21. beacon-assisted spectrum access with cooperative cognitive transmitter and receiver
TRANSCRIPT
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
1/15
Beacon-Assisted SpectrumAccess with Cooperative Cognitive
Transmitter and ReceiverAli Tajer, Student Member, IEEE, and Xiaodong Wang, Fellow, IEEE
AbstractSpectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the
legacy systems. In this paper, we propose novel cooperative communication models and show how deploying such cooperations
between a pair of secondary transmitter and receiver assists them in identifying spectrum opportunities more reliably. These
cooperations are facilitated by dynamicallyand opportunistically assigning one of the secondary users as a relay to assist the other
one, which results in more efficient spectrum hole detection. Also, we investigate the impact of erroneous detection of spectrum holes
and thereof missing communication opportunities on the capacity of the secondary channel. The capacity of the secondary users with
interference-avoiding spectrum access is affected by 1) how effectively the availability of vacant spectrum is sensed by the secondary
transmitter-receiver pair, and 2) how correlated are the perceptions of the secondary ransmitter-receiver pair about network spectral
activity. We show that both factors are improved by using the proposed cooperative protocols. One of the proposed protocols requires
explicit information exchange in the network. Such information exchange in practice is prone to wireless channel errors (i.e., is
imperfect) and costs bandwidth loss. We analyze the effects of such imperfect information exchange on the capacity as well as theeffect of bandwidth cost on the achievable throughput. The protocols are also extended to multiuser secondary networks.
Index TermsCognitive radio, spectrum access, cooperative diversity, opportunistic communication, channel capacity.
1 INTRODUCTION
COGNITIVE radios have been introduced as a potentialsolution for alleviating the scarcity of frequency spec-trum in overly crowded environments [1], [2], [3], [4].According to the Federal Communication Commission(FCC), a vast portion of the frequency bands is used onlysporadically and furthermore, the usage varies geographi-cally and temporally. Such inefficient utilization of spectrum,as well as the increasing demand for frequency bands by theexisting and emerging wireless applications, motivatesopportunistic access to licensed bands by unlicensed(secondary) users. The notion of cognitive radios makes itpossible to accommodate self-configuring ad hoc linkswithin currently established wireless communication infra-structures. For accessing vacant spectrum bands assigned tolicensed users, the secondary userscontinuously and activelymonitor the spectrum in order to efficiently make use of thespectrum hole while avoiding interference with licensedusers (interference-avoiding [5] or interweave paradigm [6])or having controlled level of interference temperature(interference-controlled [5] or underlay paradigm [6]).
Related studies on spectrum access can be broadlycategorized as those proposing efficient methods forlocating the holes in the spectrum [7], [8], [9] and thosediscussing how to optimally allocate the available unusedfrequency bands to secondary users [10], [11], [12], [13]. Theworks in the former category aim at improving the
delectability of the unused portions of spectrum by usingphysical layer techniques, while those in the latter one,develop media access control (MAC) protocols seeking tomaximize secondary users network throughput. Thechannel access protocols we propose in this paper fallwithin the first category mentioned above. These protocols
allow the secondary transmitter and receiver to coopera-tively listen to the primary user instead of havingindependent observations.
The gains yielded for the detection of unused spectrumare due to the diversity gains introduced by the coopera-tion. The increase in the channel capacity is also partly dueto the same diversity gain, but is mostly shaped by reducingthe uncertainty at the secondary transmitter and receivernodes about each others observation of the spectralactivity, which is a by-product of the cooperation betweenthem. As discussed in [14], discrepancy in spectral activityawareness at the secondary transmitter and receiver, whichis due to their spatial separation and/or imperfect channelsensing, incurs a loss in channel capacity.
The underlying idea of the cooperation models devel-oped is to have a one-time broadcast of a beacon messageand a one-time relaying of this message by one of thesecondary users such that both enjoy a second-orderdiversity gain in detecting the beacon message. This beaconmessage is a codeword within the codebook of the primaryuser, reserved specifically for the purpose of informing thesecondary users of the vacant channel.
Besides seeking spectrum opportunities and utilizingthem, another major function of secondary users is todetect the return of primary users and agilely vacate thechannel. The idea of deploying cooperative diversityschemes and their merits in detecting the return of theprimary users has also been investigated as an independent
problem in [15], [16], [17].
112 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
. The authors are with the Department of Electrical Engineering, ColumbiaUniversity, New York, NY 10027. E-mail: {tajer, wangx}@ee.columbia.edu.
Manuscript received 2 Oct. 2008; revised 3 Mar. 2009; accepted 6 May 2009;published online 27 May 2009.For information on obtaining reprints of this article, please send e-mail to:[email protected], and reference IEEECS Log Number TMC-2008-10-0393.
Digital Object Identifier no. 10.1109/TMC.2009.103.1536-1233/10/$26.00 2010 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
2/15
2 SYSTEM DESCRIPTIONS
We consider a primary transmitter Tp and a pair ofsecondary transmitter Tt and receiver Tr users. Thesecondary users continuously monitor the channel used bythe primary user, seeking an opportunity to take it overwhen it is unused. We assume that all channels between theprimary user and the secondary users and those between the
secondary users are quasi-static wireless flat fading channelswhich remain unchanged during the transmission of a blockof symbols and change to independent states afterwards.
We denote the channels between the primary user andthe secondary transmitter and receiver by p;t and p;r,respectively. The channel between the secondary nodes aredenoted by t;r and r;t. The physical channel between nodesi 2 fp; t; rg and j 2 ft; rg has an instantaneous realization
i;j ffiffiffiffiffiffiffi
i;jp hi;j; 1
where fading coefficients hi;j are assumed to be independent,circularly symmetric complex Gaussian random variablesCN 0; 1. The term i;j accounts for path loss and shadowingand is given by i;j Si;jd
i;j , where Si;j represents the log-normal shadowing effect, di;j is the physical distancebetween nodes i and j, and > 0 is the path loss exponent.
In [7], it is shown that compared with energy detectionmethods, the detection of vacant spectrum can be signifi-cantly improved through transmitting pilot signals by theprimary user and deploying coherent detection at thesecondary users. Motivated by this fact, in this paper weassume that whenever a channel is released by the primaryuser, it is announced to the secondary users by having theprimary user broadcast a beacon message. It is noteworthythat as eventuallywe areevaluating thenetworkthroughput,it is valid to assume that the secondary users are alwayswilling to access the channel and are continuously monitor-
ing the channel for the beacon message by the primary user.We consider Nconsecutive channel uses for the transmis-
sion of the beacon message. The beacon message, sent by theprimary user, is denoted by xxb xb1; . . . ; xbNT, and thereceived signals by the secondary transmitter and receiverare denoted by yyt yt1; . . . ; ytNT and yyr yr1; . . . ;yrNT, respectively. For the direct transmission from theprimary user to the secondary users, as the baseline in ourcomparisons, we have
ytn p;txbn ztn; 2and yrn p;rxbn zrn; n 1 . . . ; N; 3
where zzt and zzr denote the zero mean additive white
Gaussian noise terms with variance N0. Also we assume thatall transmitted signals have the same average power, i.e.,IEjxxbj2 Pp, and denote 4 PpN0 as the SNR without fading,pathloss, and shadowing. Therefore, the instantaneous SNRis given by
SNRi;j i;j jhi;jj2: 4Throughout the paper we say that two functions fx andgx are exponentially equal, denoted by fx : gx if
limx1
log fxlog gx 1:
The ordering operators_
and_
! are defined accordingly.
3 COOPERATION PROTOCOLS
We assume that the secondary users are informed of thevacancy of the channels by having the primary userbroadcast a beacon message a priori known to the secondaryusers. The beacon message is a reserved codeword in thecodebook of the primary user and is dedicated to announ-cing the availability of the channel for being accessed by thesecondary users. We intend to devise a cooperation modelsuch that both secondary transmitter and receiver decode thebeacon message with a second-order diversity gain.
Cooperative diversity has been studied and developedextensively as a means for making communication overwireless links more reliable [18], [19], [20], [21]. Incooperative communication, a point-to-point link is assistedby an intermediate node (relay) aiming at providing theintended receiver by additional diversity gains while theoverall resources (frequency bandwidth and power) remainunchanged compared to the noncooperative schemes.
In this paper, we first develop a novel cooperation modelappropriate for multicast transmissions and then show how
to adopt it for building cooperative spectrum accessschemes. Unlike the conventional three node cooperativemodels where the objective is to achieve a second-orderdiversity gain at only the intended receiver, we considerbroadcasting the same message to two receivers such thatboth enjoy second-order diversity gains and yet use the sameamount of resources. This cooperation scheme is a combina-tion of opportunistic relay assignment and bit forwarding.While this protocol, like most other existing cooperationmodels, guarantees performance enhancement in only highenough SNR regimes, we further modify this protocol suchthat it exerts cooperation only if it is beneficial. Thismodified protocol, compared to the noncooperative trans-mission, will ensure performance improvement over all
SNR regimes and all channel realizations.
3.1 Cooperative Spectrum Access (CSA)
Assume that the beacon message consists of K informa-tion bits and N K parity bits giving rise to the codingrate KN and requires N channel uses in a noncooperativetransmission. We utilize the regenerative scheme of [21]and divide the beacon message into the smaller segmentsof lengths K N1 < N and N2 4 N N1, and define thelevel of cooperation as 4 N1N . The transmission of thebeacon message is accomplished in two steps:
1. The primary user uses only the first N1 channel uses(as opposed to noncooperative that uses all the
N channel uses) to broadcast a reserved codebook inits codebook (xx0b) when it is willing to release thechannel. This reserved codeword is a weaker code-word compared to the original beacon. Meanwhile,the secondary transmitter and receiver try to decodethe first segment.
2. During the remaining N N1 channel uses, anysecondary user who has successfully decoded thefirst segment, immediately constructs N2 additionalextra bits and forwards them to the other secondaryuser. If both happen to decode successfully, bothwill try to transmit in the second phase and theirtransmissions collide. Such collision is insignificant
and incurs no loss as it only happens when both
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 113
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
3/15
secondary users have already successfully decodedthe beacon. If neither of the secondary users issuccessful in decoding the first segment of thebeacon message, there will be no transmission in thesecond phase and hence 1 portion of the timeslot is wasted. Despite such possible waste, asanalyses reveal, by cooperation a better overall
performance can be achieved. As shown in Section 4,the combination of opportunistic relay assignmentand bit forwarding uses essentially the same amountof resources (power and bandwidth) as in thenoncooperative approach, and yet provides a sec-ond-order diversity gain for both secondary users,whereas if one of the nodes is selected a priori andindependently of the channel conditions, this nodewill achieve only a first-order diversity gain.
It is also noteworthy that the CSA protocol can be extended
beyond the scope of cognitive networks and can be adopted
in any application in which a message is intended to be
multicast to several nodes.
3.2 Opportunistic Cooperative Spectrum Access(OCSA)
Attaining a higher diversity order, which is a high SNRmeasure, regime does not necessarily guarantee perfor-mance enhancement in the low or even moderate SNRregimes. For instance, when either the source-relay or the
relay-destination link is very weak, cooperation may not be
beneficial. When exchanging certain information between
the primary and the secondary users is possible, we canovercome this problem by modifying the CSA protocol
such that cooperation is deployed only when deemed
beneficial. Therefore, the protocol becomes opportunistic in
the sense it dynamically decides whether to allow coopera-tion or not. The cost of this improvement is that the primary
and the secondary users need to acquire the quality of theiroutgoing channels. Acquiring such channel gains is not
necessarily feasible in all networks, but those capable of it
can benefit from deploying the OCSA protocol instead of
the CSA protocol. The discussions on how the required
information exchange should take place are provided inSection 6.1. The cooperation is carried out in two steps:
1. The first step is similar to that of the CSA protocol.2. All the three nodes (the primary user and the pair of
secondary transmitter-receiver) step in a competition
for broadcasting additionalpartybits for xx0b during thenext N2 channel uses. Thecompetitionis carried outasfollows: We first assign the metrics tp 4 jp;tj2 jp;rj2,tt 4 jp;tj2 jt;rj2, and tr 4 jp;rj2 jr;tj2 to theprimaryuser, the secondary transmitter, and the secondaryreceiver, respectively. Then the N2 channel uses is
allocated to
a. the secondary transmitter if it successfullydecodes xx0b and tt > maxftp; trg,
b. the secondary receiver if it successfully decodesxx0b and tr > maxftp; ttg, and
c. to theprimary transmitter ifeither tp > maxftt; trgor both secondary users fail to decode xx0
b
.
As shown in the next sections, including the primarytransmitter in the competition has the advantage of guaran-teeing that cooperation is deployed only when it is helpful.
A simple technique for identifying the winner in thesecond phase in a distributed way (without having a centralcontroller) is to equip each primary and secondary userwith a backoff timer, with its initial value set inversely
proportional to its corresponding metric t. Therefore, thetimer of the user with the largest metric t goes off soonerand will start relaying. The idea of encoding the backofftimer by channel gain has also been used in [22], [23].
In multiuser primary networks, the central authority ofthe network responsible for spectrum coordinations shouldbe in charge of transmitting the beacon message. The reasonis that individual users are not fully aware of the networkspectral activity and if they act independently, there existsthe possibility that some user mistakenly announces that aspectrum is vacant while some other primary user isutilizing it. Such strategy will also avoid having multipleprimary users transmit beacon messages concurrently, in
which case these messages collide and are lost.
4 DIVERSITY ANALYSIS
In this section, we characterize the performance of theproposed protocols in terms of the probability of erroneousdetection of the beacon message, which we denote by Pe,at the signal-to-noise ratio . The achievable diversity gainwhich measures how rapidly the error probability decayswith increasing SNR is given by
diversity order lim1
log Pelog
:
4.1 Noncooperative Scheme
As a baseline for performance comparisons, we firstconsider the direct transmission (noncooperative) by theprimary user over the channels given by (2) and (3). Wedenote the events that the secondary transmitter andreceiver do not decode the beacon message successfullyby et and er, respectively. For a coded transmission withcoherent detection, the pairwise error probability (PEP) thatthe secondary transmitter erroneously detects the beaconcodeword cc in favor of the codeword cc for the channelrealization p;t is given by [24, (12.13)]
Pet j p;t 4 Prcc cc j p;t Q ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi2djp;tj2q ; 5where d is the Hamming distance between cc and cc.Throughout the diversity order analyses, we will frequentlyuse the following two results:
Remark 1. For a real value a > 0 and the random variableu > 0 with probability density function fUu, we have
IEuQffiffiffiffiffiffiau
p Z1
0
Z1ffiffiffiffiau
p1ffiffiffiffiffiffi2
p ev2=2dv fUu du
Z1
0
Pr u v2
a
1
ffiffiffiffiffiffi2
p ev2 =2 dv:6
114 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
4/15
Lemma 1. For integer M > 0 and real ki > 0,Z10
YMi1
1 ekiv2= 1ffiffiffiffiffiffi
2p ev2=2 dv : M: 7
Proof. See Appendix A. tu
As a result, from (5), (6), and (7) we can show that fornoncooperative transmission, we have
PNC et IEp;t Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi
2djp;tj2q !
1;
and PNC er 1.4.2 CSA Protocol
The transmissions are accomplished in N N1 N2 con-secutive channel uses, where N1 uses is for the direct
transmission, and N2 uses for the cooperation phase. We
denote d1 and d2 as the Hamming distances of the codewords
sent in the first and second phase, and we have d1
d2
d.
In the case only one node is successful in the first phase, we
denote it by TR 2 fTt; Trg and also define TR 4 fTt; TrgnTR.Therefore, we get
PC e R j p; R; R; R Qffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffi
2d1jp; Rj2 2d2jR; Rj2q
; 8
and for the case that there is no relaying, we have
PC et j p;t Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffi
2d1jp;tj2q
; 9
and PC er j p;r Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffi
2d1jp;rj2q
: 10
Theorem 1. For sufficiently large SNR values, we have
PC et: PC er: 12 , PC et< PNC et, and PC er< PNC er.Proof. We denote the success and failure of the secondary
transmitter in the first phase by Tt : S and Tt : F,respectively. We also define Tr : Sand Tr : F similarly.By using (8)-(10) and by expansion over all differentcombinations of the statuses of the secondary users, forthe secondary transmitter we get
PC et PC et j Tt : S; Tr : S
|fflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflffl}0PTt : S; Tr : S
PC et j Tt : S; Tr : F|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflffl}0
PTt : S; Tr : F
PC et j Tt : F; Tr : SPTt : F; Tr : S PC et j Tt : F; Tr : F|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflffl}
1
PTt : F; Tr : F
11
Q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2d1jp;tj2 2d2jr;tj2q
Q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2d1jp;tj2q
1 Q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2d1jp;rj2q
Q
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi2d1jp;tj2
q
Q
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi2d1jp;rj2
q 12
Z1
0
P
d1jp;tj2 d2jr;tj2 v
2
2
|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflffl}
P
d1jp;tj2v22
P
d1jp;rj2v22
ev2=2ffiffiffiffiffiffi
2p dv
Z1
0
P
d1jp;tj2 v
2
2
ev
2=2
ffiffiffiffiffiffi2
p dv
1 Z10
Pd1jp;rj2 v22 ev2 =2ffiffiffiffiffiffi2p dv" #
Z1
0
P
d1jp;tj2 v
2
2
ev
2=2ffiffiffiffiffiffi2
p dv
Z1
0
P
d1jp;rj2 v
2
2
ev
2=2ffiffiffiffiffiffi2
p dv
13
Z1
0
1 e v
2
2d1p;t
1 e v2
2d1p;r ev2=2ffiffiffiffiffiffi
2p dv|fflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflffl fflfflfflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflffl fflfflfflffl}
: 12
from Lemma 1 and Remark 1
Z1
0 1 ev2
2d1p;t ev2=2
ffiffiffiffiffiffi2p dv|fflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflffl}: 1 from Lemma 1 and Remark 1
Z1
0
1 e v
2
2d1p;t ev2=2ffiffiffiffiffiffi
2p dv|fflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflffl}
: 1 from Lemma 1 and Remark 1
Z1
0
1 e v
2
2d1p;r ev2=2ffiffiffiffiffiffi
2p dv|fflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflffl{zfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflffl}
: 1 from Lemma 1 and Remark 1
: 12
13
: 12
;
where the transition from (12) to (13) follows fromRemark 1. Now, by comparing to the noncooperative
case, where we have PNC et
: 1 , we conclude that for
sufficiently large SNR, PC et < PNC et. The same lineof argument holds for the secondary receiver. tuThe CSA protocol ensures that for sufficiently high SNR
values, the probability of detecting unused spectrum holesis boosted. However, the performance in the low SNRregimes depends on the instantaneous channel conditionsand it might happen that noncooperative spectrum accessoutperforms the cooperative scheme.
4.3 OCSA Protocol
Like in the CSA protocol, the first N1 channel uses areallocated for direct transmission from the primary user tothe secondary users. During the remaining time, dependingon the instantaneous channel conditions, the primary usermight transmit the additional parity bits itself or one of thesecondary users might take over such transmission. Wedenote the transmitting user in the second phase byTR 2 fTp; Tt; Trg. Therefore, the transmission in the secondphase is given by
ytn R;txRn ztn; if TR 6 Tt;0; if TR Tt;
&and yrn
R;rxRn zrn; if TR 6 Tr;0; if TR Tr:
&As specified by the protocol, if neither of the secondary
users decodes the beacon message successfully, the primary
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 115
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
5/15
user will transmit the additional parity bits itself. In thiscase, transmission of the beacon message is similar to (2)-(3)for the entire channel uses.
Theorem 2. For all values ofSNR, channel realizations and level
of cooperation, we have POC et < PNC et, POC er tp, which
provides that jr;tj > jp;tj. Therefore, from (14) we getPOC et
IEp;t Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi
2d1jp;tj2 2d2jp;tj2q !
POC TR Tp
IEp;t;r;t Q ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi2d1jp;tj2 2d2jr;tj2q ! POC TR Tr
< IEp;t Q
ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi2djp;tj2
q ! POC TR Tp POC TR Tr < PNC et:
15
d1 and d2 are the Hamming distances of the codewords
sent in the first and second phase, and we have
d1 d2 d. By following the same line of argument,we can accordingly show that POC er < PNC er. Inorder to assess the diversity gain, note that
POC et POC et j Tt : FPTt : F POC et j Tt : S|fflfflfflfflfflfflfflfflfflffl fflffl{zfflfflfflfflfflfflfflfflffl fflfflffl}
0
PTt : S: 16
On the other hand,
POC et j Tt : F POC et j Tt : F; Tr : FPTr : F
POC et j Tt : F; Tr : SPTr : S PTr : F POC et j Tt : F; Tr : S
IEp;tQ ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi2d1jp;rj2
q ! IEp;t
Q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2djp;rj2q !
: 1
1: 1
:
17
Recalling that PTt : F : 1 and using (16)-(17) pro-vides that POC et : 12 . A similar argument holds forPOC er. tuNumerical evaluations of the probabilities of erroneous
spectrum hole detection in different schemes are providedin Fig. 1. These error probabilities for the noncooperative,the CSA, and the OCSA protocols are provided in (5), (13),
and (15), respectively. This figure compares the detection
performance of the proposed cooperative schemes with
that of the noncooperative scheme, where it demonstratesthat the CSA and the OCSA protocols achieve a second-order diversity gain. As expected theoretically, at low SNRregimes the CSA protocol might not outperform thenoncooperative scheme, whereas the OCSA protocol out-performs the noncooperative scheme over all SNR re-gimes. In the evaluations above, we have set 0:5 andhave considered channel realizations with parametersp;t; p;r; t;r 1; 2; 3. In Fig. 1, the error probability ofthe user Ti for i 2 ft; rg in the CSA and OCSA protocols isidentified by CSA-Ti and OCSA-Ti, respectively.
4.4 False Alarm
Thus far we have examined the improvements attained indetecting the vacant spectrum holes. In such detectionproblems, however, another aspect that should also betaken into consideration is the false alarm probability. Inour proposed spectrum access models, false alarm is theevent that the secondary users erroneously consider aspectrum band to be idle, i.e., they detect the beaconmessage while the channel is still used by the primary user.This leads to concurrent transmissions by the primary andsecondary users which can potentially harm the transmis-sion of the primary user. Due to stringent constraints onavoiding concurrent transmissions, it is imperative to studythe probability of false alarm as well.
For most detection problems, there exists a tension
between the probability of successful detection and theprobability of false alarm, and it is crucial to maintain agood balance between these two probabilities such thatneither of them is sacrificed in favor of the other one.
In this paper, we have translated a detection probleminto a communication problem rested on the basis ofexchanging a beacon message. Therefore, assessing theprobability of erroneously decoding a nonbeacon messagein favor of the beacon message has the same nature as thatof missing a transmitted beacon and both are quantified interms of decoding errors. More specifically, the probabilitythat for a channel realization p;t, a nonbeacon codeword ccis mistakenly decoded as the beacon message denoted by cc
(which is the false alarm probability), is given by
116 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
Fig. 1. Detection error probabilities and diversity gains of noncoopera-tive, CSA, and OCSA schemes.
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
6/15
P0et j p;t 4 Prcc cc j p;t Q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2djp;tj2q
; 18
which is equal to the probability in (5). Therefore, byfollowing the same lines as in Sections 4.2 and 4.3, it is seenthat the proposed cooperation models will also improve theprobability of false alarm which diminishes as fast as theprobability of missing the beacon, enjoying a second-orderdiversity gains.
As a result, deploying the proposed cooperation schemesnot only incurs no loss in the probability of false alarm, butalso improves it. Hence, by translating the detectionproblem into a communication problem, the tensionbetween the two aforementioned probabilities is resolvedand they can be improved simultaneously.
5 CAPACITY ANALYSIS
In this section, we analyze the effect of erroneous detectionof unused channel and thereof missing communicationopportunities on the capacity of the secondary users and
will show how exploiting the proposed cooperative diver-sity protocols enhances the capacity. In the OCSA protocol,each user requires to know the gains of its outgoing channelsto the other users. Acquiring such channel gains requiresinformation exchange over the wireless channel. Therefore,the acquired channel gain estimates are not perfect inpractice, which can affect the capacity. In this section, weassume that all channel estimates for the OCSA protocol areperfect and defer analyzing the effect of estimationinaccuracy on the channel capacity to Section 6.2.
For fading channels, there is always a nonzero prob-ability that a target rate R cannot be supported and there isno meaningful notion of capacity as a rate of arbitrarily
reliable communication. Therefore, we resort to looking intothe notions of outage capacity for slow fading channels andergodic capacity for fast fading channels.
Capacity of the secondary link is influenced by thespectral activity of the primary users and the efficiency ofthe secondary users in detecting the unused channels. In anearlier study in [14], it is also demonstrated how thesecondary user capacity is affected by dissimilar perceptionof secondary users of primary users spectral activity intheir vicinities, where it has been shown that morecorrelated perceptions lead to higher channel capacity forthe secondary link. We will show that the cooperativeprotocols are also effective in increasing such correlation.Lower and upper bounds on the capacity of the secondary
channel, when the received power at the secondary receiveris P, are given by [14]
CUP PrSt Sr 1 log
1 PPrSt Sr 1
19
and
CLP PrSt Sr 1 log
1 PPrSt 1
1
Tc: 20
where the states St; Sr 2 f0; 1g, assigned to the secondarytransmitter and receiver,respectively, indicate the perceptionof the secondary users about the activity of the primary user.
St 0 and St 1 mean that the secondary transmitter has
sensed thechannel to be busy and idle, respectively, and Sr is
defined accordingly. These state variables retain their states
for a period of Tc channel uses and vary to an i.i.d. state
afterwardsandasseenabove, Tc onlyaffectsthelowerbound.For further analysis we assume that all channels (i.e.,
hp;t; hp;r; ht;r) follow the same fading model and therefore
the states St and Sr have the same time variations as the
secondary channel ht;r, which means that all remainunchanged for Tc channel uses and change to indepen-
dent states afterwards. Now, corresponding to different
values of Tc we will have slow and fast fading processes
and need to look into meaningful notions of capacity foreach of them.
1. Fast fading: Small values of Tc correspond to fastfading for which a meaningful notion of capacity isgiven by ergodic capacity and is obtained byaveraging over all channel fluctuations
CUerg 4 IEt;r CUt;r; CLerg 4 IEt;r CLt;r:21
2. Slow fading: Corresponding to large values ofTc ) 1,we consider the -outage capacity C as t heperformance measure for which the bounds aregiven by
Pr
CULt;r < CUL : 22
As the ergodic and outage capacities provided in (21)-(22)
depend on the probability terms PrSt 1 and PrSt Sr 1, we need to assess these terms and their variationsunder different cooperation models. The states St and Srdepend not only on the spectral activity in the vicinity of the
secondary transmitter and receiver, but also on how
successfully these users sense this spectral activity.We introduce the random variables t; r 2 f0; 1g to
account for modeling the spectral activities. t 1 (r 1)states that no primary user is using the channel in the
vicinity of the secondary transmitter (receiver) and the
channel can be used by the secondary users. t 0 andr 0 are defined accordingly for busy channels. Based onthe definitions above and those of St and Sr, which indicate
the perception of secondary users of the activity of the
primary user, we have
PrSt 1 Prt 11 Pet; 23
PrSt Sr 1 Prt r 1Pet; er; 24where et and er are the erroneous detection events. Note
that the terms Prt 1 and Prt r 1 for thecooperative and noncooperative schemes are identical andthe effect of cooperation reflects in the terms Pet andPet; er. In the following two lemmas, we show how theCSA and the OCSA protocols improve the probability
PrSt Sr 1.Lemma 2. For sufficiently large SNR, we have PrCSt
Sr 1 ! PrNC
St Sr 1.
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 117
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
7/15
Proof. We first show that for sufficiently large SNR,
PC er j et ! PNC er as follows:PC er j et PC er j et; Tr : S|fflfflfflfflfflfflfflfflfflffl fflfflfflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflffl}
1
PTr : S
PC er j et; Tr : F
|fflfflfflfflfflffl{zfflfflfflfflfflffl}Tt:S;Tr :FPTr : F
PTr : S PC er j Tt : S; Tr : FPTr : F! PNC erPTr : S
PC er j Tt : S; Tr : F|fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl fflfflffl}: 1 1
2
PTr : F
! PNC erPTr : S PNC er|fflfflfflffl{zfflfflfflffl}: 11
PTr : F
PNC er:
25
On the other hand, from Theorem 1 we know that forsufficiently large SNR, PC
et
> PNC
et
, which in
conjunction with (25) provides that POC et; er PC er j etPC et ! PNC erPNC et, which is the desiredresult. tu
Lemma 3. For all values of SNR, we have
PrOCSt Sr 1 !maxfPrCSt Sr 1; PrNCSt Sr 1g:
P r o o f . W e e q ui v al e nt l y s h ow t h at POC et; er !maxfPC et; er; PNC et; erg. By expanding POC et; erover all different combinations of the statuses of the
secondary users (success/failure), we get
POC et; er POC et; er j Tt : S; Tr : S|fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflffl}
1
PTt : S; Tr : S
POC et; er j Tt : S; Tr : F|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflffl}POC er j Tt:S; Tr :F
PTt : S; Tr : F
POC et; er j Tt : F; Tr : S|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflffl}POC et j Tt:F; Tr :S
PTt : F; Tr : S
POC et; er j Tt : F; Tr : F|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl{zfflffl fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflffl}PNC etPNC erPTt : F; Tr : F
PTt : S; Tr : S PTt : S; Tr : F
1 Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffi
2d1jp;rj2 2d2 maxfp;rj2; jt;rj2gq !
PTt : F; Tr : S
1 Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffi
2d1jp;tj2 2d2 maxfp;tj2; jt;rj2gq !
PTt : F; Tr : F
1 Q
ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi2djp;tj2
q !
1 Q
ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi2djp;rj2
q !
:
26
By following similar steps, we can show that
PC et; er PTt : S; Tr : S
PTt : S; Tr : F
1 Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi
2d1jp;rj2 2d2jt;rj2q !
PTt : F; Tr : S
1 Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffi
2d1jp;tj2 2d2jt;rj2q !
:
27
Comparing (26) and (27) establishes that POC et; er !PC et; er. Also from (26), we get
POC et; er
! PTt : S; Tr : S PTt : F; Tr : F PTt : S; Tr : F 1 Q
ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffi2djp;rj2
q ! PTt : F; Tr : S 1 Q
ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffi2djp;tj2
q !! PTt : S; Tr : S PTt : F; Tr : F
PTt : S; Tr : F
1 Qffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffi
2djp;rj2q !
1 Qffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffi
2djp;tj2q !
PTt : F; Tr : S
1
Q ffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffi2djp;tj2q ! 1 Q ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi2djp;rj2q !
! 1 Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi
2djp;tj2q !
1 Qffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi
2djp;rj2q !
PNC et; er;which completes the proof. tu
Fig. 2 illustrates numerical evaluations comparing the
term Pet; er for different schemes given in (25)-(27). Asexpected, for very low SNR regimes, CSA exhibits no gain
over noncooperative scheme, while OCSA outperforms both
CSA and noncooperative schemes in all SNR regimes. As
seen in the figure, the CSA protocol achieves considerable
118 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
Fig. 2. Comparing Pet; er for different schemes.
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
8/15
gain in moderate SNR regimes. For the numerical evalua-
tions, we have assumed the same setup as in Fig. 1.
Theorem 3. For large enough SNR values, we have
CU;Cerg > CU;NCerg ; and CL;Cerg > CL;NCerg ;CU;C > CU;NC ; and CL;C > CL;NC :
Proof. See Appendix B. tuTheorem 4. For all SNR regimes, we have
CU;OCerg > max
CU;Cerg ; CU;NCerg
;
CL;OCerg > max
CL;Cerg ; CL;NCerg
;
CU;OC
> maxCU;C ; CU;NC ;and CL;OC > maxCL;C ; CL;NC :
Proof. See Appendix C. tu
Fig. 3 demonstrates numerical evaluations of the outage
capacity achieved under different schemes. For these
evaluations, we have used the capacity lower and upper
bounds given in (22) and have assumed 12
. For
evaluating PrSt Sr 1 given in (24), we have assumedPrt r 1 0:7 in both cooperative and noncoopera-tive schemes. We also have assumed SNR 10 dB, and forthe lower bounds on the outage capacity, we have set
Tc 10. It is observed that outage capacity bound increasesas we allow higher outage probability. Also, since the gap
between the lower and upper bounds for the cooperative
schemes is small, the bounds seem to be tight.
6 DISCUSSIONS
6.1 Information Exchange
In this section, we discuss how the primary and thesecondary users acquire the channel state information thatthey need in the OCSA protocol. The users need to acquirechannel gains, which can be facilitated via employingtraining-based channel estimation schemes and feedback
communication. Such estimations and feedback can be
carried out reliably via a very low-rate communication (bytransmitting few pilot symbols). The information about
channel gains is used only once for initializing the backofftimers, which is during the transition of the channel accessfrom the primary user to the secondary users, and is notneeded afterwards.
It is noteworthy that acquiring such channel state
information is not guaranteed to be feasible in all networks,in which case the secondary users can deploy the CSAprotocol that does not require any information exchange.
In the OCSA protocol, we need the following channelstate information.
1. The secondary transmitter should know jp;tj and thesecondary receiver should know jp;rj: We assume thatthe primary transmitter is periodically transmittingtraining symbols to its designated receiver fortraining purposes. The secondary users can overhearthese pilots due to the broadcast nature of thewireless channel and periodically acquire theirdesired channel states. Obtaining these channel gainsis only possible when the primary users transmittraining symbols to its designated receiver and thesesymbols are known to the secondary users a priori.
2. The secondary users should know jt;rj jr;tj: Thischannel gain can be acquired by having thesecondary users exchange pilot symbols. This ex-change should be performed while the primary useris still active. To avoid harming the communicationof primary users, the pilots can be exchanged usingultrawideband (UWB) communication which allowsthe secondary users to communicate the low-ratepilots well below the noise level of the primary user.As the secondary users do not have any prior
information about the time of the availability of thechannel, they should keep exchanging the pilotsaccording to how static the channel t;r is. Sinceexchanging pilot sequences requires a very low-ratecommunication, the process of channel gain estima-tion can be performed reliably. This level ofinformation exchange can be carried out in allnetworks. We also assume that the secondary usersalso exchange the estimates ofjp;t and jp;rj that theyhave obtained in Step 1.
3. The primary user should know jp;tj and jp;rj: We devisetwo time slots between the time that primary userfinishes the transmission of the beacon and the timethat all users run their backoff timers. During these
two time slots, the secondary users feed backthe value of jp;tj2 jp;rj2, which they have alreadyobtained during Steps 1 and 2. Note that eachsecondary user will have feedback transmission onlyif it has successfully decoded the beacon, otherwiseits dedicated feedback slot will be wasted. Also, theprimary user will not receive any feedback only ifboth secondary users fail to decode the beacon, inwhich case its lack of knowledge about the valuejp;tj2 jp;rj2 does not harm as the secondary userswill not step in the competition phase and anyrandom initializing of the primary userss backofftimer suffices to ensure that the primary user will be
transmitting in the second phase.
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 119
Fig. 3. Lower and upper bounds on outage capacity for differentschemes.
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
9/15
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
10/15
and, similarly,
IEtp;tt;tr PTR Tp j tr > tp; tt IEtp;tt;tr PTR Tr j tr > tp; tt
< IEtp;tt P~tp > ~tr j tr > tp:33
By noting that ~ti ti wi, where wi $ N0; 2,and denoting the probability density functions ofti by fti, (29)-(33) provide thatIEtp;tt;tr Pwrtp; tt; tr
tp tt j tp > tt
13
IEtp;tt Pwp wt > tt tp j tt > tp
13
IEtp;tr Pwr wp > tp tr j tp > tr
13
IEtp;tr Pwp wr > tr tp j tr > tp
1
3Z1
0 Z1
0
Qjtp ttjffiffiffiffiffiffiffiffi22p ftp dtp ftt dtt
13
Z10
Z10
Qjtp trjffiffiffiffiffiffiffiffi
22p
ftp dtp ftr dtr
13
IEtp;tt;tr Qjtp ttjffiffiffiffiffiffiffiffi
22p
Q jtp trjffiffiffiffiffiffiffiffi
22p
!:
34Now, from (28) and (34), we get
IEt;r ;p;t;p;rCOCt;r ~COCt;r
COCt;r
" #
< IEtp;tt;tr Pwrtp; tt; tr
< 13
IEtp;tt;tr Q jtp ttjffiffiffiffiffiffiffiffi22
p Q jtp trjffiffiffiffiffiffiffiffi22
p !;35
which is the desired result.2. We start by showing that
lim0
log IEtp ;tt Qjtpttjffiffiffiffiffiffi
22p
h ilog
1:
By some simplifications, we get
IEtp;tt Qjtp ttjffiffiffiffiffiffiffiffi
22p
!
IEp;r;t;r Q kp;r
j2
jt;r
j2
jffiffiffiffiffiffiffiffi22p " #;36
where we have assumed that fp;t; p;r; t;rg arei.i.d. distributed as N0; where we havedefined 4 p;t p;r t;r. Therefore, jp;rj2and jt;rj2 are distributed exponentially withmean 2. It can be readily shown that the random
variable X4 kp;rj2 jt;rj2j is also distributedexponentially with mean 2. Therefore, from (36),
we get
IEtp;tt Qjtp ttj
ffiffiffiffiffiffiffiffi22p
! IEX Q X
ffiffiffiffiffiffiffiffi22p !
: 37
On the other hand, we know that 8x > 01ffiffiffiffiffiffi2
px
1 1x2
ex
2=2 Qx 1ffiffiffiffiffiffi2
px
ex2 =2;
which provides
limx1
log 1ffiffiffiffi2p x 1 1x2 ex2=2 log ex2=2|fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflffl}
1
limx1
log Qxlog ex2 =2
limx1
log 1ffiffiffiffi2
px
ex2=2 log ex2 =2|fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl fflffl}
1
;
or equivalently, for asymptotically large values
of x,
Qx : ex2=2:For any given value of X, by setting x X
ffiffiffiffiffiffi22p ,
for asymptotically large values of x (or small
values of )
QXffiffiffiffiffiffiffiffi22
p
: eX2
42 :
Hence, for asymptotically small values of ,
IEX QXffiffiffiffiffiffiffiffi22
p !
: IEX eX2
42
h i 1
2
Z10
ex2 =42x=2dx
1
ffiffiffi
pe
2=42
2Q
ffiffiffi2p |fflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflffl}: 1
: 1
;
which, in conjunction with (37), gives rise to
IEtp ;tt Qjtp ttjffiffiffiffiffiffiffiffi
22p
! IEX Q Xffiffiffiffiffiffiffiffi
22p !
: 1
: 38
Similarly, we can show that
IEtp ;tt Qjtp trjffiffiffiffiffiffiffiffi
22p
!: 1
: 39
Hence,
IEtp;tt;tr Q jtp ttjffiffiffiffiffiffiffiffi22
p Q jtp trjffiffiffiffiffiffiffiffi22
p !: 1
: 40
Equations (35) and (40) provide that
lim0
log IEt;r ;p;t;p;rCOCt;r ~COCt;r
COCt;rh ilog
< lim0
log IEtp;tt;tr Qjtptt jffiffiffiffiffiffi
22p
Q jtptr jffiffiffiffiffiffi
22p
h i3log
13
;
which is the desired result. tuThe numerical evaluation of IEtp;tt;tr Qjtpttj
ffiffiffiffiffiffi22
p Qjtptrj
ffiffiffiffiffiffi22
p
versus the variance of noise estimation (
2
is depicted in
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 121
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
11/15
Fig. 4 for three different SNR values. We have considered
the setup p;t p;r t;r 1, where we can see that whenthe noise variance is 2 0:01, the capacity loss will be lessthan 1 percent at 0 dB, which is a negligible loss. Also, itis observed that for any fixed value of 2, increasing the
SNR results in less capacity loss. This is justified by noting
that for fixed noise level, more powerful signals are less
prone to estimation errors.
6.3 Throughput Analysis
Channel capacity, being an intrinsic characteristic of thewireless channel, is not influenced by how effectively thechannel is utilized or by how much the MAC-levelcoordinations (e.g., backoff timers and information exchange
in the OCSA protocol) cost. Therefore, in order to furnish afair comparison between the OCSA protocol and thenoncooperative scheme and to incorporate the MAC-levelcosts of this protocol, we assess the achievable throughputs.
We have developed a throughput analysis, which rests onthe basis of our capacity analysis, to account for two types ofthroughput losses incurred by the OCSA protocol. One lossis due to the time waste imposed by the backoff timers, andthe other loss is due to the required feedback from thesecondary users to the primary user.
As running the backoff timers and exchanging informa-tion take place only one time, if the secondary users accessthe channel for a period sufficiently larger than those of thebackoff timers and the feedback communications, the
throughput will be very close to the capacity and thesethroughput losses will have a negligible effect.
In order to formulate the throughput, which we denoteby R, we define TCR as the duration that the secondary linkwill use the channel and we denote the time dedicated tothe feedback communication by TFB. Finally, we denote theinitial value of the backoff timer of user Ti by T
iBT, which is
set as
TiBT 4
ti; for i 2 fp; t; rg;
where is a constant and its unit depends on the unit of ti.Since ftig are scalars, has the units of time. Therefore, forany channel realization fp;t; p;r; t;rg, when the relay is
user Ti, the time delay due to backoff timers is TiBT and the
throughput is found as
Rp;t; p;r; t;r TCRTCR TFB TiBT
~COCt;r
TCRTCR
TFB
ti
~COCt;r;41
where we have taken into account that there is a one-timefeedback transmission and backoff timer activation.Equation (41) suggests that when the duration that thesecondary users access the channel is considerably longerthan the time required for feedback, i.e., TCR ) TFB, thethroughput loss due to feedback will be negligible.However, the same argument does not apply to the effectof backoff timers as for very weak channels (small ti),
ti
can become a nonnegligible factor compared to TCR. In thefollowing theorem, we assess the average throughput lossover the possible channel realizations.
Theorem 6. The average throughput loss due to information
exchange and backoff timers is upper bounded by
IEt;r ;p;t;p;r
~COCt;r Rp;t; p;r; t;r~COCt;r
" # w1
1 w1 1 w1 ew2
1w1 1
;
where
w1 4 TFBTCR
and w2 4 TCRp;t
:
Proof. First note that for the node Ti selected as the relay,
ti !tp jt;pj2jt;rj2 > jt;pj2. Therefore, from (41), we getRp;t; p;r; t;r
~COCt;r! 1
1 w1 w2 1jhp;tj2:
Therefore,
IEt;r ;p;t;p;rRp;t; p;r; t;r
~COCt;r
" #
! IEp;tTCR
TCR TFB jp;tj2
24 35 IEhp;t
1
1
w1
w2
1
jhp;tj2
24
35
1 w1et w2e
w21w1 Ei w21w1t
1w1
1 w12
24 35t1t0
11 w1 w2e
w21w1
Z1w2
1w1
et
tdt
! 11 w1 w2e
w21w1
1 ew2
1w1 1 w1
w2
11 w1 1 w1
e
w21w1 1;
which establishes the desired result. tuFrom the above result, it is consequently concluded that
for the appropriate choice of , i.e., by setting
122 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
Fig. 4. Relative capacity loss versus channel estimation noise accuracy.
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
12/15
( TCRp;t w2 ( 1;we can make the effect of the backoff timers very negligiblewhich provides that w2 0 and
IEt;r ;p;t;p;r
~COCt;r Rp;t; p;r; t;r~COCt;r
" # w1
1 w1 :
As for the effect of feedback, there will be a loss which isupper bounded by TCRTCRTFB . This loss will be also marginal ifthe period that the cognitive link is active is sufficientlylarger than the small period of the feedback communica-tion, i.e., TCR ) TFB.
Fig. 5 depicts the achievable throughput by the OCSAunder different assumptions on feedback loads andbackoff timer settings and compares them to the through-
put achievable via the noncooperative scheme and theCSA protocol. The solid curves represent the lowerbounds on the capacity found in Section 5. For thenoncooperative and the CSA schemes, due to having noMAC-layer bandwidth loss, the throughput is essentiallyequivalent to the capacity, whereas for the OCSA protocol,the throughput becomes equal to the capacity when we setw1 w2 0. The dashed curves illustrate the throughputof the OCSA protocol for the different choices of w1; w2.We have considered a similar setup as in the numericalevaluations of Fig. 3. The results provide that for thechoice of w1 < 0:15 and w2 < 0:15, the throughput of theOCSA scheme is higher than that of the CSA scheme, and
as w1 and w2 exceed these levels, the throughput of theOCSA protocol falls below that of the CSA protocol. Notethat in practical scenarios, it is reasonable to assume thatw1; w2 < 0:15 as w1 TFBTCR , which is the ratio of the lengthof the one-time feedback packet to the length of theinformation packets and is close to zero. Also, w2 dependson the constant factor of the timers which can be chosensuch that keeps the value of w2 arbitrarily small.
7 MULTIUSER NETWORK
7.1 Multiuser CSA Protocol (MU-CSA)
The cooperation protocols proposed in Section 3 and the
subsequent analyses in Section 4 consider a cognitive
network with a single pair of secondary transmitter and
receiver. In this section, we provide a direction for
generalizing the CSA protocol to a cognitive network
consisting of multiple secondary transmitter-receiver pairs.
The objective is to provide all secondary users with the
diversity gain 2M for decoding the beacon message.
We consider a multiuser network consisting of M pairsof secondary transmitters and receivers denoted by
T1t ; T1r ; . . . ; TMt ; TMr . The physical channels between theprimary user and the mth secondary transmitter and
receiver are represented by mp;t and m
p;r, respectively, and
mt;r denotes the channel between Tmt ; Tmr for m 1; . . . ; M.As in Section 2 for the channel realizations, we have
mi;j ffiffiffiffiffiffiffi
mi;j
qhmi;j; 42
where hmi;j, the fading coefficients, are independent complex
Gaussian CN 0; 1 random variables and mi;j representspathloss and shadowing effects. In the CSA protocol, a
secondary user acts as relay based on its success in
decoding the first segment of the beacon. The MU-CSA
protocol consists of two steps:
1. The primary user broadcasts the first segment of the
beacon message during the initial 0 < < 1 portion
of the time slot as in the CSA and OCSA protocols
and all the secondary transmitters and receivers
listen to the message and at the end of the
transmission try to decode the message.2. During the remaining 1 portion of the time slot,
all secondary users who have successfully decoded
the first segment of the beacon construct the addi-tional parity bits and broadcast them. Note that there
is the possibility that multiple secondary users have
been successful in the first phase. Since all these users
broadcast identical information packets, their concur-
rent transmissions are not considered as collision and
rather can be deemed as a distributed multiple-
antenna transmission. For maintaining fairness in
terms of the amount of resources consumed, the
transmission power of individual secondary users
acting as relay should not exceed Pp2M
in order to keep
the aggregate transmission power below Pp. There is
the issue of synchronization between the successful
relays, which they can ensure by using the beacon
they have received as the synchronization reference.
7.2 Diversity Analysis
Next, we show that in a multiusercognitive network with the
MU-CSA protocol, all secondary users enjoy the diversity
gain of2M in detecting the beacon message. We define the
set T f ~T1; . . . ; ~T2Mg fT1t ; . . . ; TMt gSfT1r ; . . . ; TMr g. Also,
we define M 4 f1; ; 2Mg and denote the channel betweenthe secondary users ~Tm and ~Tn by ~m;n, and the channel
between Tp and ~Tm by ~p;m. The probability of missing the
beacon message by the secondary user~
Tm is
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 123
Fig. 5. Throughput comparison in different schemes.
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
13/15
PC e ~Tm X
AMnfmgA6;
PC e ~Tm j 8i 2 A; ~Ti : S; 8j 62 A; ~Tj : F
P8i 2 A; ~Ti : S; 8j 62 A; ~Tj : F PC e ~Tm j 8i; ~Ti : F
|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflffl}1
P8i; ~Ti : F
XAMnfmg
A6;
Q ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffi2d1j~p;mj2 2d2 2MXi2A
j~i;mj2s0@ 1A|fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflffl fflffl{zfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflfflffl fflfflffl}: 1
jAj1from Lemma 1
Y
j62AQ
ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffi2d1j~p;jj2
q |fflfflfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl fflfflfflfflfflfflfflfflffl}
: 12MjAj from Lemma 1
Yi2A
1 Q
ffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffi2d1j~p;ij2
q |fflfflfflfflfflfflfflfflfflfflffl fflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
1 from Lemma 1
!
Yi2f1;...;2Mg Q ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffi2d1j~p;jj2q |fflfflfflfflfflfflfflfflfflfflfflffl fflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl}: 1 from Lemma 1
: 12M1
12M
: 12M
:
Therefore, all the secondary users enjoy a diversity order2M in decoding the beacon message.
The channel capacity can be obtained similarly as inSection 5 for each secondary pair when only that pairaccesses the channel. For finding the channel capacity of aspecific pair of secondary users, we need to find 1) theprobability of detecting the beacon by the secondarytransmitter and 2) the probability that both of secondary
transmitter and receiver are successful in decoding tobeacon. The lower and upper bounds on the channel capacityare given in (19) and (20), and the capacity for the linkbetween Tmt ; Tmr can be found by plugging the values of
PrSTmt 1 PrTmt 1PC eTmt and
PrSTmt STmr 1 PrTmt Tmr 1PC
eTmt ; eTmr
:
Numerical evaluations for the lower and upper bounds onthe secondary user capacity in a cognitive networkconsisting of five pairs of users are shown in Fig. 6, whichdepicts the outage capacity. For this evaluation, we have
used the same setup as that in Section 4.3. By comparingthese results with those of a network with one pair ofsecondary users, it is seen that more gain in terms ofchannel capacity is achievable for the multiuser networkwhich is due to opportunistic selection of the cognitive pair.As the number of secondary users pairs increases, thequality of the best secondary user is expected to becomebetter which justifies the additional gains observed in themultiuser cognitive networks.
8 CONCLUSIONS
In this paper, we have proposed opportunistic cooperation
protocols for supervised spectrum access in cognitive
networks where the primary and secondary users are only
allowed to have orthogonal access to the channel and
cannot coexist concurrently. The primary user broadcasts a
beacon message upon releasing the channel and a pair of
secondary transmitter and receiver cooperatively detect the
beacon message. The cooperation protocols are devised
such that by a single-time relaying both secondary
transmitter and receiver enjoy second-order diversity gains
in detecting the beacon message. We have also quantified
the effect of erroneous detection of vacant channels on the
secondary channel capacity and show the advantage of the
proposed protocols for achieving higher secondary channel
capacity. One of the proposed protocols imposes informa-
tion exchange and bandwidth costs, where we have
assessed the effect of imperfect information exchange on
the capacity and the loss due to the bandwidth cost on theachievable throughput. The cooperation models are also
extended to multiuser cognitive networks as well.
APPENDIX A
PROOF OF LEMMA 1
F ir st w e s ho w t ha t f or t he f un ct io n AM; n 4PMm0
Mm
mn1m, AM; n 0 fo r 8M > n ! 0, a nd
AM; M 6 0. We provide the proof by induction:1. F or n 0 an d 8M > 0, w e h av e AM; 0
PMm0
Mm
1m 1 1M 0.2. Assumption: 8M > n > 0, we have AM; n 0.3. Claim: 8M > n 1, we show that AM; n 1 0.
AM; n 1 XMm0
M
m
mn11m
MXM1m0
M 1m
m 1n1m
MXnk0
n
k
XM1m0
M 1m
mk1m
! M
Xnk0
n
k
AM 1; k
|fflfflfflfflffl{zfflfflfflfflffl}M1>n!k 0:
124 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010
Fig. 6. Outage capacity in a cognitive network with five pairs of users.
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
14/15
Now, we show that AM; M 6 0. Again, by induction wehave:
1. For M 1, A1; 1 1.2. Assumption: AM; M 6 0.3. Claim: AM 1; M 1 6 0.
A
M
1; M
1
XM1m0
M 1m
mM11m
M 1XMm0
M
m
m 1M1m
M 1XMk0
M
k
XMm0
M
m
mk1m
!
M 1
AM; M|fflfflfflfflfflffl{zfflfflfflfflfflffl}60
XM1k0
M
k
AM; k|fflfflfflfflffl{zfflfflfflfflffl}
0
!6 0:
Knowing the above result and considering the followingTaylor series expansion
1 kx12 X1
n0
2n!22nn!2 kx
n;
and noting that 1ffiffiffiffi2
pR1
0e
av2
2 dv 12
a12, we getZ1
0
1 ekv2=M 1ffiffiffiffiffiffi
2p ev2=2 dv
XMm0
M
m
1m 1
ffiffiffiffiffiffi2
pZ1
0
ev2
212km=dv
12
XMm0
Mm
1m1 2km1=2
12
XMm0
M
m
1m
X1n0
2n!22nn!2 1
n
2km
n 1
2
X1n0
n2n!
2nn!2 knXMm0
M
m
mn1m
12
X1n0
n2n!
2nn!2 knAM; n
12
X1
nMn
2n!2nn!2 k
nAM; n : M;
therefore,
M :Z1
0
YMi1
1 eminikiv2= 1ffiffiffiffiffiffi
2p ev2 =2 dv
Z1
0
YMi1
1 ekiv2= 1ffiffiffiffiffiffi
2p ev2=2 dv
Z1
0
YMi1
1 eminikiv2 = 1ffiffiffiffiffiffi
2p ev2=2 dv
: M;
which concludes the lemma.
APPENDIX B
PROOF OF THEOREM 3
We show that for any P > 0, CU;CP > CU;NCP andCL;CP > CL;NCP, which consequently proves the theo-rem. First, we remark that p log1 ap is nondecreasing in psince
@
@pCUa @
@pp log
1 a
p
! 0:
The inequality above holds because for the function fu 4log u 1 1u, f1 0 and for u ! 1, @fu@u 1u 1u2 ! 0, andtherefore, fu ! 0 for u ! 1. Therefore, CUP as given in(19) is nondecreasing in the probability PrSt Sr 1. Byusing Lemma 2, it is concluded that for sufficiently large
SNRCU;CP > CU;NCP, which, in turn, establishes theresult for the upper bound. For the lower bound, as shown
in (25), for sufficiently large SNR, PC er j et ! PNC er asshown
PC et; erPNC etPNC er
>PC et
PNC etor, equivalently,
PrCSt Sr 1PrNCSt Sr 1
>PrCSt 1
PrNCSt 1: 43
Therefore, for the lower bound, we get that, for sufficiently
large SNR,
CL;CP PrCSt Sr 1 log
1 PPrC
St
1
1
Tc
> PrCSt Sr 1 log
1 P
PrCStSr1PrNCStSr1 Pr
NCSt 1
1
Tc
44
> PrNCSt Sr 1 log
1 P
PrNCSt 1
1Tc
CL;NCP;
45
where (44) follows from (43) and the transition from where
(44) to (45) follows from the fact that p log1 ap isincreasing in p.
APPENDIX C
PROOF OF THEOREM 4
As shown in Appendix B, CUP is nondecreasing inPrSt Sr 1. By using Lemma 3, it is readily verifiedthat for the function CUP
CU;OCP > maxfCU;CP; CU;NCPg:For the lower bound, we deploy the same approach as in
the proof of Theorem 3 and first show that
TAJER AND WANG: BEACON-ASSISTED SPECTRUM ACCESS WITH COOPERATIVE COGNITIVE TRANSMITTER AND RECEIVER 125
Authorized licensed use limited to: Columbia University. Downloaded on November 28, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
-
7/31/2019 21. Beacon-Assisted Spectrum Access With Cooperative Cognitive Transmitter and Receiver
15/15
PrOCSt Sr 1PrCSt Sr 1
! PrOCSt 1
PrCSt 1; 46
andPrOCSt Sr 1PrNCSt Sr 1
! PrOCSt 1
PrNCSt 1: 47
The above inequalities can be proven by substituting and
manipulating the expansions of PrCet and PrOCet givenin Theorems 1 and 2 and the expansions of PrCet; er andPrOCet; er in (26) and (27). After establishing the aboveinequalities, the last step is similar to that of Appendix B.
REFERENCES[1] J. Mitola, Cognitive Radio: An Integrated Agent Architecture for
Software Defined Radio, PhD dissertation, KTHRoyal Instituteof Technology, Dec. 2000.
[2] S. Haykin, Cognitive Radio: Brain-Empowered Wireless Com-munications, IEEE J. Selected Areas in Comm., vol. 23, no. 2,pp. 201-220, Feb. 2005.
[3] N. Devroye, P. Mitran, and V. Tarokh, Achievable Rates in
Cognitive Radio Channels, IEEE Trans. Information Theory, vol. 52,no. 2, pp. 1813-1827, May 2006.[4] A. Jovicic and P. Viswanath, Cognitive Radio: An Information-
Theoretic Perspective, Proc. IEEE Intl Symp. Information Theory,pp. 2413-2417, June 2006.
[5] N. Devroye and V. Tarokh, Fundamental Limits of CognitiveRadio Networks, Cognitive Wireless Networks, Springer, 2007.
[6] A. Goldsmith, S.A. Jafar, I. Maric, and S. Srinivasa, BreakingSpectrum Gridlock with Cognitive Radios: An InformationTheoretic Perspective, Proc. IEEE, vol. 97, no. 5, May 2009.
[7] A. Sahai, N. Hoven, and R. Tandra, Some Fundamental Limits onCognitive Radio, Proc. Allerton Conf. Comm., http://www.eecs.
berkeley.edu/~ sahai/Pap ers/cog nitive_radio_p reliminary.pdf ,2004.
[8] D. Slepian, Some Comments on Detection of Gaussian Signalsin Gaussian Noise, IEEE Trans. Information Theory, vol. 4, no. 2,pp. 65-68, June 1958.
[9] N.A.R. Price, Detection Theory, IEEE Trans. Information Theory,vol. 7, no. 3, pp. 135-139, July 1961.[10] R. Etkin, A. Parekh, and D. Tse, Spectrum Sharing for Unlicensed
Bands, IEEE J. Selected Areas in Comm., vol. 25, no. 3, pp. 517-528,Apr. 2007.
[11] Q. Zhao, L. Tong, A. Swami, and Y. Chen, DecentralizedCognitive MAC for Opportunistic Spectrum Access in Ad HocNetworks: A PODMP Framework, IEEE J. Selected Areas inComm., vol. 25, no. 3, pp. 589-599, Apr. 2007.
[12] M. Agarwal and M.L. Honig, Spectrum Sharing on a WidebandFading Channel with Limited Feedback, Proc. IEEE Intl Conf.Cognitive Radio Oriented Wireless Networks & Comm. (CrownCom),pp. 72-76, Aug. 2007.
[13] L. Lai, H. El-Gamal, H. Jiang, and H.V. Poor, CognitiveMedium Access: Exploration, Exploitation and Competition,IEEE/ACM Trans. Networking, submitted.
[14] S.A. Jafar and S. Srinivasa, Capacity Limits of Cognitive Radio
with Distributed and Dynamic Spectral Activity, IEEE J. SelectedAreas in Comm., vol. 25, no. 3, pp. 529-537, Apr. 2007.[15] G. Ganesan and Y. Li, Cooperative Spectrum Sensing in
Cognitive Radio, Part I: Two User Networks, IEEE Trans. WirelessComm., vol. 7, no. 7, pp. 2204-2213, June 2007.
[16] G. Ganesan and Y. Li, Cooperative Spectrum Sensing inCognitive Radio, Part II: Two User Networks, IEEE Trans.Wireless Comm., vol. 7, no. 7, pp. 2214-2222, June 2007.
[17] G. Ganesan, Y. Li, B. Bing, and S. Li, Spatiotemporal Sensingin Cognitive Radio Networks, IEEE J. Selected Areas in Comm.,vol. 26, no. 1, pp. 5-12, Jan. 2008.
[18] A. Sendanoris, E. Erkip, and B. Aazhang, User CooperationDiversity Part I: System Description, IEEE Trans. Comm., vol. 51,no. 11, pp. 1927-1938, Nov. 2003.
[19] A. Sendanoris, E. Erkip, and B. Aazhang, User CooperationDiversity Part II: Implementation Aspects and PerformanceAnalysis, IEEE Trans. Comm., vol. 51, no. 11, pp. 1939-1948,
[20] J.N. Laneman, D.N.C. Tse, and G.W. Wornell, CooperativeDiversity in Wireless Networks: Efficient Protocols and OutageBehavior, IEEE Trans. Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
[21] T. Hunter and A. Nosratinia, Diversity through Coded Coopera-tion, IEEE Trans. Wireless Comm., vol. 5, no. 2, pp. 283-289, Feb.2006.
[22] A. Bletsas, A. Khisti, D.P. Reed, and A. Lippman, A SimpleCooperative Diversity Method Based on Network Path Selection,
IEEE J. Selected Areas in Comm., vol. 24, no. 3, pp. 659-672, Mar.2006.[23] A. Tajer and A. Nosratinia, Opportunistic Cooperation via Relay
Selection with Minimal Information Exchange, Proc. IEEE IntlSymp. Information Theory (ISIT 07), June 2007.
[24] M.K. Simon and M.-S. Alouini, Digital Communication over FadingChannels: A Unified Approach to Performance Analysis. Wiley, 2000.
Ali Tajer received the BSc and MSc degreesin electrical engineering from Sharif Universityof Technology, Tehran, Iran, in 2002 and2004, respectively. Since June 2007, he hasbeen working toward the PhD degree inelectrical engineering at Columbia University,New York. In the summers of 2008 and 2009,he was a research assistant with NECLaboratories America, Princeton, New Jersey.
His research interests lie in the general areasof network information theory, cognitive radios, multiuser communica-tion, relay networks, and statistical signal processing. He is a studentmember of the IEEE.
Xiaodong Wang received the PhD degree inelectrical engineering from Princeton University.He is a professor of electrical engineering atColumbia University in New York. His researchinterests fall in the general areas of computing,signal processing, and communications, and hehas published extensively in these areas.Among his publications is a recent book entitledWireless Communication Systems: AdvancedTechniques for Signal Reception (Prentice Hall,
2003). His current research interests include wireless communications,statistical signal processing, and genomic signal processing. He
received the 1999 US National Science Foundation CAREER Awardand the 2001 IEEE Communications Society and Information TheorySociety Joint Paper Award. He has served as an associate editor for theIEEE Transactions on Communications, the IEEE Transactions onWireless Communications, the IEEE Transactions on Signal Proces-sing, and the IEEE Transactions on Information Theory. He is a fellow ofthe IEEE.
. For more information on this or any other computing topic,please visit our Digital Library at www.computer.org/publications/dlib.
126 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 1, JANUARY 2010