Unlock instant, AI-driven research and patent intelligence for your innovation.

A probabilistic access control method for network-side terminals based on cognitive radio

A cognitive radio and access control technology, applied in the field of ubiquitous network wireless resource management

Inactive Publication Date: 2015-11-11
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the joint wireless resource management problem existing in the existing multi-heterogeneous wireless network, the technical solution provided by the present invention is:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A probabilistic access control method for network-side terminals based on cognitive radio
  • A probabilistic access control method for network-side terminals based on cognitive radio
  • A probabilistic access control method for network-side terminals based on cognitive radio

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] The architecture of the wireless network in this embodiment is as follows figure 1 shown. When a SU requests access to the network in a multi-network accessible area (shaded area), the BS faces the problem of which RAN to access the SU to. If the choice is not appropriate, it is likely to cause some RAN networks to be congested. Rise, service quality declines, and spectrum resources of other RANs are not fully utilized at the same time. In this embodiment, precious spectrum resources can be fully utilized without affecting the PU as much as possible, and wireless resource sharing between the PU and the SU can be realized.

[0078] The process of probabilistic access control is as follows:

[0079] Step 1: JACM obtains the attribute parameters of each RAN in the area and the access pricing policy of SU, including RAN collection Reluctant income collection Poisson arrival rate set of PU PU blocking loss set RAN channel capacity set When there are k users in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network terminal probability access control method based on cognitive radio. The method is characterized by comprising the following steps that: (1) a network terminal joint access control manager (JACM) obtains attribute parameters of an radio access network (RAN) in which the network terminal JACM is located, and obtains an access pricing strategy to a cognitive radio terminal user (secondary user, SU); (2) according to the network attribute and the pricing strategy, by utilizing a stochastic dynamic programming method, a probability vector which is adopted for the access request of the SU at any possible state of a system is obtained, wherein the vector determines the probability that the SU accesses to each RAN; and (3) the JACM executes a probability access control algorithm according to an access probability vector. The network terminal probability access control method disclosed by the invention has high innovation and strong expansibility, and compared with a corresponding certainty access control algorithm, the method improves profits of a network system greatly and has an extremely wide application prospect.

Description

technical field [0001] The invention belongs to the field of ubiquitous network wireless resource management, and in particular relates to a network side terminal access control method, which can be used to solve the problem of ubiquitous network resources caused by lack of coordination when multiple cognitive user terminals send network access requests at the same time The problem of waste and reduced revenue of the network system. Background technique [0002] Most of the existing wireless networks are based on a fixed spectrum allocation scheme, that is, the relevant government departments authorize the frequency band to the licensee, allowing it to be used for a long time within a certain geographical range. According to the statistics of the Federal Communications Commission (FCC), quite a large number of authorized wireless frequency bands are not fully utilized, and the utilization rate of the time and area ranges from 15% to 85%. With the rapid increase of wireless ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W16/10H04W16/14H04W16/18H04W16/22H04W74/08
Inventor 徐宏力张浩然黄刘生孙权
Owner SUZHOU INST FOR ADVANCED STUDY USTC