Conference Paper

A novel channel handover strategy to improve the throughput in cognitive radio networks

Dept. of Comput. Eng., Istanbul Tech. Univ., Istanbul, Turkey
DOI: 10.1109/IWCMC.2011.5982515 Conference: Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International
Source: IEEE Xplore

ABSTRACT Cognitive radio (CR) is the most promising solution to spectrum scarcity and spectrum underutilization problems. Most of the research in CR design ignores the cost of channel handover process (CHP) in cognition cycle. However, CHP can be a time consuming process that consists of spectrum sensing, spectrum decision, negotiation through control channel, and adjustment of frequency and modulation settings. Taking all of these steps into account, we deduce that the frequency of CHP is one of the most critical CR design issues. In this sense, initiating the CHP after detecting each primary user (PU) activity can decrease the aggregated spectrum utilization. In this paper, we analyze the trade-off between initiating a CHP to find an idle channel and staying in the current data channel for a while to catch free slots when some PU activity is detected. We propose a novel channel handover strategy (CHS) to balance this trade-off. In this CHS, secondary users (SUs) track only their current data channel and do not need information about the whole spectrum environment to determine whether to start CHP or not. Simulation results show that the proposed CHS can clearly decrease the frequency of handovers and increase the aggregated SU utilization.

0 Bookmarks
 · 
171 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: Prediction of future availability times of different channels based on history information helps a cognitive radio (CR) to select the best channels for control and data transmission. Different prediction rules apply to periodic and stochastic ON-OFF patterns. A CR can learn the patterns in different channels over time. We propose a simple classification and learning method to detect the pattern type and to gather the needed information for intelligent channel selection. Matlab simulations show that the proposed method outperforms opportunistic random channel selection both with stochastic and periodic channel patterns. The amount of channel switches needed over time reduces up to 55%, which reduces also the delay and increases the throughput.
    Cognitive Radio and Advanced Spectrum Management, 2008. CogART 2008. First International Workshop on; 03/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article considers the issue of dynamic spectrum access in time domain, in which the secondary user seeks spectrum vacancy between bursty transmissions of the primary user to communicate. Since spectrum sensing and data transmission can not be done simultaneously in the same band, the secondary user should employ the sense-then-transmit strategy to detect the presence of primary user before accessing the licensed band. We model the behavior of the secondary user as a discrete-time queuing subjected to bursty preemption, which is an abstraction of temporal channel unavailability due to the random presence of the primary user. We formulate an interference-throughput tradeoff problem under the discrete-time queuing framework, and find the optimal slot duration to maximize the throughput of the secondary user, yet to ensure the primary interfered time ratio (PITR) is less than a tolerable threshold. Finally, the computer simulation results validate our theoretical approach.
    Cognitive Radio Oriented Wireless Networks and Communications, 2009. CROWNCOM '09. 4th International Conference on; 07/2009
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Driven by regulatory initiatives and radio technology advances, opportunistic spectrum access has the potential to mitigate spectrum scarcity and meet the increasing demand for spectrum. In this paper, we consider a scenario where secondary users can opportunistically access unused spectrum vacated by idle primaries. We introduce two metrics to protect primary performance, namely collision probability and overlapping time. We present three spectrum access schemes using different sensing, back-off, and transmission mechanisms. We show that they achieve indistinguishable secondary performance under given primary constraints. We provide closed form analysis on secondary user performance, present a tight capacity upper bound, and reveal the impact of various design options, such as sensing, packet length distribution, back-off time, packet overhead, and grouping. Our work sheds light on the fundamental properties and design criteria on opportunistic spectrum access.
    INFOCOM 2008. The 27th Conference on Computer Communications. IEEE; 05/2008

Full-text

View
1 Download
Available from