Abstract
We analyze a queueing model for cognitive wireless networks using the asymptotic-diffusion method (Moiseev et al. (2020); Nazarov et al. (2020)). Cognitive wireless is a technology that resolves radio spectrum shortages by allowing secondary users (SUs, unlicensed users) to occupy channels initially assigned to primary users (PUs, licensed users). SUs need to sense the channel availability upon arrival. After sensing, an SU can transmit if there is an idle channel; otherwise, the SU must continue sensing. We consider the situation where SUs may be interrupted by the arrivals of PUs when all channels are occupied. We derive a diffusion limit for the queueing model when the SUs’ mean sensing time tends to infinity. The diffusion limit leads to an approximate probability distribution of the number of sensing SUs. Finally, we derive a necessary stability condition which turns out to be consistent with the sufficient condition obtained in previous research.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Recent progress in information technology has led to an explosive increase in Internet traffic. In addition to the development of the Internet of Things (IoT), COVID-19 drives online communication needs, making well networked environments essential. As a result, there is a concern about the shortage of wireless resources, such as radio bandwidth allocated to unlicensed users.
Cognitive wireless, which is used to develop 5G or Beyond (B5G) technologies, is expected to alleviate the bandwidth scarcity problem. Cognitive wireless networking separates users into two classes: primary users (PUs) and secondary users (SUs). PUs are licensed and have a dedicated bandwidth, while SUs can only opportunistically use that bandwidth. There are three main types of cognitive technology: overlay access, underlay access and interweave access (Nasser et al., 2021). In underlay access, SUs are allowed to transmit concurrently with PUs over the same channels. However, their traffic must not exceed a certain threshold so as to keep the interference on PUs below a fair value. In overlay access, SUs may, simultaneously with PUs, occupy the same channel until the capacity of the channel is maximized. In this case, the SU sends its data by relaying the PUs. This type of technology thus needs the cooperation of each user and may result in an invasion of PUs’ privacy. In interweave access, SUs are allowed to transmit at maximum power only when PUs are not present. This paradigm is also known as the classical cognitive radio (CR) (Nasser et al., 2021).
In this paper, we focus on interweave access. SUs must sense the availability of the channels before using the frequency bands. If an SU finds an idle channel after sensing, it occupies the channel and starts communication; otherwise, the SU must sense again to find an idle channel at a later time.
This sensing behavior of SUs resembles retrial queues. The reader can refer to Artalejo and Gómez (2008); Falin and Templeton (1997) for research in retrial queues. In retrial queues, arriving customers are blocked when the servers are already fully occupied. These blocked customers instead enter a virtual waiting room, called the orbit, and seek service again after a random waiting time until they successfully complete the communication (Phung-Duc, 2019). In the cognitive radio model, every arriving SU is sent to the sensing pool (the orbit in the retrial queue) and senses to find an idle channel.
Queueing systems for cognitive radio networks are extensively studied (PalunčIć et al., 2018). Salameh et al. (2017) considered a model with a stochastic choice of channels and a finite number of simultaneously sensing users (i.e., a finite sensing pool). In Akutsu and Phung-Duc (2019) and Phung-Duc et al. (2021), they assume that the size of the sensing pool is infinite.
Diffusion limits for queueing systems were deeply studied in Halfin and Whitt (1981) and Whitt (2004), and those for retrial queues were studied in Moiseev et al. (2020), Nazarov et al. (2019), Nazarov et al. (2020) and Nazarov et al. (2020b). The latter used the characteristic function approach.
In this paper, using the asymptotic-diffusion method (Moiseev et al., 2020; Nazarov et al., 2020; Nazarov et al., 2019, 2020b), we focus on the situation where it takes SUs a long time to sense the availability of channels. In this case, the evaluation of the number of SUs in the orbit is extremely difficult using a conventional method such as level-dependent quasi-birth-and-death process (QBD) (Phung-Duc et al., 2010). Because the number of SUs in the orbit is large, we need to truncate the orbit at an extremely large truncation level, denoted by \(N^*\). The complexity of the algorithm is proportional to that for computing \(N^*\) inverse matrices and thus is extremely large. From the computational point of view, the asymptotic diffusion method is more useful in this case and complements the level-dependent QBD approach.
When \(\sigma \) takes closer to 0, the number of SUs in the sensing pool diverges, but a scaled version of this number converges to a deterministic process. Furthermore, we study the second-order asymptotics, in which the scaled and centered number of SUs in the orbit weakly converges to a diffusion process. Finally, the limiting results are used to approximate stationary performance measures.
The main result of this study is a necessary condition of stability for the steady-state regime, which turns out to be consistent with the sufficient condition in Phung-Duc et al. (2021). In addition, we show the uniqueness of the stationary solution of the differential equation, which determines the asymptotic number of SUs in the sensing pool in the stationary regime.
The paper consists of seven sections. In Sect. 2, we introduce the model description and the mathematical model. Next, we consider the diffusion analysis of cognitive wireless networks in Sect. 3. In Sect. 4, we prove the main results for the stability condition of our model. Using the continuous probability distribution obtained from the diffusion limit, we construct approximations for the discrete distribution in Sect. 5. Section 6 compares the simulation results and the approximation obtained by the diffusion limit. We conclude with a summary synthesis in Sect. 7.
2 Model description and preliminaries
In this section, we model cognitive wireless networks as a queueing system of c servers with PUs and SUs arriving at the system according to Poisson processes with arrival rates \(\lambda _1\) and \(\lambda _2\), respectively. The transmission times of PUs and SUs are exponentially distributed with parameters \(\mu _1\) and \(\mu _2\), respectively. The arrival processes of both user types and the service times are assumed to be mutually independent. A new PU can use the channel and transmit unless all channels are occupied by other PUs; otherwise, it gets blocked and leaves the system. Thus, from PU’s point of view, the model is Erlang-B. Arriving SUs must enter the sensing pool and sense for available channels. The sensing times of the SUs follow the exponential distribution with parameter \(\sigma \) and do not depend on other SUs.
When a new PU arrives at the system where the total number of channels c are occupied by other SUs and PUs, the PU interrupts the transmission of an SU (if exists) and uses that channel. The interrupted SU must enter the sensing pool (orbit) to sense again.
Gómez-Corral et al. (2005) addressed the assumption that when all channels are busy with priority customers, a newly arriving priority unit balks. In the model in Salameh et al. (2017), the sensing pool is limited in size, but our model assumes an infinite sensing pool. Note that the service time distribution of an interrupted SU is the same as that of a newly arrived SU because of the memoryless property of exponential distributions.
Let us denote:
-
\(n_1(t)\): the number of PUs that occupy channels at instant t,
-
\(n_2(t)\): the number of SUs that occupy channels at instant t,
-
i(t): the number of SUs in the sensing pool at instant t.
Let \(P(n_1, n_2, i, t) = P\left\{ n_1(t)=n_1, \, n_2(t)=n_2, \, i(t)=i \right\} \) denote the joint probability distribution of the process \(\{ (n_1(t), \, n_2(t), \, i(t) ) \mid t \ge 0 \}\). Under the assumptions of the model, the process is a three-dimensional Markov chain. The transition rate from \(x = (n_1, n_2, i)\) to y (\(x \ne y\)) is given as follows.
Our goal is to obtain the scaling limits of \((n_1(t), n_2(t))\) and i(t). We solve this problem by the asymptotic-diffusion method (Moiseev et al., 2020; Nazarov et al., 2019; Nazarov et al., 2020) under the asymptotic condition when the sensing time is long: \(\sigma \rightarrow 0\).
The Kolmogorov forward equations are given as follows.
-
(i)
\(n_1 + n_2 = 0\), \(i \ge 0\)
$$\begin{aligned} \begin{aligned} \frac{{{d}} P(0, 0, i, t)}{{{d}} t} =&-(\lambda _1 + \lambda _2 + i \sigma ) P(0, 0, i, t) + \lambda _2 P(0, 0, i-1, t) \\&+ \mu _1 P(1, 0, i, t) + \mu _2 P(0, 1, i, t). \end{aligned} \end{aligned}$$ -
(ii)
\(1 \le n_1 + n_2 \le c-1\), \(i \ge 0\)
$$\begin{aligned} \begin{aligned} \frac{{{d}} P(n_1, n_2, i, t)}{{{d}} t} =&-(\lambda _1 + \lambda _2 + n_1 \mu _1 + n_2 \mu _2 + i \sigma ) P(n_1, n_2, i, t) \\&+ \lambda _2 P(n_1, n_2, i-1, t) + \lambda _1 P(n_1-1, n_2, i, t) \\&+ (n_1+1) \mu _1 P(n_1 +1, n_2, i, t) \\&+ (n_2+1)\mu _2 P(n_1, n_2+1, i, t) \\&+ (i+1) \sigma P(n_1, n_2-1, i+1, t). \end{aligned} \end{aligned}$$ -
(iii)
\(n_1 + n_2 = c, n_2 \ge 1\), \(i \ge 0\)
$$\begin{aligned} \begin{aligned} \frac{{{d}} P(n_1, n_2, i, t)}{{{d}} t} =&-(\lambda _1 + \lambda _2 + n_1 \mu _1 + n_2 \mu _2)P(n_1, n_2, i, t) \\&+ \lambda _1 \{ P(n_1-1, n_2, i, t) + P(n_1-1, n_2+1, i-1, t) \} \\&+ \lambda _2 P(n_1, n_2, i-1, t) \\&+(i+1) \sigma P(n_1, n_2-1, i+1, t). \end{aligned} \end{aligned}$$ -
(iv)
\(n_1 =c\), \(i \ge 0\)
$$\begin{aligned} \begin{aligned} \frac{{{d}} P(c, 0, i, t)}{{{d}} t} =&-(\lambda _2 +c \mu _1) P(c, 0, i, t) + \lambda _2 P(c, 0, i-1, t) \\&+\lambda _1 \{ P(c-1, 0, i, t) + P(c-1, 1, i-1, t) \}. \end{aligned} \end{aligned}$$
We note that \(P(n_1, n_2, i, t) = 0\) for \(n_1 < 0\) or \(n_2 < 0\) or \(i < 0\) and let \(j = \sqrt{-1}\) be the imaginary unit. The partial characteristic function is defined by
We obtain the following differential equations.
-
(i)
\(n_1 + n_2 = 0\)
$$\begin{aligned} \frac{\partial H(0, 0, s, t)}{\partial t} =&-(\lambda _1 + \lambda _2) H(0, 0, s, t) + e^{js} \lambda _2 H(0, 0, s, t) \nonumber \\&+ \mu _1 H(1, 0, s, t) + \mu _2 H(0, 1, s, t) + j \sigma \frac{\partial H(0, 0, s, t)}{\partial s}. \end{aligned}$$(1) -
(ii)
\(1 \le n_1 + n_2 \le c-1\)
$$\begin{aligned} \frac{{{\partial }} H(n_1, n_2, s, t)}{\partial t} =&-(\lambda _1 + \lambda _2 + n_1 \mu _1 + n_2 \mu _2) H(n_1, n_2, s, t) \nonumber \\&+ e^{js} \lambda _2 H(n_1, n_2, s, t) + \lambda _1 H(n_1-1, n_2, s, t) \nonumber \\&+ (n_1+1) \mu _1 H(n_1+1, n_2, s, t) \nonumber \\&+ (n_2+1) \mu _2 H(n_1, n_2+1, s, t) \nonumber \\&+ j \sigma \frac{\partial H(n_1, n_2, s, t)}{\partial s} - e^{-js} j \sigma \frac{\partial H(n_1, n_2-1, s, t)}{\partial s}. \end{aligned}$$(2) -
(iii)
\(n_1 + n_2 =c, n_2 \ge 1\)
$$\begin{aligned} \frac{{{\partial }} H(n_1, n_2, s, t)}{\partial t} =&-(\lambda _1 + \lambda _2 + n_1 \mu _1 + n_2 \mu _2) H(n_1, n_2, s, t) \nonumber \\&+ e^{js} \lambda _2 H(n_1, n_2, s, t) + \lambda _1 \{ H(n_1-1, n_2, s, t) \nonumber \\&+ e^{js} H(n_1-1, n_2+1, s, t) \} \nonumber \\&- e^{-j s} j \sigma \frac{\partial H(n_1, n_2-1, s, t)}{\partial s}. \end{aligned}$$(3) -
(iv)
\(n_1 =c\)
$$\begin{aligned} \frac{{{\partial }} H(c, 0, s, t)}{\partial t} =&-(\lambda _2 + c \mu _1) H(c, 0, s, t) + e^{js} \lambda _2 H(c, 0, s, t) \nonumber \\&+ \lambda _1 \{ H(c-1, 0, s, t) + e^{js} H(c-1, 1, s, t) \}. \end{aligned}$$(4)
By using linear finite difference operators \({\textbf{A}}\), \({\textbf{B}}\), \({\textbf{C}}\), \({{\textbf{I}}}_0\), \({{\textbf{I}}}_1\), we can rewrite (1)–(4) as follows.
where \({\textbf{H}}(s, t)\) is a \((c+1) \times (c+1)\) top-left triangle matrix with elements being equal to \(H(n_1, n_2, s, t)\) for \(n_1 \ge 0\), \(n_2 \ge 0\), \(n_1+n_2 \le c\). Operators in (5) are defined as:
Let \(\textbf{S}_1\) be the summing operator for the elements \(n_1 + n_2 = c \) and \(n_2 \ge 1\) and \(\textbf{S}_2\) be that for the elements \(n_1 + n_2 \le c-1\). Furthermore, let \(\textbf{S}\) be the total summing operator. We rewrite (6) in the following form
3 Asymptotic-diffusion analysis
We construct the solution for the first order asymptotic (fluid limit (Robert, 2013)) in Sect. 3.1 and that for the diffusion limit in Sect. 3.2. The idea of the fluid limit is that we scale the time by a factor that in our model is chosen to be the retrial rate \(\sigma \). In the diffusion limit, the time is scaled by another factor that is square of that in the fluid limit, i.e., \(\sigma ^2\). In the fluid limit, we prove that \(\sigma i(\frac{\tau }{\sigma })\) converges to a deterministic process \(x(\tau )\). Using this result, we can approximate the stochastic process \(i(\frac{\tau }{\sigma })\) by \(\frac{1}{\sigma }x(\tau )\). In Sect. 3.2, we study the fluctuation of i(t) around its mean for which we subtract \(\frac{1}{\sigma }x(\tau )\) from i(t).
3.1 First step of asymptotic analysis
In this section, we solve the system of Eqs. (5) and (7) using the asymptotic-diffusion method (Nazarov et al., 2020) under the asymptotic condition: \(\sigma \rightarrow 0\). Here, we make the following substitutions:
It should be noted that \(\tau = \epsilon t\) is the standard procedure for the change of time scale in fluid limit while \(s= \epsilon \omega \) is to consider the characteristic function of the scaled version of i(t) that is \(\epsilon i(t)\). With these substitutions, \({\textbf{F}}(\omega , \tau , \epsilon )\) represents the characteristic function of \(\epsilon i(t)\).
Then, we obtain the following equations:
Lemma 3.1
The following equality holds as \(\sigma \rightarrow 0\).
where \(x(\tau )\) is a solution of
Here, \(\textbf{R}=\textbf{R}(x)\) is a left-top triangle matrix which is a solution of the following system
and satisfies the normalization condition of a probability distribution
From (12) and (13), \(R(n_1, n_2, x)\) is the steady state probability of a Markov chain at state \((n_1, n_2)\). The transition diagram of the Markov chain is illustrated in Fig. (for simplicity, we show the case of \(c=4\)). It follows from (12) that this Markov chain represents the corresponding loss system, where the arrival rates of PUs and SUs are \(\lambda _1\) and x, respectively.
Proof
Denoting \(\mathop {\lim \limits _{\epsilon \rightarrow 0}} \textbf{F}(\omega , \tau , \epsilon ) = \textbf{F}(\omega , \tau )\) and taking the limit \(\epsilon \rightarrow 0\) in (8), we have
Due to the structure of (14), similar to the scalar case, we find its solution in the form
where \(\textbf{R}\) is a left-top triangle matrix and \(x(\tau )\) is a scalar function which represents the asymptotic value of the normalized number of SUs in the sensing pool \(\sigma i(\frac{\tau }{\sigma })\). Substituting (15) into (14), we obtain (12). Because the matrix before \({\textbf{R}}\) in the left-hand side of (12) is the infinitesimal generator of the Markov chain (Fig. 1), we can choose \({\textbf{R}}\) as the stationary distribution of that Markov chain for which (13) holds.
Taking the limit \(\epsilon \rightarrow 0\) in (9) yields
Substituting (15) into (16), we obtain (11). Since the scalar function \(x(\tau )\) is the asymptotic value of the normalized number of SUs in the sensing pool \(\sigma i(\frac{\tau }{\sigma })\), (10) holds. \(\square \)
Remark 3.2
We note that the solution of (11) in the case \(c=1\) is given by
where
and where N is a constant of integration given the initial value \(x(0)=0\), and W(x) is Lambert W-function.
3.2 Second step of asymptotic analysis
In this section, using the approach (Nazarov et al., 2020), we perform the second stage of the asymptotic-diffusion method to obtain the diffusion limit.
Let us rewrite \(\textbf{H}(s, t)\) as
We obtain
We note that \(\textbf{H}^{(1)}(s, t)\) is the matrix characteristic function of the centered process \(i(t) - \frac{1}{\sigma }x(\sigma t)\). Here, \(x(\tau )\) is the asymptotic value of the normalized number of SUs in the sensing pool.
We denote \(\sigma = \epsilon ^2\) and make the following substitutions:
to obtain
It should be noted that \(\tau = \epsilon ^2 t\) is the standard time change procedure in diffusion limit.
The following lemma states the asymptotic property.
Lemma 3.3
Let \(\Phi (\omega , \tau )\) be the characteristic function of the asymptotic process, \( \mathop {\lim \limits _{\sigma \rightarrow 0}} \sqrt{\sigma } \left\{ i(\frac{\tau }{\sigma }) - \frac{1}{\sigma } x(\tau ) \right\} \). Then, we have
where a(x) is given by (11), and b(x) is given by:
in which \(\textbf{g}(x)\) is a left-top triangle matrix, and is the particular solution of the system of equations
such that
Proof
We consider the first equation of (17) up to \(O(\epsilon ^2)\)
From the first-order result in Sect. 3.1, we find the solution of (19) in the following form
Here, \(\textbf{f}(x)\) is some matrix function which we will find later. Substituting (20) into (19) yields
Dividing both sides by \(j \epsilon \omega \) and taking limit as \(\epsilon \rightarrow 0\), we obtain
Applying the superposition principle, we find \(\textbf{f}(x)\) in the following form:
Substituting (22) into (21), we obtain
Differentiating (12) by x, we have
Because this equation has the same form as (23), we can interpret \({\varvec{\varphi }}(x)\) as the solution of (24) in the form
We notice that \(\textbf{S} \varvec{\varphi }(x) = 0\) because of the normalization condition. We rewrite (17) up to order \(\epsilon ^3\)
Substituting (20) into this equation, we have
We take into account (11), (12), dividing (25) by \(\epsilon ^2\), and taking the limit as \(\epsilon \rightarrow 0\) to obtain
Substituting (22) into this equation, and combining with \(\textbf{S R}(x) \equiv 1\), \(\textbf{S g}(x) \equiv 0\), \(\textbf{S} \varvec{\varphi } (x) \equiv 0\), \(\textbf{S f}(x) \equiv 0\), we obtain the following:
Differentiating (11) yields
The coefficient of \(\omega \frac{\partial \Phi (\omega , \tau )}{\partial \omega }\) of (26) matches the right-hand side of (27). Let us denote the coefficient in the second term by b(x):
We rewrite (26) using a(x) and b(x) as
Thus, the lemma is proved. \(\square \)
3.3 Stationary distribution of the diffusion limit
Following the asymptotic-diffusion method, we construct an approximation to the stationary distribution of the number of sensing SUs. First, we perform an inverse Fourier transform as follows:
We obtain the Fokker-Planck equation for \(P(y, \tau )\) as follows:
where \( y(\tau ) = \mathop {\lim \limits _{\sigma \rightarrow 0}} \sqrt{\sigma } \left\{ i \left( \frac{\tau }{\sigma } \right) - \frac{1}{\sigma } x(\tau ) \right\} \). \(\Phi (\omega , \tau )\) and \(P(y, \tau )\) are the characteristic function and probability density function of \(y(\tau )\) respectively. The reader may refer to Risken (1996) for the details of the methodologies.
\(y(\tau )\) is the diffusion process with drift coefficient \(a'(x) y\) and diffusion coefficient b(x). Since \(y(\tau )\) is a solution of the stochastic differential equation (SDE), we can write
Here, \(\omega (\tau )\) is the standard Brownian motion. To solve this equation, we rewrite the ordinary differential equation (11) as
We consider the stochastic process:
Because \(z(\tau ) = \mathop {\lim \limits _{\sigma \rightarrow 0}} \sigma i \left( \frac{\tau }{\sigma } \right) \), \(z(\tau )\) is associated with the number of SUs in the orbit i(t).
To solve the SDE for \(z(\tau )\), differentiating (31) and considering (29), (30), we obtain
We rewrite the coefficients of the above equation in the form of the first-order Taylor series expansion
In this way, taking into account \(\epsilon = \sqrt{\sigma }\), we obtain
This explains that \(z(\tau )\) is a diffusion process with drift coefficient a(z) and diffusion coefficients \(\sigma b(z)\).
Letting \(\pi (z)\) as the stationary PDF of \(z(\tau )\), \(\pi (z)\) is the stationary solution of the Fokker-Plank equation and thus we have
For simplicity, we find a special solution as follows.
The general solution of the differential equation is given as follows.
where C is the integration constant for normalizing \(\pi (z)\), given by
Hence, we obtain the asymptotic probability density function \(\pi (z)\) of the scaled number of SUs in the sensing pool in the steady state, that is \(\sigma i(\frac{\tau }{\sigma })\) as \(\sigma \rightarrow 0\) and \(\tau \rightarrow +\infty \).
4 Stability condition
In this section, we consider the necessary stability condition to guarantee the existence of the steady state. (Nazarov et al., 2020) and Phung-Duc and Kawanishi (2019) found that \(\mathop {\lim \limits _{x \rightarrow \infty }}\, a(x) < 0\) is necessary and sufficient for the stability of the orbit size for a related model. We show that the necessary stability condition is equivalent to the sufficient stability condition proved in Phung-Duc et al. (2021). Furthermore, we define \(R(n_1, n_2):= \mathop {\lim \limits _{x \rightarrow \infty }} R(n_1, n_2, x)\).
Theorem 4.1
When \(c \ge 1\), \( \mathop {\lim \limits _{x \rightarrow \infty }} a(x) < 0\) is equivalent to
where \(\pi _i\) is the steady-state probability that the number of transmitting PUs is i, and is given as follows:
Proof
Applying the method of cut off graph, we obtain the equations for the probabilities \(R(n_1, n_2, x)\).
For diagonal cuts when \(n_1+n_2=n \le c-1\) (see Fig. 1), we can derive
Therefore, taking a limit \(x \rightarrow \infty \), all the probabilities \(R(n_1, n_2, x)\) for \(n_1+n_2 \le c-1\) are equal to zero. Combining with the normalization condition,
we can notice that the probabilities \(R(n_1, n_2)\) are non-zero when \(n_1 + n_2 = c\). Furthermore, from (34), we have \( \mathop {\sum \limits _{n_1+n_2=n}} R(n_1, n_2, x)\) are infinitesimals order of \(\frac{1}{x^{c-n}}\) for \(n \le c-1\). Specifically, the probabilities \(R(n_1, n_2, x)=o(\frac{1}{x})\) for \(n_1 + n_2 = c - 1\), and all other probabilities \(R(n_1, n_2, x)\) have higher infinitesimal order.
Hence, taking the limit \(x \rightarrow \infty \) for \(n=c-1\) in (34), we obtain
Here, we note that the asymptotic property holds \( \mathop {\lim \limits _{x \rightarrow \infty }} R(n_1, n_2, x) = \pi _{n_1}\) for \(n_1 + n_2 = c\). Especially, \(R(c, 0, x) = \pi _c\), which is independent of x.
Moreover, using (35), and we obtain
Taking \(x \rightarrow \infty \) in (11) and substituting (36) and (37) into the result, we have
Applying Little’s law, we have the following equation.
Thus, we obtain Eq. (33), and the theorem is proved. \(\square \)
Figure illustrates the behavior of a(x). The function determines the derivative of the process of the normalized number of SUs. When x is sufficiently large, a(x) converges to a certain value, and Fig. 2 shows that the limit of a(x) is negative under the stability condition (33). If the parameters do not satisfy the stability condition (33), however, the limit is positive.
Theorem 4.2
Under the stability condition, the solution of \(a(x)=0\) is unique.
Proof
Due to (11) and (33), it is clear that \(a(0)>0\) and \( \mathop {\lim \limits _ {x \rightarrow \infty }} a(x)<0\). From the intermediate value theorem, there is at least one value \(\kappa \) in \((0, \infty )\) for which \(a(\kappa ) = 0\). We show that this equation has a unique solution \(\kappa \).
We rewrite the function a(x) as follows:
Here, \((\lambda _1 + x) \mathbf{S_2 R}(x)\) in (38) expresses the ingoing flow of the two types of users successfully entering the system without blocking or interrupting. In other words, \((\lambda _1 + x) \mathbf{S_2 R}(x)\) represents the arrival rate that increases the number of customers (PUs or SUs) in the channels, i.e., the throughput.
Thus, \((\lambda _1 + x) \mathbf{S_2 R}(x)\) increases with the original arrival rate \(\lambda _1 + x\) (that may be blocked or interrupt). As a consequence, a(x) decreases with the increase in x, and thus the theorem is proved. \(\square \)
Figure shows \(-(\lambda _1+x) \mathbf{S_2 R}(x)\) against x. We observe that this quantity decreases when x increases and thus a(x) decreases with x.
5 Approximation of steady state distributions
We first construct the approximations for the distribution \(P(n_1, n_2)\) of the states of the channels and the mean number of sensing SUs using the first-order asymptotic analysis (Sect. 3.1).
Algorithm for finding \(\kappa \) and \(R(n_1, n_2, \kappa )\) and is as follows.
-
1.
We solve the balance Eq. (12) and the normalization condition (13) for elements \(R(n_1, n_2, x)\).
-
2.
We find all \(R(n_1, n_2, x)\) for given parameters and x.
-
3.
From (11), we have
$$\begin{aligned} a(x) = \lambda _1 \sum _{\begin{array}{c} n_1 + n_2 = c \\ n_2 \ge 1 \end{array}} R(n_1, n_2, x) + \lambda _2 - x \sum _{n_1 + n_2 \le c-1} R(n_1, n_2, x). \end{aligned}$$(39) -
4.
We solve the equation \(a(x)=0\) and obtain the solution \(x=\kappa \).
Using \(R(n_1, n_2, \kappa )\) as the steady-state probability, we calculate performance measures and verify the accuracy of the approximations in Sect. 6.
Remark 5.1
In case \(c=1\), the solution of \(a(x)=0\) is given by
Next, we also construct an approximation \(G_A(i)\) for the probability density function P(i) of the number of sensing SUs in the orbit by using the diffusion analysis (Sects. 3.2 and 3.3).
Algorithm for building the approximation \(G_A(i)\) is given as follows.
-
1.
Solving (18) and \(\displaystyle \sum _{\begin{array}{c} n_1 + n_2 = c \end{array}}\, g(n_1,n_2,x) = 0\) for a particular solution \(g(n_1,n_2,x)\).
-
2.
From (28), we calculate b(x) by
$$\begin{aligned} b(x) = a(x) + 2 \Bigg [(\lambda _1 + x) \sum _{\begin{array}{c} n_1 + n_2 = c \\ n_2 \ge 1 \end{array}} g(n_1, n_2, x) + x \sum _{n_1+n_2 \le c-1} R(n_1, n_2, x) \Bigg ]. \end{aligned}$$ -
3.
To obtain an approximation for the discrete steady-state probability distribution, we normalize the Eq. (32) using \(\sigma \) as follows.
$$\begin{aligned} G(i) = \frac{1}{b (\sigma i)} \exp \left\{ \frac{2}{\sigma } \int _0^{\sigma i} \frac{a(x)}{b(x)} \, dx \right\} . \end{aligned}$$(40) -
4.
We obtain the probability distribution \(G_A(i)\) as follows because i(t) only take non-negative values.
$$\begin{aligned} G_A(i) = \frac{G(i)}{\sum _{i=0}^{\infty } G(i)}. \end{aligned}$$
In the next section, we compare this analytic approximation with simulation results. The comparison will be shown in Fig. .
6 Numerical experiment
In this section, we provide some numerical experiments on the results derived in Sect. 5 above. In our experiment, for fixed \(\mu _1 = 4\), \(\mu _2 = 20\) and \(c = 5\), we examine the changes in performance measures against \(\lambda _1\) and \(\lambda _2\). Under the same frameworks, we also conduct simulations and collect the same results as those obtained by the diffusion limit approach. The length of all experimental simulations is set at \(10^6\) time steps, which suffices for the simulations to converge to their corresponding numerical solutions. The simulation results in all the figures are denoted by the points marked "Sim." \(x=\kappa \) and "App" indicate the theoretical value and the approximation derived in Sect. 5.
Figures and illustrate the mean number of SU interruptions per one SU from arrival to departure. From Morozov et al. (2022) the average number of SU terminations is given by \({\mathbb {E}} [N_\mathrm{{int}}]\) as
Although the effect on the value of the SUs arrival rate is small (see Fig. 5), the effect of the PUs is significant (see Fig. 4). We also notice that the effect of the sensing rate is smaller when \(\lambda _2\) is lower (see Fig. 5), and the differences between the simulations and theoretical values become big when user arrival rates are bigger. The closer \(\sigma \) approaches 0, the longer the sensing time is. In that sense, we can regard the system as an M/M/c/c loss system with arrival rates \(\kappa \) for SUs and \(\lambda _1\) for PUs.
Next, we consider the SU blocking probability with the change of the PU arrival rate and the SU arrival rate when \(\sigma =0.1, 1, 2, 32, 64\) and 128. Here, blocking means that SUs are blocked when all channels are occupied by SUs or PUs, and hence go back to the sensing pool. Figure presents the SU blocking probability against \(\lambda _1\). We can see that the difference between different sensing rates is not significant because the mean number of available channels for SU is fixed for a given arrival rate of PU. Figure compares the SU blocking probability while \(\lambda _1\) is fixed and \(\sigma \) varies. The difference becomes smaller as \(\lambda _2\) is smaller, and the difference is larger with larger \(\sigma \), following the theoretical results.
Figure depicts the proportion of the number of SU-occupied channels. We observe that there are few channels occupied by SUs when \(\lambda _2\) is small. When the SU arrival rate is low, the probability distribution is less sensitive to the sensing rate, but when \(\lambda _2\) is larger, the distribution is increasingly sensitive to \(\sigma \).
Figures and reflect the mean number of SUs in the orbit for several sensing rates, plotted on a logarithmic scale. We use the following approximation:
These figures demonstrate that our estimation is more accurate as \(\sigma \) is closer to 0. The difference between simulations and the approximation becomes negligible when \(\sigma \) is close to 0. In addition, when the arrival rates of the two user types are larger, the approximation is further from the simulation.
Figure indicates the transition of the normalized number of SUs in the orbit. We note that 100 times average expresses the average values obtained by running the simulation 100 times with different randomization seeds for each run. The simulation lines evolve around \(x(\tau )\) over time. This figure shows that our presumption increases in accuracy as we carry out more simulations.
In Fig. 12, we compare the simulation results with the approximation obtained for the probability distribution of the number of SUs in the orbit. When the sensing rate is close to 0, the accuracy is high, and the approximation is reasonable. However, for a large value of \(\sigma \), we observe a jump at the starting point in the distribution and cannot get a reliable approximation. These observations agree with theoretical results.
7 Conclusion
In this paper, we considered cognitive wireless networks with the sensing time of secondary users. Using asymptotic diffusion analysis, we obtained the diffusion process and the probability density function of the number of SUs in the orbit. We proved that the stability condition obtained in Phung-Duc et al. (2021) is equivalent to the condition that the limit of the derivative of the normalized number of sensing SUs is negative. We also carried out numerical experiments and showed that the approximation obtained is suitable for various parameter settings. As a future work, we plan to compare with other methods such as level-dependent QBD.
References
Akutsu, K. & Phung-Duc, T. (2019). Analysis of retrial queues for cognitive wireless networks with sensing time of secondary users. In International conference on queueing theory and network applications (pp. 77–91). Berlin: Springer.
Artalejo, J. R., & Gómez-Corral, A. (2008). Retrial queueing systems: A computational approach. Berlin: Springer.
Falin, G. I., & Templeton, J. G. C. (1997). Retrial queues (Vol. 75). Boca Raton: CRC Press.
Gómez-Corral, A., Krishnamoorthy, A., & Narayanan, V. C. (2005). The impact of self-generation of priorities on multi-server queues with finite capacity. Stochastic Models, 21(2–3), 427–447.
Halfin, S., & Whitt, W. (1981). Heavy-traffic limits for queues with many exponential servers. Operations Research, 29(3), 567–588.
Moiseev, A., Nazarov, A., & Paul, S. (2020). Asymptotic diffusion analysis of multi-server retrial queue with hyper-exponential service. Mathematics, 8(4), 531.
Morozov, E. V., Rogozin, S. S., Nguyen, H. Q., & Phung-Duc, T. (2022). Modified Erlang loss system for cognitive wireless networks. Mathematics, 10(12), 2101.
Nasser, A., Al Haj Hassan, H., Abou Chaaya, J., Mansour, A., & Yao, K. (2021). Spectrum sensing for cognitive radio: Recent advances and future challenge. Sensors, 21(7), 2408.
Nazarov, A., Moiseev, A., Phung-Duc, T., & Paul, S. (2020). Diffusion limit of multi-server retrial queue with setup time. Mathematics, 8(12), 2232.
Nazarov, A., Phung-Duc, T., Paul, S., & Lizura, O. (2019). Asymptotic-diffusion analysis for retrial queue with batch Poisson input and multiple types of outgoing calls. In Distributed computer and communication networks (pp. 207–222). Berlin: Springer.
Nazarov, A., Phung-Duc, T., Paul, S., & Lizyura, O. (2020b). Diffusion approximation for multiserver retrial queue with two-way communication. In Distributed computer and communication networks, (pp. 567–578). Berlin: Springer.
PalunčIć, F., Alfa, A. S., Maharaj, B. T., & Tsimba, H. M. (2018). Queueing models for cognitive radio networks: A survey. IEEE Access, 6, 50801–50823.
Phung-Duc, T. (2019). Retrial queueing models: A survey on theory and applications. arXiv preprint arXiv:1906.09560.
Phung-Duc, T., Akutsu, K., Kawanishi, K., Salameh, O., & Wittevrongel, S. (2021). Queueing models for cognitive wireless networks with sensing time of secondary users. Annals of Operations Research, 1–20.
Phung-Duc, T., & Kawanishi, K. (2019). Multiserver retrial queue with setup time and its application to data centers. Journal of Industrial & Management Optimization, 15(1), 15–35.
Phung-Duc, T., Masuyama, H., Kasahara, S., and Takahashi, Y. (2010). A simple algorithm for the rate matrices of level-dependent QBD processes. In Proceedings of the 5th international conference on Queueing Theory and Network Applications, pages 46–52.
Risken, H. (1996). Fokker–Planck equation (pp. 63–95). Berlin: Springer.
Robert, P. (2013). Stochastic networks and queues (Vol. 52). Berlin: Springer.
Salameh, O., De Turck, K., Bruneel, H., Blondia, C., & Wittevrongel, S. (2017). Analysis of secondary user performance in cognitive radio networks with reactive spectrum handoff. Telecommunication Systems, 65(3), 539–550.
Whitt, W. (2004). Efficiency-driven heavy-traffic approximations for many-server queues with abandonments. Management Science, 50(10), 1449–1461.
Acknowledgements
The research of Tuan Phung-Duc was supported in part by JSPS KAKENHI Grant Number 21K11765. We sincerely express our gratitude to Professor Anatoly Nazarov from Tomsk State University (Russia) for developing the asymptotic-diffusion method, and Hung Quoc Nguyen for technical helps in the programming of the numerical experiment. Finally, we would like to thank three anonymous referees for constructive remarks and comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Abe, K., Phung-Duc, T. Diffusion limit of a modified Erlang-B system with sensing time of secondary users. Ann Oper Res 331, 985–1006 (2023). https://doi.org/10.1007/s10479-022-05153-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10479-022-05153-w