A probabilistic access control method for network-side terminals based on cognitive radio
A cognitive radio and access control technology, applied in the field of ubiquitous network wireless resource management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0077] The architecture of the wireless network in this embodiment is as follows figure 1 shown. When a SU requests access to the network in a multi-network accessible area (shaded area), the BS faces the problem of which RAN to access the SU to. If the choice is not appropriate, it is likely to cause some RAN networks to be congested. Rise, service quality declines, and spectrum resources of other RANs are not fully utilized at the same time. In this embodiment, precious spectrum resources can be fully utilized without affecting the PU as much as possible, and wireless resource sharing between the PU and the SU can be realized.
[0078] The process of probabilistic access control is as follows:
[0079] Step 1: JACM obtains the attribute parameters of each RAN in the area and the access pricing policy of SU, including RAN collection Reluctant income collection Poisson arrival rate set of PU PU blocking loss set RAN channel capacity set When there are k users in t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 