) ≥ ..... ios. Our method has been developed for fully noncooperative s