Optimizing Secondary User Performance under Delay Constraint for Primary User
We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize...
Saved in:
Published in | IEEE Wireless Communications and Networking Conference : [proceedings] : WCNC pp. 1 - 6 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.03.2017
|
Subjects | |
Online Access | Get full text |
ISSN | 1558-2612 |
DOI | 10.1109/WCNC.2017.7925715 |
Cover
Loading…
Abstract | We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize the stable throughput of the SU under a delay constraint for the PU. This optimization problem is formulated using two schemes. First, the hard delay guarantee scheme where the objective is to maximize the throughput of the SU subject to the delay of the PU's packet is less than a certain value. Second, the soft delay guarantee scheme where the objective is to minimize the delay of the PU's packets minus a constant multiplied by the throughput of the SU. Numerical results reveal that none of the proposed outperforms the other in general. The first scheme ensures a fix delay performance for the PU's packets on the boundary of the stability region. While the second scheme guarantees a finite delay performance with higher stable throughput than that of the first scheme. |
---|---|
AbstractList | We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize the stable throughput of the SU under a delay constraint for the PU. This optimization problem is formulated using two schemes. First, the hard delay guarantee scheme where the objective is to maximize the throughput of the SU subject to the delay of the PU's packet is less than a certain value. Second, the soft delay guarantee scheme where the objective is to minimize the delay of the PU's packets minus a constant multiplied by the throughput of the SU. Numerical results reveal that none of the proposed outperforms the other in general. The first scheme ensures a fix delay performance for the PU's packets on the boundary of the stability region. While the second scheme guarantees a finite delay performance with higher stable throughput than that of the first scheme. |
Author | Lijun Chen Salman, Mohamed |
Author_xml | – sequence: 1 givenname: Mohamed surname: Salman fullname: Salman, Mohamed email: mohamed.salman@colorado.edu organization: Coll. of Eng. & Appl. Sci., Univ. of Colorado, Boulder, CO, USA – sequence: 2 surname: Lijun Chen fullname: Lijun Chen email: lijun.chen@colorado.edu organization: Coll. of Eng. & Appl. Sci., Univ. of Colorado, Boulder, CO, USA |
BookMark | eNo1j91Kw0AUhFdRsKk-gHizL5B6zmZ_kkuJv1BtQYuXZbN7IivNpmziRX16C61XAzN8w0zGzmIfibFrhBkiVLef9Vs9E4BmZiqhDKoTlqGCCiSWhTxlE1SqzIVGccGyYfgGEKCknLDXxXYMXfgN8Yu_k-ujt2nHVwMlvqTU9qmz0RH_iX7v3NPG7njdx2FMNsSR73O-TKH7Zy7ZeWs3A10ddcpWjw8f9XM-Xzy91HfzPKBRY25RS1-S9Q6lM9JI4Sz4xqNrSVe6KZ13TjXGWqEceG1Qu9I2RQutFiRNMWU3h95AROvtYcH6eL34Ax1nUNU |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/WCNC.2017.7925715 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1509041834 9781509041831 |
EISSN | 1558-2612 |
EndPage | 6 |
ExternalDocumentID | 7925715 |
Genre | orig-research |
GroupedDBID | 29I 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ABLEC ACGFS ADZIZ AI. ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL RNS VH1 |
ID | FETCH-LOGICAL-i175t-a164d8eadc14c74742ca0dbd1cfe696b8cdcc5b7aa25c0d6716c8ab3f0f62e473 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:15:45 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-a164d8eadc14c74742ca0dbd1cfe696b8cdcc5b7aa25c0d6716c8ab3f0f62e473 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7925715 |
PublicationCentury | 2000 |
PublicationDate | 2017-March |
PublicationDateYYYYMMDD | 2017-03-01 |
PublicationDate_xml | – month: 03 year: 2017 text: 2017-March |
PublicationDecade | 2010 |
PublicationTitle | IEEE Wireless Communications and Networking Conference : [proceedings] : WCNC |
PublicationTitleAbbrev | WCNC |
PublicationYear | 2017 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020544 |
Score | 1.9894935 |
Snippet | We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Delays Numerical stability Optimization Queueing analysis Relays Stability analysis Throughput |
Title | Optimizing Secondary User Performance under Delay Constraint for Primary User |
URI | https://ieeexplore.ieee.org/document/7925715 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG6Qk158gPGdHjy6S9ntbrdnlBATkESJ3Eg7bROiAiHLAX69090V1Hjw1keaNu2kM1873wwht5m1EdNgA5cKF3ALUaCkgsCg8aqM05KB5w73B2lvxB_HybhG7rZcGGtt4XxmQ18s_vLNHFb-qawlJAqYZ5TvIXAruVpbcIWmB69-LdtMtl47g4533BJhNehH9pRCeXQPSf9r2tJn5C1c5TqEza-IjP9d1xFp7mh6dLhVQMekZmcn5OBbhMEG6T_hlfAx3WCFPnvsa9RyTUcod3S4owxQzyRb0nv7rtbUp_AsEkfkFPtxgiIcRTGmSUbdh5dOL6gyKARTNAvyQCEYMhkKC7Q5IHDgEShmtGmDs6lMdQYGINFCqSgBZlIET5ApHTvm0shyEZ-S-mw-s2eESm7jLFFCCOm4Vpli0sWOO8aNZpzrc9LwGzNZlKuaVHty8XfzJdn3h1M6c12Rer5c2WvU7rm-KY71E1nWqJs |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4QPKgXH2B824NHdym73e32jBJUFkmEyI30mRAVDFkO8Ottd1dQ48FbH2natJPOfO18MwDXidYBFlJ7JqbGI1oGHmdcesoar1wZwbB03OG0F3eG5GEUjSpws-bCaK1z5zPtu2L-l69mcuGeyhqUWQFzjPKtyJFxC7bWGl5Z44OU_5ZNzBovrV7LuW5Rvxz2I39Krj7ae5B-TVx4jbz6i0z4cvUrJuN_V7YP9Q1RD_XXKugAKnp6CLvfYgzWIH2yl8L7ZGUr6NmhX8XnSzS0kof6G9IAclyyObrVb3yJXBLPPHVEhmy_nSAPSJGPqcOwfTdodbwyh4I3sYZB5nELh1RixUU2ibTQgQSSYyVUUxods1gkUkkZCcp5EEmsYgufZMJFaLCJA01oeATV6WyqjwExosMk4pRSZojgCcfMhIYYTJTAhIgTqLmNGX8UqxqXe3L6d_MVbHcGaXfcve89nsGOO6jCtescqtl8oS-srs_EZX7En1KMq-M |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IEEE+Wireless+Communications+and+Networking+Conference+%3A+%5Bproceedings%5D+%3A+WCNC&rft.atitle=Optimizing+Secondary+User+Performance+under+Delay+Constraint+for+Primary+User&rft.au=Salman%2C+Mohamed&rft.au=Lijun+Chen&rft.date=2017-03-01&rft.pub=IEEE&rft.eissn=1558-2612&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FWCNC.2017.7925715&rft.externalDocID=7925715 |