CN101778435B - Method and device for allocating frequency spectrum resource in heterogeneous wireless network - Google Patents

Method and device for allocating frequency spectrum resource in heterogeneous wireless network Download PDF

Info

Publication number
CN101778435B
CN101778435B CN2010100340594A CN201010034059A CN101778435B CN 101778435 B CN101778435 B CN 101778435B CN 2010100340594 A CN2010100340594 A CN 2010100340594A CN 201010034059 A CN201010034059 A CN 201010034059A CN 101778435 B CN101778435 B CN 101778435B
Authority
CN
China
Prior art keywords
mrow
msub
frequency band
math
msubsup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010100340594A
Other languages
Chinese (zh)
Other versions
CN101778435A (en
Inventor
李屹
陈丹
毛旭
纪红
黎明
李曦
王成金
李希金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN2010100340594A priority Critical patent/CN101778435B/en
Publication of CN101778435A publication Critical patent/CN101778435A/en
Application granted granted Critical
Publication of CN101778435B publication Critical patent/CN101778435B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method and a device for allocating frequency spectrum resource in a heterogeneous wireless network, which belong to the field of network communication. The method comprises the following steps: after the network at a licensed frequency band receives the requests from unlicensed users, judging whether a common frequency band is idle, if so, receiving the requests from the unlicensed users, and allocating the unlicensed users to the common frequency band, otherwise, receiving the requests from the unlicensed users when a reserved frequency band is idle, and allocating the unlicensed users to the reserved frequency band, wherein the common frequency band provides service to licensed users and the unlicensed users, and the reserved frequency band specially provides service to the unlicensed users. The technical scheme provided by the specific embodiment of the invention has the advantages of ensuring the service quality of the unlicensed users when the licensed users appear.

Description

Method and device for allocating spectrum resources in heterogeneous wireless network
Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for allocating spectrum resources in a heterogeneous wireless network.
Background
In recent years, the diversity of wireless communication has been increasingly remarkable from 3G to WLAN and WiMAX, from UWB to ZigBee, and from Bluetooth to DVB-H, and the complementary fusion of various wireless network technologies has become a trend. The rapid development of wireless communication not only puts higher demands on the organic integration of heterogeneous networks, but also puts higher spectrum resource demands. The existing wireless spectrum allocation system is fixed spectrum allocation, and divides the spectrum into 2 parts: licensed Frequency Band (LFB) and Unlicensed Frequency Band (UFB). Most of the spectrum resources are used for licensed bands, e.g. 3G, WiMAX, UWB, etc.; the spectrum resources of the unlicensed frequency band are much less, and due to the rapid development of wireless communication services such as WLAN, WPAN, WMAN and the like, the unlicensed frequency band in which these networks operate is nearly saturated.
Recent measurement results of spectrum resource utilization indicate that authorized users (LUs) actually use the authorized spectrum very inadequately (less than 15%), and a large amount of spectrum holes exist; compared with the traditional fixed spectrum allocation scheme, the Cognitive Radio (CR) technology introduces an unauthorized user (ulsus) in an authorized frequency band to access the spectrum of an authorized network in an opportunistic manner, which creates a brand-new situation for solving the problem of insufficient spectrum resources and improving the spectrum utilization rate. In consideration of protecting the communication quality of authorized users, the introduction of unauthorized users needs to satisfy a premise that its transmission must satisfy the interference temperature constraint of authorized users; in addition, when the authorized user appears, the unauthorized user should return the current authorized spectrum and search for other idle frequency bands.
In the process of implementing the invention, the inventor finds that the prior art has the following problems:
since the prior art does not reserve a frequency band for the unauthorized user, the scheme necessarily affects the quality of service (Qos) of the unauthorized user.
Disclosure of Invention
The specific implementation mode of the invention provides a method and a device for allocating spectrum resources in a wireless network, and the method and the device have the advantage of ensuring the service quality of unauthorized users.
The invention provides a method for distributing spectrum resources in a heterogeneous wireless network, which comprises the following steps:
after a network of an authorized frequency band receives a request of an unauthorized user, judging whether a common frequency band is idle, if so, receiving the request of the unauthorized user, and distributing the unauthorized user to the common frequency band;
if not, receiving the request of the unauthorized user when the reserved frequency band is idle, and distributing the unauthorized user to the reserved frequency band;
the common frequency bands are: frequency bands for providing services for authorized users and unauthorized users; the reserved frequency band is as follows: a frequency band dedicated to serving unauthorized users.
The invention provides a device for distributing spectrum resources in a heterogeneous wireless network, which comprises:
the judging unit is used for judging whether the common frequency band is idle or not after the network of the authorized frequency band receives the request of the unauthorized user;
a common access unit, configured to accept the request of the unauthorized user and allocate the unauthorized user to a common frequency band when the determining unit determines that the unauthorized user is authorized;
a reserved access unit, configured to receive a request of the unauthorized user when a reserved frequency band is idle and allocate the unauthorized user to the reserved frequency band when the judging unit judges that the unauthorized user is not authorized;
the common frequency bands are: frequency bands for providing services for authorized users and unauthorized users; the reserved frequency band is as follows: a frequency band dedicated to serving unauthorized users.
The technical scheme provided by the specific embodiment of the invention has the advantage that the service quality of the unauthorized user can be ensured when the authorized user appears.
Drawings
Fig. 1 is a flowchart of a method for allocating spectrum resources in a heterogeneous wireless network according to the present invention;
fig. 2 is a structural diagram of an apparatus for allocating spectrum resources in a heterogeneous wireless network according to the present invention.
Detailed Description
The specific embodiment of the present invention provides a method for allocating spectrum resources in a heterogeneous wireless network, where the method is shown in fig. 1 and includes:
s11, after receiving the request of the unauthorized user, detecting whether the ordinary frequency band is idle, if yes, executing the step S12; otherwise, performing S13-S15;
s12, receiving the request of the unauthorized user, and distributing the unauthorized user to the common frequency band;
s13, detecting whether the reserved frequency band is idle, if so, performing S14; otherwise, performing S15;
s14, receiving the request of the unauthorized user, and distributing the unauthorized user to the reserved frequency band;
and S15, rejecting the request of the unauthorized user.
The method provided by the invention allocates the unauthorized user to the reserved frequency band under the condition that the unauthorized user has no idle channel in the common frequency band, thereby ensuring the Qos of the unauthorized user.
The above method may be performed by a network in a licensed frequency band, for example; 3G, WiMAX, UWB, etc.
The common frequency band in the method can be a frequency band for providing service for authorized users and unauthorized users, and the reserved frequency band can be a frequency band for providing service for unauthorized users.
Optionally, after S14, the method may further include: and if the common frequency band is detected to be idle, the unauthorized user is converted into the common frequency band. When the common frequency band is free, the unauthorized user is converted from the reserved frequency band to the common frequency band, the number of channels of the reserved frequency band is increased, so that the reserved frequency band can be accessed to more authorized users, and the Qos and the frequency of the unauthorized user are further improved,
Optionally, the common frequency band and the reserved frequency band may be statically configured, for example, in a 3G network, 80% of the authorized frequency bands of the 3G network are allocated to the common frequency band, and 20% of the authorized frequency bands of the 3G network are allocated to the reserved frequency band. Certainly, the allocation method of the common frequency band and the reserved frequency band may be dynamic configuration, that is, the number of channels in the reserved frequency band is calculated according to the interruption probability allowed by the authorized user; the specific calculation method may be:
for the convenience of calculation, the authorized frequency band of the system is divided into a reserved frequency band set £ hereR1, 2, L and a common band set £ £N1, ·, J, where L + J ═ K; l, J respectively representing the number of channels in the reserved frequency band and the number of channels in the common frequency band, and K representing the total number of channels in the authorized frequency band; indicating vector
Figure G2010100340594D00041
Indicates whether the channel K is occupied, phik0 indicates that the channel K is idle and phik1 indicates that channel K is being used. Let (i, j, l) represent the system state, wherein i, j and l represent the number of unauthorized users occupying the ordinary frequency band, the number of authorized users occupying the ordinary frequency band and the number of unauthorized users occupying the reserved frequency band, respectively; the state space delta of the system is { (i, J, L) | i + J ≦ J, L ≦ L }. Let π (i, j, l) denote the steady state probability distribution, where (i, j, l) is ∈ Δ;
when the channel resources are sufficient, i.e. delta1If { (i, J, l) | i + J < J, and l ═ 0}, all newly-accessed users, both authorized users and unauthorized users, can be allocated to the normal band, and therefore, no communication interruption occurs, then the following equation (1) can be expressed:
[iμss+(i+1)μpp]π(i,j,l)
=λsπ(i-1,j,0)+(i+1)μsπ(i+1,j,0)
pπ(i,j-1)+(i+1)μpπ(i,j+1)(1)
wherein, musProbability representing service time of unauthorized user traffic; mu.spA probability representing a service time of an authorized user traffic; lambda [ alpha ]sRepresenting the probability of arrival of an unauthorized user, λpRepresenting the probability of an authorized user arriving.
When all the common frequency bands in the system are occupied, part of the common frequency bands are occupiedThe reserved frequency band is also in use by an unauthorized user, at which time the state of the system, Δ, is2{ (i, J, L) | i + J ═ J, L < L }; can be expressed as in equation (2):
s+(j+l)μs+jμpp]π(i,j,l)
=(i+j+1)μsπ(i,j,l+1)+λsπ(i,j,l-1)
pπ(i+1,j-1,l-1)+(j+1)μpπ(i-1,j+1,l+1)(2)
when all the common frequency bands in the system are used by authorized users and unauthorized users can only use the reserved channel, the state delta of the system is at the moment3{ (i, J, L) | i ═ 0, J ═ J, L < L }; can be expressed as in equation (3):
s+lμs+Jμp]π(0,J,l)
=(l+1)μsπ(0,J,l+1)+λsπ(0,J,l-1)(3)
pπ(1,J-1,l-1)
when all the common frequency bands in the system are used by authorized users and all the reserved frequency spectrums are used by unauthorized users, the state delta of the system is at the moment4{ (i, J, L) | i ═ 0, J ═ J, L ═ L }; can be expressed as in equation (4):
[Lμs+Jμp]π(0,J,L)=λsπ(0,J,L-1)+λpπ(1,J-1,L-1)(4)
all the steady-state probabilities in the above equations (1), (2), (3) and (4) should satisfy the normalized constraint ∑(i,j,l)∈ΔPi (i, j, l) is 1, wherein
Figure G2010100340594D00051
Combining the (1), (2), (3) and (4) to solve the steady-state probability distribution { pi (i, j, l) | (i, j, l) ∈ delta }; specific solving methods can be seen inThe document "Introduction to Queueing Theory".
In the mechanism provided by the invention, when the common frequency band is occupied, the communication interruption of the authorized user newly accessing the network can be caused, and the interruption probability of the authorized user is as follows:
<math> <mrow> <msubsup> <mi>P</mi> <mi>b</mi> <mi>p</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>3</mn> </msub> <mo>&cup;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow> </math>
when the common frequency band and the reserved frequency band are occupied, the communication of the newly-accessed unauthorized user is interrupted, and the interruption probability of the unauthorized user is as follows:
<math> <mrow> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow> </math>
for the unauthorized user who is communicating, when there is no idle channel, the authorized user who newly accesses the network will cause the interruption of the unauthorized user on the ordinary frequency band, and the interruption probability calculation formula is:
<math> <mrow> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mfrac> <mrow> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> </mrow> <mi>i</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>7</mn> <mo>)</mo> </mrow> </mrow> </math>
for the throughput of the unauthorized user, the calculation formula is:
<math> <mrow> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <mi>&Delta;</mi> </mrow> </msub> <mrow> <mi>i&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <msub> <mi>&mu;</mi> <mi>s</mi> </msub> <msub> <mi>P</mi> <mi>com</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>8</mn> <mo>)</mo> </mrow> </mrow> </math>
wherein, <math> <mrow> <msub> <mi>P</mi> <mi>com</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <mn>1</mn> <mo>-</mo> <mo>[</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>+</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> <mfrac> <mrow> <msub> <mi>&lambda;</mi> <mi>p</mi> </msub> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msub> <mi>&mu;</mi> <mi>s</mi> </msub> <mo>+</mo> <msub> <mi>&lambda;</mi> <mi>p</mi> </msub> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> </mfrac> <mo>]</mo> <mo>.</mo> </mrow> </math>
the invention uses Sigmoid utility function to measure the throughput of unauthorized users, and the specific calculation formula is as follows:
<math> <mrow> <mi>U</mi> <mrow> <mo>(</mo> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mn>1</mn> <mrow> <mn>1</mn> <mo>+</mo> <mi>exp</mi> <mo>{</mo> <mo>-</mo> <mi>g</mi> <mo>[</mo> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>-</mo> <mi>h</mi> <mo>]</mo> <mo>}</mo> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>9</mn> <mo>)</mo> </mrow> </mrow> </math>
wherein g and h are constants.
In order to limit the interference to authorized users within the constraint of their outage probability and maximize the utility of equation (9), it is necessary to find the most suitable number of channel reservations L*. P for the present inventionbMAX pThe maximum interruption probability allowed by the authorized user is shown (which can be set according to the actual situation), and therefore, the optimal channel reservation calculation formula is:
L*=arg max U
<math> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> <mo>,</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>p</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>&lt;</mo> <msubsup> <mi>P</mi> <mi>bMAX</mi> <mi>p</mi> </msubsup> <mo>,</mo> <mi>L</mi> <mo>&le;</mo> <mi>K</mi> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>10</mn> <mo>)</mo> </mrow> </mrow> </math>
solving the formula (10) to obtain the channel number L of the reserved frequency spectrum*
When the channel number of the reserved frequency band is dynamically distributed, the channel number L is obtained by solving according to the method*Therefore, the method can ensure the service quality of the unauthorized user on the premise of ensuring the interruption probability of the authorized user.
The present invention also provides a device for allocating spectrum resources in a heterogeneous wireless network, where the device is shown in fig. 2 and includes:
a determining unit 21, configured to determine whether the ordinary frequency band is idle after the network in the authorized frequency band receives the request of the unauthorized user;
a common access unit 22, configured to accept the request of the unauthorized user and allocate the unauthorized user to a common frequency band when the determining unit determines that the unauthorized user is authorized;
a reserved access unit 23, configured to receive a request of the unauthorized user when a reserved frequency band is idle and allocate the unauthorized user to the reserved frequency band if the determining unit determines that the unauthorized user is not authorized;
the common frequency bands are: frequency bands for providing services for authorized users and unauthorized users; the reserved frequency band is as follows: a frequency band dedicated to serving unauthorized users.
Optionally, the apparatus further comprises:
a converting unit 24, configured to convert the unauthorized user to the normal frequency band when the reserved access unit determines that the normal frequency band is idle after completing allocating the unauthorized user to the reserved frequency band.
The device provided by the invention allocates the unauthorized user to the reserved frequency band under the condition that the unauthorized user does not have a free channel in the common frequency band, thereby ensuring the Qos of the unauthorized user.
Those skilled in the art will appreciate that the drawings are merely schematic representations of one preferred embodiment and that the blocks or flow diagrams in the drawings are not necessarily required to practice the present invention.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by associated hardware as a program, which may be stored in a computer-readable storage medium, and which, when executed, includes one or a combination of the steps of the method embodiments.
The technical scheme of the specific implementation mode of the invention has the advantages that the unauthorized user is allocated to the reserved frequency band under the condition that the ordinary frequency band has no idle channel, and the Qos of the unauthorized user is further ensured.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (5)

1. A method for allocating spectrum resources in a heterogeneous wireless network, the method comprising:
after a network of an authorized frequency band receives a request of an unauthorized user, judging whether a common frequency band is idle, if so, receiving the request of the unauthorized user, and distributing the unauthorized user to the common frequency band;
if not, receiving the request of the unauthorized user when the reserved frequency band is idle, and distributing the unauthorized user to the reserved frequency band;
the common frequency bands are: frequency bands for providing services for authorized users and unauthorized users; the reserved frequency band is as follows: a frequency band dedicated to providing service to an unauthorized user;
wherein the method further comprises:
the ordinary frequency band and the reserved frequency band are statically or dynamically configured, and when the ordinary frequency band and the reserved frequency band are dynamically configured, the method for calculating the number of the channels in the reserved frequency band comprises the following steps:
L*=arg max U
<math> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> <mo>,</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>p</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>&lt;</mo> <msubsup> <mi>P</mi> <mi>bMAX</mi> <mi>p</mi> </msubsup> <mo>,</mo> <mi>L</mi> <mo>&le;</mo> <mi>K</mi> </mrow> </math>
wherein, s.t. is a constraint condition,
Figure FDA0000146018220000012
representing the maximum probability of interruption allowed by an authorized user;
solving the formula to obtain the channel number L of the reserved frequency band*
In the above formula:
<math> <mrow> <mi>U</mi> <mrow> <mo>(</mo> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mn>1</mn> <mrow> <mn>1</mn> <mo>+</mo> <mi>exp</mi> <mo>{</mo> <mo>-</mo> <mi>g</mi> <mo>[</mo> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>-</mo> <mi>h</mi> <mo>]</mo> <mo>}</mo> </mrow> </mfrac> <mo>;</mo> </mrow> </math>
<math> <mrow> <msubsup> <mi>P</mi> <mi>b</mi> <mi>p</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>3</mn> </msub> <mo>&cup;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>;</mo> </mrow> </math>
Δ3={(i,j,l)|i=0,j=J,l<L};
Δ4={(i,j,l)|i=0,j=J,l=L};
ρ(L)=∑(i,j,l)∈Δiπ(i,j,l)μsPcom(L);
<math> <mrow> <msub> <mi>P</mi> <mi>com</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <mn>1</mn> <mo>-</mo> <mo>[</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>+</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> <mfrac> <mrow> <msub> <mi>&lambda;</mi> <mi>p</mi> </msub> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msub> <mi>&mu;</mi> <mi>s</mi> </msub> <mo>+</mo> <msub> <mi>&lambda;</mi> <mi>p</mi> </msub> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> </mfrac> <mo>]</mo> <mo>;</mo> </mrow> </math>
<math> <mrow> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>;</mo> </mrow> </math>
<math> <mrow> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mfrac> <mrow> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> </mrow> <mi>i</mi> </mfrac> <mo>;</mo> </mrow> </math>
wherein g and h are constants in the formula; l, J respectively representing the number of channels in the reserved frequency band and the number of channels in the common frequency band, K representing the total number of channels in the authorized frequency band, and pi (i, j, l) representing the steady-state probability distribution;
(i, j, l) represents the network system state of the authorized frequency band, wherein i, j and l respectively represent the number of unauthorized users occupying the ordinary frequency band, the number of authorized users occupying the ordinary frequency band and the number of unauthorized users occupying the reserved frequency band; Δ represents the state space of the system, and Δ { (i, J, L) | i + J ≦ J, L ≦ L }, where (i, J, L) is ∈ Δ; mu.ssProbability representing service time of unauthorized user traffic; lambda [ alpha ]pRepresenting the probability of an authorized user arriving.
2. The method of claim 1, wherein the allocating the unlicensed user to a reserved frequency band further comprises:
and when the common frequency band is idle, converting the unauthorized user into the common frequency band.
3. The method of claim 1, wherein the licensed band network comprises: 3G, WiMAX or UWB.
4. An apparatus for allocating spectrum resources in a heterogeneous wireless network, the apparatus comprising:
the judging unit is used for judging whether the common frequency band is idle or not after the network of the authorized frequency band receives the request of the unauthorized user;
a common access unit, configured to accept the request of the unauthorized user and allocate the unauthorized user to a common frequency band when the determining unit determines that the unauthorized user is authorized;
a reserved access unit, configured to receive a request of the unauthorized user when a reserved frequency band is idle and allocate the unauthorized user to the reserved frequency band when the judging unit judges that the unauthorized user is not authorized;
the common frequency bands are: frequency bands for providing services for authorized users and unauthorized users; the reserved frequency band is as follows: a frequency band dedicated to providing service to an unauthorized user;
wherein, the ordinary frequency band and the reserved frequency band in the device are obtained through static or dynamic configuration, and when the ordinary frequency band and the reserved frequency band in the device are dynamically configured, the method for calculating the number of the channels in the reserved frequency band comprises the following steps:
L*=arg max U
<math> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> <mo>,</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>p</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>&lt;</mo> <msubsup> <mi>P</mi> <mi>bMAX</mi> <mi>p</mi> </msubsup> <mo>,</mo> <mi>L</mi> <mo>&le;</mo> <mi>K</mi> </mrow> </math>
wherein, s.t. is a constraint condition,
Figure FDA0000146018220000032
representing the maximum probability of interruption allowed by an authorized user;
solving the formula to obtain the channel number L of the reserved frequency band*
In the above formula:
<math> <mrow> <mi>U</mi> <mrow> <mo>(</mo> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mn>1</mn> <mrow> <mn>1</mn> <mo>+</mo> <mi>exp</mi> <mo>{</mo> <mo>-</mo> <mi>g</mi> <mo>[</mo> <mi>&rho;</mi> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>-</mo> <mi>h</mi> <mo>]</mo> <mo>}</mo> </mrow> </mfrac> <mo>;</mo> </mrow> </math>
<math> <mrow> <msubsup> <mi>P</mi> <mi>b</mi> <mi>p</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>3</mn> </msub> <mo>&cup;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>;</mo> </mrow> </math>
Δ3={(i,j,l)|i=0,j=J,l<L};
Δ4={(i,j,l)|i=0,j=J,l=L};
ρ(L)=∑(i,j,l)∈Δiπ(i,j,l)μsPcom(L);
<math> <mrow> <msub> <mi>P</mi> <mi>com</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <mn>1</mn> <mo>-</mo> <mo>[</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>+</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>)</mo> </mrow> <mfrac> <mrow> <msub> <mi>&lambda;</mi> <mi>p</mi> </msub> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> <mrow> <msub> <mi>&mu;</mi> <mi>s</mi> </msub> <mo>+</mo> <msub> <mi>&lambda;</mi> <mi>p</mi> </msub> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> </mrow> </mfrac> <mo>]</mo> <mo>;</mo> </mrow> </math>
<math> <mrow> <msubsup> <mi>P</mi> <mi>b</mi> <mi>s</mi> </msubsup> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>;</mo> </mrow> </math>
<math> <mrow> <msub> <mi>P</mi> <mi>Int</mi> </msub> <mrow> <mo>(</mo> <mi>L</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>&Sigma;</mi> <mrow> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> <mo>&Element;</mo> <msub> <mi>&Delta;</mi> <mn>4</mn> </msub> </mrow> </msub> <mfrac> <mrow> <mi>&pi;</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>,</mo> <mi>l</mi> <mo>)</mo> </mrow> </mrow> <mi>i</mi> </mfrac> <mo>;</mo> </mrow> </math>
wherein g and h are constants in the formula; l, J respectively representing the number of channels in the reserved frequency band and the number of channels in the common frequency band, K representing the total number of channels in the authorized frequency band, and pi (i, j, l) representing the steady-state probability distribution;
(i, J, L) represents a network system state of an authorized frequency band, wherein i, J and L respectively represent the number of unauthorized users occupying a common frequency band, the number of authorized users occupying the common frequency band and the number of unauthorized users occupying a reserved frequency band, Δ represents a state space of the system, and Δ { (i, J, L) | i + J ≦ J, L ≦ L }, wherein (i, J, L) belongs to Δ; mu.ssProbability representing service time of unauthorized user traffic; lambda [ alpha ]pRepresenting the probability of an authorized user arriving.
5. The apparatus of claim 4, further comprising:
and the conversion unit is used for converting the unauthorized user into the common frequency band when the common frequency band is judged to be idle after the reserved access unit finishes distributing the unauthorized user to the reserved frequency band.
CN2010100340594A 2010-01-13 2010-01-13 Method and device for allocating frequency spectrum resource in heterogeneous wireless network Expired - Fee Related CN101778435B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010100340594A CN101778435B (en) 2010-01-13 2010-01-13 Method and device for allocating frequency spectrum resource in heterogeneous wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010100340594A CN101778435B (en) 2010-01-13 2010-01-13 Method and device for allocating frequency spectrum resource in heterogeneous wireless network

Publications (2)

Publication Number Publication Date
CN101778435A CN101778435A (en) 2010-07-14
CN101778435B true CN101778435B (en) 2012-07-18

Family

ID=42514709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010100340594A Expired - Fee Related CN101778435B (en) 2010-01-13 2010-01-13 Method and device for allocating frequency spectrum resource in heterogeneous wireless network

Country Status (1)

Country Link
CN (1) CN101778435B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098799B (en) * 2011-01-26 2013-04-03 北京邮电大学 Intelligent cognitive wireless network system for realizing heterogeneous network convergence
CN102651869A (en) * 2011-02-28 2012-08-29 中兴通讯股份有限公司 Method and device for distributing spectrum resources
CN102123424B (en) * 2011-03-16 2013-12-25 上海交通大学 Method for selecting number of reserved sub-channels in IEEE 802.22 network
WO2012171200A1 (en) * 2011-06-16 2012-12-20 华为技术有限公司 Dynamic spectrum allocation method, central control unit, base station and spectrum allocation system
CN102917456B (en) 2011-08-02 2018-05-11 华为技术有限公司 A kind of communication means, multimode terminal and base station and system
CN102355740B (en) * 2011-10-11 2014-05-07 华中科技大学 User channel access method in cognitive radio network
CN103200623B (en) * 2013-03-29 2015-09-23 北京邮电大学 The decision-making technique of dynamic adjustments channel reservation and implement device in a kind of cognitive radio
CN103596181B (en) * 2013-08-23 2016-12-28 上海交通大学 The frequency spectrum resource allocation method controlled based on topology in cognitive radio networks
EP3048831B1 (en) 2013-11-11 2018-01-10 Huawei Technologies Co., Ltd. Usage method and devices for unlicensed spectrum
CN104661227B (en) * 2013-11-21 2018-04-27 中国联合网络通信集团有限公司 A kind of method and device of shared authorized channels
CN103648168B (en) * 2013-12-26 2017-01-18 周口师范学院 Combined type dynamic spectrum distribution method in heterogeneous network convergence scene
WO2015106393A1 (en) * 2014-01-14 2015-07-23 华为技术有限公司 Method, ue and base station for data transmission
CN105491641B (en) 2014-09-19 2020-02-07 电信科学技术研究院 Transmission method of discovery signal, cell discovery method and device
CN105827379A (en) * 2015-01-09 2016-08-03 夏普株式会社 Channel maintaining method for unauthorized spectrum communication, base station, and user terminal
CN105992373B (en) * 2015-01-30 2020-09-15 中兴通讯股份有限公司 Data transmission method, device, base station and user equipment
CN106888482B (en) * 2015-12-15 2020-04-07 展讯通信(上海)有限公司 Terminal, LTE-U base station and communication method thereof
CN110493873B (en) * 2019-07-02 2023-06-30 全球能源互联网研究院有限公司 Wireless private network spectrum allocation optimization method and device suitable for power service
CN111935847B (en) * 2020-09-21 2021-01-05 杭州觅睿科技有限公司 Wireless data communication method, device, equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203039A (en) * 2006-12-15 2008-06-18 华为技术有限公司 Method, apparatus and network for system initiation of wireless area network
WO2009104689A1 (en) * 2008-02-21 2009-08-27 株式会社トヨタIt開発センター Mobile radio communication system and radio communication method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203039A (en) * 2006-12-15 2008-06-18 华为技术有限公司 Method, apparatus and network for system initiation of wireless area network
WO2009104689A1 (en) * 2008-02-21 2009-08-27 株式会社トヨタIt開発センター Mobile radio communication system and radio communication method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Li-Chun Wang, Anderson,C..On the performance of specturm handoff for link maintenance in cognitive radio.《3rd International Symposium on Wireless Pervasive Computing》.2008, *
李希金,纪红.基于认知的异构无线网络信道借用策略.《北京邮电大学学报》.2009,第32卷(第5期), *
蔡莉莉.认知无线电系统中动态频谱分配算法的研究.《硕士学位论文》.2009,4.3.1. *

Also Published As

Publication number Publication date
CN101778435A (en) 2010-07-14

Similar Documents

Publication Publication Date Title
CN101778435B (en) Method and device for allocating frequency spectrum resource in heterogeneous wireless network
Zhang Dynamic spectrum access in cognitive radio wireless networks
Tang et al. Performance of secondary radios in spectrum sharing with prioritized primary access
KR101881433B1 (en) System and method for communicating traffic over licensed or un-licensed spectrums based on quality of service(qos) constraints of the traffic
US9107202B2 (en) Methods, apparatuses and computer program products for providing coordination of device to device communication
KR101509360B1 (en) Method for generating a coexistence value to define fair resource share between secondary networks
WO2020029698A1 (en) Uplink channel resource indication and determination method, and base station, terminal and medium
CN102076091B (en) Distribution method, apparatus for signal path assignment and base station control equipment of signal path
US8615264B2 (en) Method and apparatus for allocating cognitive radio network spectrum based on aggregation
US8706149B2 (en) Method for allocating priority to resource and method and apparatus for operating resource using the same
GB2490748A (en) A femtocell management apparatus allocates a resource block according to a request signal and an interference figure
WO2012163162A1 (en) Method and device for acquiring idle frequency spectrum
WO2012022170A1 (en) Frequency spectrum cognation method, equipment and system
CN103139874B (en) Channel Selection Method Based on Time Series Prediction in Cognitive Radio
WO2013044804A1 (en) Method and device for co-channel interference coordination
KR102133253B1 (en) Method of allocating radio resources and apparatus of allocating radio resources in small-cell networks
EP2775748B1 (en) Radio base station apparatus, radio resource management method, radio resource management program, wireless communication apparatus, and wireless communication system
WO2012139364A1 (en) Method and system for dynamic channel allocation
CN104883212B (en) A kind of data transmission method and device based on cooperating relay and spectrum aggregating
Chu et al. Channel reservation for dynamic spectrum access of cognitive radio networks with prioritized traffic
CN103442363B (en) Use the minimized frequency spectrum aggregation method of cognitive TD-LTE intermediate frequency spectrum switching times of TVWS
Li et al. Combined channel aggregation and fragmentation strategy in cognitive radio networks
Tang et al. A fair scheduling scheme based on collision statistics for cognitive radio networks
CN110536306B (en) Optimal power distribution method in multi-channel cognitive wireless network based on convex optimization
Kim et al. MAC protocol for quality-aware real-time voice delivery in cognitive radio-enabled WSNs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Li Yi

Inventor after: Chen Dan

Inventor after: Mao Xu

Inventor after: Ji Hong

Inventor after: Li Ming

Inventor after: Li Xi

Inventor after: Wang Chengjin

Inventor after: Li Xijin

Inventor before: Li Yi

Inventor before: Mao Xu

Inventor before: Ji Hong

Inventor before: Li Ming

Inventor before: Li Xi

Inventor before: Wang Chengjin

Inventor before: Li Xijin

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: LI YI MAO XU JI HONG LI MING LI XI WANG CHENGJIN LI XIJIN TO: LI YI CHEN DAN MAO XU JI HONG LI MING LI XI WANG CHENGJIN LI XIJIN

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120718

Termination date: 20130113