You are on page 1of 6

Resource Allocation for Cognitive Radios in

Dynamic Spectrum Access Environment


Dong In Kim, Long Le, and Ekram Hossain
(Invited Paper)

Abstract- We investigate the dynamic spectrum sharing prob- inactive. Therefore, dynamic spectrum access of secondary
lem among primary and secondary users in a cognitive radio users by adapting to the on-off behavior of primary users
network subject to QoS constraints for secondary users and could lead to further improvement in spectrum efficiency. This
interference constraints for primary users. For a scenario where
only mean channel gains from secondary users to primary paper models and analyzes the spectrum sharing problem and
receiving points, which are averaged over short-term fading, proposes a solution to the dynamic rate and power allocation
are available, we derive outage probabilities for secondary users problem for secondary users. Recently, there have been a
and interference constraint violation probabilities for primary flurry of works in the literature addressing different aspects
users. Based on the analysis, we develop a framework to perform
of spectrum sensing, dynamic spectrum sharing, and spectrum
joint admission control and rate/power allocation for secondary
users such that statistical guarantees on the violation probabilities
pricing for cognitive radio networks [1]-[8]. The works related
of both the QoS and the interference constraints are achieved. to resource allocation to secondary users under dynamic
Spectrum access by the secondary users can exploit the time- spectrum sharing are particularly relevant to our context (e.g.,
varying nature of the activity of the primary users, and thereby in [3], [7], [8]).
much higher throughput can be achieved compared to the case In this paper, we present solutions for the spectrum shar-
where primary users are assumed to be active at all time.
Also, via extensive numerical analysis, throughput performances ing problem in a dynamic spectrum access environment.
of primary and secondary users are investigated considering We consider the case where only mean channel gains from
different levels of implementation complexity due to channel secondary users to primary receiving points averaged over
estimation. short-term fading are available while either instantaneous or
Index Terms- Cognitive radio, spectrum overlay and spec- mean channel gains among secondary users are available.
trum underlay, rate and power allocation, quality of service Assuming that secondary users can dynamically track the sum
(QoS), convex optimization. interference from primary users at their receiving sides, we
are interested in finding optimal resource allocation solutions
INTRODUCTION
I.
subject to QoS constraints, minimum rate requirements for
secondary users, and interference constraints for primary users.
Dynamic spectrum sharing through cognitive radios can In particular, we propose a complete framework for joint
significantly enhance the spectrum utilization in a wireless admission control, rate/power allocation for optimal spectrum
network. There are two approaches for this dynamic spectrum sharing in a cognitive radio network. For detailed proof and
sharing, namely, spectrum underlay and spectrum overlay analysis of the results presented in this paper we refer the
(Chapter 3, [1]). The spectrum overlay approach increases the readers to [9].
spectrum efficiency by granting secondary (i.e., unlicensed)
users to opportunistically exploit unused frequency bands of
primary (i.e., licensed) users when the frequency bands are II. SYSTEM MODEL AND SUM INTERFERENCE OF
sensed as being unused in temporal and spatial domains [2]. In SECONDARY USERS
contrast, the spectrum underlay approach permits simultaneous We consider a cellular wireless network where primary users
sharing of all the frequency bands available among primary communicate with the corresponding base stations through up-
and secondary users, while imposing severe restrictions on the link transmission. The secondary users (i.e., cognitive radios)
transmission power of the secondary users, so as not to cause communicate with each other in an ad-hoc mode. We will call
any harmful interference to the active primary users [3]. In this a communication link between a pair of secondary users a
scenario, we can simply assume the worst-case primary user secondary link in the sequel. We assume that primary users
interference by treating the primary users all as being active. exhibit the on-off behavior so the total traffic load contributed
However, this approach prevents us from increasing the data by all primary users varies with time depending on how many
rate of the secondary users when the primary users become primary users are in the "on" state.
For the above dynamic spectrum access scenario, rate and
Dong In Kim is with the School of Information and Communication Eng.,
Sungkyunkwan University (SKKU), Korea (Email: dikim@ece.skku.ac.kr). power allocations for the cognitive radios are performed such
Long Le is with the Department of Electrical and Computer Engi- that the following constraints are satisfied: i) the QoS require-
neering, University of Waterloo, Waterloo, ON, Canada (Email: long- ment for a secondary link in terms of signal-to-interference
ble@engmail.uwaterloo.ca). Ekram Hossain is with the Department of Elec-
trical and Computer Engineering, University of Manitoba, Winnipeg, MB, ratio (SIR) and minimum data rates; ii) the tolerable in-
Canada (E-mail: ekram@ee.umanitoba.ca). terference limit at the primary receiving points (i.e., base

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on January 8, 2009 at 20:18 from IEEE Xplore. Restrictions apply.
2

stations). A secondary node would adjust its transmit power III. FORMULATION OF RESOURCE ALLOCATION PROBLEM
and rate so that the interference temperature limits at the A. QoS Constraints for Secondary Users
primary receivers are not violated and at the same time its
For analytical purpose, we limit our framework to a CDMA-
QoS requirements are satisfied. It is assumed that a central
controller in the secondary users' network gathers information based wireless network where the primary and secondary users
can transmit simultaneously in a common frequency band, but
about the primary sum-interference, as well as the channel
status of potential secondary links. Then, the controller per- the framework developed here can easily be extended to other
forms the joint admission control, and rate/power allocation types of wireless networks with slight modifications.
for secondary links, considering the QoS and the interference The signal-to-interference ratio (SIR) at the receiving node
constraints, provided that the primary sum-interference can be of secondary link i can be formulated as
measured properly at the secondary receiving nodes. B (S) p
While it may be possible to estimate instantaneous channel Hi=RiN g(s) p+N (3)
gains among secondary users, it is more difficult to esti-
mate instantaneous channel gains from secondary users to where B is the system bandwidth, Ri and Pi are the trans-
primary receiving points. However, by exploiting pilot signals mission rate and power of secondary link i, respectively, and
transmitted from primary BSs, secondary users can estimate (s) denotes the channel gain from the transmitting node of
the mean channel gains from primary BSs to themselves. secondary link j to receiving node of secondary link i. Here,
For channel gains among secondary users, instantaneous or the processing gain B/Ri should be sufficiently large enough
mean channel gains may be available depending on design to suppress the inter-user interference caused by other users
sophistication of secondary mobile units. We assume that the sharing the common channel. However, it can be assumed
mean channel gains are averaged over short-term fading, and to be one for other multiple access technologies such as
therefore, only the effects of long-term shadowing and path- FDMA. Note that background noise can be ignored in an
loss are reflected in these gains. Moreover, channel gains interference-limited CDMA network. If the noise power is
corresponding to secondary user links are assumed to be included, then Ni corresponds to the sum of noise power and
reported to the controller in a slotted mode. sum-interference due to the primary users. The channel gain
We consider an M-cell layout as in Fig. 1, where K primary (s) can be decomposed into
users are uniformly distributed in the considered geographical
area, communicating with their base stations centered in each (() = as) (s)
cell, and there are N secondary communication links in the
area. We assume that the signal format of the primary users where g(S) is the local average of g(s) and a(s) represents
is known a priori to the receiving nodes of secondary links. short-term fading with mean value normalized to one.
Based on this, the primary users' sum-interference is estimated The secondary users may estimate channel gains among
and measured at the receiving node of secondary link i as secondary links instantaneously or in an average sense, that is,
by averaging over short-term fading. If instantaneous channel
K
gains are available, the following SIR constraints
Ni = (Pk Pkugi(u), i = 1, 2, ... N. (1) Pi>Yi, i=1,2,...,N (4)
k=l
must be satisfied by the resource allocation solutions where -Yj
is the required SIR corresponding to the desired value of bit
Here, fOk C {0, 1} represents the kth primary user activity, error rate (BER)'. If only mean channel gains are available,
i,k) is the uplink channel gain from the kth primary user the locally averaged SIR ,u, at the receiving node of secondary
to the receiving node of secondary link i, and PM is the link i can be expressed as
transmission power of the kth primary user in uplink direction.
The transmit power of primary user k associated with base _ B giSi) Pi
(5)
station j', P(u), is given by Hi=Ri EN= g(S)j + Ni
9.

In this situation, the average-sense QoS requirement consid-


p(U) Pr (2) ered here should conservatively be set as
k (U)
gj,k
Pi >- Wyi. t =
1.2. ... .N (6)
assuming an equal received power Pr at the primary receiving for some a > 1. In particular, the factor needs to be a

points (i.e., base stations) due to uplink transmission from determined a priori to constrain the outage probability of
the corresponding primary users for j 1, 2,.. , M. Here, ,Ui < -Yi to a certain minimum level, denoted by d), such
(ju)is the channel gain from the kth primary user to primary that
receiving point j. We assume that the receiving node of
secondary link i can estimate/measure the sum interference Ni Pr[ pi < -.i 11-i > a-.i, Nj] < 6(s). t=1.2. ... N. (7)
and report it to the controller to perform resource allocation lFor a particular modulation and coding an explicit relationship between
in each time slot. the BER and target SIR can be found.

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on January 8, 2009 at 20:18 from IEEE Xplore. Restrictions apply.
3

Note that a proper value of ax depends on the primary user IV. SOLUTIONS OF RESOURCE ALLOCATION PROBLEM
activity factor and the fading channel statistics. Therefore, the We assume that in each time slot the primary network
value of a may need to be updated periodically. Derivation of provides its tolerable interference limit Ij to the secondary
outage probabilities in (7) can be found in [9]. central controller based on its current traffic load and other
system/design parameters. Based on the tolerable interference
B. Interference Constraints for Primary Users limit Ij and the sum interference from primary users Ni, the
secondary network controller will find an optimal solution for
Let gjP-) denote the channel gain from the transmitting node the problem stated in (11)-(13). In essence, the secondary
of secondary link i to primary receiving point j and be its network can dynamically share the spectrum with primary
mean value averaged over short-term fading. Also, let Ij be users by adapting to current traffic load in the network.
the maximum interference limit tolerable at primary receiving
point j. Then, the interference constraints can be written as
A. Design of Primary Network
N
Tb1 = Zg,I)Pi < I;, j = 1,2,...,M. First, to observe the interaction between the interference
i=l
limit Ij and the achieved SIR at the primary receiving point
j, we express the corresponding SIR as
As mentioned before, the instantaneous channel gains gjrinnay (p) B Pr
be difficult to estimate in practice. We assume that only the j 1,2,...,M
mean channel gain gjPi) can be estimated by processing the
Hi R (I+ f) ZE2i)kPr+I
pilot signal from the primary receiving point j, where the lo
1-
~~~~~~~~~~~~~~~(14)
term fading appears identical for both uplink and down]link
lng- where R is the data rate for a primary user (e.g., for voice
due to the reciprocity of the channel. With only mean chaninel service), f denotes the frequency reuse factor, and Kj is the
number of primary users served by the receiving point j with
gains, interference constraints can be set in an average se~nse M
as follows: E=l Kj = K. Let p be the primary activity factor (i.e.,
probability that a primary user is in on state). If the achieved
N SIR is controlled in an average sense for a target SIR of -7(P),
b Z gj-<) Pi /< Ij, j = 1,2,...,M (9) that is,
i=l
_ (p) _B Pr
where some Q < 1. Since the instantaneous interference H1i -R (1+ f)(Kj- l)pPr+ Ij > S (P) (15)
level Tbj E gj P)P, may exceed the tolerable limit 1j,
=

for some i > 1 (, is a design parameter similar to a in (6)).


and therefore, violate the absolute interference constraint, i.e.,
Klj< Ij, we define a constraint on the violation probability as Then the tolerable interference limit is obtained as
follows: B Pr
T
= I + f ) (Kj- )pPr* (16)
Pr [ T13 > T/i < 1313 ] < 611) .
13 j = 1,2,...,M (10)
Here, we need to find Ij and , such that the probability of
where 0(I) denotes the maximum interference violation prob- violation of SIR requirements for the primary users remains
ability allowed for primary receiving points. These violation below an outage probability threshold. Specifically, given
probabilities are derived in [9]. Ij, the value of i can be found by evaluating the outage
probability as
C. Problem Formulation
0 Pr [ [Li < ) Ij() ], j = 1,2,...,M
To obtain a fair resource allocation for secondary users iS (Kp) p1(
subject to constraints described before, we will solve the
following optimization problem: n=O
A+-n+1]
p)Kj-n u[()
N (17)
max E1n(R)
{Pi,Ri}Ii1
(1 1) where u[n] = 1 for n > O and zero otherwise, Ij (1) as given
subject to constraints in (4) or (6) and (9) in (16) and A(K) is
Rmin <Ri <RmX il
O P< pma i N
N (12)
(13)
...
A (K) --
B
R
I
(I + f ),.,(P)
I
I

K
+ p (Kj 1)j
where the objective function E7= 1n(Ri) provides the well- where Lxi denotes the integer part of x.
known proportional fair solutions [10] of data rates for differ- Specifically, we will search for the value of i such that
ent secondary links. Note that either QoS constraints stated in Pout < a(P) (18)
(4) or (6) are used depending on whether secondary users can
estimate instantaneous and mean channel gains to/from one where the outage probability is given in (17). Again, the
another. detailed analysis is available in [9].

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on January 8, 2009 at 20:18 from IEEE Xplore. Restrictions apply.
4

B. Joint Admission Control, Rate/Power Allocation where Aa and Af3 are small adjustment values.
Given the value of Ij which is calculated in (16), we can 5. Return to step 2.
design both primary and secondary networks as follows:
Note that in (21), if instantaneous channel gains g(s) can
Algorithm 1: Joint design of primary and secondary be estimated by secondary users, we use constraints ,ui >
networks otherwise, if only mean channel gains -(s) are available, we
1. Assuming that the values of R and p for the primary users use constraints ,ui > aEYi. For the case where instantaneous
are given, using (16)-(18), the primary network can calculate channel gains gj,i can be estimated, we only need to search
the values of Ij and such that the SIR requirements of for conservative factor Q (i.e., a = 1). Otherwise, if only mean
primary users are violated with a probability smaller than the channel gains g(S) are available, we have to search for both
outage probability threshold dP. conservative factors a and 3. The optimization problem in
2. Given Ij calculated in step 1, the secondary network (19)-(23) can be converted into a geometric convex program
controller finds the joint admission control and rate/power [3], [11] whose optimal solution can be calculated by any
allocation for the problem in (11)-(13). standard algorithms.
Now, we consider the admission control problem to ensure
In step 2 of the above algorithm, due to the minimum rate minimum rate requirements for secondary links. We propose
requirements for secondary links, the rate/power allocation the following two algorithms to perform joint admission
problem may not be feasible. Hence, admission control should control, and rate/power allocation.
be jointly performed with rate/power allocation to push the
network into feasible region. To decompose the admission Algorithm 3: One-step removal algorithm
control from the rate/power allocation problem, we remove the 1. Using Algorithm 2, solve the rate/power allocation problem
minimum rate requirements and solve the rate/power allocation without minimum requirements.
problem first (i.e., constraints in (12) become Ri < Rmax 2. Perform admission control using rate/power allocation solu-
without the lower bound). tion in step 1 as follows. For each secondary link i, compare
To obtain rate/power allocation solutions, we need to deter- optimal rate R* with minimum rate Rm'. We remove all
mine conservative factors a and Q such that SIR and inter- secondary links with R* < Rmin.
ference constraints are only violated with desired probabilities 3. Solve the rate/power allocation problem again for the
(i.e., these values are specified by d 0(I)). Unfortunately, remaining set of secondary links (i.e., secondary links for
violation probabilities of SIR and interference constraints which the minimum rate requirements are satisfied) using
presented in Propositions 1 and 2 depend on the rate and power Algorithm 2.
vectors which are the solutions of the resource allocation
problem. Due to the coupling of the design parameters, we Algorithm 4: One-by-one removal algorithm
propose the following iterative algorithm to find the conserva- 1. Solve the rate/power allocation problem without minimum
tive factors and resource allocation solutions. requirements using Algorithm 2.
Algorithm 2: Joint rate and power allocation with desired 2. Remove at most one worst secondary link using rate/power
constraint violation probabilities allocation solution in step 1 as follows. If the optimal solution
in step 1 is such that all secondary links achieve their minimum
1. Initialize a = 1, Q = 1. rates, finish. Otherwise, remove one link with the smallest rate
2. Solve the joint rate and power allocation problem with the (i.e., remove link i = argmin {R* })R
current values of a and Q as follows:
3. Solve the rate/power allocation problem again for the
N remaining set of secondary links and go to step 2.
max
{Pi,RT}E
Zln(Ri) (19)
Algorithm 3 is fast because we remove "violated links" in
subject to only one step. For algorithm 4, we have to perform rate/power
N allocation (using Algorithm 2) N times in the worst case.
S
i=l
pgj.)P < 3Ijj, 1,2,... ,M (20)
Hi > Yi orHi > aY,
i= 1, 2,...,N (21) C. Throughput Performance
R<RR , i=1,...,N (22) Now, the sum of the transmission rates of the primary users
O < P < pmax, i (23) R(P) can be calculated as
3. Calculate the violation probabilities for SIR and interference M Kj
constraints and check whether they are smaller than the desired R(P) (r;) = R 55 [jP) >
n Pr <P), n out of Kj is active]
values in (7) and (10). If yes, finish; otherwise go to step 4. j=l n=l
4. Adjust the conservative factors as follows:
a a+ Aa if any constraints in (7) are violated RI: n ( n pn (I _-p)Kj nU A(1) _n+1].
/3 - AQ if any constraints in (10) are violated (24)

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on January 8, 2009 at 20:18 from IEEE Xplore. Restrictions apply.
5

Therefore, the total transmission rate achieved by both primary a little bit higher throughput than the one-step removal algo-
and secondary users can be written as rithm. Recall that one-step removal algorithm needs to run
Algorithm 2 at most two times while the one-by-one removal
algorithm may incur much higher computational complexity.
R,n,(K, fR*j)
i RI: n=l
1jn j=l
n )pn(i Also, the secondary throughput with instantaneous channel
N gains g s,) among secondary users is significantly larger than
xu [A(K) -n + 1] + R (25) that with mean channel gains gS,). Note, however, that in
order to achieve high throughput, channel gains gjs) should
where R* is the solution of the joint admission control and be estimated as fast as fading rate which is quite challenging
rate/power allocation problem in Section IV.B. Note that in practice.
traffic load of the primary network will change the tolerable We show throughput of the secondary network versus the
interference limit Ij in (16) which in turn affects throughput number of secondary links in Fig. 3. Again, it is observed
of the secondary network. that both of the admission control algorithms 3 and 4 achieve
similar performance in terms of throughput. Moreover, for the
V. PERFORMANCE EVALUATION case with instantaneous channel gains, the secondary through-
We present illustrative numerical results for the proposed put continues to increase while it saturates at 12 requesting
resource allocation model. We consider a 3-cell scenario where
secondary links when only mean channel gains are available.
in each cell K/M primary users are randomly located as in Also, with 6 requesting secondary links, throughput of the
Fig. 1. In each time slot, locations of N/M secondary users are secondary network for the case of instantaneous channel gains
generated randomly in each cell. The corresponding receivers is less than two times that with mean channel gains. However,
are generated randomly within a distance of R,/2 from the
the performance gap in terms of throughput is more than two
transmitters where RC is the radius of each cell. times with 15 requesting secondary links.
The value of received power for primary users Pr is We plot throughput of the secondary network versus the
calculated as Pr = 1016 10RNo, where this received power voice activity factor p in Fig. 4 and total throughput of both
value Pr achieves the signal-to-noise ratio (SNR) of 16 dB primary and secondary networks versus p in Fig. 5 under our
at the BS. With required SIR for primary users -y(P) = 6 dB, proposed approach and worst case design where all primary
we can calculate the interference limit Ij assuming that the users are treated as being always active. These figures show
Gaussian noise is negligible. Other parameters are as follows: that our adaptive approach, in which the dynamics of Ni
B = 3.75 MHz, path loss exponent = 4, standard deviation for is tracked, achieves much higher throughput than that under
shadowing = 6 dB, No = 2 x 10-12 W/Hz, R = Rmin = 9.6 the worst case design. Moreover, while throughput of the
Kbps, Rmax = B'PG (where PG is the minimum processing secondary network decreases, the total throughput of both
gain), pmax = 1W, 6(P) = 0.001, (s) = ) = 0.01 or 0.005, networks tends to increase when the voice activity of primary
frequency reuse factor f = 0.5, radius of a cell R, = 100 m. users increases.
The adjustment values for conservative factors in algorithm
2 are chosen to be Aa = 2, AQ = 0.05. All performance VI. CONCLUSION
measures are obtained by averaging over 100 simulation runs.
Except for the results in Figs. 4, 5, the voice activity p = 3/8 We have proposed a framework for resource allocation
is used to obtain results in all other figures. between primary and secondary networks for dynamic spec-
We investigate the throughput performance of the joint trum sharing. Joint admission control and rate/power allocation
admission control, rate/power allocation algorithms presented schemes have been developed where the interference limits at
in Section IV. Specifically, we will compare the throughput primary receiving points are adapted depending on traffic load
performance of two admission control algorithms: one-step of the primary network. We have derived outage probability for
removal and one-by-one removal algorithms. We will inves- SIR constraints and violation probability for interference con-
tigate throughput performance under two cases where either straints considering fading dynamics of the wireless channel.
instantaneous channel gains g(s) or mean channel gains g(S) Then, we have proposed a solution approach for the resource
among secondary users are available (denoted as instantaneous allocation problem. Numerical results have shown the efficacy
gains and average gains in all figures). Recall that if instan- of the proposed framework and revealed several interesting
taneous channel gains g(s) are available, instantaneous SIR aspects of the resource allocation solutions.
constraints for secondary links in (4) will be satisfied, and it
is only required to search for the conservative factor Q.
REFERENCES
In Fig. 2, we show the throughput performance of the
secondary network versus minimum processing gain under [1] E. Hossain and V. K. Bhargava, Cognitive Wireless Communication
Networks, (edited volume), ISBN: 978-0-387-68830-5, Springer, 2007.
two admission control algorithms. As expected, throughput of [2] L. Le and E. Hossain, "OSA-MAC: A MAC protocol for opportunistic
the secondary network decreases when minimum processing spectrum access in cognitive radio networks," in Proc. IEEE WCNC'08,
gain increases. This is because maximum data rates decrease Mar. 2008.
[3] L. Le and E. Hossain, "Resource allocation for spectrum underlay in
when minimum processing gain increases. However, it is quite cognitive radio networks," IEEE Transactions on Wireless Communica-
surprising that the one-by-one removal algorithm only achieves tions, to appear.

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on January 8, 2009 at 20:18 from IEEE Xplore. Restrictions apply.
6

[4] C. Cordeiro, M. Ghosh, D. Cavalcanti, and K. Challapali, "Spectrum 900


sensing for dynamic spectrum access of TV bands," in Proc. Second In- One-by-one removal, instantaneous gains
ternational Conference on Cognitive Radio Oriented Wireless Networks One-step removal, instantaneous gains
800 One-by-one removal, average gains
and Communications (CrownCom'07), Orlando, FL, USA, July 31-Aug. - One-step removal, average gains
3. 700-
[5] D. Niyato and E. Hossain, "A game-theoretic approach to competitive
spectrum sharing in cognitive radio networks," in Proc. IEEE WCNC'07, -600-
Mar. 2007.
[6] D. Niyato and E. Hossain, "Equilibrium and disequilibrium pricing for 2 500-
spectrum trading in cognitive radio: A control-theoretic approach," in 400-
Proc. IEEE Globecom'2007, Washington, D.C., USA, 26-30 Nov. 2007.
[7] S. Srinivasa and S. A. Jafar, "Cognitive radio networks: How much U) 300'
spectrum sharing is optimal," in Proc. IEEE Globecom'07, Washington,
D.C., USA, 26-30 Nov. 2007. 200
[8] Y. Xing, C. N. Mathur, M. A. Haleem, R. Chandramouli, and K. P. Sub-
balakshmi, "Dynamic spectrum access with QoS and interference tem- inn-
6 7 8 9 10 11 12 13 14 15
perature constraints," IEEE Trans. Mobile Comp., vol. 6, no. 4, pp. 423- Number of secondary links
433, April 2007.
[9] D. I. Kim, L. Le, and E. Hossain, "Joint rate and power allocation
for cognitive radios in dynamic spectrum access environment," IEEE Fig. 3. Throughput of the secondary network versus the number of secondary
Transactions on Wireless Communications, submitted. links (K = 30, minimum processing gain PG = 50).
[10] F. P. Kelly, A. Maulloo, and D. Tan, "Rate control for communication
networks: Shadow prices, proportional fairness, and stability," J. Oper.
Res. Soc. vol. 49, no. 3, pp. 237-252, Mar. 1998.
[11] S. Boyd and L. Vandenberge, Convex Optimization, Cambridge Univer-
sity Press, 2004.

600
- Proposed approach
550ik, - Worst-case design

500

-0 450

m 400

2 350
2
300( F
au 250
200

150
100
0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Activity factor p

Fig. 4. Throughput of the secondary network versus the voice activity factor
p (for one-step removal scheme, instantaneous channel gains g(s), N = 9, K
= 60, minimum processing gain PG = 50).
D Primary user * Secondary user -* Communication link -> nterference

Fig. 1. System model with three cells.

1000
One-by-one removal, instanteneous gains
900 One-step removal, instanteneous gains 700 r
One-by-one removal, average gains Proposed approach
800 * One-step removal, average gains Worst-case design
_ 650
u)

-0 700
600

m 600
550
2
2 500 e
2
2 400 500

a'
I)
300 450

2 400
E

350Y

20 30 40 50 60 70 80 90 100
Minimum processing gain 300
r\1
0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Activity factor p

Fig. 2. Throughput of the secondary network versus the minimum processing


gain (K = 30, N = 9). Fig. 5. Total throughput of primary and secondary networks versus the voice
activity factor p (for one-step removal scheme, instantaneous channel gains
9('), N = 9, K = 60, minimum processing gain PG = 50).

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on January 8, 2009 at 20:18 from IEEE Xplore. Restrictions apply.

You might also like