Open access peer-reviewed chapter

Traffic Pattern Prediction Based Spectrum Sharing for Cognitive Radios

By Xiukui Li and Seyed A. Reza Zekavat

Published: November 1st 2009

DOI: 10.5772/7838

Downloaded: 2528

1. Introduction

In this chapter, we introduce different traffic prediction techniques and discuss the process of evaluating channel availability through predicting traffic pattern of primary users for cognitive radios. When cognitive and non-cognitive users share the licensed spectrum, compared with secondary users (cognitive users), primary users have higher priority in using licensed channels. Therefore, whenever a primary user is detected, secondary users must vacate the relevant channels or decrease their transmitted power to reduce the interference on primary users. However, in some situations, based on the activity of primary users, secondary users may need to switch to other available channels, terminate communication, or reduce the transmitted power frequently. This leads to temporal connection loss of secondary users. In addition, if secondary users can not vacate a channel in a timely manner, it would interfere with primary users. To reduce the temporal connection loss and interference on primary users, secondary users should avoid using the channels that are available only for a short time period. A solution to this problem is to enable secondary users to evaluate the channel availability through predicting the traffic pattern of primary users. This chapter discusses the methods of evaluating the probability of channel availability for secondary users, and examines the probability that there is a successful secondary user's transmission at one time instance. In addition, the cooperative prediction is briefly introduced. Finally, the applications of traffic pattern prediction technique to spectrum sharing are discussed.

2. Traffic Model

Traffic data patterns can be classified as (Haykin, 2005): 1) deterministic patterns: for example, each primary user (e.g., TV transmitter) is assigned a fixed time slot for transmission, and when it is switched off, the frequency band is vacated; 2) stochastic patterns: for example, the arrival times of data packets are modeled as a Poisson process, while the service times are modeled as exponentially distributed, depending on whether the data are of packet-switched or circuit-switched, respectively. Note that, in common channel signaling network, the exponential distribution drastically underestimates the proportion of short calls that do not last longer than the mean holding time (Bolotin, 1994). In general, the traffic stochastic parameters vary slowly. Hence, they can be estimated using historical data. To predict the network traffic, the first step is to estimate the traffic patterns and then forecast the future traffic based on these observations. The traffic model built on historical data enables secondary users to predict the future traffic pattern of primary users in using channels (Li & Zekavat, 2008).

An overview of traffic modeling is provided in (Frost & Melamed, 1994). It discusses Markov modulated traffic models, autoregressive traffic models and self-similar traffic models, etc. In addition, the authors in (Adas, 1997) discuss different traffic models in telecommunication networks.

2.1. Traffic Model for Voice Communication

A speech process can be modeled as a two-state Markov chain which alternates between talk spurt and silent periods (Li, 1990), (Gruber, 1981). The authors in (Hong & Rappaport, 1986) propose a traffic model for cellular mobile radio telephone systems. The basic system model in (Hong & Rappaport, 1986) assumes that the new call origination rate is uniformly distributed over the mobile service area, and the channel holding time is approximated to a negative exponential distribution.

Considering a one-dimensional mobile system with cells in series (e.g., in highways), the authors in (Pavlidou, 1994) uses two-dimensional state diagrams to analyze the traffic in the mixed media cellular system. It assumes four Poisson arrival streams are entering each cell, which are originating new voice calls, originating new data packets, hand-off voice calls and hand-off data packets. The authors in (Leung et al., 1994) also consider the circumstance of a one-way, semi-infinite highway. With the assumption that there are an infinite number of channels available, they present a deterministic fluid model and a stochastic traffic model for a wireless network along the highway.

2.2. Traffic Model for Video Data

The authors in (Dawood & Ghanbari, 1999) provide a summary for traffic model of video data. (Lucantoni et al., 1994) proposes to model a single video source as a Markov renewal process whose states represent different bit rates. Some other models including Markov Modulated Fluid Flow (MMFF) model (Maglaris et al., 1988), Markov Modulated Poisson Process (MMPP) (Skelly, 1993), and AutoRegressive AR(1) stochastic model (Maglaris et al., 1988) are proposed to address the basic characteristics of the variable bit rate traffic. The MMFF and MMPP are suitable for queueing analysis of packet switched networks. The AR(1) stochastic model primarily characterizes the inter-frame source bit-rate variations and correlation.

For variable bit-rate traffic, the authors in (Knightly & Zhang, 1997) introduce a new deterministic traffic model called deterministic bounding interval-length dependent (D-BIND) to capture the multiplexing properties of bursty streams. For large-scale satellite network simulation, (Ryu, 1999) proposes: 1) a discrete autoregressive process for MBone ("multicast backbone") video source modeling; 2) the superposition of fractal renewal processes (Sup-FRP) model for Web request arrivals, and, 3) a generalized shot-noise-driven Poisson point process (GSNDP) for aggregate traffic flows modeling.

2.3. Traffic Model for General Packet Data

Based on an analysis of Internet protocols for data communication, (Anderlind & Zander, 1997) proposes a simple model for future data traffic in wireless radio networks. Model parameters are selected to describe traffic from the Worldwide Web (WWW) access and from distributed file systems. A multilayer Markov model is considered in (Filipiak, 1992) for arrivals of calls, bursts, and packets to fast packet switching system, where the multilayer refers to call layer, packet layer and burst layer.

3. Traffic Prediction Techniques

Different methods and models are proposed to forecast the traffic of different networks. Generally, network traffic has a mix of self-similarity, Short Range and Long Range Dependencies (SRD and LRD) (e.g., (Kleinrock, 1993), (Paxon & Floyd, 1995), (Leland et al., 1994), (Jiang et al., 2001)), There exist concentrated periods of low activity and high activity (i.e., burstiness) in the network traffic (Feng, 2006).

An accurate predictor needs to capture the traffic characteristics such as SRD and LRD, self-similarity and nonstationarity (Sadek & Khotanzad, 2004a). The prediction models can he categorized as stationary and non-stationary ones (Adas, 1997). The stationary models include traditional models such as Poisson, Markov and autoregressive (AR), and self-similar models such as fractional autoregressive integrated moving average (FARIMA). Nonstationary models include artificial neural network (ANN) such as fuzzy neural network (FNN). These models can be applied to predict different types of traffic data in Ethernet, Internet and etc. (Sadek et al., 2003), (Shu et al., 1999); (Hall & Mars, 2000). In the following subsections, some prediction techniques are introduced including ARIMA based traffic forecasting, application of neural network for traffic forecasting, least mean square based traffic forecasting and etc.

3.1. ARIMA based Traffic Forecasting

Traditional models, such as autoregressive (AR) and autoregressive moving average (ARMA), can be used to predict the high-speed network traffic data (Adas, 1997), (Sang & Li, 2002), and they can capture the short range dependent (SRD) characteristic. For example, considering the traffic data from a regional emergency communication center, (Chen & Trajkovic, 2004) uses algorithms to classify network users into user clusters, and then predicts the network traffic using the SARIMA (seasonal autoregressive integrated moving-average) model. SARIMA is discussed in detail in (Brockwell & Davis, 2002). For a campus-wide wireless network

(IEEE 802.11 infrastructure), (Papadopouli, 2005) uses the Yule-Walker method of ARIMA model to forecast the traffic at each wireless access point (AP) in an hourly timescale.

If a time series is non-stationary, but the first difference of the time series is stationary, ARIMA models can be used to characterize the dynamics of such a process. (Basu, 1996) indicates that appropriately differenced time-series generated from Internet traffic traces can be modeled as Auto-Regressive-Moving-Average (ARMA) processes. (Krithikaivasan et al., 2004) also proposes to use the ARIMA models to predict network traffic. Although ARIMA models can be used to model a class of non-stationary data, however, they cannot be applied to predict the network traffic which possesses the Long Range Dependent (LRD) characteristics.

In ARIMA models, the difference parameter d is restricted to integer values. In Fractional Autoregressive Integrated Moving Average models (FARIMA), this difference parameter can be a fraction. FARIMA model has the ability to capture both SRD and LRD characteristics (Corradi et al., 2001), (Shu et al., 1999). (Shu et al., 1999) also proposes using fractional ARIMA (FARIMA) to capture the self-similarity of network traffic. However, FARIMA model is time-consuming (Feng, 2006). (Sadek & Khotanzad, 2004a) discusses a two-stage predictor. It combines two different models, namely FARIMA and FNN. FARIMA captures the self-similarity, and FNN captures the non-stationarity. The combination of FARIMA and FNN enhances the prediction accuracy.

The authors in (Papagiannaki et al., 2005) model the evolution of IP backbone traffic at large time scales for long-term forecasting of Internet traffic. The aggregate demand between any two adjacent points is modeled as a multiple linear regression model. Short-term (e.g., seconds or minutes) forecasting of Internet traffic are addressed in (Basu, 1999), (Sang, 2000), (Papadopouli et al., 2006).

The authors in (Randhawa & Hardy, 1998) model the VBR sources as AutoRegressive AR(1) Modulated Deterministic Arrival process which characterizes the inter-frame as well as the intra-frame bit rate variations, and they model the call arrival process as conventional birth-death Markov Process. The future traffic is predicted using a combination of linear prediction and transient state analysis of birth-death Markov Process.

3.2. Application of Neural Network for Traffic Forecasting

The authors in (Zhao et al., 2004) propose two neural network models for traffic forecasting in two situations. One addresses the forecasting of hourly traffic of the next day based on past observations, and the other focuses on the peak load prediction of the next day. Based on Time Series Forecasting (TSF), (Cortez et al., 2006) uses a Neural Network Ensemble (NNE) to predict the TCP/IP traffic.

Neural network based traffic prediction approach is complicated to implement. The accuracy and applicability of the neural network approach to traffic prediction is limited (Hall & Mars, 2000). Artificial Neural Network (ANN) can capture the non-linear nature of network traffic and the relationship between the output and the input theoretically (Hansegawa et al., 2001), (Khotanzad & Sadek, 2003 ), (Lobejko, 1996), however, it might suffer from over-fitting (Doulamis et al., 2003).

The learning machine technique called support vector machine (SVM) can be applied to pattern recognition and other applications such as regression estimation. (Feng, 2006) employs the SVM to forecast traffic in WLANs. It studies the issues of one-step-ahead prediction and multi-step-ahead prediction without any assumption on the statistical property of actual WLAN traffic.

3.3. Least Mean Square based Traffic Forecasting

Normalized Least Mean Square (NLMS) based prediction approaches are proposed for on-line variable bit-rate video traffic prediction. They do not require any prior knowledge of the video statistics (Adas, 1998). The authors in (Liu & Mao, 2005) propose a time-domain NLMS based prediction scheme, and a wavelet-domain NLMS based adaptive prediction scheme for video traffic prediction which exploits the redundant information in the wavelet transform coefficients for more accurate prediction (traffic is decomposed into wavelet coefficients and scaling coefficients at different timescales).

3.4. Other Traffic Forecasting Algorithms

The authors in (Kohandani et al., 2006) present a new forecasting technique called the extended structural model (ESM) which is derived from the basic structural model (BSM). This technique replaces the constant parameters in BSM with variables and use steepest descent search algorithm to find the value for these variables to minimize the mean absolute percentage error (MAPE).

Traffic prediction techniquesAdvantageDisadvantageApplications
ARIMACan capture the short range dependent (SRD) characteristic; can model a class of non-stationary data.Cannot capture the Long Range Dependent (LRD) characteristic; the difference parameter d is restricted to integer values.WLAN, Internet traffic, etc.
FARIMACan capture both SRD and LRD characteristics; can capture the self-similarity; the difference parameter d can be a fraction.Time-consuming.Ad hoc wireless networks; Ethernet, etc.
Neutral network basedCan capture the non-stationarity; can capture the non-linear nature of network traffic.Complicated to implement; the accuracy and applicability is limited.Internet traffic (video traffic), etc.
Least Mean square basedDo not require any prior knowledge of the traffic statistics.Slow convergence with the time-domain NLMS based algorithms; High complexity with wavelet-domain NLMS based algorithms.Internet traffic (video traffic), etc.

Table 1.

Comparison of traffic prediction techniques.

Based on classical queueing theory, (Filipiak & Chemouil, 1987) derives discrete-time stochastic models and propose methods based on those models to forecast the number of congested trunk groups. The authors in (Liang, 2002) show that the ad hoc wireless network traffic are self-similar. The paper applies a fuzzy logic system to ad hoc wireless network traffic forecasting. Fuzzy logic systems (FLSs) have been widely used in time-series forecasting (e.g., (Liang & Mendel, 2000)).

The authors in (Sadek & Khotanzad, 2004b) present a parameter estimation procedure for the k-factor GARMA model (a generalized form of FARIMA). They use an adaptive prediction scheme to enable the model to capture the non-stationary characteristic and deal with any possible growth in the future traffic. The results indicate that the performance of the k-factor GARMA model outperforms the traditional AR model. GARMA models can be used to model a time series with SRD and LRD characteristics, and they also can model the periodicity of a time series with fewer parameters than ARMA models. The authors in (Ramachandran & Bhethanabotla, 2000) use the GARMA framework to measure the periodicities of Ethernet traffic.

The advantages and disadvantages of the traffic prediction techniques are compared in Fig. 1.

4. Probability of Channel Availability

Currently, most of the spectrum is owned by licensed owner such as GSM and CDMA networks (Brodersen, 2004). For CDMA networks (e.g., CDMA 2000, UMTS), the code division access makes the coexistence of primary users and secondary users difficult unless FDMA-CDMA systems are used (Pezeshk & Zekavat, 2003). In this case, secondary users may use the available spectrum only if the entire CDMA channel is available. Here, it is assumed that secondary users can find the idle channels for communication which are licensed to GSM networks.

4.1. Channels in GSM Networks

GSM uses TDMA techniques to provide multiple access for mobile users (Rappaport, 2002). In GSM, the available forward and reverse frequency bands are divided into 200kHz wide channels called ARFCNs (Absolute Radio Frequency Band Numbers). ARFCN is time shared between 8 subscribers using TDMA (there are eight time slots per TDMA frame). The combination of a time slot number and an ARFCN constitutes a physical channel for both the forward and reverse link. Each physical channel in a GSM system can be mapped into different logical channels at different times. There are two types of GSM logical channels, called traffic channels (TCHs) and control channels (CCHs).

In GSM systems, there are control messages transmitted over control channels between subscribers and the base stations even if no call is in the progress. There are three main control channels: the broadcast channel (BCH), the common control channel (CCCH), and the dedicated control channel (DCCH). The BCH and CCCH forward control channels are allocated time slot 0 (TS0). In the same frame, the time slot 1, TS1, through 7,

Figure 1.

Call a rrival process.

TS7, still can carry regular traffic. The DCCH may exist in any time slot and on any ARFCN except TS0 of the BCH ARFCN. However, there are three types of DCCHs in GSM: (i) the stand-alone dedicated control channels (SDCCHs) which can be considered as intermediate and temporary channels for accepting a call from the BCH and holding the traffic while waiting for the base stations to allocate a TCH channel; (ii) the Slow, and, (iii) the Fast Associated Control Channels (SACCHs and FACCHs) which are used for supervisory data transmission between mobile stations and the base stations during a call. In summary, for the three control channels, BCH and CCCH only use TS0 in each frame and DCCHs are call related. Therefore, if there is no call in progress, secondary user can find an available channel within TS1-TS7 to use.

To detect the availability of a physical channel, a secondary user needs to tune to a forward channel (ARFCN) and synchronize with the base station. For a TDMA frame, a secondary user can detect whether the time slots TS1-TS7 are used or not by analyzing the data bursts. Here, secondary users are assumed to have the capability to remove the effect of dummy burst which are used as filler information for unused time slots on the forward link.

4.2. Channel Availability Evaluation

Generally, multiple channels are licensed to primary users. Secondary users can select any idle channel for communication. However, once a secondary user detects the appearance of primary users, it should vacate the channel immediately to allow primary users to continue using that channel. Therefore, the activities of secondary users do not affect the traffic distribution of primary users. Primary users keep their normal activities regardless of the existence of secondary users. Here, the number of channels licensed to primary users is assumed to be constant. In addition, with a fair scheduling policy, primary users utilize all licensed channel equally.

Traffic pattern prediction enables secondary users to estimate the channel utilization in a near future. For voice communications, two crucial factors in the traffic pattern are call arrival rate and call holding time. To estimate the utilization of one channel, secondary users can predict or estimate the call arrival rate and call holding time of primary users that use this channel. Then, according to the prediction and/or estimation results, secondary users are able to evaluate the probability that the channel would be available for a given time period. By comparing the evaluated probability with some threshold, secondary users can decide whether to use this channel.

In general, the traffic of voice communication in traditional wireless networks is periodic with a specific period T, e.g., T = 24 hours (one day), and it follows similar pattern in each period (Shu et al., 2003). An example of the call arrival process is shown in Fig. 2.

The call arrivals of primary users can be considered to follow non-homogeneous Poisson process{A(t),t0}(Snyder & Miller, 1991). The rate parameter for the process {A(t)} isλ(t). λ(t)may change over time. The expected call arrival rate between the time t1 and t2 is:

λt1,t2= t1 t2λ(t)dtE1

Thus, the number of call arrivals within the time interval(t,t+τ)follows a Poisson distribution with the

Figure 2.

Three cases for channel availability evaluation.

parameterλt,t+τ, i.e.,

{(A(t+τ)A(t))=k}=eλt,t+τ(λt,t+τ)kk!,k=0,1E2

Evenly dividing one traffic period into 24 time intervals(tn,tn+1] (n=0,1,...,23), then, the time durationTd(Td=tn+1tn)for one time interval is one hour. For call arrival rate, a common metric employed in the telecommunication industry is the hourly number of calls (Chen & Trajkovic, 2004). Thus, the rate parameterλ(t)can be assumed to maintain constant valueλnTdin each time interval(tn,tn+1], i.e.,

λ(t)=λnTd,t(tn,tn+1)E3

where,λnis the total number of call arrivals in the time interval(tn,tn+1]

Consideringtntt+τtn+1, i.e., t and t+τare within the same time interval(tn,tn+1], the expected call arrival rate withinτis:

λt,t+τ=λnTdτE4

Similarly, using (1) and (3),λt,t+τcan be obtained when t and t + t are within different time intervals or within different periods.

When a secondary user finds an idle channel and intends to start transmission over this channel, first, it predicts the number of primary user call arrivals in the current time interval(tn,tn+1]Using (4), the secondary user obtains the call arrival rate of primary users,λnTdτchwithin its oncoming call holding timeτch(the call holding time of its next call). Then, the secondary user evaluates the probability, Pna, that no primary user would occupy the channel within the call holding time Tch. Accordingto(2), Pna corresponds to:

Pna=eλnTdτch(λnTdτch)0r!(nr)=eλnTdτchE6

The oncoming call holding time Tch for a secondary user is a random variable and it is hard to predict. Tch in (5) can be replaced with the average call holding time T of the secondary user. For a secondary user, T can be calculated based on the cumulative total call holding time Ta and the total number of calls Nc within a time duration, i.e.,T¯=TaNc

To evaluate the probability that a channel is available for a given time period, secondary users should consider three scenarios discussed in the following.

Case 1 and 2 (see Fig. 3): Primary users end transmission at time t1, and a secondary user starts transmission

at
t2,t1t2(tnt1t2tn+1)E7

In these two cases, the secondary user only needs to evaluate the probability Pi that no primary user arrives withinT¯,i=1,2According to (5), Pi corresponds to:

Pi=eλnTdT¯,i=1,2E8

Case 3 (see Fig. 3): One primary user starts transmission over a channel at time t0, and it ends transmission at t2. A secondary user intends to start transmission at t1 over this channel (no other channels are available),tnt0t1t2tn+1, i.e.,i.e., at time t1, the primary user call is still in progress. In this case, the secondary user is assumed to be capable of suspending its call for some time duration Tw (Tw > 0). Otherwise, the call of secondary users would drop (see (Li & Zekavat, 2009) for details).

In summary, to evaluate the probability that the channel would be available withinT¯, secondary users should be able to predict the number of primary user call arrivals in the corresponding time interval. In addition, secondary users should be able to obtain the PDF of call holding time distribution of primary users (for Case 3).

4.3. Call Arrival Prediction Algorithms

In Section 4.2, the rate parameterλ(t)for the process{A(t)}is assumed to be constant,λnTdin the time interval (tn,tn+1](Td = tn+1— tn,n = 0,1,…, 23), andλnis the total number of call arrivals in the time interval (tn,tn+1]. Therefore, to estimate the call arrival rate in a given time period, secondary users need to predict the number of call arrivals in the corresponding time interval. Denoting the time interval (tn,tn+1] in the (m + 1)th period as (tn + mT, tn+1 + mT], and the corresponding number of call arrivals in this time interval asλn+mT, the set of observations of the number of call arrivals in different time intervals of different periods can be considered as a discrete-time series{λt}(t=0,1,...). Thus, secondary users can predict the call arrivals of primary users using the known observations of the number of primary user call arrivals in the past. Here, we use SARIMA model as an example to discuss one-step prediction of the number of call arrivals in a time interval, i.e., predicting the number of call arrivals A+1 given the known observations of call arrivalsλi,i{1...l}

{λt}is a seasonal ARIMA (p,d,q)×(P,D,Q)s process with period s if the differenced series Yt = (1 — B)d(1 — Bs)Dλtis a causal ARMA process defined by:
(1ϕ1BϕpBp)(1φ1Bsφp(Bs)P)Yt=(1+θ1B+θqBq)(1+θ1Bs+θQ(Bs)Q)ZtE9

where, p and P are the non-seasonal and seasonal autoregressive orders, respectively; q and Q are the non-seasonal and seasonal moving average orders, respectively, and d and D are the numbers of the regular and seasonal differences required. In addition,ϕ1,...,ϕp,Φ1,...,Φp,θ1,...,θp,Θ1,...,ΘQare coefficient parameters. B is the backward operation, i.e.,Bλt=λt1andZtN(0,σ2)(Brockwell & Davis, 2002).

With the simulated field data of{λ t}, the autocorrelation of {Yt} with different d and D is calculated and it is found that d =1 and D = 1 make the process {Yt} stationary. With period s = 24, the differenced observation Yt corresponds to:

Yt=(1B)(1B24)λt=λtλt1λt24+λt25E10

Rearranging (8),

λt=Yt+λt-1+λt-24-λl+h-25E11

Considering /i-step prediction, and setting t = l + h:

λl+h=Yl+h+λl+h-1+λl+h-24-λl+h-25E13

Using Pi to denote the best linear predictor, according to (10

Plλl+h=PlYl+h+Plλl+h-1+Plλl+h-24-Plλl+h-25E14

After calculating PiYi+h of Yl+h, the prediction PiXi+h of Xi+h can be computed recursively by noting thatPlλl+1j=λl+1j for j1. For one-step prediction (h = 1), according to (11),Plλl+1corresponds to:

Plλl+1=PlYl+1+λl+λl-23-λl-24E15

The linear prediction for ARMA process {Yt} (PlYl+h) can be implemented by the innovations algorithm (Brockwell & Davis, 2002).

Some algorithms discussed in Section 3 can also be used to implement the call arrival prediction. For other traffic types in various applications such as WLAN, video and etc., different algorithms can be selected to forecast the future traffic.

If the current time is within the time interval (tn+1,tn+2], given the predicted resultλ^n+1,for Case 1 and 2 discussed in Section 4.2, the probability Pi that a channel would be available to the secondary user corresponds

to:
Pi=e-λn+13600T¯,i=1,2E16

where,λ^n+1is the predicted result ofλn+1, andT¯is the average call holding time of the secondary user.

4.4. Decision of Channel Availability

Introducing traffic prediction techniques to cognitive radio systems would impact the communication performance of both primary and secondary users. To maintain a trade-off between performance measurements including channel switching rate and call blocking rate of secondary users, interference on primary users and spectrum reuse efficiency, secondary users can set a threshold Pth (Pth & [0,1]) to determine whether to use a channel. If the probability Pi (i = 1, 2, 3) is not less than this threshold, i.e.,

PiPthE17

then, a secondary user can proceed to use the channel. Otherwise, it would abandon using the channel.

The probability threshold Pth in (14) is determined by the requirements on performance measurements, whereas performance measurements are affected by the probabilities of false alarm and missed detection. Here, false alarm refers to the condition that a secondary user judges that primary users would appear whereas, actually, no primary user appears; missed detection refers to the condition that a secondary user judges that no primary user would appear whereas, actually, primary users appear.

To balance the performance in terms of the call blocking rate of secondary users, spectrum reuse efficiency and interference on primary users, the probability threshold should be selected such that the occurrence rate of false alarm is equal to that of missed detection (Li & Zekavat, 2009).

Defining Pavg as:

Pavg=PiNE18

where,ΣPiis the summation of the evaluated probabilities of channel availability over all N decisions (assuming, for one channel, a secondary user makes N decisions on channel availability). Based on the discussion in (Li & Zekavat, 2009),

{PiPth}=PavgE19

Considering Pi is uniformly distributed between(1α)Pavg and (1+α)Pavg(0α1,αis used to vary the range), According to (16),

Pth=(PiN)(1+α-2α(PiN)),0α1E20

where,ΣPiis introduced in (15).

Taking advantage of the intelligence of cognitive radio, secondary users can dynamically select an appropriate a based on the evaluation results of probability on channel availability.

If Pi is assumed to be uniformly distributed betweenPi(max) and Pi(min), andthePDFis 1Pi(max)Pi(min),

secondary users can record thePi(max) and Pi(max)for each time interval whenever they evaluate the Pi. Then, according to (16), Pth corresponds to:

Pth=Pi(max)-PiN(Pi(max)-Pi(min))E21

Within a time interval, for one channel, the secondary user can set the threshold Pth according to (17) or (18) using the past evaluated probability results. Note that, within a time interval, the selection of Pth is impacted by the number of primary user call arrivals. Therefore, in different time intervals, Pth should be set dynamically. The performance of prediction techniques is evaluated in (Li & Zekavat, 2009) based on simulations.

5. Probability of secondary users' successful transmissions

Before starting a transmission, a secondary user needs to check the channel availability. Here, the channel availability means that currently the channel is idle, and the probability that the channel would not be occupied by primary users within T (T is the average call holding time of the secondary user) is not less than the

Figure 3.

Call blocking probability of a Secondary User (SU).

probability threshold. Thus, at time t, the probability Pa that at least one channel is available to secondary users corresponds to (considering total m channels are licensed to primary users):

Pa=1-k=1m[1-Pc(k){Pi(k)Pth(k)}]E22

where,Pc(k)is the probability that channel k is idle at time t;Pi(k)is the evaluated probability that channel

k would not be occupied by primary users withinT¯,andPth(k)is the probability threshold set for channel k.

When the hourly number of call arrivals,λn,increases,Pc(k)would decrease. If, at time t, a secondary user has a transmission request, then, the probability Pbr that this request would be blocked corresponds to:

Pbr=1-Pa=k=1m[1Pc(k){Pi(k)Pth(k)}]E23

To examine the probability that there is a successful secondary user's transmission at time t, Pb is assumed to be the probability that there is a secondary user's transmission request at time t. Then, the probability Ps that, at time t, there is a successful secondary user's transmission corresponds to:

Ps=PaPb{1-k=1m[1-Pc(k){Pi(k)Pth(k)}]}PbE24

Generally, the occupancy of the channels is correlated. Here, for simplicity, Pc is assumed equal for all channels, i.e.,Pc(1)=Pc(2)==Pc(m). With another assumption thatΡ{Pi(k)Pth(k)}=0.5, according to (20), the call blocking probability of a secondary user, Pbr, with respect to different Pc is sketched in Fig. 4. It can be observed that, (a) when Pc increases, i.e.,λndecreases, Pbr decreases, and, (b) when the number of available channels increases, Pbr decreases.

According to (21), the probability Ps with respect to different Pb and Pc is sketched in Fig. 5 (m = 8). The probability Ps is low when either Pb or Pc is low (if the competition among secondary users in using the channel is considered, Ps would be lower). This is due to the fact that, when Pb is low, at time t, even if channels are available, nonetheless, secondary users may not have transmission requests; when Pc is low, i.e.,λnis high, the transmission requests from secondary users will mostly be blocked (this can be illustrated by Fig. 6). In other words, requesting channels from secondary users and channels becoming available do not occur simultaneously. This implies that, in some situations, even if channels which are licensed to primary users are underutilized statistically, it is still hard for secondary users to obtain available channels because channel access by primary users and channel request from secondary users are both random processes.

Figure 4.

Probability that there is a successlul secondary user's transmission at time t.

Figure 5.

Channel utilization and secondary users' channel requests.

6. Cooperative Prediction

To improve the accuracy of call arrival prediction, a secondary user may collect the prediction results on primary users' call arrivals from other secondary users, and obtain the average value of the predicted call arrivals. This is called cooperative prediction. Secondary users which are involved in the cooperative prediction should be able to monitor the same channel(s). Furthermore, a common channel (mostly, with low bandwidth) is required for those secondary users to deliver the shared information. After collecting M prediction results for Xn+1 from other Ai secondary users, the secondary user may calculate the average value An+i to evaluate the probability of channel availability. An+i can be calculated as:

λ¯n+1=i=1λn+1E25

whereλ^n+1(i)is the prediction result ofλn+1from secondary user i.

If the average call holding timeT¯is the same for those involved secondary users, another cooperation technique can be employed (Unnikrishnan & Veeravalli, 2008), (Aalo & Viswanathan, 1992). Considering two hypotheses for the evaluated probability Pi relative to

the probability threshold Pth:

{H1:PiPthH0:PiPthE26

for secondary user k, the decision Uk corresponds to:

Uk{1,ifH1istrue-1ifH0istrueE27

Figure 6.

Cooperative prediction (SU: Secondary User, PU: Primary User).

After receiving decisions in the form of Ui from other K secondary users, one secondary user can calculate the summation of all Ui's. If the summation result is greater than 0, i.e.,

i=1KU10E28

then, the secondary user can proceed to use the channel. Fig. 7 illustrates the whole process, in whichω1,...,ωKare the weight coefficients that can be simply considered as one or tuned based on field data.

7 Traffic Prediction based Spectrum Sharing

Cognitive radio techniques enable the inter-vendor and user-central spectrum sharing (Zekavat & Li, 2005), (Li & Zekavat, 2007). The approach of finding available spectrum based on traffic pattern prediction can be applied to different cognitive radio based spectrum sharing techniques.

7.1 Spectrum Sharing across Multiple Service Providers

In business zones, for an infrastructure (e.g., base station) of a service provider, when the number of active users is greater than the maximal number of users that can be accommodated (i.e., the infrastructure is in overloaded situation due to channel scarcity), the communication of users would be more likely blocked. However, at the same time, nearby infrastructures of other service providers might be in the underloaded status. Available channels licensed to those service providers or other organizations can be used by the overloaded infrastructure (assuming multiple service providers coexist in an area of interest). This difference in traffic load across multiple service providers might be due to the diversity of services that they offer to their customers, e.g., mobile communication, wireless Internet for laptops, etc.

Generally, there are two approaches for the overloaded infrastructure to find available channels which are licensed to other service providers: (a) the overloaded infrastructure asks neighboring service providers for available channels; (b) the overloaded infrastructure is equipped with CR, and it senses the available channels within its coverage area. However, if the cell radii of these service providers are different, and/or the infrastructures of different service providers are not located at the same positions, then, both approaches could lead to co-channel interference.

To reduce the co-channel interference and remove the need of equipping CRs in each infrastructure of different service providers, a CR network consisting of multiple fixed CR nodes can be deployed to support the spectrum sharing. These CR nodes are distributed regularly within an area of interest, and each CR node is a dedicated node that senses the surrounding environment and monitors the channel usage within its sensing range. These channels might be licensed to different service providers. To avoid co-channel interference, CR nodes which monitor the channel usage in the cell of interest and the corresponding co-channel cells cooperate to provide channel availability information for the overloaded infrastructures of service providers. CR nodes are connected together via wire or they communicate wirelessly to form a network. The CR network can be called a spectrum management network, and coexists with the wireless networks operated by different service providers (see Fig. 8). Thus, when one or more infrastructures of a service provider are overloaded, they request the channel availability information from those surrounding CR nodes. Then, overladed infrastructures process the information to select the optimum channels based on the channel associated metrics such as interference level and the probability of channel being available for a certain time duration.

Figure 7.

CR spectrum management network coexists with multiple cell based wireless networks.

A CR node would determine channel i is available if: 1) The instantaneous RF (Radio Frequency) energy (plus noise) in this channel,Iint(i), is less than the tolerable interference limit,Itol(i), of this channel, i.e.,Iint(i)Itol(i)and, 2) The probabilityP(i)that this channel would be available (not occupied by its licensed users) for a period of time is not less than a thresholdPthii.eP(i)Pth(i).P(i)is evaluated by CR nodes based on the discussed traffic pattern prediction technique. Thus, it reduces the probability that the selected channel used by the overloaded infrastructure is claimed by its licensed users.

8.Conclusion

In this chapter, traffic models and traffic prediction techniques which can be implemented in secondary users are discussed. Methods are introduced for secondary users to evaluate the probability of channel being available for a given time period in different situations. Comparing the evaluated probability of channel availability with a threshold, secondary users can determine whether to use a channel. The threshold probability maintains a trade-off between the channel switching rate and call blocking rate of secondary users, the interference on primary users and spectrum reuse efficiency.

In addition, the probability that there is a successful secondary user's transmission at one time instance is examined and the cooperative prediction techniques are briefly introduced. Finally, the applications of traffic pattern prediction technique to spectrum sharing are discussed.

© 2009 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike-3.0 License, which permits use, distribution and reproduction for non-commercial purposes, provided the original is properly cited and derivative works building on this content are distributed under the same license.

How to cite and reference

Link to this chapter Copy to clipboard

Cite this chapter Copy to clipboard

Xiukui Li and Seyed A. Reza Zekavat (November 1st 2009). Traffic Pattern Prediction Based Spectrum Sharing for Cognitive Radios, Cognitive Radio Systems, Wei Wang, IntechOpen, DOI: 10.5772/7838. Available from:

chapter statistics

2528total chapter downloads

6Crossref citations

More statistics for editors and authors

Login to your personal dashboard for more detailed statistics on your publications.

Access personal reporting

Related Content

This Book

Next chapter

Cognitive Radio Dynamic Access Techniques for Mutual Interference Reduction and Efficient Spectrum Utilization

By I. Budiarjo, M.K.Lakshmanan and H. Nikookar

Related Book

First chapter

A Novel PFC Circuit for Three-Phase Utilizing Single Switching Device

By Keiju Matsui and Masaru Hasegawa

We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.

More About Us