Throughput Maximization for Opportunistic Spectrum Access via Transmission Probability Scheduling Scheme Yang Cao, Daiming Qu, Guohui Zhong, Tao Jiang Huazhong University of Science and Technology, Wuhan, China

Outline • Background • System Model • Transmission Probability Scheduling (TPS) Scheme • Hidden Markov Model (HMM) Based Predictor • Simulations • Conclusions

2010/8/27

2

Background

Spectrum Holes for Secondary User

Primary Packets

Time

• Opportunistic spectrum access • Fundamental challenges: – Protect the primary transmissions – Improve the spectrum efficiency as much as possible 2010/8/27

3

System Model Collision Occurs

L Primary Packets

Time Sensing sub-slot

Secondary Packets

• Network elements: – Primary user: • ON-OFF alternative process (ON-busy, OFF-idle)

– Secondary user: • Slotted transmission • The sensing capability is perfect 2010/8/27

4

Slot boundary

System Model (cont’d) • Performance metrics: – Average packet collision ratio (APCR) of the primary user NC

RC = lim

U →+∞

NP

– Normalized throughput of the secondary user

NS T = lim U →+∞ N IDLE

• Optimization aim: maximize T while keep RC under a preset threshold RTH NP NC NS N IDLE

--the number of the primary user’s packets during U --the number of collision events during U --the number of idle slots successfully utilized by the secondary user during U --the total number of idle slots during U

2010/8/27

5

TPS Scheme Spectrum Hole Identified

X (k − 1) = 1 X (k ) = 0

slot k-1

Primary Packets

step 1

step 2

PkT (0)

PkT (1)

slot k

slot k+1

step N-1

...

Sensing sub-slot

step N

PkT ( N − 1)

Time Slot boundary

• Calculate the transmission probabilities PkT (0), PkT (1),..., PkT ( N − 1)

at the N following data sub-slots according to the optimization aim. 2010/8/27

6

TPS Scheme (cont’d) • The definition of two probabilities – the probability that the primary user accesses the channel during the (k + i)-th data sub-slot 1) 1), = i 0 Pr( X (k + i + =  Bk (i ) =  (1) Pr( X (k += 1) 0,..., X (k += i ) 0, X (k + i += 1) 1), 0
– The probability that the primary user would not access the channel from the k-th to the (k + i)-th data sub-slot 1) 0),= i 0 Pr( X (k + i +=  I k (i ) =  (2) Pr( X (k += 1) 0,..., X (k += i ) 0, X (k + i += 1) 0), 0
7

TPS Scheme (cont’d) • The formulation of performance metrics – the collision probability for the coming primary packet PkC =

N −1

∑ B (i) ⋅ P

T k

k

i =0

PkC ⇔ RC

(i )

– the expected normalized throughput of the secondary N −1 user T Tk =

∑I i =0

k

(i ) ⋅ Pk (i )

Tk ⇔ T

N −1

∑I i =0

k

(i )

Max. Tk

Optimization problem

PkC ≤ RTH

s.t.

0 ≤ PkT (i ) ≤ 1, = i 0,1,..., N − 1. 2010/8/27

8

HMM-Based Predictor Make prediction

Train HMM



Primary Packets

Sensing sub-slot

Secondary Packets

Time

X (k − 1) X (k )

Slot boundary

• Make prediction based on the sensing history Z ( k= ) [ X (k − W + 1),..., , X (k − 1), X (k )]

• The channel usage pattern of the primary user is generated by a HMM, which is denoted as ξ 2010/8/27

9

HMM-Based Predictor (cont’d) • The process of making prediction Z(k ), ξ 0

Baum-Welch Algorithm (Expectation Maximization)

max . Pr(Z(k ) ξ j )

Forward-backward procedure

ξ∗

Pr( ⋅ ξ ∗ ) 2010/8/27

10

HMM-Based Predictor (cont’d) • The prediction of the two probabilities  Pr( X (k + i + 1) = 1, Z(k ) ξ ) , i=0  Pr(Z(k ) ξ )   Bˆ k (i ) =  (3)  Pr( X (k += i ) 0, X (k + i += 1) 0,..., X (k += 1) 1, Z(k ) ξ ))  , 0
11

Simulations Parameters: •The primary packet length is fixed to 4 slots •The mean duration of the primary user’s idle period is 8 slots •The prediction steps number is set to 40 •The training sequence length is set to 3000

• Case 1: Exponential distributed idle period baseline TPS(HMM)

0.2

Normalized Troughput

0.2

APCR

0.15

0.1

0.05

0 0

2010/8/27

0.05

0.1 APCR Threshold

0.15

f (t ) = e − λt

baseline TPS(HMM)

0.15

0.1

0.05

0.2

12

0 0

0.05

0.1 APCR Threshold

0.15

0.2

Simulations (cont’d) • Case 2: Hyper-Erlang-2-2 distribution idle period (k1λ1 ) k1 t k1 −1 − k1λ1t (k2 λ2 ) k2 t k2 −1 − k2 λ2t f (t ) α1 e e + α2 (k1 − 1)! (k2 − 1)! 0.35

0.2 baseline TPS(HMM)

0.3

Normalized Troughput

APCR

0.15

0.1

0.05

baseline TPS(HMM)

0.25 0.2 0.15 0.1 0.05

0 0

0.05

2010/8/27

0.1 APCR Threshold

0.15

0 0

0.2

13

0.05

0.1 APCR Threshold

0.15

0.2

Conclusions • The TPS scheme could maximize the throughput of the secondary user while constraining the APCR of the primary packet under a required threshold. • The maximum achievable throughput of the secondary user has a relationship with the distribution of the primary user’s idle period. • The accuracy of the HMM-based predictor is satisfactory.

Thanks for your time! Any questions? 2010/8/27

14

Throughput Maximization for Opportunistic Spectrum ...

Aug 27, 2010 - Throughput Maximization for Opportunistic. Spectrum Access via Transmission. Probability Scheduling Scheme. Yang Cao, Daiming Qu, Guohui Zhong, Tao Jiang. Huazhong University of Science and Technology,. Wuhan, China ...

162KB Sizes 0 Downloads 47 Views

Recommend Documents

Opportunistic Interference Alignment for MIMO ...
1School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected] 2Dept. of CSE .... user feeds back the effective channel vector and quantity of inter-cell.

Extended Expectation Maximization for Inferring ... - Semantic Scholar
uments over a ranked list of scored documents returned by a retrieval system has a broad ... retrieved by multiple systems should have the same, global, probability ..... systems submitted to TREC 6, 7 and 8 ad-hoc tracks, TREC 9 and 10 Web.

Opportunistic Interference Alignment for Interference ...
This work was supported by the Industrial Strategic Technology Develop- ... [10033822, Operation framework development of large-scale intelligent and.

Extended Expectation Maximization for Inferring ... - Semantic Scholar
Given a user's request, an information retrieval system assigns a score to each ... lists returned by multiple systems, and (b) encoding the aforementioned con-.

Opportunistic Interference Alignment for MIMO Interfering Multiple ...
Feb 15, 2013 - Interference management is a crucial problem in wireless ... of International Studies, Dankook University, Yongin 448-701, Republic of ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of this .... informat

Power Management for Throughput Enhancement
consumption and end-to-end network throughput in a wireless ad-hoc en- vironment. This power management ..... ing factor that reflects the relative importance of the two com- ponents of the afore ..... lar Technology, Vol. 42, No. 4, Nov. 1993.