Next Article in Journal
Design and Experimental Study of a Down-Drive Piezoelectric High-Frequency Fatigue Testing Machine
Previous Article in Journal
Artificial Intelligence Software Adoption in Manufacturing Companies
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of a Communication Failure and Repair Mechanism with Classified Primary Users in CRNs

1
School of Computer and Communication Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
2
Hebei Key Laboratory of Marine Perception Network and Data Processing, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(16), 6958; https://doi.org/10.3390/app14166958
Submission received: 4 July 2024 / Revised: 5 August 2024 / Accepted: 6 August 2024 / Published: 8 August 2024

Abstract

:
Due to the deficiency of radio spectrum resources caused by the progress in technology, cognitive radio networks (CRNs) have made significant progress. CRNs have two types of users, namely, primary users (PUs) and secondary users (SUs). Considering that PUs have a higher priority and diversified data transmission requirements, this study divides PUs into two levels, namely, PU1s with a higher priority and PU2s with a lower priority. On the other hand, the occurrence of failures is inevitable in CRNs, which affects the data transmission of users. In this paper, combined with an adjustable PU packets transmission rate mechanism, a communication failure and repair mechanism with classified PUs based on the single-channel CRNs is proposed, and different preemption principles are set according to different system states. A queueing model is established and analyzed with a Markov chain, the performance index expressions that need targeted research are listed, numerical experiments are conducted, and the system performance change trends are obtained. The comparison experiment shows that the proposed communication failure and repair mechanism with classified PUs can improve the throughput of PU1 packets and reduce the blocking rate of PU1 packets compared with the conventional communication failure and repair mechanisms with unclassified PUs.

1. Introduction

Wireless communication technology has entered the stage of rapid development, becoming the fastest-developing and most widely used technology in information communication in recent years. Current networks require communication technology to expand capacity, speed up data transmission and reduce latency further [1]. Cognitive radio (CR) technology has a promising future, which supplies lower delay and more agile services [2], and it is an important research technique to meet the above needs. Achieving a higher spectrum utilization and addressing the spectrum shortage are essential goals of resource allocation in cognitive radio networks (CRNs) [3,4,5]. In CRNs, secondary users (SUs) possessing a lower priority can opportunistically occupy some spectrums that primary users (PUs) possessing a higher priority have not used for the time being [6,7].
Hardware failure, software failure, or inherent characteristics, such as fading or shadowing, may lead to channel failure, resulting in the degradation of CRN performance [8]. A centralized channel allocation strategy is common in CRNs, but it needs to be more robust when it encounters things like spectrum server failures [9,10]. In addition, network nodes usually depend on each other to transmit data in multi-hop CRNs, and connectivity is affected when nodes run out of power [11,12]. The systems mentioned above may be affected in various circumstances collectively referred to as communication failure. The occurrence of communication failures has a momentous influence on CRNs, so we ought to conduct in-depth research on this area.
Communication failure has an essential influence on the CRN system performance. In [13], a continuous-time Markov chain (CTMC) model was designed, and all the performance metrics under different PUs’ and SUs’ arrival and channel failure rates were estimated. In [14], under multi-channel malfunction and PUs’ arrival rates, a model was formulated to evaluate the network performance. In [15], the authors described the most common failure sources and offered a failure classification program for wireless networks using CRs, and again emphasized that the dominating requirement for an SU is to respect the priority of PUs. From [13,14,15], we can find that failure rate is an essential variable in the performance evaluation of CRN models, and most studies on CRNs have focused on the priority between PUs and SUs, but priorities within users of the same category are not considered. The same type of users also have different transmission needs [16], such as different requirements for real-time performance. Therefore, to reduce the impact of communication failure on users with higher priorities, it is worth considering the classification of users and arranging a reasonable preemption principle.
Moreover, spectrum sensing and spectrum allocation are hot topics in CRNs. CRNs require reliable cognitive algorithms to detect signals from licensed primary radios and find unexploited spectrum holes to avoid harmful interference [17]. However, we note that the focus of this paper is not spectrum sensing, but spectrum allocation, that is, how to design a reasonable and efficient spectrum allocation strategy to effectively use spectrum resources under the background of communication failure and repair.
Considering the digital characteristic of data transmission, we use a discrete-time queueing model to analyze the proposed mechanism. The main mathematical tool of discrete-time queueing analysis is Markov chain, which refers to a random process in the state space that goes through a transition from one state to another, in which the probability of state transition at a certain moment depends only on its previous state. Markov chain is conceptually very intuitive and easy to implement. In our paper, we apply the widely used Markov chain for model analysis since we are concerned with the state transition of the system.
In summary, the purpose of this study is as follows:
  • Explore the impact of communication failure and repair on the system.
  • Considering the transmission needs of different PUs, establish a reasonable channel allocation mechanism to improve the network performance of the system.
  • Find a suitable model framework to model the proposed mechanism and express the obtained numerical results clearly.
These research objectives can provide a foundation for the overall study and provide a framework for evaluating the results.
In this paper, we propose a communication failure and repair mechanism with classified PUs to improve the throughput of PU packets with higher transmission requirements and reduce the influence of communication failure on CRN systems. On the basis of different requirements of real-time invisibility, PUs are divided into two levels: PU1s and PU2s. The real-time invisibility of PU1s is higher than that of PU2s. Different preemption rules are set according to whether the system is faulty. Our primary research results are as follows:
  • Communication failure is a problem that cannot be ignored in current network communication. This paper considers network communication failure and repair to explore their impact on system performance.
  • To meet the diversified data transmission requirements of PUs, a communication failure and repair mechanism with classified PUs in CRNs is proposed.
  • Through the analysis of the proposed mechanism, a discrete-time queueing model and a four-dimensional Markov chain (4DMC) are established to evaluate the proposed mechanism. The steady-state distribution and important performance indexes of the system are derived.
  • The critical performance indexes are analyzed by numerical experiments, and some indicators of the proposed and traditional mechanisms are contrasted and analyzed.
Other sections of this article are listed hereafter. Section 2 records the preliminary preparation for the study. The proposed mechanism and the corresponding modeling process are introduced in detail in Section 3. In Section 4, the performance indicator expressions of the proposed mechanism are listed and explained accordingly. The changes in each performance index are described by numerical experiments, and the comparison curves of important performance indexes between the proposed mechanism and the traditional mechanism are described in Section 5. Section 6 presents a summary of the full text.

2. Related Works

In the current research on channel allocation strategies in CRNs, the internal classification of SUs is often considered. In [18], a channel allocation strategy was proposed to classify SUs according to real-time requirements, in which the priority of SU1 packets was higher than SU2 packets, and the performance index analysis and system behavior optimization were carried out for SU2. In [19], SUs were divided into two levels according to delay sensitivity, and two different active spectrum switching strategies were derived for two types of SUs. In [20], SUs were divided into real-time traffic SU1s with high priority and non-real-time traffic SU2s with low priority to offer better performance for SU2s without influencing SU1s. From [18,19,20], we can find that it is widespread to classify SUs, but in the literature, scholars rarely classify PUs. When a CRN system is faulty, the transmission success rate of packets generated by users is significantly reduced. In this case, PUs with higher real-time requirements should be given priority. Therefore, it is necessary to consider the classification of PUs.
In conventional CRNs, channel preemption usually occurs between PUs and SUs. Similarly, the preemption principle between different levels of PUs should be considered after the hierarchical processing of PUs. There are two standard methods to deal with it: complete preemption and non-preemption [21,22]. When considering the internal priority of the SUs, complete preemption means that the channel of the SU possessing a lower priority can be preempted by the SU possessing a higher priority, and the principle of non-preemption means that the data transmission of the SU possessing a lower priority cannot be interrupted by the SU possessing a higher priority [23]. In [24], the authors found that complete preemption of PUs to SUs could reduce the waiting time of PUs, and full non-preemption of PUs to SUs could reduce the waiting time of SUs. In [25], to diminish the delay time of SUs, the authors put forward a hybrid preemptive/non-preemptive resume priority model. From [24,25], we conclude that a mix of complete preemption and non-preemption between users should be considered, depending on the different scenarios. Therefore, we can set different preemption rules to apply to PUs of different levels. When the system state is normal, PUs of different levels are equal and do not preempt each other’s channel. When the system is affected by the failure, to ensure the data transmission of PUs with high real-time requirements, PUs who are with high real-time requirements can interrupt the data transmission of PUs who are with low real-time requirements. Moreover, we note that audio, video, or real-time services have high real-time requirements, so we can think of them as the packets with the highest priority. Due to the high priority, their real-time service transmission needs can be guaranteed.
A CRN system can break down for various reasons, and many researchers have studied the problem according to the wholly stopped service area of the server. On account of the complicacy of modern operating systems, system failure may not terminate service entirely to users [26]. In [27], a partially failed and interruptible setup/shutdown strategy was proposed, and the system maintained a low service in the case of failure. In [28], the authors studied the equilibrium strategies in the almost observable and almost unobservable M/M/1 queues with partial failure, and the service rate in partial failure states was lower than the standard service rate. In [29], the equilibrium behavior of customers in Markov queues with setup times and partial failure was considered. When the system was faulty, services were provided at a low speed, and no new users were received. In [30], the authors assumed that the PU packets’ transmission would be maintained at a low speed under the condition of system failure and would be resumed at a high speed after the failure was repaired. According to the experimental results in [27,28,29,30], under the condition that the system does not entirely collapse but partially fails, it is beneficial to improve the system performance for the system to maintain a low speed to provide services to users. In refining our strategy, we are able to provide this service for PU packets with a higher priority, that is, to continue receiving assistance in the event of system failure.
Moreover, queueing theory is often used to solve problems in CRNs. In [31], the authors introduced a queueing method that considered server outages to analyze the performance of the CRN system under periodic failures and outages. In [32], a simulation of a queueing model for evaluating the performance and reliability of CRNs is discussed. In [33], a hybrid PRP/NPRP M/G/1 queueing model based on interruption priority was proposed to describe the spectrum usage in the CRN with multi-level SUs and multiple switches. Queueing theory was used to analyze system performance, user grading, and failure interruption problems in CRNs. In addition, discrete-time queueing theory is in line with the development characteristics of today’s digital age, so we establish and dissect a discrete-time queueing model to perform the system performance assessment in this paper.

3. System Model

3.1. Communication Failure and Repair Mechanism with Classified PUs

In a single-channel CRN system, there are three types of users: one PU1, one PU2, and one SU, where PU1 has a higher priority than PU2, and SU has the lowest priority. As the source of data, each type of user generates one corresponding packet at most in each slot. In the transmission process, the central controller is responsible for spectrum scheduling. Due to the low priority of SU packets, setting a cache with limited capacity for SU packets can appropriately reduce the occurrence of SU packets leaving the system. PU packets require high real-time performance, so no cache is set for them.
We define the system as being in a normal state if there is no failure. If a system failure occurs, the system enters a failure state. To balance the influence of the existence of the failure on the two types of PU packets, we set the preemption principle based on the system state. No preemption behavior will exist between PU1 and PU2 packets in the system’s normal state. In the failure state of the system, PU1 packets can preempt PU2 packets’ right to use the channel. In addition, both PU1 and PU2 packets can preempt SU packets’ channel access right whatever the system’s state is.
Once a failure happens, SU packets’ transmission is interrupted. While PU1 and PU2 packets have higher real-time requirements, we set them to be transmitted at a low speed when the system is in a failure state to effectively enhance the throughput of PU1 and PU2 packets within a unit time slot.
Based on the proposed communication failure and repair mechanism, the system actions for the three types of packets are described as follows:
For PU1 packets, when there are no other PU packets in the channel, the newly arrived PU1 packet can directly enter the channel. If an SU packet exists in the channel, the newly arrived PU1 packet will preempt the channel used by the SU packet and the SU packet will enter into the cache to wait. When the system state is normal, and there is a PU1 packet or a PU2 packet in the channel, the freshly arrived PU1 packets can only leave the system. If the system state is failure, when the channel contains a PU1 packet, and the freshly arrived PU1 packet leaves the system; moreover, when the channel includes a PU2 packet, the channel used by the PU2 packet is preempted by the newly arrived PU1 packet and the PU2 packet leaves the system. A PU1 packet entering the channel is transmitted at a low speed if the system is in a failure state and at a high speed if the system state is normal.
For PU2 packets, when there are no other PU packets in the channel, the newly arrived PU2 packet can directly enter the channel, and if there are other PU packets in the channel, the newly arrived PU2 packet can only leave the system. The channel used by the SU packet is snatched by the newly arrived PU2 packet if an SU packet exists in the channel, and the SU packet enters the cache for waiting. A PU2 packet entering the channel is transmitted at a low speed if the system is in a failure state and at a high speed if the system state is normal.
For SU packets, if the system state is failure, the newly arrived SU packet directly enters the cache to wait, and the SU packet being transmitted is interrupted and enters the cache. If the system state is normal, the newly arrived SU packet enters the channel for transmission if there are no other packets in the channel. If there are other packets in the channel, the newly arrived SU packet enters the cache and waits. When the cache is full, the interrupted or newly arrived SU packets cannot enter the cache. When the channel is empty and the system state is normal, the SU packet at the head of the cache queue can enter the channel for further transmission.

3.2. Model Building

We establish an early arrival discrete-time queueing model for a single service desk according to the proposed strategy. The service desk is an abstraction of the channel, and the user packets are equivalent to the customers in queueing theory. The entire timeline is separated into time slots of the same length. The slot boundary points are t 1 , t 2 , ⋯, t n , and at most one user packet can be transmitted in the channel in each time slot. In addition, the size of the cache that holds SU packets is k.
The probability that the system state changes from normal to failure due to the occurrence of failure is f ( f ¯ = 1 f , 0 < f < 1 ) , and f represents the communication failure rate. The probability that the system returns from the failure state to the normal state through the repair process is r ( r ¯ = 1 r , 0 < r < 1 ) , and r represents the system repair rate. All user packets’ arrival intervals and transmission time also conform to the geometric distribution. The arrival rate of PU1 packets is α 11 ( α ¯ 11 = 1 α 11 , 0 < α 11 < 1 ) , the arrival rate of PU2 packets is α 12 ( α ¯ 12 = 1 α 12 , 0 < α 12 < 1 ) , and the arrival rate of SU packets is α 2 ( α ¯ 2 = 1 α 2 , 0 < α 2 < 1 ) . When the system state is normal, the transmission rates of PU1 and PU2 packets are β 11 ( β ¯ 11 = 1 β 11 , 0 < β 11 < 1 ) and β 12 ( β ¯ 12 = 1 β 12 , 0 < β 12 < 1 ) , and the transmission rate of SU packets is β 2 ( β ¯ 2 = 1 β 2 , 0 < β 2 < 1 ) . When the system is in a failure state, the transmission rates of PU1 and PU2 packets are ϵ 11 ( ϵ ¯ 11 = 1 ϵ 11 , 0 < ϵ 11 < β 11 ) and ϵ 12 ( ϵ ¯ 12 = 1 ϵ 12 , 0 < ϵ 12 < β 12 ) .
At time t + , the number of all packets is U t , in which there are V t packets of PU1 and W t packets of PU2, and the system state is O t . Then, { ( U t , V t , W t , O t ) : t 0 } composes a four-dimensional Markov chain (4DMC). The system’s state space is defined as E .
E = { ( 0 , 0 , 0 , s ) : s = 0 , 1 } { ( l , 0 , 0 , 0 ) ( l , 0 , 1 , 0 ) ( l , 1 , 0 , 0 ) ( l , 0 , 0 , 1 ) ( l , 0 , 1 , 1 ) ( l , 1 , 0 , 1 ) : l = 1 , 2 , , k + 1 }
The state ( l , m , n , s ) in Equation (1) indicates a total of l user packets in the system at present, including m PU1 packets and n PU2 packets. In addition, the system state is determined by s. If s is 1, the system state is failure; if s is 0, the system state is normal.

3.3. Model Analysis

To simplify the matrices, we simplify some formulas. The concrete representation of some symbols in the below matrices is as follows:
ζ = α ¯ 11 α ¯ 12 α ¯ 2 , δ = α ¯ 11 α ¯ 12 α 2 η = α ¯ 11 α 12 α ¯ 2 , θ = α ¯ 11 α 12 α 2
The system’s total number of user packets varies from 0 to k + 1, where k ( k > 1 ) is the cache capacity. The total state transition matrix H is shown in Equation (3), and its submatrix H a , b is shown in Equations (4)–(15), where H a , b represents the one-step state transition matrix of the total user packets from a to b.
H = H 0 , 0 H 0 , 1 H 0 , 2 H 1 , 0 H 1 , 1 H 1 , 2 H 1 , 3 H 2 , 1 H 2 , 2 H 2 , 3 H 2 , 4 H k , k 1 H k , k H k , k + 1 H k + 1 , k H k + 1 , k + 1
  • H 0 , 0 , H 0 , 1 , H 0 , 2 , H 1 , 0 are represented as Equations (4)–(7).
    H 0 , 0 = f ¯ ζ f ζ r ζ r ¯ ζ
    H 0 , 1 = f ¯ δ f ¯ η f ¯ α 11 α ¯ 2 f δ f η f α 11 α ¯ 2 r δ r η r α 11 α ¯ 2 r ¯ δ r ¯ η r ¯ α 11 α ¯ 2
    H 0 , 2 = 0 f ¯ θ f ¯ α 11 α 2 0 f θ f α 11 α 2 0 r θ r α 11 α 2 0 r ¯ θ r ¯ α 11 α 2
    H 1 , 0 = β 2 f ¯ ζ β 2 f ζ β 12 f ¯ ζ β 12 f ζ β 11 f ¯ ζ β 11 f ζ 0 0 ϵ 12 r ζ ϵ 12 r ¯ ζ ϵ 11 r ζ ϵ 11 r ¯ ζ
  • When 2 c k , H c , c 1 is represented as Equation (8).
    H c , c 1 = β 2 f ¯ ζ 0 0 β 2 f ζ 0 0 β 12 f ¯ ζ 0 0 β 12 f ζ 0 0 β 11 f ¯ ζ 0 0 β 11 f ζ 0 0 0 0 0 0 0 0 ϵ 12 r ζ 0 0 ϵ 12 r ¯ ζ 0 0 ϵ 11 r ζ 0 0 ϵ 11 r ¯ ζ 0 0
  • When 1 c k 1 , H c , c , H c , c + 1 and H c , c + 2 are represented as Equations (9)–(11).
    H c , c = f ¯ ( δ β 2 + ζ β ¯ 2 ) β 2 f ¯ η β 2 f ¯ α 11 α ¯ 2 f ( δ β 2 + ζ β ¯ 2 ) β 2 f η β 2 f α 11 α ¯ 2 β 12 f ¯ δ f ¯ ( η β 12 + α ¯ 2 β ¯ 12 ) β 12 f ¯ α 11 α ¯ 2 β 12 f δ f ( η β 12 + α ¯ 11 α ¯ 2 β ¯ 12 ) f α 11 α ¯ 2 β 11 f ¯ δ β 11 f ¯ η f ¯ α ¯ 2 ( α 11 β 11 + β ¯ 11 ) β 11 f δ β 11 f η f α ¯ 2 ( α 11 β 11 + β ¯ 11 ) r ζ 0 0 r ¯ ζ 0 0 ϵ 12 r δ r ( η ϵ 12 + α ¯ 2 ϵ ¯ 12 ) ϵ 12 r α 11 α ¯ 2 ϵ 12 r ¯ δ r ¯ ( η ϵ 12 + α ¯ 11 α ¯ 2 ϵ ¯ 12 ) r ¯ α 11 α ¯ 2 ϵ 11 r δ ϵ 11 r η r α ¯ 2 ( α 11 ϵ 11 + ϵ ¯ 11 ) ϵ 11 r ¯ δ ϵ 11 r ¯ η r ¯ α ¯ 2 ( α 11 ϵ 11 + ϵ ¯ 11 )
    H c , c + 1 = β ¯ 2 f ¯ δ f ¯ ( θ β 2 + η β ¯ 2 ) f ¯ α 11 ( α 2 β 2 + α ¯ 2 β ¯ 2 ) β ¯ 2 f δ f ( θ β 2 + η β ¯ 2 ) f α 11 ( α 2 β 2 + α ¯ 2 β ¯ 2 ) 0 f ¯ ( θ β 12 + α 2 β ¯ 12 ) β 12 f ¯ α 11 α 2 0 f ( θ β 12 + α ¯ 11 α 2 β ¯ 12 ) f α 11 α 2 0 β 11 f ¯ θ f ¯ α 2 ( α 11 β 11 + β ¯ 11 ) 0 β 11 f θ f α 2 ( α 11 β 11 + β ¯ 11 ) r δ r η r α 11 α ¯ 2 r ¯ δ r ¯ η r ¯ α 11 α ¯ 2 0 r ( θ ϵ 12 + α 2 ϵ ¯ 12 ) ϵ 12 r α 11 α 2 0 r ¯ ( θ ϵ 12 + α ¯ 11 α 2 ϵ ¯ 12 ) r ¯ α 11 α 2 0 ϵ 11 r θ r α 2 ( α 11 ϵ 11 + ϵ ¯ 11 ) 0 ϵ 11 r ¯ θ r ¯ α 2 ( α 11 ϵ 11 + ϵ ¯ 11 )
    H c , c + 2 = 0 β ¯ 2 f ¯ θ β ¯ 2 f ¯ α 11 α 2 0 β ¯ 2 f θ β ¯ 2 f α 11 α 2 0 0 0 0 0 0 0 0 0 0 0 0 0 r θ r α 11 α 2 0 r ¯ θ r ¯ α 11 α 2 0 0 0 0 0 0 0 0 0 0 0 0
  • The remaining non-zero submatrices in matrix H are represented as Equations (12)–(15).
    H k , k = f ¯ ( δ β 2 + ζ β ¯ 2 ) β 2 f ¯ η β 2 f ¯ α 11 α ¯ 2 f ( δ β 2 + α ¯ 11 α ¯ 12 β ¯ 2 ) β 2 f η β 2 f α 11 α ¯ 2 β 12 f ¯ δ f ¯ ( η β 12 + α ¯ 2 β ¯ 12 ) β 12 f ¯ α 11 α ¯ 2 β 12 f δ f ( η β 12 + α ¯ 11 α ¯ 2 β ¯ 12 ) f α 11 α ¯ 2 β 11 f ¯ δ β 11 f ¯ η f ¯ α ¯ 2 ( α 11 β 11 + β ¯ 11 ) β 11 f δ β 11 f η f α ¯ 2 ( α 11 β 11 + β ¯ 11 ) r ζ 0 0 r ¯ α ¯ 11 α ¯ 12 0 0 ϵ 12 r δ r ( η ϵ 12 + α ¯ 2 ϵ ¯ 12 ) ϵ 12 r α 11 α ¯ 2 ϵ 12 r ¯ δ r ¯ ( η ϵ 12 + α ¯ 11 α ¯ 2 ϵ ¯ 12 ) r ¯ α 11 α ¯ 2 ϵ 11 r δ ϵ 11 r η r α ¯ 2 ( α 11 ϵ 11 + ϵ ¯ 11 ) ϵ 11 r ¯ δ ϵ 11 r ¯ η r ¯ α ¯ 2 ( α 11 ϵ 11 + ϵ ¯ 11 )
    H k , k + 1 = β ¯ 2 f ¯ δ f ¯ ( θ β 2 + α ¯ 11 α 12 β ¯ 2 ) f ¯ α 11 ( α 2 β 2 + β ¯ 2 ) 0 f ( θ β 2 + α ¯ 11 α 12 β ¯ 2 ) f α 11 ( α 2 β 2 + β ¯ 2 ) 0 f ¯ ( θ β 12 + α 2 β ¯ 12 ) β 12 f ¯ α 11 α 2 0 f ( θ β 12 + α ¯ 11 α 2 β ¯ 12 ) f α 11 α 2 0 β 11 f ¯ θ f ¯ α 2 ( α 11 β 11 + β ¯ 11 ) 0 β 11 f θ f α 2 ( α 11 β 11 + β ¯ 11 ) r δ r α ¯ 11 α 12 r α 11 0 r ¯ α ¯ 11 α 12 r ¯ α 11 0 r ( θ ϵ 12 + α 2 ϵ ¯ 12 ) ϵ 12 r α 11 α 2 0 r ¯ ( θ ϵ 12 + α ¯ 11 α 2 ϵ ¯ 12 ) r ¯ α 11 α 2 0 ϵ 11 r θ r α 2 ( α 11 ϵ 11 + ϵ ¯ 11 ) 0 ϵ 11 r ¯ θ r ¯ α 2 ( α 11 ϵ 11 + ϵ ¯ 11 )
    H k + 1 , k = β 2 f ¯ ζ 0 0 f α ¯ 11 α ¯ 12 0 0 β 12 f ¯ ζ 0 0 β 12 f α ¯ 11 α ¯ 12 0 0 β 11 f ¯ ζ 0 0 β 11 f α ¯ 11 α ¯ 12 0 0 0 0 0 0 0 0 ϵ 12 r ζ 0 0 ϵ 12 r ¯ α ¯ 11 α ¯ 12 0 0 ϵ 11 r ζ 0 0 ϵ 11 r ¯ α ¯ 11 α ¯ 12 0 0
    H k + 1 , k + 1 = f ¯ ( δ β 2 + α ¯ 11 α ¯ 12 β ¯ 2 ) f ¯ α ¯ 11 α 12 f ¯ α 11 0 f α ¯ 11 α 12 f α 11 β 12 f ¯ δ f ¯ ( α ¯ 11 α 12 β 12 + β ¯ 12 ) β 12 f ¯ α 11 0 f α ¯ 11 ( α 12 β 12 + β ¯ 12 ) f α 11 β 11 f ¯ δ β 11 f ¯ α ¯ 11 α 12 f ¯ ( α 11 β 11 + β ¯ 11 ) 0 β 11 f α ¯ 11 α 12 f ( α 11 β 11 + β ¯ 11 ) 0 0 0 0 0 0 ϵ 12 r δ r ( α ¯ 11 α 12 ϵ 12 + ϵ ¯ 12 ) ϵ 12 r α 11 0 r ¯ α ¯ 11 ( α 12 ϵ 12 + ϵ ¯ 12 ) r ¯ α 11 ϵ 11 r δ ϵ 11 r α ¯ 11 α 12 r ( α 11 ϵ 11 + ϵ ¯ 11 ) 0 ϵ 11 r ¯ α ¯ 11 α 12 r ¯ ( α 11 ϵ 11 + ϵ ¯ 11 )
The steady-state distribution of the 4DMC is defined as ψ λ , μ , ρ , σ .
ψ λ , μ , ρ , σ = lim t P { U t = λ , V t = μ , W t = ρ , O t = σ } , ( λ , μ , ρ , σ ) E
The definition of the steady-state probability vector Ψ is
Ψ = ( Ψ 0 , Ψ 1 , , Ψ k + 1 )
where
Ψ x = ( ψ x , 0 , 0 , 0 , ψ x , 0 , 0 , 1 ) , x = 0 Ψ x = ( ψ x , 0 , 0 , 0 , ψ x , 0 , 1 , 0 , ψ x , 1 , 0 , 0 , ψ x , 0 , 0 , 1 , ψ x , 0 , 1 , 1 , ψ x , 1 , 0 , 1 ) , x 0
In Equation (19), e is a column vector with all values being 1, and the value of Ψ can be obtained with Equation (19) by using the numerical calculation.
Ψ H = Ψ Ψ e = 1

4. Performance Metrics

The performance indicators covered in this paper are PU1 packets’ blocking rate and throughput; PU2 packets’ blocking rate, loss rate, and throughput; and SU packets’ blocking rate, loss rate, and throughput. Blocking rate, loss rate, and throughput reflect the loss and successful transmission of packets. We note that other indicators in network analysis, such as average queue length, average delay, and interruption rate, cannot visually represent the “in and out” of the system. Therefore, we focus on blocking rate, loss rate, and throughput to show the performance of the system in this paper.

4.1. PU1 Packets’ Performance Metrics

The amount of PU1 packets that is blocked and leave per time slot is defined as PU1 packets’ blocking rate B P 1 .
B P 1 = y = 1 k + 1 ( ψ y , 0 , 1 , 0 f ¯ α 11 β ¯ 12 + ψ y , 1 , 0 , 0 α 11 β ¯ 11 + ψ y , 0 , 1 , 1 r α 11 ϵ ¯ 12 + ψ y , 1 , 0 , 1 α 11 ϵ ¯ 11 )
The amount of PU1 packets with completed transmission per time slot is defined as PU1 packets’ throughput T P 1 .
T P 1 = α 11 B P 1

4.2. PU2 Packets’ Performance Metrics

The amount of PU2 packets that is blocked and leave per time slot is defined as PU2 packets’ blocking rate B P 2 .
B P 2 = y = 0 k + 1 ( ψ y , 0 , 0 , 0 α 11 α 12 + ψ y , 0 , 0 , 1 α 11 α 12 ) + y = 1 k + 1 [ ψ y , 0 , 1 , 0 ( f α ¯ 11 α 12 β ¯ 12 + f ¯ α 12 β ¯ 12 + f ¯ α 11 α 12 β 12 + f α 11 α 12 ) + ψ y , 0 , 1 , 1 ( r ¯ α ¯ 11 α 12 ϵ ¯ 12 + r α 12 ϵ ¯ 12 + r α 11 α 12 ϵ 12 + r ¯ α 11 α 12 ) + ψ y , 1 , 0 , 0 ( α 11 α 12 β 11 + α 12 β ¯ 11 ) + ψ y , 1 , 0 , 1 ( α 11 α 12 ϵ 11 + α 12 ϵ ¯ 11 ) ]
The amount of PU2 packets that leave due to interrupted transmission per time slot is defined as PU2 packets’ loss rate L P 2 .
L P 2 = y = 1 k + 1 ( ψ y , 0 , 1 , 0 f α 11 β ¯ 12 + ψ y , 0 , 1 , 1 r ¯ α 11 ϵ ¯ 12 )
The amount of PU2 packets with completed transmission per time slot is defined as PU2 packets’ throughput T P 2 .
T P 2 = α 12 B P 2 L P 2

4.3. SU Packets’ Performance Metrics

The amount of SU packets that is blocked and leave per time slot is defined as SU packets’ blocking rate B S .
B S = ψ k , 0 , 0 , 0 ( f α ¯ 11 α ¯ 12 α 2 β ¯ 2 + α ¯ 11 α 12 α 2 β ¯ 2 + α 11 α 2 β ¯ 2 ) + ψ k , 0 , 0 , 1 ( r ¯ α ¯ 11 α ¯ 12 α 2 + α ¯ 11 α 12 α 2 + α 11 α 2 ) + ψ k + 1 , 0 , 0 , 0 ( f α ¯ 11 α 2 + f ¯ α ¯ 11 α ¯ 12 α 2 β ¯ 2 + f ¯ α ¯ 11 α 12 α 2 + α 11 α 2 ) + ψ k + 1 , 0 , 1 , 0 ( f α ¯ 11 α ¯ 12 α 2 β 12 + α ¯ 11 α 12 α 2 β 12 + f ¯ α 11 α 2 β 12 + f α ¯ 11 α 2 β ¯ 12 + f α 11 α 2 + f ¯ α 2 β ¯ 12 ) + ψ k + 1 , 1 , 0 , 0 ( α 11 α 2 β 11 + α 2 β ¯ 11 + f α ¯ 11 α 2 β 11 + f ¯ α ¯ 11 α 12 α 2 β 11 ) + ψ k + 1 , 0 , 1 , 1 ( r ¯ α 2 + r α ¯ 11 α 12 α 2 ϵ 12 + r α 2 ϵ ¯ 12 + r α 11 α 2 ϵ 12 ) + ψ k + 1 , 1 , 0 , 1 ( α 2 ϵ ¯ 11 + r ¯ α ¯ 11 α ¯ 12 α 2 ϵ 11 + α ¯ 11 α 12 α 2 ϵ 11 + α 11 α 2 ϵ 11 )
The amount of SU packets that leaves because they are interrupted and cannot enter into the cache per time slot is defined as SU packets’ loss rate L S .
L S = ψ k + 1 , 0 , 0 , 0 ( f α ¯ 11 α ¯ 12 + α ¯ 11 α 12 β ¯ 2 + α 11 β ¯ 2 )
The amount of SU packets with completed transmission per time slot is defined as SU packets’ throughput T S .
T S = α 2 B S L S

5. Numerical Results and Discussion

To better describe the changes in various performance indicators along with some parameters, we design numerical experiments through MATLAB to describe the changing trend in the form of broken lines, and we elaborate on the problems reflected in the curves.

5.1. Performance Analysis

We describe the performance of PU1, PU2, and SU packets in different network environments. Table 1 shows the parameters with fixed values.

5.1.1. Performance Analysis of PU1 Packets

Figure 1 depicts the trends of PU1 packets’ blocking rate B P 1 and throughput T P 1 under the proposed communication failure and repair mechanism.
As shown in Figure 1, when the communication failure rate f increases, PU1 packets’ blocking rate B P 1 increases while throughput T P 1 decreases. When the repair rate r increases, B P 1 decreases while T P 1 increases. When f increases, the possibility of the system state being failure increases, so the time PU1 packets are present in the channel increases due to the low-speed transmission of PU1 packets in the failure state. Therefore, the probability of newly arrived PU1 packets being blocked increases, and the number of transmitted PU1 packets decreases in unit time correspondingly. When r increases, the possibility of the system maintaining a normal state increases, the probability of PU1 packets being transmitted at a high speed increases, which reduces the transmission time, and the chance of the channel being idle to meet those newly arrived PU1 packets increases; therefore, less blocking occurs and the number of transmitted PU1 packets increases.
From Figure 1, we can find that as PU1 packets’ arrival rate α 11 increases, PU1 packets’ blocking rate B P 1 and throughput T P 1 increases simultaneously. As PU2 packets’ arrival rate α 12 increases, B P 1 increases, and T P 1 decreases. Considering the priority of PU1 packets is higher, as α 11 increases, the probability that PU1 packets are present in the channel increases. Therefore, the amount of PU1 packets with completed transmission rises. Meanwhile, there can only be at most one packet in the channel, so the probability of PU1 packets being blocked also increases. When α 12 increases, the probability of PU2 packets entering the channel increases. However, in the system’s normal state, when PU2 packets are being transmitted in the channel, PU1 packets cannot t preempt the channel, so the probability that PU1 packets are blocked increases, and the number of PU1 packets with completed transmissions decreases accordingly.

5.1.2. Performance Analysis of PU2 Packets

Figure 2 depicts the variation trends of PU2 packets’ blocking rate B P 2 , loss rate L P 2 , and throughput T P 2 under the proposed communication failure and repair mechanism.
As shown in Figure 2, if the communication failure rate f rises, PU2 packets’ blocking rate B P 2 and loss rate L P 2 increase while throughput T P 2 decreases. When the repair rate r increases, B P 2 and L P 2 decrease while T P 2 increases. When f increases, the probability of the system state being failure rises, and the low-speed transmission of PU packets reduces the channel’s idle time, so the probability of the newly arrived PU2 packets being blocked increases. If the system state fails, the channel preemption behavior of PU1 packets to PU2 packets becomes frequent, and the probability of PU2 packets being lost increases accordingly. Due to the increased blocking and loss rates, the amount of PU2 packets that is transmitted completely decreases. When r increases, the possibility of the system maintaining a normal state increases, and the high-speed transmission of PU1 and PU2 packets makes the channel more free to meet the newly arrived PU2 packets, so the blocking rate reduces. If the system state is normal and PU1 packets will not preempt the channel of PU2 packets, the probability of PU2 packets being preempted decreases. Therefore, the probability of PU2 packets being lost decreases, and more PU2 packets are transmitted successfully.
From Figure 2, we can find that as PU1 packets’ arrival rate α 11 increases, PU2 packets’ blocking rate B P 2 and loss rate L P 2 increase while throughput T P 2 decreases. As PU2 packets’ arrival rate α 12 increases, B P 2 , L P 2 , and T P 2 all increase. When α 11 increases, the probability that the channels are occupied by PU1 packets increases, so the probability that those newly arrived PU2 packets are unable to enter into the channel increases. Meanwhile, when the system is in the failure state, the preemption behavior of PU1 packets to PU2 packets increases, resulting in more lost PU2 packets, and the amount of PU2 packets transmitted completely decreases. Because at most one packet can exist in the channel at a time, when α 12 increases, the number of PU2 packets blocked grows, and more PU2 packets entering the channel encounter PU1 packets and lose channel access right; therefore, B P 2 increases. According to our parameter setting, α 12 has a larger increase compared with B P 2 and L P 2 , so after performance calculation, T P 2 also shows an increasing trend.

5.1.3. Performance Analysis of SU Packets

Figure 3 depicts the variation trends of SU packets’ blocking rate B S , loss rate L S , and throughput T S under the proposed communication failure and repair mechanism.
As shown in Figure 3, SU packets’ blocking rate B S and loss rate L S increase while throughput T S decreases if the communication failure rate f is enhanced. When the repair rate r increases, B S and L S decrease while T S increases. As f increases, more SU packets enter the cache after their transmission is suspended by the communication failure. As a result, the cache space decreases. In that case, the newly arrived SU packets have less chance to enter the cache and the blocking rate increases. When there is no free space in the cache, SU packets can only leave the system if they are interrupted. Therefore, the loss rate also rises, and the amount of SU packets with completed transmission per unit time decreases accordingly. When r increases, the probability of the system state being normal increases, the probability of SU packets being transmitted grows, and the probability of SU packets being blocked and leaving decreases. The probability of SU packets being interrupted due to communication failure decreases, and the probability of being forced to leave the system because of interruption also decreases correspondingly; thus, the amount of SU packets with finished transmission increases.
From Figure 3, we can observe that as PU1 packets’ arrival rate α 11 grows or PU2 packets’ arrival rate α 12 grows, SU packets’ blocking rate B S and loss rate L S increase while throughput T S decreases. With the increase in α 11 or α 12 , the probability that PU packets are present in the channel rises, and so does the probability of SU packets’ transmission being interrupted. Therefore, the probability of SU packets being blocked and lost rises, so the number of SU packets transmitted completely reduces.

5.2. System Performance Comparison

Regarding the two performance indexes of PU1 packets’ throughput T P 1 and blocking rate B P 1 , we designed numerical experiments to make curve comparisons between the proposed failure and repair mechanism with classified PUs and the traditional failure and repair mechanism with unclassified PUs. In the traditional mechanism, unclassified PUs mean that PU packets generated by PUs with different demands are transmitted equally. There is no mutual preemption in different system states, and they have the same rights. The parameters of each numerical experiment are displayed in Table 2.
Figure 4 reflects the comparison results of the changes in PU1 packets’ throughput and blocking rate with the communication failure rate under the two mechanisms.
By observing Figure 4, we can find that under both of the two mechanisms, for PU1 packets, the throughput decreases and the blocking rate increases while the communication failure rate increases, but our proposed mechanism can enhance the throughput of PU1 packets and reduce the blocking rate of PU1 packets compared to the mechanism with unclassified PUs. So, prioritized PU packets and different preemption principles make PU1 packets enjoy certain privileges and meet higher transmission requirements.
According to Figure 4, when the normal transmission rate of PU1 packets β 11 increases, PU1 packets’ throughput T P 1 increases and blocking rate B P 1 decreases. With the increase in β 11 , the transmission time of newly arrived PU1 packets decreases, the number of PU1 packets with completed transmission increases, and the number of blocked PU1 packets decreases. When the normal transmission rate of PU2 packets β 12 increases, T P 1 also increases and B P 1 decreases. When β 12 increases, PU2 packets take less time to occupy the channel and PU1 packets have more chances to enter the channel. Therefore, the number of PU1 packets with completed transmission increases and the number of blocked PU1 packets decreases.

5.3. Discussion

Communication failure is a matter that cannot be ignored in data transmission. It has an important impact on the performance of the network. In order to minimize the negative impact of communication faults on network performance, a reasonable channel allocation mechanism is necessary.
In this section, we describe the performance trends of PU1 packets, PU2 packets, and SU packets in different network environments under the background of communication failure and repair based on the proposed channel allocation mechanism. Figure 1, Figure 2 and Figure 3 could be summarized as follows. As the communication failure rate increased, the blocking rate of PU1 packets grew and the throughput decreased, and the blocking rates and loss rates of PU2 and SU packets increased while the throughput dropped. With the increase in repair rate, the above performance variation trends were opposite to those caused by the rise in the communication failure rate. At the same time, with the increase in PU1 or PU2 packets’ arrival rate, the blocking rates and loss rates involved in the three types of packets (the loss rate not involving PU1 packets) increased. When the arrival rate of one type of packet increased, the throughput of the corresponding type of packet increased, while the throughput of the other types of packet decreased. The performances of these three types of packets were analyzed in detail and the possible reasons were explained, which helped us to better explore the impact of communication failure and repair on the system, as well as the difference in system performance in different network environments.
In addition, we compared the communication failure and repair mechanism with classified PUs proposed in this paper with that with unclassified PUs. Figure 4 demonstrates that the proposed mechanism improved the throughput and reduced the blocking rate of PU1 packets, which proved the effectiveness of the proposed mechanism for real-time services.

6. Conclusions

In CRNs, considering communication failure and repair, to maximize system performance and meet the different transmission requirements of PUs, we propose a communication failure and repair mechanism with classified PUs to minimize the impact of communication failure on the transmission of PU packets with a higher priority. We divided PUs into two levels and set different preemption principles according to the system state. In addition, PU1 and PU2 packets can be transmitted at a low speed under the failure state of the system. We built an early-arrival discrete-time queueing model and solved the performance expressions of the system through the system’s steady-state analysis. The curve characterization and performance analysis of some performance indexes were carried out by designing numerical experiments. When the communication failure rate increased, the blocking rates of the three types of packets increased, the throughput fell, and the loss rates of PU2 and SU packets increased. As the repair rate grew, the performance change trends were opposite to those caused by the rise in the communication failure rate. When PU1 packets or PU2 packets’ arrival rate increased, the blocking rates of the three types of packets rose, and the loss rates of PU2 and SU packets grew. Meanwhile, the throughput of the corresponding type of packets increased, while the throughput of the other two types of packets decreased. By comparing the proposed mechanism with the traditional mechanism, we discovered that the proposed mechanism could more effectively meet the different transmission requirements of PUs and improve the performance of PU1 packets. In summary, the experimental results reflected the performance variation trends of the proposed communication failure and repair mechanism with classified PUs in different network environments and demonstrated its effectiveness.
The limitations of this study and future work are summarized as follows:
  • After the communication failure and repair mechanism with classified PUs is presented, a discrete-time queueing model is established and analyzed. However, due to the space limitation and the possible cumbersome statements, we only list the matrix and submatrices of the one-step state transition probability of the system and do not analyze the model in detail.
  • In the comparison experiments, we only compare the performance between the proposed communication failure and repair mechanism with classified PUs and that with unclassified PUs. It can be seen from the performance comparison diagrams that the proposed mechanism can effectively improve the performance of PU1 packets. However, we do not compare the proposed mechanism with existing methods, such as adaptive modulation and coding (AMC) or hybrid automatic repeat request (HARQ). In future work, we will further compare the proposed mechanism with existing techniques and methods to highlight the strengths and weaknesses of the mechanism proposed in this paper.
  • In this paper, we deal with PUs with fixed positions. In future work, we will extend the study of spectrum allocation strategies in the context of communication failure and repair by taking mobile users into account.

Author Contributions

Conceptualization, Y.Z. and Q.L.; Data curation, S.Y. and Z.Y.; Formal analysis, Y.Z. and Q.L.; Investigation, Q.L. and S.Y.; Methodology, Q.L. and Z.Y.; Software, S.Y.; Supervision, Y.Z.; Validation, S.Y. and Z.Y.; Visualization, Q.L.; Writing—original draft, Y.Z. and Q.L.; Writing—review and editing, Y.Z., Q.L. and S.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Fundamental Research Funds for the Central Universities (grant number N2323024), China.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ahmad, W.S.H.M.W.; Radzi, N.A.M.; Samidi, F.; Ismail, A.; Abdullah, F.; Jamaludin, M.Z.; Zakaria, M. 5G technology: Towards dynamic spectrum sharing using cognitive radio networks. IEEE Access 2020, 8, 14460–14488. [Google Scholar] [CrossRef]
  2. Jiao, J.; Sun, X.; Fang, L.; Lyu, J. An overview of wireless communication technology using deep learning. China Commun. 2021, 18, 1–36. [Google Scholar] [CrossRef]
  3. Chuang, C.L.; Chiu, W.Y.; Chuang, Y.C. Dynamic multiobjective approach for power and spectrum allocation in cognitive radio networks. IEEE Syst. J. 2021, 15, 5417–5428. [Google Scholar] [CrossRef]
  4. Latif, S.; Akraam, S.; Malik, A.J.; Abbasi, A.A.; Habib, M.; Lim, S. Improved channel allocation scheme for cognitive radio networks. Intell. Autom. Soft Comput. 2021, 27, 103–114. [Google Scholar] [CrossRef]
  5. Salehi, S.; Solouk, V. Channel assignment and users mobility influence on primary users QoE in cognitive radio network. Ad Hoc Netw. 2022, 129, 102807. [Google Scholar] [CrossRef]
  6. Zhao, Y.; Xiang, Z.; Chen, K.; Ye, Z.; Lu, Q. Modelling and optimization for cognitive radio networks with preemption backoff mechanism. J. King Saud Univ.-Comput. Inf. Sci. 2022, 129, 9039–9051. [Google Scholar] [CrossRef]
  7. Arshid, K.; Hussain, I.; Bashir, M.K.; Naseem, S.; Ditta, A.; Mian, N.A.; Zahid, M.; Khan, I.A. Primary user traffic pattern based opportunistic spectrum handoff in cognitive radio networks. Appl. Sci. 2020, 10, 1674. [Google Scholar] [CrossRef]
  8. Shruti; Kulshrestha, R. Channel allocation and ultra-reliable communication in CRNs with heterogeneous traffic and retrials: A dependability theory-based analysis. Comput. Commun. 2020, 158, 51–63. [Google Scholar] [CrossRef]
  9. Singh, W.N.; Marchang, N. A review on spectrum allocation in cognitive radio network. Int. J. Commun. Netw. Distrib. Syst. 2019, 23, 172–193. [Google Scholar]
  10. Gu, Z.; Shen, T.; Wang, Y.; Lau, F.C. Efficient rendezvous for heterogeneous interference in cognitive radio networks. IEEE Trans. Wirel. Commun. 2019, 19, 91–105. [Google Scholar] [CrossRef]
  11. Abu Diab, R.A.; Abdrabou, A.; Bastaki, N. An efficient routing protocol for cognitive radio networks of energy-limited devices. Telecommun. Syst. 2020, 73, 577–594. [Google Scholar] [CrossRef]
  12. Sun, L.; Wang, W. Understanding blackholes in large-scale cognitive radio networks under generic failures. In Proceedings of the 2013 IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 728–736. [Google Scholar]
  13. Khan, A.U.; Tanveer, M.; Khan, W.U. On reliability in the performance analysis of cognitive radio networks. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 8750–8756. [Google Scholar] [CrossRef]
  14. Khan, A.U.; Abbas, G.; Abbas, Z.H.; Bilal, M.; Shah, S.C.; Song, H. Reliability analysis of cognitive radio networks with reserved spectrum for 6G-IoT. IEEE Trans. Netw. Serv. Manag. 2022, 19, 2726–2737. [Google Scholar] [CrossRef]
  15. Azarfar, A.; Frigon, J.F.; Sanso, B. Improving the reliability of wireless networks using cognitive radios. IEEE Commun. Surv. Tutor. 2011, 14, 338–354. [Google Scholar] [CrossRef]
  16. Zhao, Y.; Xiang, Z.; Zhou, C. Performance analysis for a single-channel CRN with prioritized primary users. In Proceedings of the International Conference on Signal Processing and Communication Technology (SPCT 2021), Tianjin, China, 24–26 December 2021; Volume 12178, pp. 304–309. [Google Scholar]
  17. Wu, H.; Jin, S.; Yue, W. Pricing policy for a dynamic spectrum allocation scheme with batch requests and impatient packets in cognitive radio networks. J. Syst. Sci. Syst. Eng. 2022, 31, 133–149. [Google Scholar] [CrossRef]
  18. Zhao, Y.; Bai, L. Performance analysis and optimization for cognitive radio networks with classified secondary users and impatient packets. Mob. Inf. Syst. 2017, 2017, 3613496. [Google Scholar] [CrossRef]
  19. Shawkat, B.B.M.; Al-Hindawi, A.M.J.; Shadir, A.H. Spectrum handoff analysis for multiple secondary users in cognitive radio networks. Indones. J. Electr. Eng. Comput. Sci. 2020, 20, 264–274. [Google Scholar]
  20. Safwat, M.A. Dynamic spectrum access with traffic prioritization in cognitive radio networks. In Proceedings of the 2015 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, 13–15 May 2015; pp. 1–6. [Google Scholar]
  21. Zhao, Y.; Yue, W.; Saffer, Z. Spectrum allocation strategy with a probabilistic preemption scheme in cognitive radio networks: Analysis and optimization. Ann. Oper. Res. 2022, 310, 621–639. [Google Scholar] [CrossRef]
  22. Chen, P.; Zhang, Q.; Zhang, Y.; Wang, Y. Performance analysis of spectrum sharing mechanisms in cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2011, 2011, 129. [Google Scholar]
  23. Fahim, T.E.; Zakariya, A.Y.; Rabia, S.I. A novel hybrid priority discipline for multi-class secondary users in cognitive radio networks. Simul. Model. Pract. Theory 2018, 84, 69–82. [Google Scholar] [CrossRef]
  24. Khedun, N.; Bassoo, V. Analysis of priority queueing with multichannel in cognitive radio network. In Proceedings of the IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON), Salamanca, Spain, 8–11 September 2015; pp. 1–6. [Google Scholar]
  25. Gouda, A.E.; Rabia, S.I.; Zakariya, A.Y.; Omar, M. Reactive spectrum handoff combined with random target channel selection in cognitive radio networks with prioritized secondary users. Alex. Eng. J. 2018, 57, 3219–3225. [Google Scholar] [CrossRef]
  26. Li, L.; Wang, J.; Zhang, F. Equilibrium customer strategies in Markovian queues with partial breakdowns. Comput. Ind. Eng. 2013, 66, 751–757. [Google Scholar] [CrossRef]
  27. Aghsami, A.; Jolai, F. Equilibrium threshold strategies and social benefits in the fully observable Markovian queues with partial breakdowns and interruptible setup/closedown policy. Qual. Technol. Quant. Manag. 2020, 17, 685–722. [Google Scholar] [CrossRef]
  28. Yu, S.; Liu, Z.; Wu, J. Strategic behavior in the partially observable Markovian queues with partial breakdowns. Oper. Res. Lett. 2017, 45, 471–474. [Google Scholar] [CrossRef]
  29. Zhang, S.; Xu, X. Equilibrium customer strategies in Markovian queues with setup times and partial failures. J. Syst. Sci. Complex. 2020, 33, 1163–1178. [Google Scholar] [CrossRef]
  30. Zhao, Y.; Lu, Q.; Ye, Z.; Chen, K. A communication failure and repair mechanism with adjustable transmission rates for PU packets in CRNs. Heliyon 2023, 9, e13184. [Google Scholar] [CrossRef]
  31. Azarfar, A.; Frigo, J.F.; Sanso, B. Analysis of cognitive radio networks based on a queueing model with server interruptions. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 1703–1708. [Google Scholar]
  32. Zaghouani, M.H.; Sztrik, J.; Melikov, A.Z. Reliability analysis of cognitive radio networks. In Proceedings of the 2019 International Conference on Information and Digital Technologies (IDT), Zilina, Slovakia, 25–27 June 2019; pp. 557–562. [Google Scholar]
  33. Zakariya, A.Y.; Rabia, S.I. Analysis of an interruption-based priority for multi-class secondary users in cognitive radio networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
Figure 1. The performance change trends of PU1 packets: (a) the change trend in B P 1 ; (b) the change trend in T P 1 .
Figure 1. The performance change trends of PU1 packets: (a) the change trend in B P 1 ; (b) the change trend in T P 1 .
Applsci 14 06958 g001
Figure 2. The performance change trends of PU2 packets: (a) the change trend in B P 2 ; (b) the change trend in L P 2 ; (c) the change trend in T P 2 .
Figure 2. The performance change trends of PU2 packets: (a) the change trend in B P 2 ; (b) the change trend in L P 2 ; (c) the change trend in T P 2 .
Applsci 14 06958 g002
Figure 3. The performance change trends of SU packets: (a) the change trend in B S ; (b) the change trend in L S ; (c) the change trend in T S .
Figure 3. The performance change trends of SU packets: (a) the change trend in B S ; (b) the change trend in L S ; (c) the change trend in T S .
Applsci 14 06958 g003
Figure 4. Comparison of performance change trends of PU1 packets under the two mechanisms: (a) performance comparison in T P 1 ; (b) performance comparison in B P 1 .
Figure 4. Comparison of performance change trends of PU1 packets under the two mechanisms: (a) performance comparison in T P 1 ; (b) performance comparison in B P 1 .
Applsci 14 06958 g004
Table 1. The parameters with fixed values in the performance analysis experiments.
Table 1. The parameters with fixed values in the performance analysis experiments.
ParametersFixed Values
SU packets’ arrival rate α 2 0.3
PU1 packets’ service rate β 11 when the system state is normal0.7
PU2 packets’ service rate β 12 when the system state is normal0.6
SU packets’ service rate β 2 when the system state is normal0.5
PU1 packets’ service rate ϵ 11 when the system is in a failure state0.4
PU2 packets’ service rate ϵ 12 when the system is in a failure state0.3
The size k of the cache that holds SU packets10
Table 2. The parameters with fixed values in the comparison experiment.
Table 2. The parameters with fixed values in the comparison experiment.
ParametersFixed Values
PU1 packets’ arrival rate α 11 0.3
PU2 packets’ arrival rate α 12 0.2
SU packets’ arrival rate α 2 0.3
SU packets’ service rate β 2 when the system state is normal0.5
PU1 packets’ service rate ϵ 11 when the system is in a failure state0.4
PU2 packets’ service rate ϵ 12 when the system is in a failure state0.3
Communication repair rate r0.8
The size k of the cache that holds SU packets10
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, Y.; Lu, Q.; Yuan, S.; Ye, Z. Performance Analysis of a Communication Failure and Repair Mechanism with Classified Primary Users in CRNs. Appl. Sci. 2024, 14, 6958. https://doi.org/10.3390/app14166958

AMA Style

Zhao Y, Lu Q, Yuan S, Ye Z. Performance Analysis of a Communication Failure and Repair Mechanism with Classified Primary Users in CRNs. Applied Sciences. 2024; 14(16):6958. https://doi.org/10.3390/app14166958

Chicago/Turabian Style

Zhao, Yuan, Qi Lu, Shuangshuang Yuan, and Zhisheng Ye. 2024. "Performance Analysis of a Communication Failure and Repair Mechanism with Classified Primary Users in CRNs" Applied Sciences 14, no. 16: 6958. https://doi.org/10.3390/app14166958

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop