Mobile Information Systems

Volume 2017 (2017), Article ID 3613496, 8 pages

https://doi.org/10.1155/2017/3613496

## Performance Analysis and Optimization for Cognitive Radio Networks with Classified Secondary Users and Impatient Packets

^{1}School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China^{2}School of Computer and Communication Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China

Correspondence should be addressed to Yuan Zhao; moc.361@58hznauy

Received 13 March 2017; Accepted 17 May 2017; Published 10 July 2017

Academic Editor: Alessandro Bazzi

Copyright © 2017 Yuan Zhao and Luyi Bai. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

A cognitive radio network with classified Secondary Users (SUs) is considered. There are two types of SU packets, namely, SU1 packets and SU2 packets, in the system. The SU1 packets have higher priority than the SU2 packets. Considering the diversity of the SU packets and the real-time need of the interrupted SU packets, a novel spectrum allocation strategy with classified SUs and impatient packets is proposed. Based on the number of PU packets, SU1 packets, and SU2 packets in the system, by modeling the queue dynamics of the networks users as a three-dimensional discrete-time Markov chain, the transition probability matrix of the Markov chain is given. Then with the steady-state analysis, some important performance measures of the SU2 packets are derived to show the system performance with numerical results. Specially, in order to optimize the system actions of the SU2 packets, the individually optimal strategy and the socially optimal strategy for the SU2 packets are demonstrated. Finally, a pricing mechanism is provided to oblige the SU2 packets to follow the socially optimal strategy.

#### 1. Introduction

Nowadays, spectrum crisis caused by possible shortage of wireless spectrum has attracted great attention of relevant scholars. However, some researches indicated that the utilization of some spectrum was not more that 6% [1–3]. This highlights a paradox between the higher transmission request and the actual lower spectrum utilization. In order to solve the spectrum crisis, it is necessary to make effort to enhance the spectrum utilization. As a technology to enhance the spectrum utilization effectively, cognitive radio emerged. Following the technology of cognitive radio, cognitive radio networks begin to cause wide public concern [4–6].

In general cognitive radio networks, there are two types of users, namely, Primary Users (PUs) and Secondary Users (SUs). The SUs are allowed to use the spectrum licensed to the PUs when the spectrum is not occupied. This kind of opportunistic spectrum occupying way can reduce the spectrum holes effectively [7, 8].

This paper focuses on the spectrum allocation strategy in cognitive radio networks with classified SU packets and impatient interrupted SU packets. The system performance of the proposed cognitive radio networks is evaluated with a discrete-time Markov chain model to give the performance analysis of the system model. With the steady-state analysis, some performance measures of the SU2 packets are derived and the system access actions of the SU2 packets are optimized.

The remainder of this paper is organized as follows. Some related works are listed in Section 2. The system model and model analysis are demonstrated in Section 3. In Section 4, some performance measures of the SU2 packets are derived. In Section 5, the individually optimal strategy and the socially optimal strategy are given, and a pricing mechanism is also given. The numerical results are shown in Section 6. Finally, conclusions are drawn in Section 7.

#### 2. Related Works

In recent years, the researches about cognitive radio networks begin to become a hot research point [9–12]. In [13], in order to reduce the possible bad influence to the PU packets from larger number of SU packets, the authors proposed an adaptive access control scheme for the SU packets. By building a two-dimensional Markov chain, the authors derived the expressions of the throughput and the average delay of the SU packets. In [14], considering the availability of a channel dynamically varying in time in cognitive radio networks, the authors designed a channel-availability estimation strategy based on the features of mobile scenarios. With numerical results, they showed and analyzed the channel availability among different mobile scenarios. In [15], by introducing a pricing policy for the SU packets, the authors proposed a novel energy saving strategy in cognitive radio networks. With a Quasi-Birth-and-Death (QBD) process model, the authors derived the expressions of the average latency of SU packets and the energy saving ratio. They also optimized the system actions of the SU packets.

From the researches mentioned above, it is not difficult to find that the papers were all studied in the cognitive radio networks with single type of SUs. However, there are different types of transmission requests in modern communication networks. It is also necessary to classify the SU packets with different requests in the research of cognitive radio networks. In [16, 17], the classification to the SU packets was considered. The authors assumed that there were two kinds of SU packets in the system, namely, SU1 packets and SU2 packets. They assumed that the SU1 packets had higher priority than the SU2 packets. With mathematical analysis, different performance measures, such as the throughput and the interrupted rate for the two types of SU packets, were derived, respectively.

On the other hand, as mentioned above, in most of researches in cognitive radio networks, the interrupted SU packets were assumed to wait in the system for following transmission. However, in practice networks, timeliness is very important to some kind of SU packets, especially to the interrupted packets. The interrupted SU packets may not wait in the system with enough patience. These packets can be called impatient packets in this paper. In order to guarantee the transmission continuity and reliability, the impatient interrupted packets may leave the system and hand off to another available spectrum for retransmission [18]. Therefore, it is necessary to consider these impatient interrupted packets when designing the spectrum allocation strategy in cognitive radio networks.

Moreover, in the researches of cognitive radio networks, queueing theory [19, 20] is an important tool to model the system when evaluating the performance of cognitive radio networks [21, 22]. In [21], a cognitive radio network with multiple channels and multiple users was considered. By modeling the queue dynamics as a discrete-time finite-state Markov chain, some performance measures, including average queueing delay, packet-loss rate, and effective throughput, were obtained. In [23], a priority-based continuous queueing model was built and analyzed to evaluate the system performance of a cognitive radio network with channel assembling. In [24], a cognitive radio network with multiple SUs were considered. Based on the queueing actions of the network users, a three-dimensional Markov chain was built to analyze the system performance. This paper is substantially different from [24] in that the impatient interrupted SU packets are considered in this paper to satisfy real-time need of the interrupted SU packets. On the other hand, with the assumption of the impatient interrupted SU packets, the transition probability matrix built in this paper is very different from [24] and the steady-state distribution is obtained by using the matrix-geometric solution method. Moreover, different from the threshold optimization in [24], the idea of game theory is introduced in this paper to optimize the system actions of the SU2 packets.

#### 3. System Model

##### 3.1. Model Assumption

In this paper, a cognitive radio network with a single channel is considered. There are two kinds of SU packets, namely, SU1 packets and SU2 packets in the system. The SU1 packets have higher priority than the SU2 packets. The PU packets in the system have the highest priority to occupy the single channel. Moreover, the spectrum sensing for the SUs is assumed to be ideal in this paper. It means that the interferences among different SUs are not considered in following system model.

There is a buffer (called SU2 buffer) set for the SU2 packets. On the arrival instant of an SU2 packet, if the channel is being occupied, this newly arriving SU2 packet will wait and queue in the SU2 buffer for later transmission. There are no buffer settings for the PU packets and the SU1 packets.

Considering the highest priority of the PU packets, when a PU packet appears during the middle of the transmission of an SU packet (an SU1 packet or an SU2 packet), the transmission for this SU packet will be interrupted directly.

Considering the relative priority of the SU1 packets, a newly arriving SU1 packet can only interrupt the transmission of an SU2 packet.

Considering the higher transmission continuity need of the interrupted packet, the interrupted SU1 packets and the interrupted SU2 packets are both impatient. Any interrupted SU packet (an SU1 packet or an SU2 packet) will not wait in the system for later transmission. These interrupted SU packets will choose to leave the system and hand off to another available channel for transmission.

Based on the spectrum allocation strategy mentioned above, considering the digital nature of modern networks, a discrete-time Markov chain model can be built as follows.

The time axis can be divided into slots with equal size, and the slot boundaries are denoted as . The arrival intervals of the PU packets, the SU1 packets, and the SU2 packets are assumed to follow geometric distributions with arrival rates , , and . The transmission times of the PU packets, the SU1 packets, and the SU2 packets are assumed to follow geometric distributions with service rates , , and .

Let , , and be the number of SU2 packets, SU1 packets, and PU packets in the system at the instant , respectively. In order to describe the transitions of the number of different types of packets in the system, a three-dimensional process composed of the number of the SU2 packets, the number of the SU1 packets, and the number of the PU packets can be abstracted. Then constitutes a three-dimensional discrete-time Markov chain [20]. With the model assumption mentioned above, the state space of can be given as follows:

##### 3.2. Model Analysis

Let be the state transition probability matrix of the three-dimensional Markov chain . In the system model, the buffer capacity of the SU2 packets is assumed to be infinite to accommodate more SU2 packets in the system. Therefore, according to the state transition of the number of SU2 packets, the dimension of the state transition probability matrix is infinite. This assumption is the same as that in [15]. can be given as follows:

Each nonzero block in is a matrix and can be given as follows:(1) is the transition probability matrix which denotes the number of SU2 packets in the system being fixed at :(2) is the transition probability matrix which denotes the number of SU2 packets in the system being increased from to :(3) is the transition probability matrix which denotes the number of SU2 packets in the system being decreased by one:(4) is the transition probability matrix which denotes the number of SU2 packets in the system being fixed:(5) is the transition probability matrix which denotes the number of SU2 packets in the system being increased by one:

Until now, all the nonzero matrices in have been given. Based on the structure of the transition probability matrix , the three-dimensional Markov chain follows a Quasi-Birth-and-Death (QBD) process [25]. The steady-state distribution of the three-dimensional Markov chain is defined as follows:The numerical results for the steady-state distribution can be obtained by using the matrix-geometric solution method [26].

#### 4. Performance Measures of the SU2 Packets

In the considered cognitive radio network with classified Secondary Users and impatient packets, the transmissions of the SU1 packets are influenced only by the PU packets and independent of the SU2 packets. The transmission processes of the PU packets and the SU1 packets can be regarded as a simple pure losing priority queueing model with single server. The system performance of the SU1 packets can reference the analysis results in [24].

On the other hand, in this paper, the transmissions of the SU2 packets are influenced not only by the PU packets but also by the SU1 packets. Therefore, this section only focuses on analyzing the performance measures of the SU2 packets. The expressions of some important performance measures, such as the interrupted rate, the throughput, and the average delay of the SU2 packets are derived.

The interrupted rate of the SU2 packets is defined as the number of SU2 packets that are interrupted and leave the system per slot. The expression of the interrupted rate of the SU2 packets can be given as follows:

The throughput of the SU2 packets is defined as the number of SU2 packets that are transmitted successfully per slot. An SU2 packet can be transmitted successfully if and only if the transmission of this SU2 packet is not be interrupted. The expression of the throughput of the SU2 packets can be given as follows:

The average delay of the SU2 packets is defined as the average time length from an SU2 packet arriving at the system to this SU2 packet leaving the system (being transmitted successfully or being interrupted to leave). By using Little’s formula [25], the expression of the average delay of the SU2 packets can be given as follows:where is the average number of SU2 packets in the system in steady state. The expression of can be given as follows:

#### 5. Performance Optimization for the SU2 Packets

In the cognitive radio networks with classified Secondary Users and impatient packets, the transmission of an SU packet that chooses to join the system may be interrupted by a PU packet or an SU1 packet. It means that an SU2 packet may not obtain a successful transmission after accessing the system. Therefore, for a newly arriving SU2 packet, it is necessary to weigh whether or not to join the system. This section focuses on optimizing the system access actions of the SU2 packets.

##### 5.1. Individual and Social Optimization

Firstly, the system access action of a single SU2 packet should be analyzed. In following analysis, it is assumed that a newly arriving SU2 packet cannot know the number of packets (including PU packets, SU1 packets, and SU2 packets) in the system before making the system access decision. If an SU2 packet is transmitted successfully, a reward denoted as can be received, while an SU2 packet that chooses to join the system has to bear a cost denoted as per slot. For a single SU2 packet, if this SU2 packet chooses to join the system, the individual net benefit function for this SU2 packet can been given as follows:

In (13), denotes the probability that an SU2 packet can obtain a successful transmission.

Let be the individually optimal access rate of the SU2 packets and be the individually optimal access probability of the SU2 packets. Let be the potential arrival rate of the SU2 packets. Then . As will be seen in following numerical results, the individual net benefit function will show a decreasing change trend as the arrival rate of the SU2 packets increases. The individually optimal strategy for the SU2 packets can be given as follows (to avoid a trivial solution, it is assumed that ):(1)For the case of , the individually optimal access probability is , and the individually optimal access rate is .(2)For the case of , based on the Nash equilibrium theory [27], the individually optimal access rate can be obtained by solving , and then the individually optimal access probability can be given by .

Secondly, the socially optimal strategy for the SU2 packets should be analyzed. The socially optimal strategy is to maximize the expected benefit received per slot. Therefore, the social net benefit function for the SU2 packet can be given as follows:

Let be the socially optimal access rate of the SU2 packets and be the socially optimal access probability of the SU2 packets. Then . From (14), the socially optimal access rate can be derived as follows:

With the socially optimal access rate in (15), the socially optimal access probability can be further obtained.

##### 5.2. Pricing Mechanism

Just as will be seen in the numerical results, the optimal access rate and optimal access probability in the individually optimal strategy are higher than that in the socially optimal strategy. This means that more SU2 packets will choose to access the system in the individually optimal strategy, but this will reduce the social net benefit. In order to guarantee the maximum of the social net benefit, it is necessary to oblige the SU2 packets to follow the socially optimal access rate and probability. Therefore, an extra price is introduced to the SU2 packets with successful transmission. When an SU2 packet is transmitted successfully, this SU2 packet has to pay an extra price . With , the new individual net benefit function for a single SU2 packet can be given as follows:

When an extra price is imposed, the new social net benefit function can be given as follows:

By comparing (14) and (17), it can be found that the extra price does not influence the social net benefit. This conclusion is the same as that in [13, 28, 29]. Based on the Nash equilibrium theory [28], by setting in (16), can be given as

By solving , the expression of the optimal extra price that realizes the maximum social net benefit can be given as follows:

Moreover, when the socially optimal access rate is equal to the potential arrival rete , the optimal extra price will be equal to or less than , which can be given as follows:

#### 6. Numerical Results

##### 6.1. Numerical Results for the Performance Measures

In this subsection, the system performance of the SU2 packets is evaluated with numerical results. The throughput and the average delay are the most important performance measurers when evaluating the system performance of cognitive radio networks. In following numerical results, the change trends of the throughput and the average delay of the SU2 packets with different parameter settings are focused on. By referencing the parameter settings in [13], without loss of generality, the service rates , , and are assumed to be equal to .

Figure 1 shows the change trend for the throughput of the SU2 packets with different arrival rates of the PU packets.