Next Article in Journal
Hollow Light Guide Module Involving Mini Light-Emitting Diodes for Asymmetric Luminous Planar Illuminators
Previous Article in Journal
The Symptoms of Illness: Does Israel Suffer from “Dutch Disease”?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Leveraging on the Cognitive Radio Channel Aggregation Strategy for Next Generation Utility Networks

by
Esenogho Ebenezer
1,*,
Theo. G. Swart
1 and
Thokozani Shongwe
2
1
Centre for Telecommunication, Department of Electrical and Electronic Engineering Science, University of Johannesburg, P. O. Box 524 Auckland Park, Johannesburg 2092, South Africa
2
Department of Electrical and Electronic Engineering Technology, University of Johannesburg, Doornfontein Campus, Johannesburg 2028, South Africa
*
Author to whom correspondence should be addressed.
Submission received: 3 May 2019 / Revised: 2 July 2019 / Accepted: 3 July 2019 / Published: 18 July 2019

Abstract

:
Integrating cognitive radio into the current power grid is designed to enable smart communication and decisions within the grid. Communication within the grid is not feasible without channel(s) and most studies have emphasized the use of cellular spectrum. This study proposes a strategy that enables the use of television white space (TVWS) within the grid. To be specific, we propose using a next-generation utility network (Next-GUN), which leverages on the cognitive radio (CR) channel aggregation capability. This strategy enables the aggregation of idle TVWS into a usable channel, thus making the Next-GUN different from the traditional power network. Next-GUN differs in terms of security, reliability, self-awareness, and cross-layer compatibility to the interface, and conveys different traffic classes, thereby making it a hybrid system. It has no dedicated channel assigned to it, and hence, utilizes the idle TVWS opportunistically to transmit data. The proposed scheme was modelled as a Markovian process and analyzed using a continuous time Markov chain (CTMC). Extensive system simulations were performed to evaluate this proposed model and the corresponding comparison with the literature was done to see the improvement. The result of our comparisons shows that when channels are aggregated, more data/information are transmitted. In addition, the use of cognitive radios on a power network enables smart transaction because idle TVWS is utilized instead of congesting the GSM spectrum. Lastly, the power utility establishment can save the cost of paying for a licensed spectrum.

Graphical Abstract

1. Introduction

One unique characteristic of cognitive radio technology (CRT) is its capability to integrate both wired and wireless technologies like the power grid, power-line communication (PLC), visible light communication (VLC), worldwide interoperability for microwave access (WiMAX) and long-term evolution advanced (LTE-A).
The advantage of integrating CRT has not been investigated in detail except in a couple of studies [1,2]. Therefore, the demand to fully integrate CRT into the current grid is predicated on developing a next-generation utility network with special features. The next-generation utility network (Next-GUN) has two main components, which include: (1) smart and non-smart metering infrastructure (SNSMI), and (2) the utility and control management center [3].
The Next-GUN model is a hybrid architecture created through the integration of wireless radio technologies that guarantee dependable, compatible and efficient access to the grid elements from generation to distribution [4]. To achieve this multifaceted hybrid network architecture, three basic network components are crucial. These include the customer area network (CAN) managed by the customer cognitive gateway (CCGW), the field area network (FAN) coordinated by the cognitive field gateway (CFGW), and the wide area network (WAN) controlled by the tier-three hybrid cognitive radio-based station (HCRBS). While the CCGW collates power consumption from homes, the CFGW plays the role of substation (data concentrator) that feeds the HCRBS for final decisions.
In other words, the HCRBS makes a final decision based on some conditions, such as the availability of idle channels (TVWS or spectrum-holes) and the traffic class that each sub-network (CAN and FAN) is carrying.
The fundamental difference between our proposed Next-GUN model and others in the literature is two-fold: (a) The application of a channel aggregation policy in all tiers of the network (from generation up to distribution). (b) The semi-independence given to the CCGW and CFGW (intelligent agent or subnetworks) to aggregate and utilize the spectrum-holes within its jurisdiction (coverage area) for daily and hourly data transmission, while still sending reports to the HCRBS for a superior decision. On these premises, we infer that our design is suitable for a next generation electricity/power grid.
The rest of the paper is structured as follows: Section 2 presents the preliminaries of the cognitive radio and the Next-GUN concept. Section 3 summarizes related work. Section 4 and Section 5 describe the network and the system model, respectively. Performance measures are found in Section 6, while numerical results and comparison are discussed in Section 7. The paper is concluded in Section 8.

2. Preliminaries of Cognitive Radio and Next-GUN

Cognitive radio is a paradigm shift from the conventional wireless communication system. This concept has been discussed extensively in the literature [5,6,7], and hence, this paper will not bore the reader with it. The core components that make up the Next-GUN architecture from generation to distribution, and the enabling functionalities of the system, are shown in Figure 1.

2.1. Customer Area Network (CAN)

A CAN is a region interconnected by a cognitive meter (smart meter), coordinated and controlled by the CCGW (a tier-one control node). The CCGW, being semi-independent, establishes connectivity between the smart meter in the CAN, while the CFGW detects and coordinates new devices joining the network via self-reconfiguration. The CAN also identifies available TVWS, ensures dynamic spectrum sharing and establishes a duplex connection through which smart-data is transmitted to the CFGW in one direction. In the other direction, it obtains feedback (e.g., price billing), which is relayed to the CAN and displayed by the smart meter installed in the customer premises [4,8].

2.2. Field Area Network (FAN)

The FAN is a region comprising several CANs within a given neighborhood radius. It is coordinated by the CFGW, a semi-independent second tier node. Its main responsibilities are to collate (data concentrator) smart-data from every CAN region within a neighborhood and deliver to the HCRBS, which then transmits to the utility establishment (management control center) via the WAN. The CFGW, being cognitive by design, identifies and manages new CCGWs joining the FAN, including non-smart meter users (NSMUs). It also ensures spectrum allocation among the CCGW, depending on demand and availability of TVWS. The CFGW creates a two-way communication link that sends and receives billings and pricings from the utility company [9,10]. Note, the CFGW has a higher processing speed than the CCGW because it handles more requests due to a larger coverage area.

2.3. Wide Area Network (WAN)

The WAN is a region consisting of several FANs with few NSMUs. In this paper, the WAN is described as the backbone of the Next-GUN architecture due to its wider coverage that spans the entire value chain from generation to distribution. It is comprised of two key components, which are the core and backhaul networks. These key components enable it to cover a wider region where the CFGW and CCGW are sited.
The core networks link the control center via the HCRBS (third-tier control terminal), while the backhaul is responsible for broadband connectivity to the FAN and CAN by leveraging on the available TVWS. The HCRBS, being the spectrum manager, recognizes the cognitive ability of the CCGW and CFGW. Hence, it gives some level of independence (semi-independence) to other cognitive gateways (CCGW and CFGW) to aggregate TVWS within a jurisdiction. This enables them to transmit smart data collated to the HCRBS. However, the HCRBS does the overall spectrum identification, collation, coordination, and allocation, and links the entire network setup to the management control center of the utility establishment in a duplex manner [4,8,9].

3. Related Works

Leveraging on the capability of cognitive radio technology (CRT) opens a new research space with lots of benefits to the power utility sector at large. This synergy has motivated several investigations in this regard. In [2] the author proposed the application of CRT on smart grid. In the study, a simple deign on how a smart grid should function was discussed. The author further proposed the functionalities of the future grid which includes self-reconfiguration, agility just to mention a few. However, did not go into details of the performance evaluation which our work will do. For example, the consideration of different traffic classes and new performance metric which we will be considering.
In [3], the authors proposed the application of cognitive radio (CR) based on the IEEE 802.22 standard in a smart grid WAN. This study investigated the benefits of the proposed scheme, including, but not limited to extended coverage, opportunistic access to the spectrum, scalability, self-reconfiguration and fault tolerance. However, this study did not consider the channel aggregation capability of CR, which we have done. In [4], the authors introduced the use of two bands. The first is the unlicensed industrial scientific and medical (ISM) band, which is used for normal transmission, while the second licensed band serves as a backup in case of interruption due the arrival of primary owners. This approach ensures the quality of service (QoS) of data communication is guaranteed in a CR-based network. In this study, both the ISM band and licensed band are sensed simultaneously and whenever the licensed band cannot guarantee the QoS, it stops sensing and accessing the ISM band. In [8], a cognitive radio-based smart grid communication network was proposed. In the study, the communication network requirements, architecture, and applications were recommended, however, without any performance investigation like our study. In [9], the authors studied the priority level of different classes of traffic carried by the CR-based smart grid communication network. This posed a scheduling challenge and so they proposed a QoS differential scheduling scheme. The scheduler is responsible for managing the spectrum resources and arranging traffic for the smart grid according to the priority. However, the scheme did not consider the worst-case scenario that could lead to force termination, blocking or dropping of services irrespective of the priority level, which our study has done, bearing in mind that the licensed users can arrive at any time.
Khan et al. [10] and Zaballos et al. [11] gave a comprehensive survey on cognitive radio smart grid architecture with an emphasis on the heterogenous architecture of the system. However, the author’s design did not consider the semi-independence/autonomous nature of the CCGW and CFGW, which our work proposed and considered in our analysis, making it unique. In [12], the authors studied the opportunities for integrating present-day electricity networks and information and communication technology (ICT). This study further highlighted challenges, such as cybersecurity of the grid as it is exposed to the internet, standard interoperability and cognitive access to radio spectra. However, the study in [12] did not emphasize the analytical aspect of the study using a detailed Markovian process that depicts the transaction between primary and secondary users, which our research did. Furthermore, as cognitive radio channel access and allocation policy is the foundation for the success of smart grid communication, several allocation strategies have been studied in [13,14,15,16,17].
In this paper, we propose and develop a Next-GUN that applies cognitive radio channel aggregation policies. The policy allows the aggregation of several idle primary user (PU) channels (TVWS) into a logical chunk. This in turn improves secondary user (SU) throughput (volume of smart meter readings sent/received per time) over wireless links. Our paper further establishes a detailed Markov chain-based analytical model for the proposed system and considers the performance measures (e.g., access, blocking and forced termination probabilities) that have not been considered before in smart communication design. The core contributions of this paper are summarized as follows:
  • We propose the application of a cognitive radio channel aggregation strategy into an existing power grid, which to the best of our knowledge has not been proposed and applied.
  • In our study, we propose using a semi-independent customer cognitive gateway (CCGW) and customer field gateway (CFGW), which aggregate and use the spectrum-holes within their jurisdictions for daily and hourly data transmission/reception.
  • We analyzed the effect of access, blocking and forced termination probabilities, which has never been reported, particularly on the smart grid communication domain using a detailed Markov chain-based analytical model.
  • We compared our model to closely related literature to determine the improvement made, depending on selected parameters.

4. Network Model

This section presents our proposed architecture shown in Figure 1. As mentioned earlier, the network model consists of three main symbiotic elements, which are the CAN, the FAN, and the WAN. These three units cover generation, transmission, and distribution, respectively. The essence of this model is to integrate all layers of the grid with cognitive radio technology (CRT). The cognitive radio probes TVWS and establishes a two-way communication between the smart meter users (SMU) and the billing/utility company.
As the present 900/1800/1900 MHz bands (GSM-bands) are faced with the challenge of congestion due to the proliferation of diverse applications and services, which has resulted in a spectrum crunch, integrating the power grid would worsen the spectrum condition. Hence, to avoid paying for spectrums that are already scarce, we suggest that power utility companies use this model to save costs by leveraging on the capability CRT for monitoring power infrastructure on a real/non-real time basis. In as much as the spectrum holes are utilized, not all the users within Next-GUN are treated equally due to traffic type orientation. In this regard, the SUs are categorized into two, which are the smart meter users (SMUs), denoted as SU1, and non-smart meter users (NSMUs) denoted as SU2.

Next-GUN Architecture and Principle of Operation

The Next-GUN architecture is presented in Figure 1. In this setup, the mode of operation occurs in such a way that the power consumed by smart devices and appliances in homes is displayed in the smart meter (SM) installed on the consumer’s premises. Then, the SM information is relayed to the nearest substation or data concentrator. Nonetheless, the data concentrator center falls under the FAN, which collates all data from the neighboring SM via the CFGW and transmits it to the billing/utility control center via the HCRBS.
The HCRBS, being the intermediary node with more robust cognitive capabilities, constantly scans the PU channel (TVWS), identifies spectrum holes (TVWS) and opportunistically utilizes these available resources to transfer the data/information to the utility center. On the other hand, if the utility management center wants to query or send pricing and billing information, the cognitive access point (CAP) interfaces with HCRBS using the same TV-band, and hence the information gets to the FAN and CAN. Some of the opportunistic SUs carry non-real-time traffic and equally want to access the TVWS, and so they probe both the CFGW/FAN and the HCRBS/WAN to check if there are remnants of resources of SMU/SU1.
To avoid unfairness, the HCRBS gives SU2 an opportunity; however, they are classified as low priority users because SU1 are high priority users. This is because SU1 carry real-time data, such as energy readings, faults and disturbance (intrusion), about the grid. The essence of the queue/buffer attached to the HCRBS in Figure 1 is to ensure that the SMU/SU1 service is queued in the event of sudden interruption due to the batch arrival of PUs, and when the spectrum is fully occupied or is insufficient for SMU/SU1. Nevertheless, SMU/SU1 will not be queued continually, and hence can be dropped if prolonged in the queue/buffer due to their delay intolerance, unlike NSMU/SU2, which can withstand delays.

5. Conceptual Assumptions and System Modeling

The concept of our system model is leveraged on the capability of CR. Precisely, the model focuses on the PU and SU channel configuration as shown in Figure 2. From the model, the TVWS (idle channel) is the currency that drives the communication transactions in the Next-GUN; hence, it was structured to ensure fairness and avoid collision among SUs. In this paper, few assumptions were made. We assumed an underlay perfect sensing [15] and that the system is comprised of U licensed channels owned by the PUs, while SUs opportunistically utilizes it.
The licensed channel is partitioned into V sub-channels for the two classes of SUs, thereby resulting in a maximum cardinality of UV sub-channels that are utilized by SUs (SMU and NSMU). SMU represents SU1 with high priority access, while NSMU denotes SU2 as a low priority user. The arrival of PUs and SUs follows a Poisson procedure with arrival rates of λ ρ ,   λ s , respectively. Whereas the service times are exponentially distributed with the service rates μ p ,   μ s for the PUs and SUs, respectively [13,16,17]. For simplicity, we assumed λ s and μ s to be the arrival and service rates of the SUs, respectively.

5.1. Next-GUN Resources Allocation Strategy

In the Next-GUN channel allocation policy, the sub-channels are divided into two parts. This is due to the two classes of SUs as illustrated in Figure 2 below.
The SMU/SU1 is allocated β subchannels out of the cardinality (total capacity of subchannels) of UV and are bounded as 0 β UV . The NSMU/SU2 is allocated UV β subchannels, which is the remainder of the resources. To minimize blocking and forced termination of SMU/SU1 services, the PU utilizes its resources in an incremental and sequential manner ( 1 ,   2 ,   , U ) , while the HCRBS and its associated cognitive nodes probe the channel and assigned subchannels for SMU/SU1 in a decremental successive pattern from UV to UV β + 1 , i.e., ( UV , UV 1 , , , ( U 1 ) V , ,   UV β + 1 ) in the opposite direction as shown in Figure 2. The leftover of UV β resources are allocated to NNSMU/SU2 in a decremental order from UV β to 1 (i.e., UV β ,   UV β 1 ,   1 ).
Our approach ensures that SMUs/SU1 are protected as real-time digital data are carried. This means that the NSMUs/SU2 act as the sacrificial users, which shield the SU1 from blocking or forced termination. We also assumed that the PU service requires one channel, while the SU service can aggregate β 1 resources, depending on the traffic demand. Further assumptions are perfect sensing of the cognitive nodes (HCRBS, CCGW and CFGW) on the PU activities (collision/interference avoidance) as in [11,12,13] and no common control channel for coordinating SUs, as assumed in [17,18,19], to avoid overhead. In addition, no geo-location for SUs, but identical bandwidth requirement with priority for SMU/SU1 was assumed. To avoid total or partial starvation of NSMU/SU2 due to SMU/SU1 greedy tendencies [15,20], a conflict resolution strategy is invoked by the HCRBS to ensure fairness among SUs while upholding priority.
Therefore, to achieve maximum efficiency in service completion rate and fairness of priority SU traffic, the Next-GUN allocation policy aims at allocating β resources to SMU/SU1 with a fairness indicator F Cg as in [13,21].
In this paper, throughput efficiency (call/service completion rate) of the SU is the average number of services that were successfully completed without interruption. It is a function of the blocking and forced termination (FT) probabilities of SUs. Consequently, the general fairness indicator F Cg is expressed as
F Cg   = ( i = 1 n su s ) 2 n ( i = 1 n su s 2 )
For n = 2 (n indicates the two classes of SUs (SMU/SU1 and NSMU/SU2).
F Cg = ( su 1 + su 2 ) 2 2 ( su 2 2 + su 2 2 )
where su 1 and su 2 are the throughput efficiency of SMU/SU1 and NSMU/SU2, and su s for both respectively. F Cg measures the extent of equity to which channel(s) are allocated among SUs [13,21]. The fairness model has a positive minimum bound of min , which denotes the lower guaranteed value of F Cg and the maximum bound max = 1 . Note that a higher value of F Cg signifies a fairer resource distribution among SUs. The algorithm for the Next-GUN policy is found below.

5.2. Governing Protocol/Algorithm for Next-GUN

For every network architecture, there are rules and procedures that guide the functionality of that system. This section presents the governing protocol/algorithm (Algorithm 1) of our Next-GUN shown below.
Algorithm 1. Governing Protocol/Algorithm for Next-GUN.
//SMU/SU1 Arrival
1:  HCRBS checks the wireless link state and scans the TV-band for TVWS (spectrum holes);// HCRBS checks for free PU/TV-user channel i.e., PU/TV-user absent.
2:      HCRBS checks the cardinality of TVWS;// HCRBS test for number of channel-slot (resources) available.
3:   If enough resources (TVWS) exist
4:     Grant access/admission to SMU/SU1 =True;//admit and allocate channel-slot (TVWS)
5:    Else:// if insufficient
6:  Check if queue=True;// test if queue is not full/free/empty
7:    If queue=True:// queue is not full
8: Admit into queue=True with set-time://waiting in the buffer with predetermined time, while HRBS scans for TVWS.
9:   Else://scanning failed
10: Grant access/admission to SMU/SU1 =False;//block due to insufficient channel-slot (TVWS)
11:      If time out in queue=True //within allowed time to wait
12:   Drop queues= False// exceed time to wait hence dropped from
13:  Go to step 8//waiting to be served by the HCRBS
14:    Else
15:  Drop queues=True// forced termination due to time out/overstaying to avoid starvation of other SUs.
16: Go to start
//NSMU/SU2 Arrival
17:    HCRBS checks for the remnant TVWS (spectrum holes) of SMU/SU1
18:   Call step 2 to 15:// calling subroutine 2 to 15
19:     Interchange SMU/SU1 for NSMU/SU2://run the same structure of command but for NSMU/SU2
//SUs Departure
20:   SUs vacates the TVWS:// SUs service completion.
21: Free spectrum are created for other SUs
//PU (TV-user) Arrival
22:         TV-user arrives and picks some SU2 resources (from left to right)
23:    Go to step 1 to 2
24:     Go to step 18 // call subroutine for SUs
25:     Else:// all condition to keep SU2 can’t be met// worst case scenario
26:    SU2 drop =True;// forced-terminate of ongoing SUs service
27:  End if;// terminate if no event
//PU (TV-user) Departure
28:   Go to step 1 to 2:// call and run subroutine
29:     If channel-slots=True;// free TVWS exists
30:      Go to 3 to 16:// call and run subroutine
31:  Ends
32:   Go to start// run the process until runtime elapse

5.3. System Model Analysis

In this analytical model, let σ p ,   σ su 1 , and σ su 2 represent the channel efficiency ratio for the PUs, SMU/SU1 and NSMU/SU2, respectively. It can be expressed as [22,23]
σ p =   λ p μ p ,   σ su 1 =   λ su 1 μ su 1 ,   σ su 2 =   λ su 2 μ su 2
Therefore, the mean number of PUs ( δ p ) , SMU/SU1 ( δ su 1 ) and NSMU/SU2 ( δ su 2 ) in the network steady-state can be estimated by substituting (3) as in [22,23]:
δ p = σ p ( 1 σ p ) =   λ p μ p ( 1 σ p )
δ su 1 = σ su 1 ( 1 σ su 1 ) =   λ su 1 μ su 1 ( 1 σ su 1 )
δ su 2 = σ su 2 ( 1 σ su 2 ) =   λ su 2 μ su 2 ( 1 σ su 2 )
Based on our estimation in (4a) to (4c), the number of channels utilized by the SUs (SMU/SU1 and NSMU/SU2) su s   would be
su s = [ U ( δ p ) ] V
While the number of channels assigned to SU1 (i.e., su 1 β ) can be computed on the premise of our estimations in (4) using this expression:
su 1 β = su s [ δ su 1 ( δ su 1 + δ su 2 ) ] = { [ U ( δ p ) ] V [ δ su 1 ( δ su 1 + δ su 2 ) ] }
For the convenience of the reader, the number of channels assigned to SU2 ( su 2 UV β ) can be expressed as
su 2 UV β = su s [ δ su 2 ( δ su 1 + δ su 2 ) ] = { [ U ( δ p ) ] V [ δ su 2 ( δ su 1 + δ su 2 ) ] }

5.4. Continous Time Markov Chain (CTMC) Model Analysis

To capture PU/SU activities (PU, SU arrival and departure), the Next-GUN scheme is modelled as a three state CTMC with a general state represented by ϕ = ( x ,   y ,   z ) , where   x ,   y ,   z , are the number of PU, SU1 and SU2 occupying the channels, respectively. The feasible state space   Ω is expressed as Ω = { ϕ   | 0 x U ;   0 y β ;   0 z UV β ; xV + y + z   UV } . The state probability P ( x ,   y ,   z ) can be obtained with the normalized equation as shown in (7). The probability of state ϕ can be obtained, given the state probability P ( ϕ ) .
P η = 0 ,   ϕ Ω P ( ϕ ) = 1 ,
where η is the transition rate matrix. Note π ( x ,   y ,   z ) is the index function presented as:
π ( x ,   y ,   z ) = { 1   if   state   ( x , y , z )   is   possible 0   otherwise
For ease of understanding of the state transition analysis, we adopt a probability notation on k as the quotient when β is divided by V with l as the reminder. This implies that β = kV + l ;   0 k < U ;   0 l < V . In the same vein, y = k * V + l * ;   0 k * < U ;   0 l * < V if k* is the quotient when y is divided by V and the remainder is l*. The possible state transitions are developed and summarized in Table 1 below for convenience of illustration.

6. Performance Measure

The performance analysis of this work is aided by the premise of [13,21,24]; however, a unique allocation policy with a performance metric was used in our detailed evaluations. The reason for the choice of theses performance indices was to see how the system responded to arrival, departure and interruption by the PUs. In addition, no study on smart grid communication has considered these indices to the best of our knowledge, making our work unique.

6.1. Blocking Probability

The blocking probability   P b su is the sum of all probabilities of states that cannot admit or give access to SUs into the network. However, arriving SUs will be blocked if:
  • There are insufficient idle channels to commence service, irrespective of the class of SUs.
  • The sum of the available idle channel(s) is less than the lower bound.
Hence the blocking probability for SU1 P b su 1 can be expressed, as in [13,21], as
  P b su 1 = x = 0 U K 1 z = 0 UV β P ( x ,   β , z ) + x = U k U P ( x ,   ( U x ) V ,   0 )
Similarly, the blocking probability for SU2 P b su 2 is expressed as
  P b su 2 x = 0 U K 1 y = 0 UV β P ( x ,   β , ( U x ) V β ) + x = U k U y = 0 β P ( x ,   y ,   0 )  

6.2. Throughput Efficiency

As stated earlier, the throughput efficiency is the service completion rate, which is a measure of how SUs successfully complete their service for every arrival, as in [24]. For SU1 and SU2 respectively, it can be expressed as
su 1 =   λ su 1 ( 1   P b su 1 ) ( 1   P f su 1 )
su 2 =   λ su 2 ( 1   P b su 2 ) ( 1 P f su 2 )

6.3. Access Probability

The acceptance probability implies that enough channels exist for the SUs when they arrive with a high possibility of being granted admission into the network. It also infers that the residual channels after PU occupancy are greater than or equal to the resources required by the SUs. It can be expressed in terms of probability as the rate of not being blocked. For SU1 and SU2 respectively, it can be expressed as
  P a su 1 = ( 1   P b su 1 )
  P a su 2 = ( 1   P b su 2 )
Note that the probability of access and blocking is unity as shown in Equation (14)
  P a su +   P b su = 1
This should not be misunderstood for the throughput efficiency in (10); however, they are related.

6.4. Force Termination Probability

The force termination (FT) occurs whenever ongoing SU (SU1 or SU2) services are pre-empted by the PU arrival. This suggests that the SU could not successfully exit from an idle channel(s). The blocking probability for SU1 can be expressed as
  P f su 1 = λ p λ su 1 ( 1 P b su 1 ) · x = U k U 1 l * = 0 V l * ( x ,   ( U 1 x ) V + l * , 0 ) + λ p   λ su 1 ( 1 P b su 1 ) · l * = 1 l z = 0 UV β l * P ( x ,   kV + l * ,   z , 0 )
Similarly, the forced termination probability for SU2 P b su 2 is expressed as
λ p λ su 2 ( 1 P b su 2 ) · x = 0 U k 2 y = 0 β z * V z * P ( x ,   y , ( U k x 1 ) V l + z * ) + λ p λ su 2 ( 1   P b su 2 ) · y = 0 β z = 1 UV β zP ( U   k 1 ,   y , z )  

7. Numerical Results and Discussion

Our numerical results and discussions will be categorized into two sub-sections. The first sub-section evaluates and compares the two classes of secondary users (SMU and NSMU) within the proposed Next-GUN model. While the second subsection will compare our proposed model to other similar investigations in the literature and the improvements made. The range of parameters used for the PUs is λ p = μ p   5.0 , while for SUs it is su = λ s =   μ s 3.0 .

7.1. Evaluation and Comparison of SM and NSM Users Within the Proposed Next-GUN Model

This subsection evaluates the performance of the Next-GUN model with respect to PU/SU events (arrival and departure). Our numerical results are anchored on four cardinal indices, which are the throughput efficiency, blocking, access and forced termination probabilities. A software tool (Matlab) was used to execute the simulations for the strategies with regards to the SMU and NSMU (SU1 and SU2, respectively). In addition, we adopted some parameters [12,15,16] and averaged 100 obtained values to obtain the result from 106 iterations. However, there are variations based on the indices like blocking, access and forced termination probabilities, which we introduced.
Figure 3 and Figure 4 show the effects of incremental arrivals of PUs (TV-users) on the network. Figure 3 shows that in the event of batch arrivals, the SUs (SU1 and SU2) would experience difficulties accessing the TVWS. This difficulty results in a decrease of access probability (admittance into the networks). In addition, fewer or no spectrum holes would be accessible to service the SUs request, hence a decrease in access into the system would result. Figure 3 illustrates that if the number of accessible subchannel(s) is not enough based on the conditions in the algorithm, access would be denied (blocked).
This consequently increased the blocking probability due to PU mass arrival as shown in Figure 4. On the contrary, once PUs depart, more spectrum-holes (TVWS) are made available for SUs. This, however, depicts a mirror behaviour, which validates the expressions in Equations (12)–(14). Nevertheless, SU1 showed an improved performance compared to SU2 due to the priority given to it by the HCRBS.
In Figure 5, the SU throughput is at its peak when the TV-users are absent from the spectrum. As such, the HCRBS utilizes the TVWS by aggregating and allocating more spectrum resources to the SUs, which results in a high completion rate irrespective of the traffic class, the policies and the wireless link state. Nonetheless, the throughput efficiency decreases as the PU arrives. By direct comparison, the throughput efficiency of SU1 is superior to SU2 due to the preferential treatment given to it and the nature of its traffic. This is unlike Figure 5, where throughput efficiency drops due to the arrival of the PU.
In Figure 6, the throughput efficiency improves owing to lighter traffic flow from the PU events. Therefore, arrived SUs can complete their transactions deprived of interruption from PU’s ON–OFF activities [25,26]. This implies that the PU has an erratic behaviour and as such, when the SU arrives and the PU is in an OFF/Idle state, the SUs can be serviced (given channel resources to transmit with) before the PU transit to the ON/Busy state.
In Figure 7, the forced termination probability increases considerably as PUs arrive. Specifically, from the point where the arrival rate λ p = 1.4 to λ p = 1.6, the forced termination increased sharply. This is due to increased arrivals (batch) from 0.1, which implies a single arrival to 1.8, which denotes 18 arrivals of PUs on the Next-GUN system. This otherwise affects the SU transactions because the PUs will grab its channels without prior notice. As such, the HCRBS will try to rescue the SU service, or else it will be forced to terminate its ongoing services. Due to its flexibility and superior capability, the smart meter response is faster and better at every point compared to the non-smart users.
In Figure 8, the forced termination probability decreases and decays to zero as the SUs experience abundant TVWS resources (left to right axis movement). This implies that SU arrivals are serviced immediately without delay, irrespective of the class of SU (SU1 or SU2). On the other hand (right to left movement), the force termination probability will increase when there are insufficient channel resources, thus reaffirming the importance of channel aggregation and its effect on SU performance.
The result in Figure 9 indicates that the likelihood of SU service being blocked on arrival will diminish once there are abundant idle TVWS to jump on after careful sensing of the TV-band. Normally, it is expected that the blocking probability decreases as the arrival/service rate of the SU is increased. Recall, we are aggregating channels, which implies that the SU throughput (volume of the packet sent) will be higher than usual. For instance, an SU using one channel to transmit packets cannot be compared to an SU that has aggregated or combined five channels. This means that the likelihood of that SU being blocked will be minimal because it will transmit its packets faster. On the other hand, if the graph is viewed from the left direction, the blocking probability will definitely increase due to loss or inadequate TVWS. This is the beauty of our proposal.
The results in Figure 10 are in consonance with Figure 9 and validates (12)–(14) from our analysis. It suggests that once there is abundant idle TVWS to jump on, the access probability will naturally increase because of adequate TVWS to aggregate. It also implies that once the SU gains access into the TVWS, it will be served immediately without delays. For example, if the blocking probability is   P b = 0.3 irrespective of the users selected, the access probability is   P a = 1 P b , then P a = 1 P b = 0.7 and vice-versa as illustrated in the results. Note, the worst-case scenario of this study would be that all channel(s)/TVWS are occupied and the HCRBS/CCGW/CFGW will have to probe continually, which will likely lead to force termination or blocking/dropping of services. This implies that the SUs will be stripped of their aggregated channel(s) with no other free ones to aggregate. This, of course, might not often happen considering the ON–OFF erratic behaviour of PUs.

7.2. Comparison of the Proposed Next-GUN Model and Some Studies in the Literature

As part of the contribution of this work, this subsection compares the proposed Next-GUN model to closely related works in the literature. We compared our work with two scenarios: (a) when there is No Aggregation (NA), and (b) when Channel Aggregation Strategy (CAS) is applied but in this case, the sub-intelligent agents (subnetworks agents) are not independent or semi-independent. In other words, in CAS, every subnetwork reports to the cognitive base station irrespective of how minute the decisions are. This increases complexity and burden on the central fusion center, and as such, degrades performance, and hence cannot be applied to smart grids or the internet of things.
As stated earlier, the essential difference between our proposed Next-GUN model and the others in the literature is twofold. (a) The application of channel aggregation policy in all tiers of the network (from generation up to distribution). (b) The semi-independence given to CCGW and CFGW (intelligent agent or subnetworks) to aggregate and use the spectrum-holes within its jurisdiction (coverage area) for daily and hourly data transmission, while still sending reports to the HCRBS for a superior decision. Hence, this design is suitable for deployment in this work. Part of our future work will be on the deployment of this Next-GUN concept in the internet of things (IoT), guided by [27] with the characterization of SU (IoT-agent) behaviour as in [28,29] using optimization strategies of [30].
In Figure 11, we notice that when there are fewer aggregated channels, the force termination is high (from right to left x-axis) and vice-versa from left to right x-axis. Furthermore, when there is no aggregation, the force termination probabilities are highest, meaning that the PU has arrived unannounced and taken back its channel. This consequently causes the SUs to terminate ongoing services. However, we also notice that because the Next-GUN is a more robust model with intelligent subnetworks, it slightly outperformed CAS and outrightly outperformed the NA, owing to its lower force termination probability.
Figure 12 illustrates what happens when the PUs arrive. First, they depart the spectrum unannounced and arrive without notice. This behaviour naturally affects SU’s ongoing service. Because they are the licensed owner, they occupy the spectrum-holes and any SU service trying to access the system is blocked. In most cases, the PUs do not occupy all the channel at once due to their ON–OFF activities. This enables the intelligent agents to optimistically probe and utilize the vacant channels. By comparison, the NA has the worst or highest blocking probability, due to no strategy being applied, followed by CAS.
The proposed Next-GUN and CAS have a better or lowered blocking probability. However, the proposed Next-GUN showed a slight superiority to CAS, particularly in batch arrival of PUs, which is the worst-case scenario.
Figure 13 illustrates SU throughput efficiency (rate of successful package delivery) as the SU arrives and aggregates channels. The logic is that, when enough channels are available, the SU aggregates more and consequently this translates to high package delivery to destination. In other words, as the SUs are serviced (allocated more channels), there is a clear tendency for higher package capacity transmission. In the same vein, if the service rate diminishes as a result of increased arrival of PU, there will be a drop-in throughput efficiency or rate of delivery. By comparison, there was no clear-cut superiority of Next-GUN over CAS initially from our results. However, as the SU service rate increased due to surplus channels and the increased arrivals of SUs, the Next-GUN began to show its superiority over CAS. Nevertheless, a point occurred when both strategies were of equal strength.
The numerical result in Figure 14 clearly affirms that the PUs are the licensed owners of the TVWS. This is clearly shown because as the PU’s arrival increases, the SU access or admission into the spectrum decreases, meaning that the SU must depart for the original owner to utilize its channels. Therefore, it is natural that when the owner of a resource arrives unannounced or by given prior notice, the tenant must vacate. On the contrary, when the PUs are absent or occupying a few channels, the SUs will gain more access into the channel to transmit its data. As Figure 13 shows, the more PUs arrive and occupy its spectrum, the admission or access given to the SU reduces. However, it is highly unlikely that PU will occupy all the slots or channels and so the SU constantly probes for spectrum holes.
Because the CAS and Next-GUN have aggregation strategies, they tend to perform far better than the NA, which is a conventional wireless technology. As presented in the results, Next-GUN outperformed the CAS due to its robust architecture and algorithms. This is not to say CAS is not good, but for us to exploit a licensed spectrum and decongest the current spectrum that is currently facing crunch and scarcity, we need a more intelligent software-driven model like Next-GUN.

8. Conclusions

Contemporary research is geared towards a multidisciplinary domain, targeted to developing robust and intelligent systems. This study has shown and reaffirms the importance of applying and integrating cognitive radio technology into our present-day power grid network and future research. It further shows that the TVWS is very useful in these days of spectrum crunch and scarcity based on the performance indices shown. In addition, most power utility establishments around the globe would not only want to make their network smart for easy and convenient data logging and monitoring, but more importantly, save the cost of paying for a licensed band. This work has shown and demonstrated to the best of our understanding the strength of the proposed software-driven Next-GUN model, which in turn is geared towards the heterogeneous wireless networks like 5G. Our future work would be in two parts. First, we will look at the smart grid internet of things (SG-IoT) using CRT and the effect of a queuing regime like the M/G/1 and M/G/K queuing model on the proposed scheme. Secondly, we will consider the effect of a queuing regime and malicious attack on the cyber–physical system.

Author Contributions

Conceptualization, E.E.; methodology, E.E., T.S., T.G.S.; software, E.E.; validation, E.E.; formal analysis, E.E.; investigation, E.E., T.S., T.G.S.; resources, T.S., T.G.S.; data curation, E.E., T.S., T.G.S.; writing—original draft preparation, E.E.; writing—review and editing, T.S., T.G.S.; visualization, E.E.; supervision, T.G.S., T.S.; project administration, T.S., T.G.S.; funding acquisition, T.G.S., T.S.

Funding

This research received no external funding. However, the APC was funded from our research center/code.

Acknowledgments

This paper is partly supported by the Global Excellence and Stature (GES) Postdoctoral Research Fellowship Program and H.C Ferreira’s Centre for Telecommunication, University of Johannesburg, South Africa.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fathi, M. A Spectrum Allocation Scheme Between Smart Grid Communication and Neighbor Communication Networks. IEEE Syst. J. 2018, 12, 465–471. [Google Scholar] [CrossRef]
  2. Xu, S.; Qian, Y.; Hu, R.Q. On Reliability of Smart Grid Neighborhood Area Networks. IEEE Access 2015, 13, 2352–2365. [Google Scholar] [CrossRef]
  3. Ghasemi, A.; Bavarian, S.; Lampe, L. Cognitive Radio for Smart Grid Communications. In Proceedings of the 1st IEEE International Conference on Smart Grid Communication (SmartGridComm), Gaithersburg, MD, USA, 4–6 October 2010; pp. 297–302. [Google Scholar]
  4. Liu, F.; Wang, J.; Han, Y.; Han, P. Cognitive Radio for Smart Grid Communications. In Proceedings of the 9th IEEE Asian Control Conference (ASCC), Istanbul, Turkey, 23–26 June 2013; pp. 1–5. [Google Scholar]
  5. Dehalwar, V.; Kolhe, M.; Kolhe, S. Cognitive radio application for smart grid. Int. J. Smart Grid Clean Energy 2012, 1, 79–84. [Google Scholar] [CrossRef]
  6. Zhang, J.; Nguyen, N.P.; Zhang, J.; Garcia-Palacios, E.; Le, N.P. Impact of primary networks on the performance of energy harvesting cognitive radio networks. IET Commun. 2016, 10, 2559–2566. [Google Scholar] [CrossRef] [Green Version]
  7. Zhang, J.; Kundu, C.; Nguyen, N.P.; Garcia-Palacios, E.; Nguyen, S.Q. Cognitive wireless powered communication networks with secondary user selection and primary QoS constraint. IET Commun. 2018, 12, 1873–1879. [Google Scholar] [CrossRef] [Green Version]
  8. Alam, S.; Sohail, M.F.; Ghauri, A.S.; Qureshi, I.M.; Aqdas, N. Cognitive Radio Based Smart Grid Communication Network. Renew. Sustain. Energy Rev. 2017, 72, 535–548. [Google Scholar] [CrossRef]
  9. Yu, R.; Zang, Y.; Gjessing, S.C. A Cognitive Radio Based Hierarchical Communication Infrastructure for Smart Grid. IEEE Netw. 2011, 25, 6–14. [Google Scholar] [CrossRef]
  10. Khan, A.A.; Rehmani, M.H.; Reisslein, M. Cognitive Radio Smart Grids: Survey of Architecture, Spectrum Sensing Mechanism, and Networking Protocols. IEEE Commun. Surv. Tutor. 2016, 18, 860–898. [Google Scholar] [CrossRef]
  11. Zaballos, A.; Vallejo, A.; Selga, J. Heterogeneous Communication Architecture for the Smart Grid. IEEE Netw. 2011, 25, 30–37. [Google Scholar] [CrossRef]
  12. Ma, R.; Chen, H.; Huang, Y.; Meng, W. Smart Grid Communication: Its Challenges and Opportunities. IEEE Trans. Smart Grid 2013, 4, 36–46. [Google Scholar] [CrossRef]
  13. Esenogho, E.; Walingo, T. Performance Evaluation of Channel Assembling Strategies with Multi-Class Secondary Users in Cognitive Radio Networks. In Proceedings of the Southern Africa Telecommunication, Networking and Application Conference (SATNAC), Hermanus, South Africa, 6–9 September 2015; pp. 81–86. [Google Scholar]
  14. Li, L.; Zhang, S.; Wang, K.; Zhou, W. Queuing method in combined channel aggregation and fragmentation strategy for dynamic spectrum access. In Proceedings of the 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), Sydney, Australia, 9–12 September 2012; pp. 1214–1219. [Google Scholar]
  15. Le, L.B.; Hossain, E. Resource allocation for spectrum underlay in cognitive radio networks. IEEE Trans. Wirel. Commun. 2008, 7, 5306–5315. [Google Scholar] [CrossRef]
  16. Jiao, L.; Li, F.Y.; Pla, V. Dynamic Channel Assembling Strategies in Cognitive Radio Networks with Spectrum Adaptation. In Proceedings of the IEEE Global Communication Conference (Globecom), Kathmandu, Nepal, 5–9 December 2011; pp. 1–6. [Google Scholar]
  17. Park, J.H.; Chung, J.M. Prioritized channel allocation-based dynamic spectrum access in cognitive radio sensor networks without spectrum handoff. EURASIP J. Wirel. Commun. Netw. 2016, 266, 1–8. [Google Scholar] [CrossRef]
  18. Esenogho, E. Channel Assembling Policies for Heterogeneous Fifth Generation (5G) Cognitive Radio Networks. Ph.D. Thesis, University of KwaZulu-Natal, Durban, South Africa, 2016. [Google Scholar]
  19. Esenogho, E.; Srivastava, V.M. Channel Assembling Strategy in Cognitive Radio Networks: A Queuing Based Approach. Int. J. Commun. Antennas Propag. 2017, 7, 31–47. [Google Scholar] [CrossRef]
  20. Esenogho, E.; Srivastava, V.M. Two Heterogeneous Channel Assembling Strategies in Cognitive Radio Networks: A Performance Analysis. Int. J. Eng. Technol. Innov. 2017, 7, 98–116. [Google Scholar]
  21. Tragos, E.Z.; Zeadally, S.; Fragkiadakis, A.G.; Siris, V.A. Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2013, 15, 1108–1135. [Google Scholar] [CrossRef]
  22. Masri, A.; Chiasserini, C.F.; Casetti, C.; Perotti, A. Common Control Channel Allocation in Cognitive Radio Networks through UWB Communication. IEEE J. Commun. Netw. 2012, 14, 710–718. [Google Scholar] [CrossRef]
  23. Ahmad, A.; Ahmad, S.; Rehmani, M.H.; Hassan, N.U. A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks. IEEE Commun. Surv. Tutor. 2015, 17, 888–917. [Google Scholar] [CrossRef]
  24. Jiang, H.; Wang, P.; Zhuang, W. A Distributed Channel Access Scheme with Guaranteed Priority and Enhanced Fairness. IEEE Trans. Wirel. Commun. 2007, 6, 2114–2125. [Google Scholar] [CrossRef] [Green Version]
  25. Alshamrani, A.; Shen, X.; Xie, L. QoS Provisioning for Heterogeneous Services in Cooperative Cognitive Radio Networks 2011. IEEE J. Sel. Area Commun. 2019, 29, 819–830. [Google Scholar] [CrossRef]
  26. Bertsekas, D.; Gallager, R. Data Networks, 2nd ed.; Prentice-Hall: Upper Saddle River, NJ, USA, 1992; ISBN 0132009161. [Google Scholar]
  27. Tumuluru, V.; Wang, P.; Niyato, D.; Song, W. Performance Analysis of Cognitive Radio Spectrum Access with Prioritized Traffic. IEEE Trans. Veh. Technol. 2012, 61, 1895–1906. [Google Scholar] [CrossRef]
  28. Esenogho, E.; Walingo, T. Primary Users ON/OFF Behaviour Models in cognitive Radio Networks. In Proceedings of the International Conference on Wirel and Mobile Communication Systems (WMCS), Lisbon, Portugal, 30 October–1 November 2014; pp. 209–214. [Google Scholar]
  29. Morabit, Y.E.; Mrabti, F.; Abarkan, E.H. The Allocation in Cognitive Radio Network: Combined Genetic Algorithm and ON/OFF Primary User Activity Models. Advances in Ubiquitous Networking 2; Springer: Berlin, Germany, 2016; pp. 3–14. [Google Scholar]
  30. Chengzhi, W.; Qiang, L.; Minyou, C.; Wenfa, K.; Houfei, L. Power-mileage-based Algorithm for the Optimization of Distribution Network Structures via Adding Transmission Lines. Energies 2019, 12, 1623. [Google Scholar] [Green Version]
Figure 1. Next Generation Utility Network Architecture.
Figure 1. Next Generation Utility Network Architecture.
Energies 12 02753 g001
Figure 2. Primary and secondary users channel usage configuration.
Figure 2. Primary and secondary users channel usage configuration.
Energies 12 02753 g002
Figure 3. SU Access Probability P a su vs. λ p .
Figure 3. SU Access Probability P a su vs. λ p .
Energies 12 02753 g003
Figure 4. SU Blocking Probability P b su vs. λ p .
Figure 4. SU Blocking Probability P b su vs. λ p .
Energies 12 02753 g004
Figure 5. SU Throughput Efficiency su s vs. λ p .
Figure 5. SU Throughput Efficiency su s vs. λ p .
Energies 12 02753 g005
Figure 6. SU Throughput Efficiency su s vs. λ s / μ s .
Figure 6. SU Throughput Efficiency su s vs. λ s / μ s .
Energies 12 02753 g006
Figure 7. SU Force Termination Probability P f su vs. λ p .
Figure 7. SU Force Termination Probability P f su vs. λ p .
Energies 12 02753 g007
Figure 8. SU forced termination probability P f su vs. λ s / μ s .
Figure 8. SU forced termination probability P f su vs. λ s / μ s .
Energies 12 02753 g008
Figure 9. SU Blocking Probability P b su vs. λ s / μ s .
Figure 9. SU Blocking Probability P b su vs. λ s / μ s .
Energies 12 02753 g009
Figure 10. SU access and blocking probability ( P a & P b ) vs. λ s & μ s .
Figure 10. SU access and blocking probability ( P a & P b ) vs. λ s & μ s .
Energies 12 02753 g010
Figure 11. SU force termination probability P f su vs. aggregated channels (service rate, μ s ).
Figure 11. SU force termination probability P f su vs. aggregated channels (service rate, μ s ).
Energies 12 02753 g011
Figure 12. SU blocking probability P b s u vs. λ p .
Figure 12. SU blocking probability P b s u vs. λ p .
Energies 12 02753 g012
Figure 13. SU throughput efficiency su s vs. μ s .
Figure 13. SU throughput efficiency su s vs. μ s .
Energies 12 02753 g013
Figure 14. SU access probability P a su vs. λ p .
Figure 14. SU access probability P a su vs. λ p .
Energies 12 02753 g014
Table 1. Transition table.
Table 1. Transition table.
Possible State Events
ActivityPresent StateOther StatesTransition RateConditions: IfOutcomes
(a) Transition from generic state ( x ,   y , z ) to other states when z = 0
PU AR and request for channel ( x ,   y ,   0 ) ( x + 1 ,   y V ,   0 ) π ( x + 1 ,   y V ,   0 )   λ p xV + y = UV V Services of SU1 will be FT if no resources exist elsewhere or failed exit.
( x + 1 ,   k * V ,   0 ) π ( x + 1 ,   k * V ,   0 )   λ p ( U 1 ) V < xV + y , and y = k * V + l * ( 0 k * U , 0 l * < V ) The l * service of SU1 will be blocked.
( x + 1 ,   y ,   0 ) π ( x + 1 ,   y ,   0 )   λ p xV + y ( U 1 ) V PU will be allocated a channel and SU1 will not be blocked or FT
PU DP after service completion ( x 1 ,   y ,   0 ) π ( x 1 ,   y ,   0 )   x μ p No conditionFrees up the channel(s)
SU1-AR and request for service ( x ,   y ,   0 ) ( x ,   y + 1 ,   0 ) π ( x ,   y + 1 ,   0 )   λ su 1 xV + y < UV SU1 is admitted and access/aggregate vacant subchannels
SU1-DP after service completion ( x ,   y 1 ,   0 ) π ( x ,   y 1 ,   0 )   x μ su 1 No conditionFrees up the channel(s) for other SUs
SU2-AR request for the remnant of the sub-channel(s) ( x ,   y ,   1 ) π ( x ,   y ,   1 )   λ su 2 When both xV + y < UV and x < U k SU2 can be given access to the remnant or unoccupied subchannel(s)
SU2-DP SU2-departure will not be captured because of the criteria/some condition. For convenience and space, we will used DP for depart, AR for arrive, and FT for forced termination.
(b) Transition from other state to state ( x ,   y , z ) when z = 0
PU-AR and request for service ( x 1 ,   y * , z * ) ( x ,   y ,   0 ) π ( x 1 ,   y * , z * )   λ p xV + y = UV and k * = k Where y * + z * = V 0 y * l and 0 z * V l In this scenario, k * SU1 and z * SU2 will be FT their services as PU gain access and utilize the channels(s)
( x 1 ,   y + v ,   0 ) ( x ,   y ,   0 ) π ( x 1 ,   y + v ,   0 )   λ p 0 v V In this event, only v SU1(s) suffer from FT when PU access and utilized the channel(s).
( x 1 ,   y ,   0 ) π ( x 1 ,   y ,   0 )   λ p xV + y < UV None of the SU(s) will be FT even as PU access one channel.
PU DP after service completion ( x + 1 ,   y ,   0 ) π ( x + 1 ,   y ,   0 ) ( x + 1 ) μ p xV + y ( U 1 ) V Releases subchannels
SU1-AR and request for service ( x ,   y 1 ,   0 ) ( x ,   y ,   0 ) π ( x ,   y 1 ,   0 )   λ su 1 No conditionoccupies subchannels
SU1-DP after service completion ( x ,   y + 1 ,   0 ) π ( x ,   y + 1 ,   z ) ( y + 1 ) μ su 2 xV + y < UV Releases subchannels
SU1-DP after using the remnant of subchannel ( x ,   y ,   1 ) π ( x ,   y , 1 ) μ su 2 xV + y < UV and x < U k Releases subchannels
(c) Transition from generic states ( x ,   y , z ) to other states when z > 0
PU-AR and request for channel ( x ,   y ,   z ) ( x + 1 ,   y ,   z V ) π ( x + 1 ,   y , z V )   λ p xV + β + z = UV and x < U k 1 AR of a PU will cause SU2 V services to be blocked being the sacrificial users while SU1 will not since is a high priority user.
( x + 1 ,   min [ kV , y ] ,   0 ) π ( x + 1 ,   min [ kV , y ] ,   0 )   λ p xV + β + z = UV and x = U k 1 If y > kV AR of a PU will cause all SU2 services to be blocked ( y kv ) services of SU1 will FT else no SU1 services to be blocked/dropped
( x + 1 , y ,   ( U k x 1 )   ( V l ) π ( x + 1 , y ,   ( U k x 1 )   ( V l )   λ p ( U 1 ) V < xV + y < UV and x < U k 1 AR of a PU will block ongoing services of SU2 without any SU1 FT
( x + 1 ,   min [ kV , y ] ,   0 ) ( x + 1 ,   min [ kV , y ] ,   0 )   λ p ( U 1 ) V < xV + y < UV , and x = U k 1 If y > kv else if ( y zn )AR of a PU will block all ongoing services of SU2 services. Then   ( y kn ) services of SU1 will be FT with, no need blocking SU1
( x + 1 ,   y ,   z ) π ( x + 1 ,   y ,   0 )   λ p xV + y ( U 1 ) V None of the SU1(s) will be FT even as PU access one channel.
PU-DP after service completion ( x 1 ,   y ,   z ) π ( x 1 ,   y , z ) x μ p No conditionReleases subchannels
SU1-AR, request and occupy subchannel ( x ,   y ,   z ) π ( x ,   y + 1 , z ) π ( x ,   y + 1 , z )   λ su 1 xV + y + z < UV and y < β Occupies subchannels
SU1-DP after service completion ( x ,   y 1 , z ) π ( x ,   y 1 , z ) y μ su 1 No conditionReleases subchannels
SU2-AR request for the remnant of the sub-channel(s) ( x ,   y , z + 1 ) π ( x ,   y , z + 1 )   λ su 2 xV + β + z < UV Occupies subchannels
SU2-DP after service completion ( x ,   y , z 1 ) ( x ,   y , z 1 ) y μ su 2 No conditionReleases subchannels
(d) Transition from other states to generic state ( x ,   y , z ) when z > 0
PU-AR and request for channel ( x 1 ,   y , z + v ) ( x ,   y ,   z ) π ( x 1 ,   y , z + v )   λ p xV + β + z = UV and 0 v V v SU2 are the only ones affected when PU access the channel(s)
( x 1 ,   y , z ) π ( x 1 ,   y , z )   λ p xV + β + z < UV None of the SUs will be FT even as PUs access one channel.
PU-DP after service completion ( x + 1 ,   y , z ) π ( x + 1 ,   y , 0 ) ( x + 1 ) μ p xV + β + z ( U 1 ) V Releases subchannels
SU1-AR, request and occupy sub channel ( x ,   y 1 , z ) ( x ,   y , z ) π ( x ,   y 1 , z )   λ su 1 No conditionOccupies subchannels
SU1-DP after service completion ( x ,   y + 1 , z ) π ( x ,   y + 1 , z ) ( y + 1 ) μ su 1 No conditionReleases subchannels
SU2-AR request for the remnant of the sub-channel(s) ( x ,   y , z 1 ) π ( x ,   y 1 , z )   λ su 2 No conditionOccupies subchannels
SU2-DP after service completion ( x ,   y , z + 1 ) π ( x ,   y , z + 1 ) ( z + 1 ) μ su 2 xV + y < UV Occupies subchannels
Remark: AR and DP denote arrival and departure respectively of PU or SU while FT represent forced termination.

Share and Cite

MDPI and ACS Style

Ebenezer, E.; Swart, T.G.; Shongwe, T. Leveraging on the Cognitive Radio Channel Aggregation Strategy for Next Generation Utility Networks. Energies 2019, 12, 2753. https://0-doi-org.brum.beds.ac.uk/10.3390/en12142753

AMA Style

Ebenezer E, Swart TG, Shongwe T. Leveraging on the Cognitive Radio Channel Aggregation Strategy for Next Generation Utility Networks. Energies. 2019; 12(14):2753. https://0-doi-org.brum.beds.ac.uk/10.3390/en12142753

Chicago/Turabian Style

Ebenezer, Esenogho, Theo. G. Swart, and Thokozani Shongwe. 2019. "Leveraging on the Cognitive Radio Channel Aggregation Strategy for Next Generation Utility Networks" Energies 12, no. 14: 2753. https://0-doi-org.brum.beds.ac.uk/10.3390/en12142753

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop