Opportunistic network coding for secondary users in cognitive radio networks
نویسندگان
چکیده
In cognitive radio networks (CRNs), secondary users (SUs) may employ network coding to pursue higher throughput. However, as SUs must vacate the spectrum when it is accessed by primary users (PUs), the available transmission time of SUs is usually uncertain, i.e., SUs do not know how long the idle state can last. Meanwhile, existing network coding strategies generally adopt a block-based transmission scheme, which means that all packets in the same block can be decoded simultaneously only when enough coded packets are collected. Therefore, the gain brought by network coding may be dramatically decreased as the packet collection process may be interrupted due to the unexpected arrivals of PUs. In this paper, for the first time, we develop an efficient network coding strategy for SUs while considering the uncertain idle durations in CRNs. At its heart is that systematic network coding (SNC) is employed to opportunistically utilize the idle duration left by PUs. To handle the uncertainty of idle durations, we utilize confidential interval estimation to estimate the expected duration for stochastic idle durations, and multi-armed bandits to determine the duration sequentially for non-stochastic idle durations, respectively. Then, we propose a coding parameter selection algorithm for SNC by considering the complicated correlation among the receptions at different receivers. Simulation results show that, our proposed schemes outperform both traditional optimal block-based network coding and non-network coding schemes, and achieve competitive performance compared with the scheme with perfect idle duration
منابع مشابه
Opportunistic Scheduling for Reliability in Cognitive Radio Networks
We develop opportunistic scheduling policies for cognitive radio networks that maximize the throughput utility of the secondary (unlicensed) users subject to maximum collision constraints with the primary (licensed) users. We consider a cognitive network with static primary users and potentially mobile secondary users. We use the technique of Lyapunov Optimization to design an online flow contr...
متن کاملOpportunistic Scheduling in Cognitive Radio Networks
We develop opportunistic scheduling policies for cognitive radio networks that maximize the throughput utility of the secondary (unlicensed) users subject to maximum collision constraints with the primary (licensed) users. We consider a cognitive network with static primary users and potentially mobile secondary users. We use the technique of Lyapunov Optimization to design an online flow contr...
متن کاملPerformance Evaluation of GSM Traffic Transmission over Cognitive Radio Networks under Opportunistic Spectrum Sharing Collisions
Cognitive Radio networks and channel sharing are emerging as a new paradigm of communication in multimedia and wireless networks. In this chapter, the authors consider a secondary use application that consists of carrying TDMA traffic between the mobile and the base station for GSM networks over a Cognitive Radio network. Therefore, packets are not only lost by reason of Primary traffic interru...
متن کاملDesign of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks
Cognitive radio technology has been developed in recent years to make efficient use of the wireless spectrum especially for opportunistic spectrum access. Cognitive radio technology enables the secondary (cognitive) users to use the unused licensed spectrum of the primary users. Medium Access Control (MAC) protocol plays a vital role in spectrum utilization, primary user’s (PU) interference man...
متن کاملSub-banding the Secondary Users' Channel in Cognitive Radio Networks Considering Unreliable Spectrum Sensing
Oneof themost efficientmethods to reduce the dropping andblockingprobabilities of the secondary users (SUs) in cognitive radio networks is channel sub-banding strategy. This means that when all the channels are occupied by the primary and secondary users, then the SUs’ channels can be divided into two sub-bands, and two SUs can use a subband, simultaneously. In this paper, we propose an opportu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Ad Hoc Networks
دوره 56 شماره
صفحات -
تاریخ انتشار 2017