The Research of QoS Guarantee Mechanism of the Secondary Users in Cognitive Radio Networks

被引:6
|
作者
Yang, Wanshu [1 ]
Zu, Yunxiao [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
关键词
TDMA scheme; asynchronous myopic repeated game; coloring quality; classical centralized algorithms;
D O I
10.1109/CC.2016.7733039
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cognitive radio (CR) is a promising solution to improve the spectrum utilization. The cognitive radio networks includes the primary user (PU) system with authorized spectrum and the secondly user (SU) system without authorized spectrum. When the SUs want to use the spectrum, they have to find the idle channels that are not occupied by the PUs. So the QoS of the SUs will be affected not only by the characteristic of their own business, but also by the behavior of the PUs. Currently, in order to ensure the quality of the SU services, the M-LDWF algorithm is widely used in scheduling. However, the M-LWDF algorithm didn't fully consider the difference among the SUs. For those SUs who are in the process of communication but have to change channel due to the return of the PU, they should have higher scheduling priority. In this paper, we put forward an improved algorithm based on M-LWDF. In order to guarantee the QoS of the SUs those were in the processing of communication, we gave the higher scheduling priority. Simulation results show that the improved algorithm can effectively decrease the dropping rate and improve the QoS of the SUs and the performance of the whole system.
引用
收藏
页码:146 / 152
页数:7
相关论文
共 50 条
  • [21] Analysis on Deployment Parameters of Secondary Users in Cognitive Radio Networks
    Jiang, Chunxiao
    Jiang, Hao
    Jiang, Chunxing
    Fan, Shuai
    Ren, Yong
    Chen, Canfeng
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 743 - 748
  • [22] Mobility Reduces the Number of Secondary Users in Cognitive Radio Networks
    Wang, Xinbing
    Fu, Luoyi
    Li, Yingzhe
    Cao, Zizhong
    Gan, Xiaoying
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [23] An Admission Control Scheme for Secondary Users in Cognitive Radio Networks
    AlQahtani, Salman A.
    Ahmed, Hassan
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2014, : 245 - 250
  • [24] Opportunistic network coding for secondary users in cognitive radio networks
    Qu, Yuben
    Dong, Chao
    Tang, Shaojie
    Chen, Chen
    Dai, Haipeng
    Wang, Hai
    Tian, Chang
    AD HOC NETWORKS, 2017, 56 : 186 - 201
  • [25] On Stable Throughput of Cognitive Radio Networks With Cooperating Secondary Users
    Kulkarni, Kedar
    Banerjee, Adrish
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (10) : 4097 - 4110
  • [26] Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Ha, Jeongseok
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1072 - 1078
  • [27] On the Impact of the Sensing Rate of Secondary Users in Cognitive Radio Networks
    Salameh, O. I.
    De Turck, K.
    Wittevrongel, S.
    De Vuyst, S.
    Bruneel, H.
    2013 CONFERENCE ON FUTURE INTERNET COMMUNICATIONS (CFIC), 2013,
  • [28] Jointly Locating the Primary and Secondary Users in Cognitive Radio Networks
    Saeed, Nasir
    Haris, Muhammad
    Ul Haq, Mian Imtiaz
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 6 - 10
  • [29] Lightweight privacy preservation for secondary users in cognitive radio networks
    Zeng, Yali
    Xu, Li
    Yang, Xu
    Yi, Xun
    Khalil, Ibrahim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 162
  • [30] Interference Performance Evaluation of Secondary Users in Cognitive Radio Networks
    Ain-ul-Aisha
    Mayekar, Nikita
    Wyglinski, Alexander M.
    2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,