Optimizing Secondary User Performance under Delay Constraint for Primary User

We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize...

Full description

Saved in:
Bibliographic Details
Published inIEEE Wireless Communications and Networking Conference : [proceedings] : WCNC pp. 1 - 6
Main Authors Salman, Mohamed, Lijun Chen
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2017
Subjects
Online AccessGet full text
ISSN1558-2612
DOI10.1109/WCNC.2017.7925715

Cover

Loading…
Abstract We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize the stable throughput of the SU under a delay constraint for the PU. This optimization problem is formulated using two schemes. First, the hard delay guarantee scheme where the objective is to maximize the throughput of the SU subject to the delay of the PU's packet is less than a certain value. Second, the soft delay guarantee scheme where the objective is to minimize the delay of the PU's packets minus a constant multiplied by the throughput of the SU. Numerical results reveal that none of the proposed outperforms the other in general. The first scheme ensures a fix delay performance for the PU's packets on the boundary of the stability region. While the second scheme guarantees a finite delay performance with higher stable throughput than that of the first scheme.
AbstractList We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize the stable throughput of the SU under a delay constraint for the PU. This optimization problem is formulated using two schemes. First, the hard delay guarantee scheme where the objective is to maximize the throughput of the SU subject to the delay of the PU's packet is less than a certain value. Second, the soft delay guarantee scheme where the objective is to minimize the delay of the PU's packets minus a constant multiplied by the throughput of the SU. Numerical results reveal that none of the proposed outperforms the other in general. The first scheme ensures a fix delay performance for the PU's packets on the boundary of the stability region. While the second scheme guarantees a finite delay performance with higher stable throughput than that of the first scheme.
Author Lijun Chen
Salman, Mohamed
Author_xml – sequence: 1
  givenname: Mohamed
  surname: Salman
  fullname: Salman, Mohamed
  email: mohamed.salman@colorado.edu
  organization: Coll. of Eng. & Appl. Sci., Univ. of Colorado, Boulder, CO, USA
– sequence: 2
  surname: Lijun Chen
  fullname: Lijun Chen
  email: lijun.chen@colorado.edu
  organization: Coll. of Eng. & Appl. Sci., Univ. of Colorado, Boulder, CO, USA
BookMark eNo1j91Kw0AUhFdRsKk-gHizL5B6zmZ_kkuJv1BtQYuXZbN7IivNpmziRX16C61XAzN8w0zGzmIfibFrhBkiVLef9Vs9E4BmZiqhDKoTlqGCCiSWhTxlE1SqzIVGccGyYfgGEKCknLDXxXYMXfgN8Yu_k-ujt2nHVwMlvqTU9qmz0RH_iX7v3NPG7njdx2FMNsSR73O-TKH7Zy7ZeWs3A10ddcpWjw8f9XM-Xzy91HfzPKBRY25RS1-S9Q6lM9JI4Sz4xqNrSVe6KZ13TjXGWqEceG1Qu9I2RQutFiRNMWU3h95AROvtYcH6eL34Ax1nUNU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WCNC.2017.7925715
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1509041834
9781509041831
EISSN 1558-2612
EndPage 6
ExternalDocumentID 7925715
Genre orig-research
GroupedDBID 29I
6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
AI.
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
RNS
VH1
ID FETCH-LOGICAL-i175t-a164d8eadc14c74742ca0dbd1cfe696b8cdcc5b7aa25c0d6716c8ab3f0f62e473
IEDL.DBID RIE
IngestDate Wed Aug 27 02:15:45 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-a164d8eadc14c74742ca0dbd1cfe696b8cdcc5b7aa25c0d6716c8ab3f0f62e473
PageCount 6
ParticipantIDs ieee_primary_7925715
PublicationCentury 2000
PublicationDate 2017-March
PublicationDateYYYYMMDD 2017-03-01
PublicationDate_xml – month: 03
  year: 2017
  text: 2017-March
PublicationDecade 2010
PublicationTitle IEEE Wireless Communications and Networking Conference : [proceedings] : WCNC
PublicationTitleAbbrev WCNC
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020544
Score 1.9894935
Snippet We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Delays
Numerical stability
Optimization
Queueing analysis
Relays
Stability analysis
Throughput
Title Optimizing Secondary User Performance under Delay Constraint for Primary User
URI https://ieeexplore.ieee.org/document/7925715
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG6Qk158gPGdHjy6S9ntbrdnlBATkESJ3Eg7bROiAiHLAX69090V1Hjw1keaNu2kM1873wwht5m1EdNgA5cKF3ALUaCkgsCg8aqM05KB5w73B2lvxB_HybhG7rZcGGtt4XxmQ18s_vLNHFb-qawlJAqYZ5TvIXAruVpbcIWmB69-LdtMtl47g4533BJhNehH9pRCeXQPSf9r2tJn5C1c5TqEza-IjP9d1xFp7mh6dLhVQMekZmcn5OBbhMEG6T_hlfAx3WCFPnvsa9RyTUcod3S4owxQzyRb0nv7rtbUp_AsEkfkFPtxgiIcRTGmSUbdh5dOL6gyKARTNAvyQCEYMhkKC7Q5IHDgEShmtGmDs6lMdQYGINFCqSgBZlIET5ApHTvm0shyEZ-S-mw-s2eESm7jLFFCCOm4Vpli0sWOO8aNZpzrc9LwGzNZlKuaVHty8XfzJdn3h1M6c12Rer5c2WvU7rm-KY71E1nWqJs
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4QPKgXH2B824NHdym73e32jBJUFkmEyI30mRAVDFkO8Ottd1dQ48FbH2natJPOfO18MwDXidYBFlJ7JqbGI1oGHmdcesoar1wZwbB03OG0F3eG5GEUjSpws-bCaK1z5zPtu2L-l69mcuGeyhqUWQFzjPKtyJFxC7bWGl5Z44OU_5ZNzBovrV7LuW5Rvxz2I39Krj7ae5B-TVx4jbz6i0z4cvUrJuN_V7YP9Q1RD_XXKugAKnp6CLvfYgzWIH2yl8L7ZGUr6NmhX8XnSzS0kof6G9IAclyyObrVb3yJXBLPPHVEhmy_nSAPSJGPqcOwfTdodbwyh4I3sYZB5nELh1RixUU2ibTQgQSSYyVUUxods1gkUkkZCcp5EEmsYgufZMJFaLCJA01oeATV6WyqjwExosMk4pRSZojgCcfMhIYYTJTAhIgTqLmNGX8UqxqXe3L6d_MVbHcGaXfcve89nsGOO6jCtescqtl8oS-srs_EZX7En1KMq-M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IEEE+Wireless+Communications+and+Networking+Conference+%3A+%5Bproceedings%5D+%3A+WCNC&rft.atitle=Optimizing+Secondary+User+Performance+under+Delay+Constraint+for+Primary+User&rft.au=Salman%2C+Mohamed&rft.au=Lijun+Chen&rft.date=2017-03-01&rft.pub=IEEE&rft.eissn=1558-2612&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FWCNC.2017.7925715&rft.externalDocID=7925715