"Applied Science, Faculty of"@en .
"Electrical and Computer Engineering, Department of"@en .
"DSpace"@en .
"UBCV"@en .
"Zhang, Yonghong"@en .
"2008-12-03T15:19:10Z"@en .
"2008"@en .
"Doctor of Philosophy - PhD"@en .
"University of British Columbia"@en .
"Cognitive radio (CR) is a novel wireless communication approach that may alleviate the looming spectrum-shortage crisis. Orthogonal frequency division multiplexing (OFDM) is an attractive modulation candidate for CR systems. In this thesis, we study resource allocation (RA) for OFDM-based CR systems using both aggressive and protective sharing.\n\nIn aggressive sharing, cognitive radio users (CRUs) can share both non-active and active primary user (PU) bands. We develop a model that describes aggressive sharing, and formulate a corresponding multidimensional knapsack problem (MDKP). Low-complexity suboptimal RA algorithms are proposed for both single and multiple CRU systems. A simplified model is proposed which provides a faster suboptimal solution. Simulation results show that the proposed suboptimal solutions are close to optimal, and that aggressive sharing of the whole band can provide a substantial performance improvement over protective sharing, which makes use of only the non-active PU bands.\n\nAlthough aggressive sharing generally yields a higher spectrum-utilization efficiency than protective sharing, aggressive sharing may not be feasible in some situations. In such cases, sharing only non-active PU bands is more appropriate. When there are no fairness or quality of service (QoS) considerations among CRUs, both theoretical analysis and simulation results show that plain equal power allocation (PEPA) yields similar performance as optimal power allocation in a multiuser OFDM-based CR system. We propose a low-complexity discrete bit PEPA algorithm. To improve spectrum-utilization\nefficiency, while considering the time-varying nature of the available spectrum\nas well as the fading characteristics of wireless communication channels and providing QoS provisioning and fairness among users, this thesis introduces the\nfollowing novel algorithms: (1) a distributed RA algorithm that provides both fairness and efficient spectrum usage for ad hoc systems; (2) a RA algorithm for non-real-time (NRT) services that maintains average user rates proportionally on the downlink of multiuser OFDM-based CR systems; and (3) cross-layer RA algorithms for the downlink of multiuser OFDM-based CR systems for both real-time (RT) services and mixed (RT and NRT) services. Simulation results show that the proposed algorithms provide satisfactory QoS to all supported services and perform better than existing algorithms designed for multiuser OFDM systems."@en .
"https://circle.library.ubc.ca/rest/handle/2429/2828?expand=metadata"@en .
"2217283 bytes"@en .
"application/pdf"@en .
"RESOURCE ALLOCATION FOR OFDM-BASED COGNITIVE RADIO SYSTEMS by YONGHONG ZHANG B.Eng., Xi\u00E2\u0080\u0099an Jiaotong University, China, 1994 M.A.Sc., University of British Columbia, 2006 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY in THE FACULTY OF GRADUATE STUDIES (Electrical and Computer Engineering) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) December 2008 c Yonghong Zhang, 2008 \u000CAbstract Cognitive radio (CR) is a novel wireless communication approach that may alleviate the looming spectrum-shortage crisis. Orthogonal frequency division multiplexing (OFDM) is an attractive modulation candidate for CR systems. In this thesis, we study resource allocation (RA) for OFDM-based CR systems using both aggressive and protective sharing. In aggressive sharing, cognitive radio users (CRUs) can share both non-active and active primary user (PU) bands. We develop a model that describes aggressive sharing, and formulate a corresponding multidimensional knapsack problem (MDKP). Low-complexity suboptimal RA algorithms are proposed for both single and multiple CRU systems. A simplified model is proposed which provides a faster suboptimal solution. Simulation results show that the proposed suboptimal solutions are close to optimal, and that aggressive sharing of the whole band can provide a substantial performance improvement over protective sharing, which makes use of only the non-active PU bands. Although aggressive sharing generally yields a higher spectrum-utilization efficiency than protective sharing, aggressive sharing may not be feasible in some situations. In such cases, sharing only non-active PU bands is more appropriate. When there are no fairness or quality of service (QoS) considerations among CRUs, both theoretical analysis and simulation results show that plain equal power allocation (PEPA) yields similar performance as optimal power allocation in a multiuser OFDM-based CR system. We propose a low-complexity discrete bit PEPA algorithm. To improve spectrum-utilization efficiency, while considering the time-varying nature of the available spectrum as well as the fading characteristics of wireless communication channels and providing QoS provisioning and fairness among users, ii \u000Cthis thesis introduces the following novel algorithms: (1) a distributed RA algorithm that provides both fairness and efficient spectrum usage for ad hoc systems; (2) a RA algorithm for non-real-time (NRT) services that maintains average user rates proportionally on the downlink of multiuser OFDM-based CR systems; and (3) cross-layer RA algorithms for the downlink of multiuser OFDM-based CR systems for both real-time (RT) services and mixed (RT and NRT) services. Simulation results show that the proposed algorithms provide satisfactory QoS to all supported services and perform better than existing algorithms designed for multiuser OFDM systems. iii \u000CTable of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix List of Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii List of Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Dedication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Co-authorship Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4 Related Previous Work . . . . . . . . . . . . . . . . . . . . . 1.4.1 Resource Allocation Algorithms for OFDM-based CR 1.4.2 Resource Allocation Algorithms for OFDM Systems . 1.5 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 Thesis Overview . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 3 3 6 6 8 11 12 16 OFDM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 22 24 26 27 31 . . . . . . . . . . . . . . . . . . . . . . . . . Systems . . . . . . . . . . . . . . . . . . . . Chapter 2 Subcarrier, Bit and Power Allocation for Multiuser based Multi-Cell Cognitive Radio Systems . . . . . . . . . . . . 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 The Optimization Problem . . . . . . . . . . . . . . . . . . . . . . 2.4 The Single CRU Case . . . . . . . . . . . . . . . . . . . . . . . . . 2.5 The Multiple CRU Case . . . . . . . . . . . . . . . . . . . . . . . iv . . . . . . . . . . \u000C2.5.1 Reward/Cost Ratio for Each Constraint . . . . . . . 2.5.2 Efficiency Value for Adding One Bit to Subchannel m 2.5.3 The Proposed Algorithm . . . . . . . . . . . . . . . . 2.6 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . 2.6.1 Single CRU Case . . . . . . . . . . . . . . . . . . . . 2.6.2 Multiple CRU Case . . . . . . . . . . . . . . . . . . . 2.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 35 36 37 38 41 46 47 Chapter 3 An Efficient Power Loading Scheme for OFDM-based Cognitive Radio Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 The Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4 An Approximate Solution for OP1 . . . . . . . . . . . . . . . . . . . . . . . . 3.4.1 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.2 Suboptimal Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 49 50 51 52 52 53 58 64 65 Chapter 4 Performance of Equal Power Allocation in Multiuser based Cognitive Radio Systems . . . . . . . . . . . . . . . . . . . 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3 Bounds on bit rates for OWF and PEPA . . . . . . . . . . . . . . 4.3.1 Upper Bounds on Achievable Bit Rate for OWF . . . . . . 4.3.2 Achievable Bit Rate for PEPA . . . . . . . . . . . . . . . . 4.4 Rayleigh fading channel . . . . . . . . . . . . . . . . . . . . . . . 4.4.1 Opportunistic Subchannel Assignment . . . . . . . . . . . 4.4.2 A Fairer Subchannel Assignment Scheme . . . . . . . . . . 4.5 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OFDM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 67 68 71 71 73 73 74 74 75 78 79 Chapter 5 Subchannel Power Loading Schemes in Multiuser OFDM Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Bit rates for OWF and PEPA . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.1 An Upper Bound on Achievable Bit Rate for OWF . . . . . . . . . . 5.3.2 Achievable Bit Rate for Continuous PEPA . . . . . . . . . . . . . . . 5.3.3 Achievable Bit Rate for Discrete PEPA . . . . . . . . . . . . . . . . . 5.3.4 Achievable Bit Rate for Improved Discrete PEPA . . . . . . . . . . . 5.3.5 Improved Discrete PEPA Algorithm . . . . . . . . . . . . . . . . . . . 81 81 82 84 84 86 86 87 89 v . . . . . . . of CRBS k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \u000C5.4 Rayleigh fading channel . . . . . . . . . . . . . 5.4.1 Opportunistic Subchannel Assignment . 5.4.2 A Fairer Subchannel Assignment Scheme 5.5 Simulation Results . . . . . . . . . . . . . . . . 5.6 Conclusions . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 . 91 . 91 . 92 . 98 . 103 Chapter 6 Cross-Layer Resource Allocation for OFDM-based Cognitive Radio Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3 Cross-Layer Resource Allocation for RT Services . . . . . . . . . . . . . . . . 6.3.1 The Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . 6.3.2 Conversion of MAC Layer Requirements to PHY Layer Requirements 6.3.3 Proposed Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.4 Estimation of the Number of Available Subchannels in the next m(t1 , t2 ) slots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4 Cross-Layer Resource Allocation for Mixed Services . . . . . . . . . . . . . . 6.4.1 The Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . 6.4.2 Conversion of MAC Layer Requirements to PHY Layer Requirements 6.4.3 A Goal Programming Approach for Improving Feasibility . . . . . . . 6.4.4 The Cross-Layer Resource Allocation Algorithm . . . . . . . . . . . . 6.5 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.1 RT Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.2 Mixed Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 7 Resource Allocation for Non-Real-Time Services based Cognitive Radio Systems . . . . . . . . . . . . . . . . . 7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3 Resource Allocation Algorithm . . . . . . . . . . . . . . . . . 7.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . 7.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 105 108 111 111 113 116 117 118 118 121 123 125 129 131 139 146 148 in . . . . . . . . . . . . . . OFDM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 151 152 154 158 160 161 Chapter 8 A Distributed Algorithm for Resource Allocation in based Cognitive Radio Systems . . . . . . . . . . . . . . . . . . . 8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.3 Distributed Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 8.3.1 Determining Achievability of Target Rates . . . . . . . . . 8.3.2 Determining HATR in a Resource-limited Situation . . . . 8.3.3 Determining HATR in a Resource-abundant Situation . . . OFDM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 162 163 167 168 169 170 vi \u000C8.3.4 The Proposed Distributed Algorithm 8.4 Simulation Results . . . . . . . . . . . . . . 8.5 Conclusions . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . Chapter 9 Conclusions . . . . . . 9.1 Contributions and Discussions 9.2 Future Work . . . . . . . . . . References . . . . . . . . . . . . . . Appendix A Optimal Solutions A.1 Solution for OP1 . . . . . . A.2 Solution for OP3 . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 171 177 180 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 182 186 188 for Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix B Proofs of Theorems B.1 Proof for Theorem 3.1 . . . . B.2 Proof for Theorem 4.1 . . . . References . . . . . . . . . . . . . . Appendix C . . . . . . . . . . . . . . . . . . . . Problems in Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . in Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . . . . . 189 189 190 193 . . . . . . . . . . . 194 194 200 207 Flowcharts for Algorithm in Section 6.4.4 . . . . . . . . . . . 208 Appendix D Derivation of The Results in (7.8) - (7.10) . . . . . . . . . . 212 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 vii \u000CList of Tables 3.1 3.2 6.1 6.2 6.3 6.4 Actual interference power exceeding Ilth , l = 1, 2 by using SUBOPT-APPROX with I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W, E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. . . . . . . . . . . . Actual interference power exceeding Ilth , l = 1, 2 by using SUBOPT-APPROX with I1th = I2th , S = 2.4 W, and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. . . . . . . . . . . . 62 63 6.5 6.6 Simulation parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Dropped packet rates for different values of pn with pn = pa and RRT = 150 kbps.135 Dropped packet rate with respect to video data rate, RRT with pn = pa = 0.5 136 Dropped packet rate with respect to video data rate, RRT . pn = 0.5 and pa = 0.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Non-feasible ratio of PHY and HLL. . . . . . . . . . . . . . . . . . . . . . . 142 Fairness index comparison for three different schedulers. . . . . . . . . . . . . 142 7.1 Fairness index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 8.1 8.2 Subchannel gains (\u00C3\u009710\u00E2\u0088\u009210 ) from CRP j\u00E2\u0080\u0099s transmitter to CRP i\u00E2\u0080\u0099s receiver. . . 174 Number of bits per OFDM symbol and fairness index for each of the three algorithms and four different sets of nominal rate requirements. . . . . . . . 178 viii \u000CList of Figures 1.1 1.2 1.3 1.4 2.1 2.2 PU active frequency bands, spectrum holes and CRU OFDM subchannels. . PU active frequency bands, guard bands, spectrum holes and CRU OFDM subchannels in a protective sharing system. . . . . . . . . . . . . . . . . . . . Spectrum sharing methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . Thesis overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 4 5 13 PU active frequency bands, spectrum holes and CRU OFDM subchannels. . Average number of bits per OFDM symbol per subchannel as a function of CRU power S, with interference thresholds set to 5 \u00C3\u0097 10\u00E2\u0088\u009212 W. . . . . . . . . Average number of bits per OFDM symbol per subchannel as a function of the interference threshold with S = 0.32 W. . . . . . . . . . . . . . . . . . . Simulation topologies: triangles represent CRBSs and circles represent PU transmitters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power constraint for Scenario 1. . . . . . . . . . . . . Average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power constraint for Scenario 2. . . . . . . . . . . . . . Average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power constraint for Scenario 3. . . . . . . . . . . . . . 26 PUP active and non-active bands and CRP OFDM subchannels. . . . . . . . Average number of bits per OFDM symbol (ANB) for each PUP band as a function of E{H1,m } with S = 2.4 W, I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W and E{H2,m } = 10\u00E2\u0088\u009214 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Average number of bits per OFDM symbol (ANB) on the whole PUP bands as a function of S with I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W, E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. . Average number of bits per OFDM symbol (ANB) on the whole PUP bands as a function of I1th with S = 2.4 W, I1th = I2th , and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. 58 4.1 4.2 4.3 Markov chain model for the number of available PU bands. . . . . . . . . . . ABR as a function of number of CRUs for OWF and PEPA. pa = 0.9 . . . . ABR as a function of pa for OWF and PEPA. K = 6. . . . . . . . . . . . . . 70 76 77 5.1 5.2 ABR as a function of average SNR \u00CE\u00B3 with K = 12 users for Case A. . . . . . ABR as a function of average SNR \u00CE\u00B3 with K = 12 users for Case B. . . . . . 94 95 2.3 2.4 2.5 2.6 2.7 3.1 3.2 3.3 3.4 ix 39 40 41 43 44 45 60 61 63 \u000C5.3 5.4 5.5 5.6 5.7 5.8 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 6.13 ABR difference between OWF and PEPA as a function of average SNR \u00CE\u00B3 for Case A. K = 12 and M = 64. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 ABR difference between OWF and PEPA as a function of average SNR \u00CE\u00B3 for Case B. K = 12 and M = 64. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 ABR as a function of number of subchannels M for Case A. K = 12 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 99 ABR as a function of number of subchannels M for Case B. K = 12 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E.100 ABR as a function of number of users K for Case A. M = 64 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. . . . . . 101 ABR as a function of number of users K for Case B. M = 64 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. . . . . . 102 Primary users\u00E2\u0080\u0099 active frequency bands, guard bands, spectrum holes and CRU OFDM subchannels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Markov chain model for the number of available PU bands. . . . . . . . . . . Average CRBS power for U = 1, 2 and 5 slots. . . . . . . . . . . . . . . . . Transformations and relationships among the optimization prblems. . . . . . Resource allocation time diagram for CRU 4 with pn = pa = 0.99 and RRT = 150 kbps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Average total power of eight video conference CRUs as a function of pn with pn = pa and RRT = 150 kbps. . . . . . . . . . . . . . . . . . . . . . . . . . . Transmit CRU power with pn = pa = 0.9 and RRT = 150 kbps. . . . . . . . Average total power for eight video conference CRUs as a function of video data rate, RRT with pn = pa = 0.5. . . . . . . . . . . . . . . . . . . . . . . . Average total power for eight video conference CRUs as function of video data rate, RRT with pn = 0.5 and pa = 0.1. . . . . . . . . . . . . . . . . . . . . . Resource allocation time diagram for CRUs 3 and 6. . . . . . . . . . . . . . . Dropped packet rate of RT CRUs as a function of video bit rate. . . . . . . Average throughput of NRT CRUs as a function of video bit rate. . . . . . System throughput as a function of video bit rate. . . . . . . . . . . . . . . 109 111 115 120 132 134 136 137 138 140 143 144 145 7.1 System throughput with respect to number of CRUs with RkP R = 1, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 8.1 PU active frequency bands, guard bands, spectrum holes and CRU OFDM subchannels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Flow chart of the distributed allocation algorithm. . . . . . . . . . . . . . . . 172 Average number of bits per OFDM symbol duration per CRP as a function of the number of available subchannels with Sk = 10\u00E2\u0088\u00923 W, K = 3, R1N OM = 25, R2N OM = 30, R3N OM = 35. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 8.2 8.3 x \u000C8.4 8.5 Average number of bits per OFDM symbol duration per CRP as a function of the number of available subchannels with Sk = 10\u00E2\u0088\u00923 W, K = 3, R1N OM = 20, R2N OM = 20, R3N OM = 20. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Average number of bits per OFDM symbol duration per CRP as a function of total power with MCR = 8, K = 3, R1N OM = 20, R2N OM = 20, R3N OM = 20. 176 C.1 Flow chart for the cross layer resource allocation algorithm: Phase 1, the resource-limited phase. Point B refers to the entry point of the resourceabundant phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 C.2 Flow chart for the cross layer resource allocation algorithm: Phase 2, the resource-abundant phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 C.3 Flow chart for the Assignment algorithm used in the cross layer resource allocation algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 xi \u000CList of Abbreviations ABR Average Bit Rate. ANB Average Number of Bits per OFDM symbol. AWGN Additive White Gaussian Noise. BER Bit Error Rate. BS Base Station. CDF (cdf) Cumulative Distribution Function. CR Cognitive Radio. CRBS Cognitive Radio Base Station. CRP Cognitive Radio transceiver Pair. CRU Cognitive Radio User. DPR Dropped Packet Rate. DSL Digital Subscriber Line. FCC Federal Communications Commission. FI Fairness Index. HATR Highest Achievable Target Rate. HOL Head of Line. ITWF Iterative Water-Filling. KKT Karush-Kuhn-Tucker. LHS Left Hand Side. MAC Medium Access Control. xii \u000CMDKP Multidimensional Knapsack Problem. NABO Non-Active PU Bands Only. NRT Non-Real-Time. OFDM Orthogonal Frequency Division Multiplexing. OWF Optimal Water-Filling. PDF (pdf) Probability Density Function. PEPA Plain Equal Power Allocation. PHY Physical. PR Proportional Rate. PSD Power spectral density. PU Primary User. PUP Primary User transceiver Pair. QoS Quality of Service. RA Resource Allocation. RHS Right Hand Side. RT Real-Time. SINR Signal to Interference plus Noise Ratio. SNR Signal to Noise Ratio. xiii \u000CList of Symbols atk,m Subchannel assignment indicator function for subchannel m of CRU k bk,i The length (in bits) of the ith packet in CRU k\u00E2\u0080\u0099s buffer bm The probability of having m available subchannels BOW F Average bit rate for OWF BP EP A Average bit rate for PEPA ck,m (i) (cm (i)) Efficiency capacity of subchannel m of CRU k (the CRU) for constraint i ctk Fraction of service lacking for CRU k at time slot t dk Allowed packet delivery delay after packet\u00E2\u0080\u0099s creation in time slots m dm k,l (dl ) The power gain for subchannel m from PU l to CRU k\u00E2\u0080\u0099s receiver (the CRU\u00E2\u0080\u0099s receiver) fc Carrier frequency CR CR fk,l,m (fl,m ) The interference power introduced by the signal in the mth subchannel of CRU k (the CRU) into PU l\u00E2\u0080\u0099s frequency band PU PU fk,l,m (fl,m ) The interference power generated by PU l to the mth subchannel at CRU k\u00E2\u0080\u0099s receiver (the CRU\u00E2\u0080\u0099s receiver) ft Fairness index at time slot t gm The power gain for subchannel m from the CRP\u00E2\u0080\u0099s transmitter to the CRP\u00E2\u0080\u0099s receiver m gj,i The power gain for subchannel m from CRU i\u00E2\u0080\u0099s transmitter to CRU j\u00E2\u0080\u0099s receiver t gk,m The power gain for subchannel m at time slot t from the CRBS to CRU k\u00E2\u0080\u0099s receiver m hm l,k (hl ) The power gain for subchannel m from CRU k (the CRU) to PU l\u00E2\u0080\u0099s receiver xiv \u000Chtk,m The subchannel assignment function for subchannel m of CRU k in time slot t Hm (f ) The OFDM receiver filter frequency response Ilth Interference power threshold for PU l Ik,m Interference power from other CRPs on subchannel m of CRP k\u00E2\u0080\u0099s receiver CR CR Ik,m (Im ) Interference power from the PU transmitters on subchannel m of CRU k\u00E2\u0080\u0099s receiver (the CRU\u00E2\u0080\u0099s receiver) PU PU Ik,m (Im ) Interference power from the other CRUs on subchannel m of CRU k\u00E2\u0080\u0099s receiver (the CRU\u00E2\u0080\u0099s receiver) K Number of CRUs or CRPs KRT Number of RT service CRUs lCR,t The number of available PU bands to a CR system at time slot t L Number of PUs LOW F Water level when using water-filling algorithm mCR,t The number of subchannels available to a CR system at time slot t m(t1 , t2 ) Number of available subchannels from time slot t1 to t2 M Number of subchannels (subbands) \u00C2\u00AF CR M Expected number of available subchannels \u00C2\u00AF t) Mt (M The set of available (unavailable) subchannels at time slot t pa The probability of a PU staying in active state pn The probability of a PU staying in inactive state pnm Incremental power required to add the nth bit to subchannel m P Transition probability matrix for the number of available subchannels Q Transition probability matrix for the number of available PU bands rk,m (rm ) The number of bits per OFDM symbol that can be supported by subchannel m of CRU k (the CRU) t rk,m The number of bits per OFDM symbol that can be supported by subchannel m of CRU k in time slot t rkt,REQ Number of bits that need to be transmitted at time slot t for CRU k xv \u000CrkM AX The maximum number of bits that can be transmitted in time slot t for CRU k Rk Total rate over all subchannels of CRU (CRP) k \u00C2\u00AF t1 ,t2 R k Average data rate of CRU k from time slot t1 to t2 RkDAT A The rate at which CRP k can reliably transmit data RM AX The maximum number of bits that can be allocated on any subchannel \u00CB\u009C M AX R k Estimated maximum data rate for CRP k RkN OM Nominal rate requirement for CRU (CRP) k RkN RT Rate request of NRT CRU k RkP R The nominal rate requirement of CRU k Rkt,REQ Minimum number of bits that needs to be transmitted in time slot 1 to t for CRU k RkT AR Target rate of CRP k sk,m (sm ) Transmit power for subchannel m of CRU k (the CRU) stk,m Transmit power for subchannel m of CRU k in time slot t Sk (S) Power limit for CRU k (the CRU) tD k,i The delivery time slot of the ith packet in CRU k\u00E2\u0080\u0099s buffer tSk,i The creation time slot of the ith packet in CRU k\u00E2\u0080\u0099s buffer Tstate The number of time slots between possible state transitions for a PU Tsymbol , Ts The duration of an OFDM symbol Tlth Interference temperature limit ui the amount of resource i that has already been consumed vk Nominal rate degradation for CRP k wkt Weight factor of CRU k at time slot t Wl Bandwidth of PU l \u00CE\u00A6CR (f ) Equivalent baseband power spectral density (PSD) of the CRU OFDM signal for a transmit power of 1 W \u00CE\u00A6Pl U (f ) Power spectral density (PSD) of PU l\u00E2\u0080\u0099s signal xvi \u000C\u00CE\u0093 SNR gap parameter which indicates how far the system is operating from capacity \u00CF\u0080l The steady-state probability of being in state l \u00CE\u00A0 The steady-state probability vector for the number of available PU bands \u00CF\u008302 Noise power on each subchannel Note: In this thesis, in order to distinguish a random variable from a sample value, the former is denoted by an uppercase letter, whereas the latter is denoted by a lowercase letter. xvii \u000CAcknowledgments I would like to offer my enduring gratitude to the faculty, staff and my fellow students at The University of British Columbia (UBC), all of whom have inspired me to continue my work in this field. I owe particular thanks to my supervisor, Prof. Cyril Leung, who has provided insightful guidelines, constructive comments, and invaluable suggestions throughout this study. Without his support, this work would not have been possible. It is my very great privilege to have been one of his students. I would like to express my sincere thanks to my parents for their selfless love and caring. Special thanks are owed to my husband, who has supported me throughout my years of education. My thanks go to the Natural Sciences and Engineering Research Council (NSERC) of Canada for awarding me a Post Graduate Scholarship (PGS) and support under Grant OGP0001731, the Province of British Columbia for awarding me a Pacific Century Graduate Scholarship, UBC for awarding me a University Graduate Fellowship, and the UBC PMCSierra Professorship in Networking and Communications for its support. Together, they have provided me with the financial means to engage in and complete this work. xviii \u000CTo my parents and family. xix \u000CCo-authorship Statement Each of Chapters 2 to 8 is based on manuscripts that have been accepted, submitted, or to be submitted for publication in international peer-reviewed journals. The manuscripts are all co-authored by myself as the first author and my supervisor, Dr. Cyril Leung. In all these works, I played the primary role in designing and performing the research, doing data analysis, and preparing manuscripts under the supervision of Dr. Cyril Leung. xx \u000CChapter 1 Introduction 1.1 Background Cognitive radio (CR) is a new technology that has attracted a lot of attention recently. It was first presented by Mitola [1] as a novel wireless communications approach with the ability to sense the external environment, learn from its history, and make intelligent decisions in adjusting its transmission parameters based on the current environment. Haykin [2] defines cognitive radio as follows: \u00E2\u0080\u009CCognitive radio is an intelligent wireless communication system that is aware of its surrounding environment (i.e., outside world), and uses the methodology of understanding-by-building to learn from the environment and adapt its internal states to statistical variations in the incoming RF stimuli by making corresponding changes in certain operating parameters (e.g., transmit-power, carrierfrequency, and modulation strategy) in real-time, with two primary objectives in mind: (1) highly reliable communications whenever and wherever needed; (2) efficient utilization of the radio spectrum.\u00E2\u0080\u009D With the ever increasing demand for mobile and wireless applications, the static assignment of radio resources to licensed holders has become a limiting factor in efficient spectrum utilization. In many jurisdictions, there is little spectrum left for exclusive use allocation [3]. However, studies have shown that a large portion of the assigned spectrum is used only sporadically, and that spectrum utilization is generally very low [4]. CR, with its ability 1 \u000Cto sense the unused bandwidth and adjust its transmission parameters accordingly, is an excellent candidate for improving spectrum utilization. Recognizing this, and to alleviate the looming spectrum-shortage crisis, the FCC [5] has suggested the use of CR technology in order to allow unlicensed users to share radio resources with licensed users while not unduly interfering with them. Orthogonal frequency division multiplexing (OFDM) is a frequency division multiplexing (FDM) scheme that uses a large number of closely spaced orthogonal subcarriers to carry data. It has been considered an appropriate modulation candidate for CR systems [6], not only because of its high spectral efficiency, but also its flexibility in dynamically allocating radio resources to multiple users and its low interference between adjacent subcarriers. PU active frequency bands W1 W2 Spectrum hole 1 3 5 Spectrum hole 7 9 11 13 15 17 19 Spectrum hole 21 23 25 27 29 31 Figure 1.1: PU active frequency bands, spectrum holes and CRU OFDM subchannels. Fig. 1.1 shows the spectrum in a typical OFDM-based CR system. The frequency bands that are currently used by the PUs are the shaded areas marked as W1 and W2 . The remaining areas are not occupied by the primary users (PUs) at this time and this geographic location. These vacant frequency bands, termed spectrum holes, can be used by CR users (CRUs). 2 \u000C1.2 Scope To implement CR technology, three main tasks are involved [2], namely, radio-scene analysis (radio environment estimation and spectrum hole detection), channel identification (channelstate information estimation and channel capacity prediction), and transmit-power control and dynamic spectrum management. In this thesis, we focus on the last task and aim to design efficient resource allocation (RA) algorithms for OFDM-based CR systems. 1.3 Motivation The introduction of CR technology poses new RA problems that need to be solved. Compared to conventional wireless communication systems, two new issues arise, namely, the interference power to the PU bands should be kept below a certain threshold and good quality of service (QoS) should be provided to CRUs in spite of the time-varying nature of the available spectrum. To make unlicensed sharing of the licensed spectrum a reality, PU operation must not be compromised. Thus, CRUs should monitor and keep the generated interference to PU bands to an acceptable level. To this end, the FCC Spectrum Policy Task Force [7] has recommended the use of interference temperature for assessing the level of interference. The specification of an interference temperature limit for a PU corresponds to a maximum allowed level of interference power; CRUs can use PU frequency bands as long as the total generated interference power to the PUs is kept below this limit. In a fading environment, a CRU signal may undergo deep fading and be received with very little power at the PU receiver. As a result, apart from the spectrum holes, CRUs can opportunistically share PU active frequency bands, as long as the total generated interference power at the PU receiver is below the specified interference power threshold. There are two main types of interference generated by CRUs sharing PU bands. One is the co-channel interference generated by CRUs using the PU active frequency bands, and the 3 \u000Cother is the cross-channel interference from the adjacent channels used by CRUs. Because of orthogonality, inter-carrier interference among CRU subcarriers can be ignored. However, since PUs may not be using OFDM, there could be cross-channel interference [8] generated to the PU bands from adjacent CRU bands and to CRU bands from adjacent PU bands. When a CRU shares spectrum holes as well as PU active-frequency bands, the capacity achievable by the CRU is higher than if PU active-frequency bands are left unused [9]. We refer to this type of sharing as aggressive sharing, since any portion of the spectrum may be utilized at any time. To enable aggressive sharing of the spectrum, new RA algorithms that make efficient use of the radio resource and keep the total generated interference to the PUs below the specified interference power thresholds are necessary. PU active frequency bands Guard bands W1 Spectrum hole 1 3 5 Guard bands W2 Spectrum hole 7 9 11 13 15 17 19 Spectrum hole 21 23 25 27 29 31 Figure 1.2: PU active frequency bands, guard bands, spectrum holes and CRU OFDM subchannels in a protective sharing system. In some practical situations, aggressive sharing may not be possible. This can happen, for example, when the CR system is co-located with a broadcast PU system in which there are so many PU receivers that the probability of keeping the interference power below the specified interference power threshold at all receivers is almost zero. In such situations, PU active frequency bands cannot be shared in order to avoid excessive co-channel interference. To reduce cross-channel interference, appropriate guard bands can be introduced, as indicated in Fig. 1.2. We refer to this type of spectrum sharing, in which interference to PU receivers 4 \u000Cneed not be considered in RA, as protective sharing. Fig. 1.3 shows the spectrum which is shared and the types of interference considered in RA for aggressive sharing and protective sharing. Aggressive sharing Protective sharing - shares both active and non-active PU bands - co-channel and cross-channel interference considered in RA - shares non-active PU bands - CRU interference to PU receivers not considered in RA Figure 1.3: Spectrum sharing methods. Note that RA algorithms designed for aggressive sharing systems can be applied to protective sharing systems by setting the PU interference power threshold at each active PU receiver equals to 0. However, the protective sharing model greatly simplifies RA design because CRU interference to PU receivers does not need to be considered. Since interference to the PUs does not need to be considered in protective sharing systems, it might seem that RA schemes designed for conventional OFDM systems apply directly to OFDM-based CR systems. However, in a CR system, besides the fading characteristics of wireless communication channels, the available transmission spectrum also changes over time. RA algorithms designed for conventional OFDM systems assume that the available spectrum is fixed, which is not the case in CR systems. Thus, new RA algorithms that take into account both the fading characteristics of the transmission channel and the time-varying nature of the available spectrum are needed. 5 \u000C1.4 1.4.1 Related Previous Work Resource Allocation Algorithms for OFDM-based CR Systems Algorithms Dealing with Cross-Channel Interference Cross-channel interference is considered in [10]\u00E2\u0080\u0093[12]. In [10], the bit and power loading problem is studied for the downlink of an OFDM-based CR system, in which the PU channel is located in the middle of a frequency band available to CRUs: an optimal scheme based on a Lagrange formulation and two suboptimal schemes are proposed assuming that there is only one CRU in the system. A similar model is used in [11] and [12] to study subcarrier, power, and bit allocation for multiple CRUs. Greedy algorithms are proposed based on minimum CRU power and minimum PU interference considerations. Algorithms Dealing with Co-Channel Interference The RA problem with co-channel interference has been studied in [13]\u00E2\u0080\u0093[16]. Different optimization problems are formulated and solved based on various interference-temperature-limit considerations. In [13], to simplify the problem, this limit is converted to a power constraint on each PU band by defining a protection area for the PUs. The power constraint is calculated based on a path loss factor and the distance between the edge of the protection area and the CRU transmitter. Interference per subchannel is considered in [14] for the single CRU case and in [15] for multiple CRU case. The optimization problems formulated in [16] for a multiple CRU and multiple PU system use two interference temperature models proposed in [17]. The first model, which assumes a unified interference temperature limit on each subchannel, is translated into an average interference power threshold at the measurement point. The second model, which assumes different interference temperature limits on different PU active frequency bands, is translated into an average interference power threshold at 6 \u000Ceach PU receiver. Instead of the interference temperature limit, some other means of protection for PU signals are considered in [18][19] and [20]. Minimum average rate is guaranteed in [18], by assuming that PUs are willing to be cooperative in RA. PU outage probability is ensured in [19]. In [20], the average PU transmission rate is maintained using CRU cooperation. The above-mentioned algorithms, designed for multiple CRUs, all assume that each subchannel can only be used by at most one CRU at any given time. In some situations, e.g., in an ad hoc system or a multicell cellular system, allowing multiple CRUs to share each subchannel can result in a higher spectrum utilization. In [21], a two-phase channel and power allocation scheme is proposed for multi-cell CR networks. In the first phase, resource allocation is done for all base stations (BSs) in a way that ensures that the interference power levels at the PU receivers do not exceed the predefined thresholds. In the second phase, the channels are allocated to the CRUs. In [22][23], CR systems with one channel are considered in which all CRUs access the channel at the same time, while keeping the total generated interference below the predefined interference temperature limit at a single measurement point. Two co-located cellular systems, consisting of one PU system and one CRU system, are studied in [24], in which the average generated interference from the CRUs to the PUs is ensured to be below the interference temperature limit. In [25], the generated interference to the PUs is limited by a per channel power mask, which specifies the highest power that can be used by a CRU on each channel. Algorithms Making Use of Spectrum Holes Studies assuming the use of spectrum holes appear in [26]\u00E2\u0080\u0093[28]. A spectrum-selection scheme is proposed in [26] for ad hoc networks, in which each user picks its channels based on a set of rules. The users try to maximize their own performance with minimal regard to overall system performance. In [27],[28], a game theoretic approach is utilized to solve the channel allocation problem based on the observation that users in CR systems may not be willing 7 \u000Cto cooperate with others but rather may selfishly try to maximize their own performance. A dynamic channel allocation scheme based on a potential game1 approach is proposed for ad hoc networks in [27]. In [28], a non-cooperative game is formulated to model the multi-channel allocation problem. In [30], although PU active-frequency bands are left unused, the subchannels in spectrum holes are shared among CRUs, with the objective of minimizing the total required power consumption while satisfying the CRUs\u00E2\u0080\u0099 data rate and bit error rate (BER) requirements. In [31], cross-layer based medium access control (MAC) protocols are proposed to allow CRUs to share the spectrum holes, which are detected by integrated physical (PHY) layer spectrum-sensing policies. The goal in [32] is to minimize CRU throughput variance in a single-user CR system. In [33], the power allocation problem for a single CRU is cast as a rate-maximization problem that considers the risk of losing a certain subchannel due to PU activity. 1.4.2 Resource Allocation Algorithms for OFDM Systems Centralized Physical (PHY) Layer Approach The bit and power loading problem for single-user OFDM systems can be solved by using the well-known water-filling [34] algorithm if we assume that the number of bits to be loaded is a real number, or implement a greedy approach that assigns one bit at a time to the subcarrier that requires the least additional power for the integer bit case [35]. To reduce computational complexity for the integer bit case, various low complexity algorithms have been proposed, for both optimal (e.g. [36, 37]) and suboptimal solutions (e.g., [38]\u00E2\u0080\u0093[40]). In the case of the downlink transmission of a BS to multiple users, the subchannels need to be assigned to users exclusively [41]. Therefore, RA involves subchannel assignment in addition to power and bit allocation. When the goal is to maximize system throughput, the 1 In game theory, a potential game is one in which the incentive of all players to change their strategies can be expressed in one global function, the potential function [29]. 8 \u000Cproblem can be solved in two separate steps [41], namely, assigning each subchannel to the user with the best channel condition, followed by power and bit allocation. When there are QoS or fairness requirements, subchannel, bit, and power allocation becomes more complicated. Since optimal solutions are generally computationally complex, various sub-optimal solutions have been proposed. In [42]\u00E2\u0080\u0093[45], suboptimal solutions are proposed to minimize the total transmit power while satisfying rate and BER requirements for real-time (RT) services. For non-real-time (NRT) services, maximizing system throughput while guaranteeing a certain level of fairness among users is a reasonable goal [46]\u00E2\u0080\u0093[49]. Most of these suboptimal solutions use a divide-and-conquer approach, in which the subcarrier, power, and bit allocation problem is broken down into two steps, i.e., allocate subcarriers to users and load appropriate power and bits to each subcarrier. During the first step, power is often assumed to be the same across all subcarriers so as to simplify the problem. Centralized Medium Access Control (MAC) Layer Approach RA also occurs in the MAC layer, which is responsible for packet scheduling. Almost all existing studies extend opportunistic scheduling [50] strategies for the single carrier case to the multiuser OFDM case with multiple subcarriers. For NRT services, some schemes, e.g., [43][51], extend the proportional fair (PF) rule [52], while others (e.g., [53]) extend the modified-largest weighted delay first (M-LWDF) rule [54] for RT traffic. An urgency and efficiency based packet scheduling (UEPS) algorithm is proposed in [55] for both RT and NRT services using an urgency factor that reflects the urgency of meeting QoS requirements combined with the PF rule to maximize system throughput. The urgency factor approach has previously been used in the single carrier case [56]. Centralized Cross-Layer Approach Some researchers have adopted a cross-layer design approach in allocating system resources. In [57]\u00E2\u0080\u0093[59], sub-optimal algorithms for NRT services are proposed; algorithms for both RT 9 \u000Cand NRT services are studied in [60] and [61]. In [60], the QoS for RT applications is improved by giving high priority to users whose head-of-line (HOL) packet deadlines are approaching. In [61], the MAC layer QoS requirement for each user is converted to a PHY layer fixed rate requirement based on the average user packet arrival rate and delay constraint. An optimal subchannel and power allocation strategy is proposed that maximizes system throughput subject to a total transmit power limit and user delay requirements. Distributed Approach While centralized RA is suitable for single-cell systems, distributed algorithms may be more appropriate for multi-cell cellular systems or ad hoc systems. Although distributed dynamic channel allocation (DCA) has been studied for multiple cell cellular networks for voice services, it cannot be easily ported to multiuser OFDM systems. This is because traditional DCA schemes assume homogeneous applications with a pre-determined SINR (signal to noise and interference ratio) threshold, and may not efficiently support services with different requirements. To dynamically allocate resources in a multi-cell system or an ad hoc system, subcarriers may be simultaneously shared among served users in order to improve system performance. In this case, co-channel interference has to be considered. In [62], other users\u00E2\u0080\u0099 signals are treated as noise, and the power allocation problem is viewed as a non-cooperative game. A distributed iterative waterfilling (ITWF) algorithm is proposed for digital subscriber line (DSL) systems. To achieve the optimal power allocation solution, the achievable target rates must be known. This is not a big problem for DSL systems, but is unrealistic for time-varying wireless channels. To make ITWF suitable for wireless systems, a scheme is proposed in [63] for multi-cell wireless systems in which a virtual referee is introduced to displace some users out of certain subchannels when necessary, to allow ITWF to converge to good solutions. Power and bit allocation for multiuser OFDM systems with co-channel interference have 10 \u000Cbeen formulated as a constrained nonlinear programming problem in [64]. To reduce the complexity of finding a solution, a distributed algorithm is proposed that allocates one bit per iteration. 1.5 Objectives The overall goal of the thesis is to design efficient RA algorithms using both aggressive and protective sharing for OFDM-based CR systems. In the category of aggressive sharing, although cross-channel and co-channel interferences to the PUs have been considered by different researchers separately, they have not been considered jointly. To ensure the PUs\u00E2\u0080\u0099 normal operation, the total generated interference power to the PUs has to be kept below the specified interference power thresholds. Therefore, both cross-channel and co-channel interference have to be taken into account in RA, especially in cases where the PUs do not use OFDM. Our first objective is to Objective 1: Devise efficient RA algorithms to allocate subchannels, powers, and bits in OFDM-based CR systems, which aggressively share both the spectrum holes and PU active frequency bands while guaranteeing that the total generated interference power due to cross-channel and co-channel interference does not exceed the specified interference power threshold of each PU. In the category of protective sharing, most existing studies focus on dynamic channel allocation, and few consider the influence of the time-varying nature of the available spectrum on QoS and fairness of CRUs. In this thesis, our second objective is to Objective 2: Design efficient RA algorithms in OFDM-based CR systems with QoS provisioning and fairness considerations to operate in a fading environment with time-varying spectrum, and protectively share the spectrum holes without generating undue interference to the PUs. 11 \u000C1.6 Thesis Overview This thesis is written in the manuscript-based format according to the guidelines established by The University of British Columbia. Each chapter has its own reference list. The relationships among the chapters are shown in Fig. 1.4 and described below. RA algorithms that aggressively share PU bands are discussed in Chapters 2 and 3, and RA algorithms that protectively share PU bands are studied in Chapters 4 to 8. Subchannnel, power and bit allocation for multiple CRUs in a multi-cell cellular system is studied in Chapter 2. Each cell is treated as a CRU system consisting of one cognitive radio BS (CRBS) and multiple CRUs. Subchannel allocation is performed within each cell. Power and bit allocation is done across all the cells. Considering co-channel interference among multiple CRUs, as well as cross-channel and co-channel interference resulting from CRU sharing of PU bands, the RA problem is formulated as a multidimensional knapsack problem (MDKP). A low-complexity suboptimal solution is proposed for the formulated MDKP problem. In Chapter 3, a simplification of the model proposed in Chapter 2 is formulated which allows for a faster algorithm. The simplification is based on the fact that cross-channel interference from CRUs to PUs is negligible except for a few subchannels adjacent to the PU bands. Assuming that the bandwidth of a PU is much larger than that of a subchannel in an OFDM-based CR system and that there is usually a guard band between two adjacent PU bands, cross-channel interference from any CRU subchannel impacts mostly one PU band, instead of several PU bands as assumed in Chapter 2. In Chapter 4, the performance of the plain equal power allocation (PEPA) algorithm, which allocates the same amount of power to each available subchannel, is studied for the continuous bits case for multiple OFDM-based CR systems. When the goal is to maximize system throughput, the difference between PEPA and the optimal solution is shown to be small. 12 \u000C13 - RA for OFDM-based multi-cell CR systems - Both cross-channel and co-channel interference considered in the model - A generalized multidimensional knapsack problem formulation - Low-complexity suboptimal solution proposed using a greedy approach Chapter 2 Main focus: CRU interference power at PU receivers. Aggressive sharing - RA for OFDM-based single-cell CR systems - Low complexity suboptimal solution proposed Chapter 3 A simplified model Distributed algorithm Figure 1.4: Thesis overview. Centralized algorithm RT Services - On-time RT packet delivery Cross-layer design Goal programming RT and NRT Services - On-time RT packet delivery - NRT user nominal rates - RA for multiuser OFDM-based single-cell CR systems - Dynamic conversion of CRU MAC layer QoS requirements to PHY layer rate requirements - Problem feasibility issue solved using a goal programming approach - RA for ad hoc or multi-cell OFDM-based CR systems - Distributed algorithm studied - System throughput maximized with user nominal rates achieved if system resource is plentiful - Fair degradation provided if system resource is limited - Performance evaluation of PEPA for multiuser OFDM systems, suitable for CR systems - Continuous and discrete bit cases - A simple to implement discrete bit PEPA algorithm proposed Chapter 6 Chapter 8 Equal subchannel power allocation Convex optimization - RA for a multiuser OFDM-based single-cell CR system - User proportional rates maintained Chapter 7 Chapter 5 - Performance evaluation of PEPA for multiuser OFDM-based CR systems - Continuous bit case - Two subchannel assignment strategies studied Chapter 4 Main focus: time-varying nature of the available system resource, QoS and fairness among CRUs. Protective sharing \u000CThe performance difference between PEPA and the optimal solution for both the continuous and discrete bits case in a multiuser OFDM system is examined in Chapter 5. A low-complexity discrete bit PEPA algorithm is proposed that can also be used in an OFDMbased CR system. In Chapter 6, the subchannel, bit and power allocation problems at the PHY layer and QoS requirements at the MAC layer are considered jointly for RT services on the downlink of a multiuser OFDM-based CR system. The proposed algorithm is designed to provide satisfactory QoS to RT applications is spite of the rapidly changing available resources resulting from PU activities. The RT CRU MAC layer QoS requirements are dynamically converted to PHY layer rate requirements; the conversion depends on the delivery status of queued packets as well as the number of available subchannels. As an extension, the RA problem for a mixture of RT and NRT services is also considered. The time-varying nature of the number of OFDM subchannels available to CRUs gives rise to two resource allocation issues, namely problem feasibility and false urgency. To solve the problem feasibility issue, which arises when resources are insufficient to meet all user QoS requirements, we adopt a goal programming approach. The false urgency issue is effectively avoided by a proposed rate requirement calculation mechanism based on the status of the packets in queue and system resource availability. A optimization problem is formulated and the optimal solution is provided. In Chapter 7, we study the RA problem in a multiuser OFDM-based CR system for NRT applications in which average user data rates are to be maintained proportionally. In contrast to existing algorithms designed for multiuser OFDM systems, which are unable to guarantee users proportional rates when applied to a CR system, we propose an optimal RA algorithm that ensures CR user rates are maintained in proportion to predefined target rates, while at the same time providing an improved system throughput. The protective sharing RA algorithms in Chapters 4 to 7 are designed for systems in which centralized algorithms are appropriate. In Chapter 8, we consider RA in an ad hoc 14 \u000Csystem, in which a distributed algorithm is more practical. In a resource-limited situation under which the nominal rate requirements of users cannot be satisfied, it is desirable to provide fair degradation among users. In a situation with abundant resources, we may choose to maximize system throughput while ensuring that user nominal rate requirements are met. RA is formulated as a single objective non-linear optimization problem for which a distributed algorithm is proposed. In Chapters 2 to 7, knowledge of the subchannel power gain from each CRBS to each CRU is assumed. Gathering this information efficiently is an important practical problem which deserves further study. In Chapter 8, we assume that each CR transmitter knows the subchannel power gain to its own receiver. In Chapter 9, the various proposed RA algorithms designed for OFDM-based CR systems are summarized. The main contributions of the thesis and suggestions for future research are presented. 15 \u000CReferences [1] J. Mitola III and G. Q. Maguire, Jr., \u00E2\u0080\u009CCognitive radio: making software radios more personal,\u00E2\u0080\u009D IEEE Personal Communications, vol. 6, no. 4, pp. 13\u00E2\u0080\u009318, August 1999. [2] S. Haykin, \u00E2\u0080\u009CCognitive radio: brain-empowered wireless communications,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201\u00E2\u0080\u0093220, February 2005. [3] National Telecommunications and \u00E2\u0080\u009CUnited states frequency allocation http://www.ntia.doc.gov/osmhome/allochrt.html Information Administration, chart.\u00E2\u0080\u009D [Online]. Available: [4] D. Cabric, S. M. Mishra, D. Willkomm, R. Brodersen, and A. Wolisz, \u00E2\u0080\u009CA cognitive radio approach for usage of virtual unlicensed spectrum,\u00E2\u0080\u009D in Proc. of 14th IST Mobile Wireless Communications Summit, Dresden, Germany, June 2005. [5] Federal Communications Commission, \u00E2\u0080\u009CFacilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies,\u00E2\u0080\u009D notice of proposed rulemaking and order, FCC 03-322, 2003. [6] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [7] Federal Communications Commission, \u00E2\u0080\u009CSpectrum Policy Task Force Report,\u00E2\u0080\u009D FCC 02135, 2002. [8] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [9] A. Ghasemi and E. S. Sousa, \u00E2\u0080\u009CFundamental limits of spectrum-sharing in fading environments,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 6, no. 2, pp. 649\u00E2\u0080\u0093658, February 2007. [10] G. Bansal, M. J. Hossain, and V. K. Bhargava, \u00E2\u0080\u009CAdaptive power loading for OFDMbased cognitive radio systems,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009907), Glasgow, Scotland, June 2007, pp. 5137 \u00E2\u0080\u0093 5142. [11] T. Qin and C. Leung, \u00E2\u0080\u009CFair adaptive resource allocation for multiuser OFDM cognitive radio systems,\u00E2\u0080\u009D in Proc. of Second International Conference on Communications and Networking in China (CHINACOM \u00E2\u0080\u009907), Shanghai, China, August 2007, pp. 115\u00E2\u0080\u0093119. [12] \u00E2\u0080\u0094\u00E2\u0080\u0094, \u00E2\u0080\u009CA cost minimization algorithm for a multiuser OFDM cognitive radio system,\u00E2\u0080\u009D in Proc. of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim 2007), Victoria, BC, Canada, August 2007, pp. 518\u00E2\u0080\u0093521. 16 \u000C[13] P. Wang, M. Zhao, L. Xiao, S. Zhou, and J. Wang, \u00E2\u0080\u009CPower allocation in OFDMbased cognitive radio systems,\u00E2\u0080\u009D in Proc. of IEEE Global Telecommunications Conference (GLOBECOM \u00E2\u0080\u009907), Washington, DC, USA, November 2007, pp. 4061\u00E2\u0080\u00934065. [14] H. Hu, W. Zhou, and J. Song, \u00E2\u0080\u009CA dynamic spectrum sharing scheme based on SAOFDM for cognitive radios,\u00E2\u0080\u009D in Proc. of Future generation communication and networking (FGCN 2007), Jeju-Island, Korea, December 2007, pp. 274\u00E2\u0080\u0093278. [15] T. Peng, W. Wang, Q. Lu, and W. Wang, \u00E2\u0080\u009CSubcarrier allocation based on water-filling level in OFDMA-based cognitive radio networks,\u00E2\u0080\u009D in Proc. of International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2007), September 2007, pp. 196\u00E2\u0080\u0093199. [16] P. Cheng, Z. Zhang, H.-H. Chen, and P. Qiu, \u00E2\u0080\u009COptimal distributed joint frequency, rate and power allocation in cognitive OFDMA systems,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 815\u00E2\u0080\u0093826, July 2008. [17] T. C. Clancy, \u00E2\u0080\u009CFormalizing the interference temperature model,\u00E2\u0080\u009D Wiley Wireless Communications and Mobile Computing, vol. 7, no. 9, pp. 1077 \u00E2\u0080\u0093 1086, May 2007. [18] J.-A. Bazerque and G. B. Giannakis, \u00E2\u0080\u009CDistributed scheduling and resource allocation for cognitive OFDMA radios,\u00E2\u0080\u009D in Proc. of 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2007), Orlando, FL, USA, August 2007, pp. 343\u00E2\u0080\u0093350. [19] Y. Chen, G. Yu, Z. Zhang, H.-H. Chen, and P. Qiu, \u00E2\u0080\u009COn cognitive radio networks with opportunistic power control strategies in fading channels,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 7, no. 7, pp. 2752\u00E2\u0080\u00932761, July 2008. [20] H. Luo, G. Yu, and Z. Zhang, \u00E2\u0080\u009COptimal bit and power allocation in broadband cognitive radio system,\u00E2\u0080\u009D in Proc. of IEEE 67th Vehicular Technology Conference (VTC 2008Spring), Marina Bay, Singapore, May 2008, pp. 1569\u00E2\u0080\u00931573. [21] A. T. Hoang and Y. C. Liang, \u00E2\u0080\u009CA two-phase channel and power allocation scheme for cognitive radio networks,\u00E2\u0080\u009D in Proc. of 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, September 2006, pp. 1\u00E2\u0080\u00935. [22] J. Huang, R. A. Berry, and M. L. Honig, \u00E2\u0080\u009CAuction-based spectrum sharing,\u00E2\u0080\u009D Springer Mobile Networks and Applications, vol. 11, no. 3, pp. 405\u00E2\u0080\u0093408, June 2006. [23] Y. Xing, C. N. Mathur, M. A. Haleem, R. Chandramouli, and K. P. Subbalakshmi, \u00E2\u0080\u009CDynamic spectrum access with QoS and interference temperature constraints,\u00E2\u0080\u009D IEEE Transactions on Mobile Computing, vol. 6, no. 4, pp. 423\u00E2\u0080\u0093433, April 2007. [24] A. Attar, O. Holland, M. R. Nakhai, and A. H. Aghvami, \u00E2\u0080\u009CInterference-limited resource allocation for cognitive radio in orthogonal frequency-division multiplexing networks,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 806\u00E2\u0080\u0093814, July 2008. 17 \u000C[25] F. Wang, M. Krunz, and S. Cui, \u00E2\u0080\u009CPrice-based spectrum management in cognitive radio networks,\u00E2\u0080\u009D IEEE Journal of Selected Topics in Signal Processing, vol. 2, no. 1, pp. 74\u00E2\u0080\u009387, February 2008. [26] H. Zheng and L. Cao, \u00E2\u0080\u009CDevice-centric spectrum management,\u00E2\u0080\u009D in Proc. of 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), Baltimore, MD, USA, November 2005, pp. 56\u00E2\u0080\u009365. [27] N. Nie and C. Comaniciu, \u00E2\u0080\u009CAdaptive channel allocation spectrum etiquette for cognitive radio networks,\u00E2\u0080\u009D Springer Mobile Networks and Applications, vol. 11, no. 6, pp. 779\u00E2\u0080\u0093797, December 2006. [28] M. Felegyhazi, M. Cagalj, S. S. Bidokhti, and J.-P. Hubaux, \u00E2\u0080\u009CNon-cooperative multiradio channel allocation in wireless networks,\u00E2\u0080\u009D in Proc. of 26th IEEE International Conference on Computer Communications (INFOCOM 2007), Anchorage, AK, USA, May 2007, pp. 1442\u00E2\u0080\u00931450. [29] D. Monderer and L. S. Shapley, \u00E2\u0080\u009CPotential games,\u00E2\u0080\u009D Elsevier Games and Economic Behavior, vol. 14, no. 1, pp. 124\u00E2\u0080\u0093143, May 1996. [30] Q. Qu, L. B. Milstein, and D. R. Vaman, \u00E2\u0080\u009CCognitive radio based multi-user resource allocation in mobile ad hoc networks using multi-carrier CDMA modulation,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 70\u00E2\u0080\u009382, January 2008. [31] H. Su and X. Zhang, \u00E2\u0080\u009CCross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 118\u00E2\u0080\u0093129, January 2008. [32] J. W. Mwangoka, K. B. Letaief, and Z. Cao, \u00E2\u0080\u009CRobust end-to-end QoS maintenance in non-contiguous OFDM based cognitive radios,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009908), Beijing, China, May 2008, pp. 2905\u00E2\u0080\u00932909. [33] Z. H. Hashmi, \u00E2\u0080\u009CDynamic resource allocation for cognitive radio systems,\u00E2\u0080\u009D Master\u00E2\u0080\u0099s thesis, The University of British Columbia, June 2008. [34] R. G. Gallager, Information Theory and Reliable Communication. Wiley & Sons, 1968. New York: John [35] D. Hughes-Hartogs, \u00E2\u0080\u009CEnsemble modem structure for imperfect transmission media,\u00E2\u0080\u009D U.S. Patents Nos. 4,679,277 (July 1987), 4,731,816 (March 1988), and 4,833,706 (May 1989). [36] B. S. Krongold, K. Ramchandran, and D. L. Jones, \u00E2\u0080\u009CComputationally efficient optimal power allocation algorithms for multicarrier communication systems,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 48, no. 1, pp. 23\u00E2\u0080\u009327, January 2000. [37] N. Papandreou and T. Antonakopoulos, \u00E2\u0080\u009CA new computationally efficient discrete bitloading algorithm for DMT applications,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 53, no. 5, pp. 785\u00E2\u0080\u0093789, May 2005. 18 \u000C[38] P. S. Chow, J. M. Cioffi, and J. A. C. Bingham, \u00E2\u0080\u009CA practical discrete multitone transceiver loading algorithm for data transmission over spectrally shaped channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 43, no. 234, pp. 773\u00E2\u0080\u0093775, February/March/April 1995. [39] J. Campello, \u00E2\u0080\u009CPractical bit loading for DMT,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009999), vol. 2, Vancouver, BC, Canada, June 1999, pp. 801\u00E2\u0080\u0093805. [40] L. Piazzo, \u00E2\u0080\u009CFast algorithm for power and bit allocation in OFDM systems,\u00E2\u0080\u009D IEE Electronics Letters, vol. 35, no. 25, pp. 2173\u00E2\u0080\u00932174, December 1999. [41] J. Jang and K. B. Lee, \u00E2\u0080\u009CTransmit power adaptation for multiuser OFDM systems,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 21, no. 2, pp. 171\u00E2\u0080\u0093178, February 2003. [42] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, \u00E2\u0080\u009CMultiuser OFDM with adaptive subcarrier, bit, and power allocation,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 17, no. 10, pp. 1747\u00E2\u0080\u00931758, October 1999. [43] M. Ergen, S. Coleri, and P. Varaiya, \u00E2\u0080\u009CQoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems,\u00E2\u0080\u009D IEEE Transactions on Broadcasting, vol. 49, no. 4, pp. 363\u00E2\u0080\u0093370, December 2003. [44] G. Zhang, \u00E2\u0080\u009CSubcarrier and bit allocation for real-time services in multiuser OFDM systems,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC 2004), vol. 5, Paris, France, June 2004, pp. 2985\u00E2\u0080\u00932989. [45] G. Yu, Z. Zhang, Y. Chen, J. Shi, and P. Qiu, \u00E2\u0080\u009CA novel resource allocation algorithm for real-time services in multiuser OFDM systems,\u00E2\u0080\u009D in Proc. of IEEE 63rd Vehicular Technology Conference (VTC 2006-Spring), vol. 3, Melbourne, Australia, May 2006, pp. 1156\u00E2\u0080\u00931160. [46] Z. Shen, J. G. Andrews, and B. L. Evans, \u00E2\u0080\u009CAdaptive resource allocation in multiuser OFDM systems with proportional rate constraints,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 6, pp. 2726\u00E2\u0080\u00932737, November 2005. [47] I. C. Wong, Z. Shen, B. L. Evans, and J. G. Andrews, \u00E2\u0080\u009CA low complexity algorithm for proportional resource allocation in OFDMA systems,\u00E2\u0080\u009D in Proc. of IEEE Workshop on Signal Processing Systems (SIPS 2004), Austin, TX, USA, October 2004, pp. 1\u00E2\u0080\u00936. [48] C. Mohanram and S. Bhashyam, \u00E2\u0080\u009CA sub-optimal joint subcarrier and power allocation algorithm for multiuser OFDM,\u00E2\u0080\u009D IEEE Communication Letters, vol. 9, no. 8, pp. 685\u00E2\u0080\u0093 687, August 2005. [49] G. Yu, Z. Zhang, Y. Chen, P. Cheng, and P. Qiu, \u00E2\u0080\u009CSubcarrier and bit allocation for OFDMA systems with proportional fairness,\u00E2\u0080\u009D in Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2006), vol. 3, Las Vegas, NV, USA, April 2006, pp. 1717\u00E2\u0080\u00931722. 19 \u000C[50] R. Knopp and P. A. Humblet, \u00E2\u0080\u009CInformation capacity and power control in single-cell multiuser communications,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009995), vol. 1, Seattle, WA, USA, June 1995, pp. 331\u00E2\u0080\u0093335. [51] P. Svedman, S. K. Wilson, and B. Ottersten, \u00E2\u0080\u009CA QoS-aware proportional fair scheduler for opportunistic OFDM,\u00E2\u0080\u009D in Proc. of IEEE 60th Vehicular Technology Conference (VTC 2004-Fall), vol. 1, Los Angeles, CA, USA, September 2004, pp. 558\u00E2\u0080\u0093562. [52] P. Viswanath, D. N. C. Tse, and R. Laroia, \u00E2\u0080\u009COpportunistic beamforming using dumb antennas,\u00E2\u0080\u009D IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1277 \u00E2\u0080\u0093 1294, June 2002. [53] P. Parag, S. Bhashyam, and R. Aravind, \u00E2\u0080\u009CA subcarrier allocation algorithm for OFDMA using buffer and channel state information,\u00E2\u0080\u009D in Proc. of IEEE 62nd Vehicular Technology Conference (VTC 2005-Fall), vol. 1, Dallas, TX, USA, September 2005, pp. 622\u00E2\u0080\u0093625. [54] M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, P. Whiting, and R. Vijayakumar, \u00E2\u0080\u009CProviding quality of service over a shared wireless link,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 39, no. 2, pp. 150\u00E2\u0080\u0093154, February 2001. [55] S. Ryu, B. H. Ryu, H. Seo, M. Shin, and S. Park, \u00E2\u0080\u009CWireless packet scheduling algorithm for OFDMA system based on time-utility and channel state,\u00E2\u0080\u009D ETRI Journal, vol. 27, no. 6, pp. 777\u00E2\u0080\u0093787, 2005. [56] P. Liu, R. Berry, and M. L. Honig, \u00E2\u0080\u009CDelay-sensitive packet scheduling in wireless networks,\u00E2\u0080\u009D in Proc. of IEEE Wireless Communications and Networking (WCNC 2003), vol. 3, New Orleans, LA, USA, March 2003, pp. 1627\u00E2\u0080\u00931632. [57] G. Song and Y. Li, \u00E2\u0080\u009CCross-layer optimization for OFDM wireless networks-part I: theoretical framework,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 2, pp. 614\u00E2\u0080\u0093624, March 2005. [58] Y. J. Zhang and K. B. Letaief, \u00E2\u0080\u009CEnergy-efficient MAC-PHY resource management with guaranteed QoS in wireless OFDM networks,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC 2005), vol. 5, Seoul, Korea, May 2005, pp. 3127\u00E2\u0080\u00933131. [59] C. Mohanram and S. Bhashyam, \u00E2\u0080\u009CJoint subcarrier and power allocation in channelaware queue-aware scheduling for multiuser OFDM,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp. 3208\u00E2\u0080\u00933213, September 2007. [60] S. S. Jeong, D. G. Jeong, and W. S. Jeon, \u00E2\u0080\u009CCross-layer design of packet scheduling and resource allocation in OFDMA wireless multimedia networks,\u00E2\u0080\u009D in Proc. of IEEE 63rd Vehicular Technology Conference (VTC 2006-Spring), vol. 1, Melbourne, Australia, May 2006, pp. 309\u00E2\u0080\u0093313. [61] D. S. W. Hui, V. K. N. Lau, and W. H. Lam, \u00E2\u0080\u009CCross-layer design for OFDMA wireless systems with heterogeneous delay requirements,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 6, no. 8, pp. 2872\u00E2\u0080\u00932880, August 2007. 20 \u000C[62] W. Yu, G. Ginis, and J. M. Cioffi, \u00E2\u0080\u009CDistributed multiuser power control for digital subscriber lines,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 20, no. 5, pp. 1105\u00E2\u0080\u00931115, June 2002. [63] Z. Han, Z. Ji, and K. J. R. Liu, \u00E2\u0080\u009CNon-cooperative resource competition game by virtual referee in multi-cell OFDMA networks,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1079\u00E2\u0080\u00931090, August 2007. [64] G. Kulkarni, S. Adlakha, and M. Srivastava, \u00E2\u0080\u009CSubcarrier allocation and bit loading algorithms for OFDMA-based wireless networks,\u00E2\u0080\u009D IEEE Transactions on Mobile Computing, vol. 4, no. 6, pp. 652\u00E2\u0080\u0093662, November-December 2005. 21 \u000CChapter 2 Subcarrier, Bit and Power Allocation for Multiuser OFDM-based Multi-Cell Cognitive Radio Systems 2.1 Introduction In many jurisdictions, there is a scarcity of unallocated frequency bands below 6 GHz. At the same time, studies have found that the utilization of a large portion of the allocated (licensed) bands is very low [1]. It has been suggested [2] that one promising approach to solving the spectrum shortage crisis is to use cognitive radio (CR) technology [3][4]. In a CR system, cognitive radio users (CRUs) are allowed to use licensed bands as long as the (licensed) primary users (PUs) are not unduly affected. In order to assess the level of interference, the FCC Spectrum Policy Task Force [5] has recommended the use of the interference temperature. The specification of an interference temperature limit for a PU corresponds to a maximum allowed interference power and makes it possible for CRUs to use both non-active and active PU bands in a controlled fashion. As explained in [6], OFDM is an attractive modulation candidate for CRUs. The subcarrier, bit and power (resource) allocation optimization problem for OFDM has been studied in the literature (e.g. [7]). However, since a PU may not use OFDM technology, cross-channel interference [8] could be generated by a CRU using a subchannel adjacent to the PU band, and from the PU transmitter to the CRU\u00E2\u0080\u0099s subchannels. Co-channel interference arises when 1 The material in this chapter is largely based on the following: (1) Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CResource Allocation in an OFDM-based Cognitive Radio System,\u00E2\u0080\u009D accepted for publication in IEEE Transactions on Communications. (2) Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CSubcarrier, Bit and Power Allocation for Multiuser OFDM-based Multi-Cell Cognitive Radio Systems,\u00E2\u0080\u009D IEEE 68th Vehicular Technology Conference (VTC 2008-fall), Calgary, Canada, Sept. 2008. 22 \u000Ca CRU uses an active PU band. Thus, for CR systems in which the PUs do not use OFDM, both cross-channel and co-channel interference between the PUs and the CRUs have to be considered. Cross-channel interference is considered in [9][10]. The bit and power loading problem for the downlink of an OFDM-based CR system is studied in [9] using a model in which the active PU\u00E2\u0080\u0099s channel is located in the middle of a frequency band which is available to CRUs. A scheme based on a non-integer Lagrange formulation and two suboptimal schemes are proposed for one CRU. A similar model is used in [10] to study subcarrier, power, and bit allocation for multiple CRUs. A greedy algorithm is proposed based on minimum CRU power and minimum PU interference considerations. The model with a single continuous PU frequency band in [9][10] is somewhat unrealistic in practice. Furthermore, active PU bands can also be utilized as long as such use does not interfere unduly with PU receivers. Some resource allocation (RA) algorithms consider co-channel interference. A single CRU case is studied in [11] and a multiple CRU case is studied in [12], in which each subchannel can only be used by at most one CRU at any given time. Multiple CRUs are allowed to share a subchannel in [13]\u00E2\u0080\u0093[17]. In [13], a two-phase channel and power allocation scheme is proposed for multi-cell CR networks. In the first phase, RA is done for all base stations (BSs), in a way that ensures that the interference power levels at the PU receivers do not exceed the predefined thresholds. In the second phase, the channels are allocated to the CRUs. In [14][15], CR systems with one channel are considered in which all CRUs access the channel at the same time, while keeping the total generated interference below the predefined interference temperature limit at a single measurement point. Two co-located cellular systems, consisting of one PU system and one CRU system, are studied in [16], in which the average generated interference from the CRUs to the PUs is ensured to be below the interference temperature limit. In [17], the generated interference to the PUs is limited by a per channel power mask, which specifies the highest power that can be used by a CRU on each channel. 23 \u000CTo the best of our knowledge, there is no published work in which both cross-channel and co-channel interference are considered to allow CRUs to use non-active PU bands as well as active PU bands. In this chapter, we study the subcarrier, bit and power allocation problem for multiuser OFDM-based CR systems in which one or more spectrum holes exist between multiple PU frequency bands, and CRUs are able to use any portion of the frequency band as long as this does not interfere unduly with the PUs. We formulate the RA problem as a multidimensional knapsack problem (MDKP) and propose to a low-complexity algorithm to solve it. 2.2 System Model Consider a CR system with total bandwidth W Hz and L PUs. The nominal bandwidth of PU l ranges from fc + FlP U to fc + FlP U + Wl . The equivalent baseband power spectral density (PSD) of PU l\u00E2\u0080\u0099s signal is \u00CE\u00A6Pl U (f ). The maximum interference power that PU l can tolerate is Ilth = Tlth \u00E2\u0088\u0097 Wl [5], where Tlth is the interference temperature limit of PU l. The frequency bands that are currently carrying PU signals which can be detected by a receiver are referred to as active; non-active bands are also termed spectrum holes. Assume that there are K CR base stations (CRBSs), all of which use OFDM. We are interested in downlink transmissions from the CRBSs to CRUs. The CRBSs may use both active bands and spectrum holes provided that the total interference in PU l\u00E2\u0080\u0099s active band does not exceed Ilth . The CR system accomodates M equally spaced OFDM subcarriers; the nominal bandwidth of subband m, m = {1, 2, . . . , M }, ranges from fc + (m \u00E2\u0088\u0092 1)\u00E2\u0088\u0086f to fc + m\u00E2\u0088\u0086f . Each subchannel can be used by a CRBS to transmit to at most one of its CRUs at a time. At each scheduling time, each CRBS chooses the CRU for transmission for each subchannel based on the CRUs\u00E2\u0080\u0099 quality of service (QoS) requirements using some subchannel assignment strategy, e.g., the one described in Section 2.6.2. It is sometimes convenient to refer to 24 \u000CCRBS k and its CRUs collectively as cognitive radio pair (CRP) k. The number of CRUs for CRBS k is denoted by nCRU,k . The subchannels are modelled in discrete-time, with the timevarying gain for subchannel m from CRBS i to CRBS j\u00E2\u0080\u0099s CRU (receiver) denoted by It is assumed that the power gains m gj,i m gj,i . are outcomes of independent random variables (rv\u00E2\u0080\u0099s), and that there is no inter-carrier interference (ICI). Each subchannel is shared by all CRBSs, and the signals from other CRBSs are considered to be interference to any given CRBS\u00E2\u0080\u0099s receiver. The power gains for subchannel m from CRBS k to PU l\u00E2\u0080\u0099s receiver are denoted by hm l,k . Each subchannel of a CRP suffers two types of interference, one from the PUs, and the other from other CRBSs which are transmitting on the same subchannel. The signal to interference plus noise ratio (SINR), \u00CE\u00B3k,m , at the output of the OFDM receiver filter for subchannel m of CRP k\u00E2\u0080\u0099s receiver can be written as \u00CE\u00B3k,m = m gk,k sk,m . 2 PU CR \u00CF\u00830 + Ik,m + Ik,m (2.1) In (2.1), sk,m is the transmit power, \u00CF\u008302 is the additive white Gaussian noise (AWGN) noise CR power, Ik,m = L l=1 i=k m PU gk,i si,m is the interference power from the other CRBSs and Ik,m = PU PU fk,l,m is the interference power from the PU transmitters, where fk,l,m can be calculated as \u00E2\u0088\u009E PU fk,l,m dnk,l = n=\u00E2\u0088\u0092\u00E2\u0088\u009E In (2.2), Hm (f ) 3 sinc 2 (m+n)\u00E2\u0088\u0086f \u00E2\u0088\u0092(FlP U + 12 Wl ) (m+n\u00E2\u0088\u00921)\u00E2\u0088\u0086f \u00E2\u0088\u0092(FlP U + 12 Wl ) |Hm (f )|2 \u00CE\u00A6Pl U (f )df . (2.2) f \u00E2\u0088\u0092 (m \u00E2\u0088\u0092 12 )\u00E2\u0088\u0086f + FlP U + 12 Wl is the OFDM receiver filter fre- quency response, chosen so that the CRBS signal powers at the input and output of the filter are equal. The term dnk,l , n \u00E2\u0088\u0088 Z represents the power gain for the subband which ranges from fc + (n \u00E2\u0088\u0092 1)\u00E2\u0088\u0086f to fc + n\u00E2\u0088\u0086f . Assuming MQAM modulation and that the total interference can be modelled as AWGN, for a given bit error rate (BER), the number of bits per OFDM symbol, rk,m , which can be 25 \u000Csupported by subchannel m of CRP k can be approximated in many cases [18, 19] rk,m \u00E2\u0089\u0088 log2 (1 + \u00CE\u00B3k,m ) \u00CE\u0093 (2.3) where \u00CE\u0093 is a SNR gap parameter which indicates how far the system is operating from capacity and can be calculated using \u00CE\u0093 \u00E2\u0088\u0092 ln(5BER)/1.5. Substituting (2.1) into (2.3), we obtain rk,m = log2 1+ m sk,m gk,k 2 PU CR \u00CE\u0093(\u00CF\u00830 + Ik,m + Ik,m ) . (2.4) PU active frequency bands W1 W2 Spectrum hole W3 Spectrum hole Spectrum hole f 1 fc 2 3 fc+FPU 1 4 5 6 7 8 9 10 fc+FPU 2 11 12 13 14 15 16 fc+FPU 3 Figure 2.1: PU active frequency bands, spectrum holes and CRU OFDM subchannels. The PU active frequency bands, the spectrum holes and the CRU OFDM subbands are shown in Fig. 2.1. 2.3 The Optimization Problem Our objective is to maximize the overall rate achievable by the CRPs, while keeping the interference to the PUs below the specified thresholds Ilth , l = 1, 2, . . . , L. The optimization 26 \u000Cproblem can be formulated as K M max rk,m (2.5) sk,m \u00E2\u0089\u00A4 Sk , \u00E2\u0088\u0080k \u00E2\u0088\u0088 1, 2, . . . , K (2.6) sk,m k=1 m=1 subject to M m=1 K M CR \u00E2\u0089\u00A4 Ilth , \u00E2\u0088\u0080l \u00E2\u0088\u0088 1, 2, . . . , L sk,m fk,l,m (2.7) k=1 m=1 rk,m \u00E2\u0088\u0088 {0, 1, 2, . . . , RM AX } . (2.8) In (2.6), Sk is the power limit for CRBS k. In (2.8), RM AX is the maximum number of bits CR is the interference power introduced that can be allocated on any subchannel. In (2.7), fk,l,m by the signal in the mth subchannel of CRBS k into PU l\u00E2\u0080\u0099s frequency band, CR fk,l,m = FlP U \u00E2\u0088\u0092(m\u00E2\u0088\u0092 21 )\u00E2\u0088\u0086f +Wl FlP U \u00E2\u0088\u0092(m\u00E2\u0088\u0092 12 )\u00E2\u0088\u0086f CR hm (f )df l,k \u00CE\u00A6 (2.9) where \u00CE\u00A6CR (f ) is the equivalent baseband PSD of the OFDM signal in subband m when sk,m = 1 W, i.e. when the transmit power of CRBS k in subchannel m is one watt. 2.4 The Single CRU Case To better understand the problem, we first study a system with only one CRU, i.e., one CR transmitter and one CR receiver. Problem (2.5) can thus be written as M max sm rm m=1 27 (2.10) \u000Csubject to M sm \u00E2\u0089\u00A4 S (2.11) m=1 M CR sm fl,m \u00E2\u0089\u00A4 Ilth , \u00E2\u0088\u0080l \u00E2\u0088\u0088 1, 2, . . . , L (2.12) m=1 rm \u00E2\u0088\u0088 {0, 1, 2, . . . , RM AX }. (2.13) In (2.10)-(2.13), the subscript k is omitted to simplify the notation. In (2.10), since there is no co-channel interference from other CRUs, rk,m in (2.4) can be simplified to rm = log2 1 + gm sm PU) \u00CE\u0093(\u00CF\u008302 + Im (2.14) where gm is the power gain for subchannel m from the CRU transmitter to the CRU receiver. In order to find a low complexity solution, we rewrite the problem as M RM AX xnm max n xm (2.15) m=1 n=1 subject to M RM AX pnm xnm \u00E2\u0089\u00A4 S (2.16) m=1 n=1 M RM AX CR n pnm fl,m xm \u00E2\u0089\u00A4 Ilth , \u00E2\u0088\u0080l \u00E2\u0088\u0088 1, 2, . . . , L (2.17) m=1 n=1 xnm \u00E2\u0088\u0088 {0, 1} (2.18) \u00E2\u0088\u0086 The term pnm = 2n\u00E2\u0088\u00921 \u00CE\u0093(\u00CF\u008302 + Im )/gm is the incremental power required to add the nth bit to subchannel m and xnm = 1 indicates that the nth bit of subchannel m is allocated. Since pnm increases with n, it follows that xnm = 1 only if xim = 1 for i = 1, 2, . . . , n \u00E2\u0088\u0092 1. Note that rm = RM AX n=1 xnm and sm = RM AX n=1 pnm xnm . 28 \u000CThe optimization problem in (2.15) is actually a 0-1 multidimensional knapsack problem (MDKP) of dimension L + 1. Since such problems are NP-hard [20] and our interest is in low-complexity solutions, we focus on greedy-like methods [21]\u00E2\u0080\u0093[23]. Usually, such algorithms make use of an efficiency value for each item which measures the benefit of selecting that item (\u00C4\u00B1.e. setting xnm to 1). Then at each step, the item with the highest efficiency value is picked until at least one of the constraints no longer holds. For example, (2.15) without constraint (2.17) is a one dimensional 0-1 knapsack problem with the reward value of each item set to 1. The efficiency value of an item can be defined as the ratio of the item\u00E2\u0080\u0099s reward to its cost, i.e. 1/pnm . Then the solution for this problem involves picking the item with the smallest incremental power needed. Since for each subchannel, the incremental power for adding the nth bit is smaller than that for adding the r\u00CB\u0086m +1 (n + 1)th bit, we need to select the lowest power only from pm , m = 1, 2, . . . , M , where r\u00CB\u0086m is the number of bits allocated on subchannel m. This is just the algorithm proposed in [7] for power allocation for a single user OFDM system. For a MDKP, the challenge of determining an effective efficiency value involves considering multiple costs. Here, we adopt the technique in [23] as it provides a simple to implement solution with low computational complexity. As a first step, we define the efficiency capacity of subchannel m for constraint l as \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 cm (l) = \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 S\u00E2\u0088\u0092u0 \u00CB\u0086m +1 prm l \u00E2\u0088\u0092u Ith l ,l = 0 \u00CB\u0086m +1 m CR prm hl fl,m , l = 1, 2, . . . , L. (2.19) In the RHS of (2.19), the first line accounts for constraint (2.16) whereas the second line accounts for the set of constraints (2.17). The terms u0 and ul are the costs of resources 29 \u000Calready allocated, i.e. M r\u00CB\u0086m u0 = pnm (2.20) CR pnm fl,m . (2.21) m=1 n=1 M r\u00CB\u0086m ul = m=1 n=1 Intuitively, the efficiency capacity, cm (l), in (2.19) represents the maximum number of the current item (i.e. the (\u00CB\u0086 rm + 1)th bit of subchannel m) that can be accommodated if the entire remaining room for constraint l were to be used for that bit. Second, we define the efficiency value of subchannel m as minl {cm (l)}. We then greedily allocate a bit to the subchannel with the largest efficiency value. This process of allocating one bit at a time is repeated until one of the constraints can no longer hold. Since the next bit is allocated to the subchannel with the maximum efficiency value and the efficiency value is the minimum efficiency capacity, we refer to our algorithm as Max-Min. A pseudo code listing of the Max-Min algorithm is given below. Initialize r\u00CB\u0086m = 0, \u00E2\u0088\u0080m; ul = 0, \u00E2\u0088\u0080l l while S \u00E2\u0088\u0092 u0 > 0 and Ith \u00E2\u0088\u0092 ul > 0, l = 1, 2, . . . , L for m = 1 to M calculate cm (l), \u00E2\u0088\u0080l using (2.19) em = minl {cm (l)} endfor \u00CE\u00B1 = argmaxm (em ) r\u00CB\u0086\u00CE\u00B1 = r\u00CB\u0086\u00CE\u00B1 + 1 update ul , \u00E2\u0088\u0080l using (2.20) and (2.21) endwhile The Max-Min algorithm has complexity O(RLM ), where R is the total number of allocated bits. 30 \u000C2.5 The Multiple CRU Case In the multiple CRU case, as can be seen from (2.4), a CRU\u00E2\u0080\u0099s transmit power is treated as interference power to other CRUs using the same subchannel. Optimization problem (2.5) can no longer be transformed to a 0-1 MDKP as in the single CRU case in Section 2.4. Nonetheless, optimization problem (2.5) can be viewed as a generalized non-linear MDKP problem with dimension D = K + L. Each dimension corresponds to one of the constraints listed in (2.6) and (2.7). In this section, we extend the Max-Min algorithm to the multiple CRU case. A bit increase in the sum in (2.5) can be viewed as a reward. Because each additional transmitted bit requires a certain amount of CRBS power and generates some interference, the power consumed and the interference generated can be treated as costs. Both CRBS power and interference power are limited system resources and we would like to incur a low cost in adding each bit. If there were only one constraint, we could add the bit that has the largest efficiency value, i.e., ratio of reward to cost. However, for the optimization problem in (2.5), for each bit added, there are altogether K + L reward/cost ratios, one for each constraint. In the process of allocating one additional bit in the system, we can choose any of the M subchannels and any of the K CRBSs. Thus, we select one among K \u00C3\u0097 M candidate subchannel/CRBS pairs. For each candidate subchannel/CRBS pair, we calculate K + L reward/cost ratios and then its efficiency value. Finally, we add the bit to the subchannel/CRBS pair that has the largest efficiency value. In the following, we first discuss how to calculate reward/cost ratio for each constraint when one bit is added to subchannel m of CRBS k. We then define the efficiency value ek,m and describe the multiple CRU Max-Min algorithm. 31 \u000C2.5.1 Reward/Cost Ratio for Each Constraint The reward for adding one bit to subchannel m of CRBS k is 1 for any m and k. To calculate the cost to each of the K + L constraints of adding one bit on subchannel m of CRBS k, we need to know the required incremental power which can be calculated from (2.4) as PU CR m CR tk,m = 2rk,m \u00CE\u0093(\u00CF\u008302 + Ik,m + Ik,m )/gk,k . However, we do not know the exact value of Ik,m since CR depends on the values of si,m , i \u00E2\u0088\u0088 {1, 2, . . . , K \ k}. As we increase CRBS k\u00E2\u0080\u0099s power, Ik,m the increased power will generate more interference on subchannel m to the receivers of the other CRBSs; to maintain a fixed bit rate, each of the other CRBSs will need to increase CR . As a result, tk,m has to be its transmitter power, si,m , resulting in a higher value for Ik,m increased again. The process of increasing powers continues until either an equilibrium point is reached or the powers grow without bound. In order to calculate the reward/cost ratio for each constraint, we next derive an expresi,b i,b i,b T sion for calculating the increase in CRBS powers, Ti,b m = (t1 , t2 , . . . , tK ) if b bits are added to CRBS i on subchannel m. Since we are only concerned with one subchannel in the rest of this subsection, the subscript m is omitted for simplicity of notation. From (2.4), we have K equilibrium equations gk,l sl = (2rk \u00E2\u0088\u0092 1)\u00CE\u0093\u00CF\u008302 . gk,k sk \u00E2\u0088\u0092 (2rk \u00E2\u0088\u0092 1)\u00CE\u0093 (2.22) l=k In matrix form, the equilibrium powers should satisfy GS = Q (2.23) where S = (s1 , s2 , ..., sK )T is the kth pair\u00E2\u0080\u0099s transmission power, Q = ((2r1 \u00E2\u0088\u0092 1)\u00CE\u0093N1 , (2r2 \u00E2\u0088\u0092 32 \u000C1)\u00CE\u0093N2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , (2rK \u00E2\u0088\u0092 1)\u00CE\u0093Nk )T , Nk = \u00CF\u008302 + IkP U , and G is a K \u00C3\u0097 K matrix that defined by \u00EF\u00A3\u00AE \u00EF\u00A3\u00B9 f (1, 2, r1 ) \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 f (1, K, r1 ) \u00EF\u00A3\u00AF g1,1 \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF f (2, 1, r2 ) g2,2 \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 f (2, K, r2 ) \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF ........................................ \u00EF\u00A3\u00AF \u00EF\u00A3\u00B0 f (K, 1, rK ) f (K, 2, rK ) \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 gK,K \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BB where f (i, j, r) = \u00E2\u0088\u0092(2r \u00E2\u0088\u0092 1)\u00CE\u0093gi,j . The final equilibrium powers can be obtained as S = G\u00E2\u0088\u00921 Q. (2.24) After the allocation of b more bits to pair i, the equilibrium power vector Si,b (if it exists) can be obtained from Gi,b Si,b = Qi,b (2.25) where Gi,b is the same as G except that the ith row is f (i, 1, ri + b), f (i, 2, ri + b), \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , gi,i , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , f (i, K, ri + b) (2.26) and Qi,b = ((2r1 \u00E2\u0088\u0092 1)\u00CE\u0093N1 , (2r2 \u00E2\u0088\u0092 1)\u00CE\u0093N2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , (2ri +b \u00E2\u0088\u0092 1)\u00CE\u0093Ni , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , (2rK \u00E2\u0088\u0092 1)\u00CE\u0093NK )T . (2.27) Subtracting (2.23) from (2.25), the lth equation (l = i) is f (l, 1, rl )\u00E2\u0088\u0086s1 + f (l, 2, rl )\u00E2\u0088\u0086s2 + . . . + gl,l \u00E2\u0088\u0086sl + . . . + f (l, K, rl )\u00E2\u0088\u0086sK = 0 33 (2.28) \u000Ci,b i,b where \u00E2\u0088\u0086sk = si,b k \u00E2\u0088\u0092 sk and sk is the kth component of S . The ith equation is i,b f (i, 1, ri + b)si,b 1 \u00E2\u0088\u0092 f (i, 1, ri )s1 + f (i, 2, ri + b)s2 \u00E2\u0088\u0092 f (i, 2, ri )s2 i,b + . . . + gi,i (si,b i \u00E2\u0088\u0092 si ) + . . . + f (i, K, ri + b)sK \u00E2\u0088\u0092 f (i, K, ri )sK = (2ri +b \u00E2\u0088\u0092 1)\u00CE\u0093N i \u00E2\u0088\u0092 (2ri \u00E2\u0088\u0092 1)\u00CE\u0093N i . (2.29) Substituting si,b k , \u00E2\u0088\u0080k by \u00E2\u0088\u0086sk + sk , we have [f (i, 1, ri + b) \u00E2\u0088\u0092 f (i, 1, ri )]s1 + f (i, 1, ri + b)\u00E2\u0088\u0086s1 + [f (i, 2, ri + b) \u00E2\u0088\u0092 f (i, 2, ri )]s2 + f (i, 2, ri + b)\u00E2\u0088\u0086s2 + . . . + gi,i \u00E2\u0088\u0086si + . . . + [f (i, K, ri + b) \u00E2\u0088\u0092 f (i, K, ri )]sK + f (i, K, ri + b)\u00E2\u0088\u0086sK = (2b \u00E2\u0088\u0092 1)2ri \u00CE\u0093N i . (2.30) Moving the terms containing sk from the LHS to the RHS, and noting that f (i, k, ri + b) \u00E2\u0088\u0092 f (i, k, ri ) = \u00E2\u0088\u0092(2b \u00E2\u0088\u0092 1)2ri \u00CE\u0093gi,k , we obtain f (i, 1, ri + b)\u00E2\u0088\u0086s1 + f (i, 2, ri + b)\u00E2\u0088\u0086s2 + . . . + gi,i \u00E2\u0088\u0086si + . . . +f (i, K, ri + b)\u00E2\u0088\u0086sK = (2b \u00E2\u0088\u0092 1)2ri \u00CE\u0093 N i + sk gi,k . (2.31) k=i Since ri = log2 1 + si gi,i \u00CE\u0093(N i + k=i sk gi,k ) , we have \u00CE\u0093(N i + k=i sk gi,k ) = si gi,i . 2ri \u00E2\u0088\u00921 Equation (2.31) can then be written as f (i, 1, ri + b)\u00E2\u0088\u0086s1 + f (i, 2, ri + b)\u00E2\u0088\u0086s2 + . . . + gi,i \u00E2\u0088\u0086si + . . . +f (i, K, ri + b)\u00E2\u0088\u0086sK = (2b \u00E2\u0088\u0092 1)si gi,i 34 2ri . 2ri \u00E2\u0088\u0092 1 (2.32) \u000CCombining (2.28) and (2.32), we obtain Gi,b Ti,b = P \u00E2\u0088\u0086 where Ti,b = i,b i,b ti,b 1 , t2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , tK T (2.33) = Si,b \u00E2\u0088\u0092 S, ti,b k = \u00E2\u0088\u0086sk represents the power increase re- sulting from the allocation of b additional bits to pair i, and P is the K \u00C3\u0097 1 column vector (0, 0, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , (2b \u00E2\u0088\u0092 1)si gi,i 2ri /(2ri \u00E2\u0088\u0092 1), \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , 0)T . The increased power vector Ti,b can be obtained as Ti,b = (Gi,b )\u00E2\u0088\u00921 P. (2.34) Since only the ith component of P is non-zero, Ti,b is dependent only on the ith column of (Gi,b )\u00E2\u0088\u00921 and ti,b k = (2b \u00E2\u0088\u0092 1)2ri gi,i si hki 2ri \u00E2\u0088\u0092 1 (2.35) where hki is the (k, i)th element of (Gi,b )\u00E2\u0088\u00921 . We obtain the reward/cost ratio for adding one bit to subchannel m of CRBS i as 1/ti,1 k,m for the kth constraint in (2.6) and 1/ K i,1 CR k=1 tk,m fk,l,m for the lth constraint in (2.7), where ti,1 k,m is given in (2.35) with b = 1. 2.5.2 Efficiency Value for Adding One Bit to Subchannel m of CRBS k To determine the efficiency value for adding one bit to subchannel m of CRBS k, we need to weigh the relative importance of the K + L constraints. Comparing the reward/cost ratios of the constraints directly does not make a lot of sense because the adding of one bit requires different amount of resources from different constraints and the resources of constraints (2.6) and constraints (2.7) are not comparable. We first define the efficiency 35 \u000Ccapacity of subchannel m of CRP k for constraint i as \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 ck,m (i) = \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 Si \u00E2\u0088\u0092ui tk,1 i,m , i\u00E2\u0089\u00A4K (2.36) th \u00E2\u0088\u0092u Ii\u00E2\u0088\u0092K i k,1 CR K j=1 tj,m fj,i\u00E2\u0088\u0092K,m , K < i \u00E2\u0089\u00A4 K + L. In the RHS of (2.36), the first line accounts for the set of constraints (2.6) whereas the second line accounts for the set of constraints (2.7). The terms {ui , i = 1, 2, . . . , K + L} are the costs of resources already allocated, i.e. \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 ui = \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 M m=1 K k=1 sk,m M m=1 i\u00E2\u0089\u00A4K (2.37) CR sk,m fk,i\u00E2\u0088\u0092K,m K * 32 \u00C3\u0097 10\u00E2\u0088\u00922 W, the system becomes interference-limited: the average bit rate 38 \u000C3.5 Average number of bits per OFDM symbol per subchannel 3 Optimal Max\u00E2\u0088\u0092Min Min\u00E2\u0088\u0092interference Min\u00E2\u0088\u0092power 2.5 2 1.5 1 0.5 0 \u00E2\u0088\u00927 10 10 \u00E2\u0088\u00926 \u00E2\u0088\u00925 \u00E2\u0088\u00924 \u00E2\u0088\u00923 10 10 10 CRU power limit S (\u00C3\u0097 32W) \u00E2\u0088\u00922 10 \u00E2\u0088\u00921 10 Figure 2.2: Average number of bits per OFDM symbol per subchannel as a function of CRU power S, with interference thresholds set to 5 \u00C3\u0097 10\u00E2\u0088\u009212 W. increases very little with S and the MP algorithm performs quite poorly compared to the MI and Max-Min algorithms. Fig. 2.3 shows the average number of bits per OFDM symbol per subchannel as a function of the interference power that can be tolerated by each PU. It can again be seen that the Max-Min algorithm is close to optimal with an average difference of less than 0.1%, and is clearly better than the MP and MI algorithms. 39 \u000C7 Average number of bits per OFDM symbol per subchannel 6 Optimal Max\u00E2\u0088\u0092Min Min\u00E2\u0088\u0092interference Min\u00E2\u0088\u0092power 5 4 3 2 1 0 \u00E2\u0088\u009214 10 \u00E2\u0088\u009213 \u00E2\u0088\u009212 \u00E2\u0088\u009211 10 10 10 th Interference threshold Il (\u00C3\u0097 5 W) 10 \u00E2\u0088\u009210 Figure 2.3: Average number of bits per OFDM symbol per subchannel as a function of the interference threshold with S = 0.32 W. 40 \u000C2.6.2 Multiple CRU Case To assess the performance of the Max-Min algorithm for multiple CRUs, simulations were performed for the downlink of an OFDM-based CR system consisting of four CRBSs within a 10 km \u00C3\u0097 10 km area, which is divided into four cells, as shown in Fig. 2.4. A CRBS is located at the center of each cell and its CRUs are uniformly distributed within its cell. The number, nCRU,k , of CRUs for CRBS k is chosen to be 100. A CRBS assigns its subchannel m to the CRU for which the ratio of its current subchannel m gain to its average subchannel m gain is the highest. There are two active PU transmitters and each of the two PU receivers is uniformly distributed within a 500-meter circle of its corresponding transmitter. (a) Scenario 1 (b) Scenario 2 (c) Scenario 3 Figure 2.4: Simulation topologies: triangles represent CRBSs and circles represent PU transmitters. Since the PU locations affect the performance of the system, e.g. the system throughput degrades as the PUs get closer to the CRBSs, we consider three scenarios: (1) an optimistic Scenario 1 in which the PU transmitters are located at the corners as shown in Fig. 2.4(a), (2) a pessimistic Scenario 2 in which the PU transmitters are located at the center as shown in Fig. 2.4(b) and (3) an average Scenario 3 in which the PU transmitters are uniformly distributed in the area (Fig. 2.4(c)). The bandwidth for each PU is six subchannels. For simplicity, we assume that all CRBSs have the same total power constraint Sk and all PUs have the same interference threshold 41 \u000CI th = 6 \u00C3\u0097 10\u00E2\u0088\u009215 W. The total power for each PU transmitter is 6 W. To assess the performance of the proposed algorithm, a commercial optimization software package was used to solve the optimization problem in (2.5) without constraint (2.8). Because this software requires several hours to solve the optimization problem with an integer number of bits for each realization (i.e. a randomly generated set of channel gains), the software was used instead to solve the problem assuming the number of bits may assume a real value. The real-valued number of bits results therefore provide upper bounds on the actual performance. The value for each point plotted in the figures is the average over one thousand realizations. To illustrate the benefit of allowing CRPs to share active PU frequency bands, we consider a system in which active PU bands are protected by guard bands on either side of a PU band; these guard bands, as well as the PU bands themselves, may not be used by CRPs. Such a system is hereafter referred to as NABO (non-active PU bands only). For the simulation results, we make the optimistic assumptions that the CRBS OFDM signals have no sidelobes, CR so that guard band widths are zero and fk,l,m = 0, l = 1, 2, . . . , L. The optimization problem is the same as that in (2.5) except that the constraints in (2.7) are always satisfied and the available CRBS bandwidth is only 20 subchannels. The commercial optimization software was used to solve the problem assuming that the number of bits loaded on a subcarrier can be a real value, i.e. constraint (2.8) was ignored; this provides an upperbound on the actual performance. Figures 2.5, 2.6, and 2.7 show the average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power limit, Sk , for Scenarios 1, 2, and 3 respectively. It can be seen that the solution obtained using the proposed Max-Min algorithm is quite close to the optimal upperbound solution obtained using the commercial optimization software. The difference is less than 5% for all scenarios. For Sk = 1 and the Max-Min algorithm, the average number of bits per OFDM symbol per subchannel per CRBS are about 6.1, 5.1 and 5.2 bits for Scenarios 1, 2 and 3 respectively. 42 \u000CAverage number of bits per OFDM symbol per subchannel per CRBS 7.5 7 Optimal (real bits) Max\u00E2\u0088\u0092Min NABO (real bits) 6.5 6 5.5 5 4.5 4 3.5 3 0.1 0.3 1 3 CRBS power constraint S (W) 10 k Figure 2.5: Average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power constraint for Scenario 1. 43 \u000C7.5 Average number of bits per OFDM symbol per subchannel 7 Optimal (real bits) Max\u00E2\u0088\u0092Min NABO (real bits) 6.5 6 5.5 5 4.5 4 3.5 3 0.1 0.3 1 3 CRBS power constraint S (W) 10 k Figure 2.6: Average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power constraint for Scenario 2. 44 \u000CAverage number of bits per OFDM symbol per subchannel per CRBS 7.5 7 Optimal (real bits) Max\u00E2\u0088\u0092Min NABO (real bits) 6.5 6 5.5 5 4.5 4 3.5 3 0.1 0.3 1 3 CRBS power constraint S (W) 10 k Figure 2.7: Average number of bits per OFDM symbol per subchannel per CRBS as a function of the CRBS power constraint for Scenario 3. 45 \u000CCompared to NABO, the performance improvements for Sk = 1 are 37%, 23%, and 27% for the three scenarios; the performance improvements for Sk = 10 are 45%, 29%, and 32%. These performance improvements are largely due to the fact that NABO can only use 20 subchannels, while the proposed algorithm is able to use all 32 available subchannels. In the simulations, at Sk = 1, the average number of subchannels that are actually used by the proposed algorithm are 32, 31.8, and 31.9 for Scenarios 1, 2, and 3 respectively. 2.7 Conclusions A low-complexity Max-Min algorithm has been proposed for subchannel, bit and power allocation in a multiuser OFDM-based multi-cell CR system. The algorithm efficiently utilizes the spectrum holes between PU frequency bands as well as active PU bands while ensuring that the generated interference powers do not exceed prescribed thresholds. Simulation results show that the proposed algorithm provides a sum of CRBS bit rates which is close to optimal. The performance improvement is over 25% compared to an algorithm that uses guard bands to protect the active PU bands. 46 \u000CReferences [1] D. Cabric, S. M. Mishra, D. Willkomm, R. Brodersen, and A. Wolisz, \u00E2\u0080\u009CA cognitive radio approach for usage of virtual unlicensed spectrum,\u00E2\u0080\u009D in Proc. of 14th IST Mobile Wireless Communications Summit, Dresden, Germany, June 2005. [2] Federal Communications Commission, \u00E2\u0080\u009CFacilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies,\u00E2\u0080\u009D notice of proposed rulemaking and order, FCC 03-322, 2003. [3] J. Mitola III and G. Q. Maguire, Jr., \u00E2\u0080\u009CCognitive radio: making software radios more personal,\u00E2\u0080\u009D IEEE Personal Communications, vol. 6, no. 4, pp. 13\u00E2\u0080\u009318, August 1999. [4] S. Haykin, \u00E2\u0080\u009CCognitive radio: brain-empowered wireless communications,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201\u00E2\u0080\u0093220, February 2005. [5] Federal Communications Commission, \u00E2\u0080\u009CSpectrum Policy Task Force Report,\u00E2\u0080\u009D FCC 02135, 2002. [6] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [7] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, \u00E2\u0080\u009CMultiuser OFDM with adaptive subcarrier, bit, and power allocation,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 17, no. 10, pp. 1747\u00E2\u0080\u00931758, October 1999. [8] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [9] G. Bansal, M. J. Hossain, and V. K. Bhargava, \u00E2\u0080\u009CAdaptive power loading for OFDMbased cognitive radio systems,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009907), Glasgow, Scotland, June 2007, pp. 5137 \u00E2\u0080\u0093 5142. [10] T. Qin and C. Leung, \u00E2\u0080\u009CFair adaptive resource allocation for multiuser OFDM cognitive radio systems,\u00E2\u0080\u009D in Proc. of Second International Conference on Communications and Networking in China (CHINACOM \u00E2\u0080\u009907), Shanghai, China, August 2007, pp. 115\u00E2\u0080\u0093119. [11] P. Wang, M. Zhao, L. Xiao, S. Zhou, and J. Wang, \u00E2\u0080\u009CPower allocation in OFDMbased cognitive radio systems,\u00E2\u0080\u009D in Proc. of IEEE Global Telecommunications Conference (GLOBECOM \u00E2\u0080\u009907), Washington, DC, USA, November 2007, pp. 4061\u00E2\u0080\u00934065. [12] P. Cheng, Z. Zhang, H.-H. Chen, and P. Qiu, \u00E2\u0080\u009COptimal distributed joint frequency, rate and power allocation in cognitive OFDMA systems,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 815\u00E2\u0080\u0093826, July 2008. 47 \u000C[13] A. T. Hoang and Y. C. Liang, \u00E2\u0080\u009CA two-phase channel and power allocation scheme for cognitive radio networks,\u00E2\u0080\u009D in Proc. of 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, September 2006, pp. 1\u00E2\u0080\u00935. [14] J. Huang, R. A. Berry, and M. L. Honig, \u00E2\u0080\u009CAuction-based spectrum sharing,\u00E2\u0080\u009D Springer Mobile Networks and Applications, vol. 11, no. 3, pp. 405\u00E2\u0080\u0093408, June 2006. [15] Y. Xing, C. N. Mathur, M. A. Haleem, R. Chandramouli, and K. P. Subbalakshmi, \u00E2\u0080\u009CDynamic spectrum access with QoS and interference temperature constraints,\u00E2\u0080\u009D IEEE Transactions on Mobile Computing, vol. 6, no. 4, pp. 423\u00E2\u0080\u0093433, April 2007. [16] A. Attar, O. Holland, M. R. Nakhai, and A. H. Aghvami, \u00E2\u0080\u009CInterference-limited resource allocation for cognitive radio in orthogonal frequency-division multiplexing networks,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 806\u00E2\u0080\u0093814, July 2008. [17] F. Wang, M. Krunz, and S. Cui, \u00E2\u0080\u009CPrice-based spectrum management in cognitive radio networks,\u00E2\u0080\u009D IEEE Journal of Selected Topics in Signal Processing, vol. 2, no. 1, pp. 74\u00E2\u0080\u009387, February 2008. [18] J. Jang and K. B. Lee, \u00E2\u0080\u009CTransmit power adaptation for multiuser OFDM systems,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 21, no. 2, pp. 171\u00E2\u0080\u0093178, February 2003. [19] A. J. Goldsmith and S.-G. Chua, \u00E2\u0080\u009CVariable-rate variable-power MQAM for fading channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 45, no. 10, pp. 1218\u00E2\u0080\u00931230, October 1997. [20] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness. San Francisco: W. H. Freeman, 1979. [21] H. Pirkul, \u00E2\u0080\u009CA heuristic solution procedure for the multiconstraint zero-one knapsack problem,\u00E2\u0080\u009D Wiley Naval Research Logistics, vol. 34, no. 2, pp. 161\u00E2\u0080\u0093172, 1987. [22] P. C. Chu and J. E. Beasley, \u00E2\u0080\u009CA genetic algorithm for the multidimensional knapsack problem,\u00E2\u0080\u009D Springer Journal of Heuristics, vol. 4, no. 1, pp. 63\u00E2\u0080\u009386, June 1998. [23] Y. Akcay, H. Li, and S. H. Xu, \u00E2\u0080\u009CGreedy algorithm for the general multidimensional knapsack problem,\u00E2\u0080\u009D Springer Annals of Operations Research, vol. 150, no. 1, pp. 17\u00E2\u0080\u009329, March 2007. [24] R. W. Daniels, Approximation Methods for Electronic Filter Design. McGraw-Hill, 1974. New York: [25] V. Erceg, L. J. Greenstein, S. Y. Tjandra, S. R. Parkoff, A. Gupta, B. Kulic, A. A. Julius, and R. Bianchi, \u00E2\u0080\u009CAn empirically based path loss model for wireless channels in suburban environments,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 7, no. 7, pp. 1205\u00E2\u0080\u00931211, July 1999. 48 \u000CChapter 3 An Efficient Power Loading Scheme for OFDM-based Cognitive Radio Systems 3.1 Introduction Cognitive radio (CR) [1, 2] is a concept which can potentially alleviate the shortage of unlicensed frequency bands. As discussed in [3], orthogonal frequency division multiplexing (OFDM) is an attractive modulation candidate for CR systems. The FCC Spectrum Policy Task Force [4] has recommended the use of the interference temperature for assessing the level of interference. The specification of a primary user pair (PUP) interference temperature limit corresponds to a maximum allowable interference power and makes it possible for CR transceiver pairs (CRPs) to use active PUP bands in a controlled fashion. Two types of interference need to be considered, namely, cross-channel interference and co-channel interference. Since a PUP may not use OFDM, cross-channel interference [5] could be generated by a CRP using an OFDM subchannel close (adjacent) to the PUP band, and from the PUP transmitter to the CRP\u00E2\u0080\u0099s subchannels. Co-channel interference arises when a CRP uses an active PUP band. Only cross-channel interference is treated in [6, 7], since CRPs may only use non-active PUP bands. In [8][9], only co-channel interference is considered since PUPs are assumed to use OFDM. In this chapter, we study the power allocation problem for an OFDM-based CR system in which CRPs may use both non-active and active PUP bands as long as the total cross and cochannel interference powers do not exceed prescribed limits. A mathematical optimization 1 A paper based on the material in this chapter has been submitted for publication. Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CAn Efficient Power Loading Scheme for OFDM-based Cognitive Radio Systems\u00E2\u0080\u009D. 49 \u000Cproblem is formulated and the optimal solution as well as a low-complexity suboptimal solution are obtained and compared. 3.2 System Model Since our focus is on power loading, we assume that the assignment of subchannels to CRPs has been made. Thus, without much loss of generality, we consider one CRP in a CR system with access to a band of width W Hz. Non-overlapping portions of this band are licensed to L PUPs, with the nominal bandwidth of PUP l ranging from fc + FlP U to fc + FlP U + Wl , l = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L. The maximum interference power that PUP l can tolerate is Ilth = Tlth Wl [4], where Tlth is the interference temperature limit for PUP l. The CRP can use non-active and active PU bands provided that the total interference in PUP l\u00E2\u0080\u0099s band does not exceed Ilth if PUP l is active. The CR system accommodates M equally spaced OFDM subcarriers (subchannels). The nominal bandwidth of subchannel m, m = {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } ranges from fc + (m \u00E2\u0088\u0092 1)\u00E2\u0088\u0086f to fc + m\u00E2\u0088\u0086f . Let Ml be the set of subchannels in PUP l\u00E2\u0080\u0099s band and L be the set of active PUPs. The subchannels are modelled in discrete-time, with the time-varying power gain for subchannel m from the transmitter to the receiver of the CRP denoted by gm . The power gains for subchannel m from the CRP\u00E2\u0080\u0099s transmitter to PUP l\u00E2\u0080\u0099s receiver and from PUP l\u00E2\u0080\u0099s transmitter to the CRP\u00E2\u0080\u0099s receiver are denoted by hl,m and dl,m , respectively. It is assumed that the power gains gm , hl,m , dl,m are outcomes of the random variables (rv\u00E2\u0080\u0099s) Gm , Hl,m , Dl,m , and that there is no inter-carrier interference (ICI). Let eCR l,m be the interference power experienced by PUP l\u00E2\u0080\u0099s receiver due to the CRP signal in subchannel m when hl,m = 1 and sm = 1, where sm is the transmit power. Then, eCR l,m = FlP U \u00E2\u0088\u0092(m\u00E2\u0088\u0092 12 )\u00E2\u0088\u0086f +Wl FlP U \u00E2\u0088\u0092(m\u00E2\u0088\u0092 12 )\u00E2\u0088\u0086f 50 \u00CE\u00A6CR (f )df (3.1) \u000Cwhere \u00CE\u00A6CR (f ) is the baseband PSD of the OFDM signal in subchannel m when sm = 1. The interference power generated by subchannel m of the CRP to PUP l\u00E2\u0080\u0099s band is sm hl,m eCR l,m , which represents cross channel interference when subchannel m is outside PUP l\u00E2\u0080\u0099s band and co-channel interference when subchannel m is within PUP l\u00E2\u0080\u0099s band. 3.3 The Optimization Problem We consider the problem of maximizing the overall rate achievable by the CRP, while keeping the interference power experienced by the PUPs below the specified thresholds Ilth , l \u00E2\u0088\u0088 L. The optimization problem is formulated as M OP1 : max sm log2 1 + m=1 sm Nm (3.2) subject to M sm \u00E2\u0089\u00A4 S (3.3) m=1 M CR sm fl,m \u00E2\u0089\u00A4 Ilth (3.4) m=1 sm \u00E2\u0089\u00A5 0, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M . (3.5) In (3.2), log2 (1+sm /Nm ) is the number of bits per OFDM symbol, which can be supported by subchannel m [10]; Nm = \u00CE\u0093(\u00CF\u008302 + l\u00E2\u0088\u0088L PU fl,m )/gm is the equivalent noise power, where \u00CE\u0093 is a SNR gap parameter which indicates how far the system is operating from capacity, \u00CF\u008302 PU is the noise power, fl,m is the interference power generated in subchannel m at the CRP CR CR receiver by PUP l. In (3.3), S is the CRP power limit. In (3.4), fl,m = hl,m eCR l,m and fl,m = 0 \u00C2\u00AF for l \u00E2\u0088\u0088 L. 51 \u000COP1 is a convex optimization problem. The Lagrangian [11] can be written as M F =\u00E2\u0088\u0092 log2 m=1 sm 1+ +\u00CE\u00BD Nm M L sm \u00E2\u0088\u0092 S + m=1 M \u00C2\u00B5l l=1 M CR sm fl,m m=1 \u00E2\u0088\u0092 Ilth \u00E2\u0088\u0092 \u00CF\u0086m sm (3.6) m=1 where \u00CE\u00BD, \u00C2\u00B5l , l = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L, and \u00CF\u0086m , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M are Lagrange multipliers. Applying the Karush-Kuhn-Tucker (KKT) conditions [11], we obtain the optimal power allocation as + s\u00E2\u0088\u0097(1) m = [\u00CE\u00B7m \u00E2\u0088\u0092 Nm ] where [x]+ = max(0, x) and \u00CE\u00B7m = L l=1 1 CR +\u00CE\u00BD \u00E2\u0088\u0097 \u00C2\u00B5\u00E2\u0088\u0097l fl,m (3.7) with \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0089\u00A5 0 and \u00C2\u00B5\u00E2\u0088\u0097l \u00E2\u0089\u00A5 0. Details of the derivation are provided in Appendix A.1. Solving for the L+1 Lagrangian multipliers is computational complex. Also, the interiorpoint method can be used to solve OP1 with a complexity O(M 3 ) [11]. We next propose an approximate method for solving the power allocation problem with lower complexity. 3.4 3.4.1 An Approximate Solution for OP1 Problem Formulation The cross-channel interference to a PUP band comes mostly from the subchannels immediately adjacent to it [5]. We thus view each subchannel as belonging to its closest PUP band and assume that it generates interference only to a single PUP band, namely, its own. Then, OP1 can be simplified to OP2, which is the same as OP1 except that constraint (3.4) is replaced by CR \u00E2\u0089\u00A4 Ilth , l \u00E2\u0088\u0088 L. sm fl,m (3.8) m\u00E2\u0088\u0088Ml Using a similar approach leading to (3.7), we obtain + s\u00E2\u0088\u0097(2) m = [\u00CE\u00B7m \u00E2\u0088\u0092 Nm ] 52 (3.9) \u000Cwhere \u00CE\u00B7m = 1 CR \u00C2\u00B5\u00E2\u0088\u0097l fl,m + \u00CE\u00BD\u00E2\u0088\u0097 . (3.10) In (3.10), \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00C2\u00B5\u00E2\u0088\u0097l \u00E2\u0089\u00A5 0. For the subchannels in non-active PUP bands, because CR fl,m = 0, the power allocation has a water-filling interpretation with a waterlevel of 1/\u00CE\u00BD \u00E2\u0088\u0097 . CR Note that for a subchannel m in an active PUP band, \u00CE\u00B7m \u00E2\u0089\u00A4 1/\u00CE\u00BD \u00E2\u0088\u0097 , since both \u00C2\u00B5\u00E2\u0088\u0097l and fm are non-negative. From (3.9) and (3.10), we have s\u00E2\u0088\u0097(2) m \u00E2\u0089\u00A4 [ 1 \u00E2\u0088\u0092 Nm ]+ . \u00CE\u00BD\u00E2\u0088\u0097 (3.11) As to be expected, if Nm = N, \u00E2\u0088\u0080m, we can see from (3.9) that for a given l, a smaller CRP CR transmit power will be allocated to subchannels with a higher fl,m value. \u00E2\u0088\u0097(2) Although solving for the power allocation {sm } in (3.9) requires less computation than \u00E2\u0088\u0097(1) solving for {sm } in (3.7), it may still be computationally impractical in many cases. Thus, faster suboptimal power allocation algorithms are of interest. 3.4.2 Suboptimal Solution In this section, an overview of the procedure for obtaining a suboptimal solution to OP2 is first given. An algorithm for implementing this procedure is then established. If no PUP is active, then constraint (3.8) is satisfied automatically, and the solution to OP2 has the standard water-filling interpretation [12]. In order to design a fast suboptimal solution, we start by assuming that constraint (3.8) is satisfied, and find the resulting waterlevel \u00CE\u00BB and the optimal solution {s\u00E2\u0088\u0097m = [\u00CE\u00BB \u00E2\u0088\u0092 Nm ]+ , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } using water-filling for all subchannels with power limit S. If m\u00E2\u0088\u0088Ml CR \u00E2\u0089\u00A4 Ilth for every l, then the ops\u00E2\u0088\u0097m fl,m timal power allocation has been found. Otherwise, PUP l for which m\u00E2\u0088\u0088Ml CR /Ilth s\u00E2\u0088\u0097m fl,m is the highest is determined, and the CRP power allocation for its subchannels is adjusted so as to ensure that the total interference power is below Ilth . From (3.11), in the optimal 53 \u000Csolution of OP2, the power allocated to the subchannels in Ml should be no higher than [1/\u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0088\u0092 Nm ]+ . Although we do not know the exact value of 1/\u00CE\u00BD \u00E2\u0088\u0097 , it can be approximated by \u00CE\u00BB, i.e., sm \u00E2\u0089\u00A4 [\u00CE\u00BB \u00E2\u0088\u0092 Nm ]+ = s\u00E2\u0088\u0097m , m \u00E2\u0088\u0088 Ml . The following problem is then solved for PUP l . OP3 : max sm log2 1 + m\u00E2\u0088\u0088M+ l sm Nm (3.12) subject to CR s m fm \u00E2\u0089\u00A4 Ilth (3.13) m\u00E2\u0088\u0088M+ l sm \u00E2\u0089\u00A5 0, sm \u00E2\u0089\u00A4 \u00CE\u00BB \u00E2\u0088\u0092 Nm , m \u00E2\u0088\u0088 M+ l (3.14) CR where fm is the simplified notation of flCR ,m , \u00CE\u00BB is the waterlevel for subchannels belonging to PUPs whose subchannels has not yet undergone power adjustment and M+ l \u00E2\u008A\u0086 Ml contains the subchannels with Nm < \u00CE\u00BB. For subchannels in Ml \M+ l , sm is set to 0. (3) In Section 3.4.2, an algorithm is described which provides a suboptimal solution {sm , m \u00E2\u0088\u0088 (3) + \u00E2\u0088\u0097 \u00E2\u0088\u0097 M+ l } for OP3. From (3.14), we have sm \u00E2\u0089\u00A4 sm , m \u00E2\u0088\u0088 Ml , where sm is the power allocation for subchannels belonging to PUPs whose subchannels have not yet undergone power adjustment. Since sm = 0, m \u00E2\u0088\u0088 Ml \M+ l , we have (3) m\u00E2\u0088\u0088Ml sm < m\u00E2\u0088\u0088Ml s\u00E2\u0088\u0097m . The reduction in CRP transmit power in subchannels m \u00E2\u0088\u0088 M+ l is then redistributed to the subchannels with waterlevel \u00CE\u00BB. A new waterlevel \u00CE\u00BB is then calculated. If with the new (higher) waterlevel, there still exists a PUP l with an interference power higher than Ilth , OP3 with l = l is solved again to lower the interference level for PUP l. This process continues until the interference power level for each active PUP l is below Ilth . Suboptimal Algorithm for OP2 An implementation of the procedure described above is given in Algorithm 2. 54 \u000CAlgorithm 2 Power Allocation Algorithm. 1) Initialize M = N = {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } and p = S. Sort {Nm , m \u00E2\u0088\u0088 M} in decreasing order with k being the sorted index. Find the waterlevel for subchannels in M using the algorithm proposed in [13] with power limit p as follows: 1.1) Nsum = m\u00E2\u0088\u0088N Nm , \u00CE\u00BB = (Nsum + p)/|N |, n = 1 . 1.2) While Nk(n) > \u00CE\u00BB, let Nsum = Nsum \u00E2\u0088\u0092 Nk(n) , N = N \{k(n)}, \u00CE\u00BB = (Nsum + p)/|N |, n = n + 1. 1.3) Set sm = [\u00CE\u00BB \u00E2\u0088\u0092 Nm ]+ , m \u00E2\u0088\u0088 M. 2) If (3.8) is satisfied for every active PUP l, stop; otherwise, go to Step 3) 3) Determine l = argmaxl\u00E2\u0088\u0088L ( CR m\u00E2\u0088\u0088Ml sm fm th Il ), let M+ l = Ml \{Nm \u00E2\u0089\u00A5 \u00CE\u00BB, m \u00E2\u0088\u0088 Ml }, (3) + and let sm = 0, m \u00E2\u0088\u0088 Ml \M+ l , then execute Algorithm 3 to get sm , m \u00E2\u0088\u0088 Ml . (3) (3) Set sm = sm , m \u00E2\u0088\u0088 M+ sm , Nsum = Nsum \u00E2\u0088\u0092 m\u00E2\u0088\u0088M+ N Nm , l , p = p\u00E2\u0088\u0092 m\u00E2\u0088\u0088M+ l l + M = M\M+ , N = N \M . l l 4) Find the waterlevel for subchannels in M with power limit p as follows: Repeat Step 4.1) and Step 4.2) until Nk(n) > \u00CE\u00BB or n \u00E2\u0089\u00A4 0. 4.1) n = n \u00E2\u0088\u0092 1, \u00CE\u00BB = (p + Nsum + Nk(n) )/(|N | + 1). 4.2) if Nk(n) \u00E2\u0089\u00A4 \u00CE\u00BB and k(n) \u00E2\u0088\u0088 M, then Nsum = Nsum + Nk(n) , N = {N , k(n)}. 5) \u00CE\u00BB = (Nsum + p)/|N |, sm = [\u00CE\u00BB \u00E2\u0088\u0092 Nm ]+ , m \u00E2\u0088\u0088 M, go to Step 2). An overall explanation of Algorithm 2 is now given. We initially assume that all subchannels are in M, the set of subchannels with waterlevel \u00CE\u00BB, and that all subchannels are also in N , the set of subchannels that have an equivalent noise power lower than \u00CE\u00BB. To find the first waterlevel, we sort {Nm , m \u00E2\u0088\u0088 M} in decreasing order with k(1), k(2), \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 denoting the sorted indices. If Nk(1) is higher than \u00CE\u00BB = (Nsum + p)/|N |, which is the waterlevel if all subchannels are in set N , then subchannel k(1) should not be in N and removing it from N will result in a lower value of \u00CE\u00BB. We continue to compare Nk(n) with the updated value of \u00CE\u00BB until each subchannel m in N has a Nm value that is lower than \u00CE\u00BB. The resulting \u00CE\u00BB is the first waterlevel, and n is the index in the sorted {Nm , m \u00E2\u0088\u0088 M} list that has the highest equivalent noise power in N . If not every PUP l satisfies (3.8), then in Step 3), the PUP l that has the highest interference power to Ilth ratio is chosen for interference power reduction. After solving OP3 using the algorithm in Section 3.4.2, the reduction in CRP transmit power in subchannels m \u00E2\u0088\u0088 M+ l is redistributed in Step 4) and a new global waterlevel is found. Because the new waterlevel is higher and Nm is sorted in decreasing 55 \u000Corder, we decrement n in order to find the new waterlevel. Suboptimal Algorithm for OP3 Applying the KKT conditions in OP3, we obtain the following optimal power allocation s\u00E2\u0088\u0097(3) m = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 m \u00E2\u0088\u0088 S0 \u00CE\u00B2 m \u00E2\u0088\u0088 S1 CR \u00E2\u0088\u0092 Nm , fm \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 \u00CE\u00BB \u00E2\u0088\u0092 Nm , m \u00E2\u0088\u0088 S2 (3.15) CR CR CR where \u00CE\u00B2 is the Lagrange multiplier with \u00CE\u00B2 < Nm fm for m \u00E2\u0088\u0088 S0 , Nm fm \u00E2\u0089\u00A4 \u00CE\u00B2 \u00E2\u0089\u00A4 \u00CE\u00BBfm for CR m \u00E2\u0088\u0088 S1 , and \u00CE\u00B2 > \u00CE\u00BBfm for m \u00E2\u0088\u0088 S2 . Details of the derivation are provided in Appendix A.2. \u00E2\u0088\u0097(3) Substituting sm into \u00CE\u00B2= \u00E2\u0088\u0097(3) m\u00E2\u0088\u0088Ml CR = Ilth , we obtain s m fm Ilth \u00E2\u0088\u0092 m\u00E2\u0088\u0088S2 (\u00CE\u00BB CR \u00E2\u0088\u0092 Nm )fm + |S1 | m\u00E2\u0088\u0088S1 CR Nm f m . (3.16) If the mutually exclusive sets S0 , S1 , and S2 are known, the optimal power allocation can be found using (3.15). In the first stage of Algorithm 2, which provides a suboptimal solution for OP3, we determine S0 . We first set S = \u00E2\u0088\u0085, S2 = \u00E2\u0088\u0085, S1 = M+ l , n1 = 1, calculate the initial value CR of \u00CE\u00B2 using (3.16) and sort Nm fm in decreasing order with i being the sorted index of the CR CR subchannels, i.e., i(1) = argmaxm\u00E2\u0088\u0088{1,2,\u00C2\u00B7\u00C2\u00B7\u00C2\u00B7 ,M } Nm fm . If \u00CE\u00B2 \u00E2\u0089\u00A5 Ni(1) fi(1) , all subchannels satisfy CR CR Nm fm \u00E2\u0089\u00A4 \u00CE\u00B2 and S0 = \u00E2\u0088\u0085. On the other hand, if \u00CE\u00B2 < Ni(1) fi(1) , subchannel i(1) is added into S0 since from (3.16) removing i(1) from S1 results in a lower value of \u00CE\u00B2, thus ensuring that CR CR \u00CE\u00B2 < Ni(1) fi(1) . We then increment n1 and compare the value of Ni(n1 ) fi(n with the value of 1) CR \u00CE\u00B2, updated using (3.16), until Ni(n1 ) fi(n \u00E2\u0089\u00A4 \u00CE\u00B2. Then S0 = {i(1), i(2), \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , i(n1 )}. 1) CR in decreasing order with j being In the second stage, we determine S2 . We first sort fm CR the sorted index of the subchannels and start with S2 = \u00E2\u0088\u0085, n2 = |M+ l |. If \u00CE\u00B2 \u00E2\u0089\u00A4 \u00CE\u00BBfj(|M+ |) , l all subchannels satisfy \u00CE\u00B2 \u00E2\u0089\u00A4 CR \u00CE\u00BBfm and S2 = \u00E2\u0088\u0085. On the other hand, if 56 CR \u00CE\u00BBfj(|M + |) l < \u00CE\u00B2 and \u000C+ j(|M+ l |) is not in S0 , subchannel j(|Ml |) is added to S2 ; from (3.16), removing subchannel CR j(|M+ l |) from S1 results in a higher value of \u00CE\u00B2, thus ensuring that \u00CE\u00BBfj(|M+ |) < \u00CE\u00B2. We then l CR decrement n2 and compare the value of \u00CE\u00BBfj(n with the value of \u00CE\u00B2, updated using (3.16), 2) + + CR until \u00CE\u00B2 \u00E2\u0089\u00A4 \u00CE\u00BBfj(n . Then S2 = {j(|M+ l |), j(|Ml | \u00E2\u0088\u0092 1), \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , j(n2 )} and S1 = Ml \(S0 2) S2 ). Finally, at the end of the second stage, if S1 = \u00E2\u0088\u0085 or S2 = \u00E2\u0088\u0085, then S0 , S1 and S2 are determined; otherwise, the following adjustment is needed to ensure that (3.8) is satisfied. (3) In this case, sm is either 0 or \u00CE\u00BB \u00E2\u0088\u0092 Nm , one subchannel at a time is transferred from S2 to S0 until (3.8) holds. At each time, the subchannel that has the lowest value of log2 (1 + CR (\u00CE\u00BB \u00E2\u0088\u0092 Nm )/Nm )/((\u00CE\u00BB \u00E2\u0088\u0092 Nm )fm ) is selected, because it has the lowest reward/cost ratio, where reward is the bits allocated to the subchannel and cost is the interference power generated on this subchannel. Algorithm 3 Suboptimal Algorithm for solving OP3. CR CR 1) Sort Nm fm , fm in descending order with i, j being the sorted index of the subchannels, respectively. Let S0 = \u00E2\u0088\u0085, S1 = M+ l , S2 = \u00E2\u0088\u0085, and calculate \u00CE\u00B2 using (3.16). CR 2) Let n1 = 1. While Ni(n1 ) fi(n1 ) > \u00CE\u00B2, do S0 = {S0 , i(n1 )}, S1 = S1 \{i(n1 )}, CR \u00CE\u00B2 = [\u00CE\u00B2(|S1 | + 1) \u00E2\u0088\u0092 Ni(n1 ) fi(n ]/|S1 |, n1 = n1 + 1. 1) + CR 3) Let n2 = |Ml |. While \u00CE\u00BBfj(n2 ) < \u00CE\u00B2, do the following: 3.1) if not j(n2 ) \u00E2\u0088\u0088 S0 , then set S2 = {S2 , j(n2 )}, S1 = S1 \{j(n2 )}, CR CR and \u00CE\u00B2 = [\u00CE\u00B2(|S1 | + 1) \u00E2\u0088\u0092 (\u00CE\u00BB \u00E2\u0088\u0092 Nj(n2 ) )fj(n \u00E2\u0088\u0092 Nj(n2 ) fj(n ]/|S1 |. 2) 2) 3.2) n2 = n2 \u00E2\u0088\u0092 1 4) If S1 = \u00E2\u0088\u0085 or S2 = \u00E2\u0088\u0085, then do Step 6); otherwise goto Step 5). m )/Nm ) CR , 5) Let I = m\u00E2\u0088\u0088S2 (\u00CE\u00BB \u00E2\u0088\u0092 Nm )fm . While I > Ilth , do m = argminm\u00E2\u0088\u0088S2 log2 (1+(\u00CE\u00BB\u00E2\u0088\u0092N CR (\u00CE\u00BB\u00E2\u0088\u0092Nm )fm CR I = I \u00E2\u0088\u0092 (\u00CE\u00BB \u00E2\u0088\u0092 Nm )fm , and S2 = S2 \{m }. (3) 6) Calculate sm , m \u00E2\u0088\u0088 M+ l using (3.15). + The computational complexity of Algorithm 3 is O(|M+ l | log(|Ml |)) and results from the sorting performed in Step 1). The other steps have lower complexity orders. In Algorithm 2, the computational complexities in Step 1) and Step 2) are O(M log(M )) and O(L), respectively. For each PUP l with m\u00E2\u0088\u0088Ml CR > Ilth , Steps 3) to 5) are performed once. s m fm So altogether, the complexity of Step 3) is at most L l=1 O(|Ml | log(|Ml |)), which is no higher than O(M log(M )). The complexity of Step 4) and Step 5) is O(M ) and O(LM ), 57 \u000Crespectively. The overall complexity of Algorithm 2 is O(M log(M )) + O(LM ). 3.5 Simulation Results Simulations were performed for an OFDM-based CR system with one CRP and three PUPs. There are M = 24 subchannels with \u00CF\u008302 = 10\u00E2\u0088\u009216 and |Ml | = 8, l = 1, 2, 3 as in Fig. 3.1. All links are assumed to undergo Rayleigh fading. PUP 3 is non-active, and the total transmit power for PUP 1 and PUP 2, is 0.8 W each. Following [5], the PSDs of the PUP signals are assumed to be those of elliptically filtered white noise processes [14], i.e. 2 2 l Rn \u00CE\u00A6Pl U (f ) = [1 + \u00E2\u0088\u00921 (\u00CE\u00BEl , f /f0,l )] where n, l , \u00CE\u00BEl , f0,l are the filter parameters and Rn (., .) is the nth-order elliptic rational function; the PSD of the CRP is \u00CE\u00A6CR (f ) = Ts ( sin\u00CF\u0080f\u00CF\u0080fTsTs )2 , where Ts = 40 \u00C2\u00B5s is the symbol duration. Other parameters are: E{Dl,m } = 10\u00E2\u0088\u009215 , E{Gm } = 10\u00E2\u0088\u009214 , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , 24 and OFDM symbol guard interval is 8 \u00C2\u00B5s. Active PUP 1 band 1 2 3 4 5 6 Non-active PUP 2 band 7 8 PUP 3 band 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Figure 3.1: PUP active and non-active bands and CRP OFDM subchannels. To illustrate the benefit of allowing the CRP to share active PUP frequency bands, we compare the average number of bits per OFDM symbol (ANB) to that of a system in which active PUP bands may not be used by the CRP. In this case, only PUP 3\u00E2\u0080\u0099s band is available to the CRP. The optimal solution for such a system is referred to as NABO (non-active 58 \u000Cband only). The optimal solution for OP1, OP2, and the suboptimal solution provided by Algorithm 1 are referred to as OPT, OPT-APPROX, and SUBOPT-APPROX, respectively. A commercial optimization software package was used to solve OP1. Actual interference generated by the CRP to the active PUPs, PUP 1 and PUP 2, is calculated using M m=1 CR sm fl,m , l = 1, 2 for SUBOPT-APPROX, in order to assess if the approach in Section 3.4 is reasonable. The ANB values (obtained by averaging over ten thousand realizations of the fading gains) for each PUP band for SUBOPT-APPROX and OPT-APPROX as a function of E{H1,m }, is shown in Fig. 3.2, with S = 2.4 W, I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W, and E{H2,m } = 10\u00E2\u0088\u009214 . As E{H1,m } decreases, the ANB on PUP 1\u00E2\u0080\u0099s band increases, since the CRP\u00E2\u0080\u0099s interference power to PUP 1\u00E2\u0080\u0099s receiver is reduced. The ANBs on PUP 2\u00E2\u0080\u0099s and PUP 3\u00E2\u0080\u0099s bands decrease with E{H1,m } because more CRP power is being diverted to PUP 1\u00E2\u0080\u0099s band. The ANB difference between OPT-APPROX and SUBOPT-APPROX is less than 2%. Although not shown in Fig. 3.2, the corresponding ANB values for NABO for PUP band 1, 2 and 3 were found to be {0, 0, 34} bits, and the improvement of SUBOPT-APPROX over NABO is 45%, 65%, 80% for E{H1,m } equals 10\u00E2\u0088\u009211 , 10\u00E2\u0088\u009213 , 10\u00E2\u0088\u009215 , respectively. The sum ANB for all subchannels as a function of the total CRP power, S, is shown in Fig. 3.3 with I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. As expected, the ANBs of OPT-APPROX, OPT, SUBOPT-APPROX, and NABO increase with S. The ANB difference between OPT-APPROX and OPT is less than 0.2% and the ANB difference between SUBOPT-APPROX and OPT-APPROX is less than 4%. The ANB for SUBOPTAPPROX is over 20% higher than that of NABO at S = 0.024 W and over 60% at S = 2.4 W. To show that when using SUBOPT, the actual generated interference power to active PUPs, PUP 1 and PUP 2, is acceptable, we summarize in Table 3.1 (1) the fraction of realizations for which either PUP 1 or PUP 2 exceeding interference powers in excess of their thresholds Ilth , (2) the average % by which the interference threshold limit is exceeded 59 \u000CAverage number of bits per OFDM symbol, ANB 50 45 40 35 PUP 1 band (SUBOPT\u00E2\u0088\u0092APPROX) PUP 1 band (OPT\u00E2\u0088\u0092APPROX) PUP 2 band (SUBOPT\u00E2\u0088\u0092APPROX) PUP 2 band (OPT\u00E2\u0088\u0092APPROX) PUP 3 band (SUBOPT\u00E2\u0088\u0092APPROX) PUP 3 band (OPT\u00E2\u0088\u0092APPROX) 30 25 20 15 10 5 0 10 \u00E2\u0088\u009215 \u00E2\u0088\u009213 10 Average subchannel gain, E{ H \u00E2\u0088\u009211 10 } 1,m Figure 3.2: Average number of bits per OFDM symbol (ANB) for each PUP band as a function of E{H1,m } with S = 2.4 W, I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W and E{H2,m } = 10\u00E2\u0088\u009214 . 60 \u000CAverage number of bits per OFDM symbol, ANB 100 90 80 OPT OPT\u00E2\u0088\u0092APPROX SUBOPT\u00E2\u0088\u0092APPROX NABO 70 60 50 40 30 20 10 0 10\u00E2\u0088\u00923 10\u00E2\u0088\u00922 10\u00E2\u0088\u00921 CRP power limit, S (\u00C3\u0097 24 W) 100 Figure 3.3: Average number of bits per OFDM symbol (ANB) on the whole PUP bands as a function of S with I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W, E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. 61 \u000Cconsidering only those realizations in which the threshold is exceeded, and (3) the % by which the maximum interference power (among the 10, 000 realizations) exceeds the thresholds as a function of S, with I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. It can be seen that the actual maximum interference power generated by the CRP is less than 1.02Ilth . S(\u00C3\u009724 W) % realizations exceed Ilth average % exceed maximum % exceed 10\u00E2\u0088\u00923 0 0 0 3 \u00C3\u0097 10\u00E2\u0088\u00923 0 0 0 10\u00E2\u0088\u00922 0.38% 0.51% 0.98% 3 \u00C3\u0097 10\u00E2\u0088\u00922 0.38% 0.57% 1.23% 10\u00E2\u0088\u00921 1.65% 0.92% 1.83% 3 \u00C3\u0097 10\u00E2\u0088\u00921 0.08% 0.72% 1.52% 100 0 0 0 Table 3.1: Actual interference power exceeding Ilth , l = 1, 2 by using SUBOPT-APPROX with I1th = I2th = 8 \u00C3\u0097 10\u00E2\u0088\u009215 W, E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. The sum ANB of all subchannels as a function of the interference threshold, I1th , is shown in Fig. 3.4 with I1th = I2th , S = 2.4 W, and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. The ANBs of SUBOPT-APPROX and OPT-APPROX increase with I1th as more interference can be tolerated by the active PUPs, PUP 1 and PUP 2. Because NABO only makes use of PUP 3\u00E2\u0080\u0099s band, the ANB of NABO does not change with I1th . The ANB difference between OPTAPPROX and OPT is less than 0.2% and the ANB difference between SUBOPT-APPROX and OPT-APPROX is less than 4%. The ANB for SUBOPT-APPROX is over 30% higher than that for NABO at I1th = 8 \u00C3\u0097 10\u00E2\u0088\u009216 W and over 80% when I1th \u00E2\u0089\u00A5 8 \u00C3\u0097 10\u00E2\u0088\u009214 W. Table 3.2 lists (1) the fraction of realizations for which either PUP 1 or PUP 2 exceeding interference powers in excess of their thresholds Ilth , (2) the average % by which the interference threshold limit is exceeded considering only those realizations in which the threshold is exceeded, and (3) the % by which the maximum interference power (among the 10, 000 realizations) exceeds the thresholds as a function of Ilth , with I1th = I2th , S = 2.4 W, and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. It can be seen that the actual maximum interference power generated by the CRP is less than 1.02Ilth . 62 \u000CAverage number of bits per OFDM symbol, ANB 65 60 55 50 OPT\u00E2\u0088\u0092APPROX OPT SUBOPT\u00E2\u0088\u0092APPROX NABO 45 40 35 30 \u00E2\u0088\u009216 10 \u00E2\u0088\u009215 \u00E2\u0088\u009214 10 10 th Interference threshold , Il (\u00C3\u0097 8 W) \u00E2\u0088\u009213 10 Figure 3.4: Average number of bits per OFDM symbol (ANB) on the whole PUP bands as a function of I1th with S = 2.4 W, I1th = I2th , and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. Ilth (\u00C3\u00978 W) % realizations exceed Ilth average % exceed maximum % exceed 10\u00E2\u0088\u009216 0 0 0 3 \u00C3\u0097 10\u00E2\u0088\u009216 0.21% 1.48% 1.66% 10\u00E2\u0088\u009215 1.46% 0.81% 1.92% 3 \u00C3\u0097 10\u00E2\u0088\u009215 0.24% 0.63% 1.25% 10\u00E2\u0088\u009214 3 \u00C3\u0097 10\u00E2\u0088\u009214 0.66% 0 0.6% 0 1.06% 0 10\u00E2\u0088\u009213 0 0 0 Table 3.2: Actual interference power exceeding Ilth , l = 1, 2 by using SUBOPT-APPROX with I1th = I2th , S = 2.4 W, and E{Hl,m } = 10\u00E2\u0088\u009214 , l = 1, 2. 63 \u000C3.6 Conclusions A low complexity, suboptimal solution for the power allocation problem in an OFDM-based CR system, in which the CRP uses both non-active as well as active PUP bands was proposed. The proposed algorithm has a lower complexity than the single CRU Max-Min algorithm proposed in Chapter 2. The complexity reduction is achieved by making a reasonable approximation based on: (1) the fact that cross-channel interference from CRUs to PUs is mainly limited to a few subchannels adjacent to the PU bands, and (2) the assumption that the bandwidth of a PU is much larger than that of an OFDM subchannel and that there is usually a guard band between two adjacent PU bands. Simulation results show that the proposed solution is very close to optimal and provides significant improvement over systems that only use non-active PUP bands. It is found that the approximation results in a relatively small performance degradation. 64 \u000CReferences [1] S. Haykin, \u00E2\u0080\u009CCognitive radio: brain-empowered wireless communications,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201\u00E2\u0080\u0093220, February 2005. [2] J. Mitola III and G. Q. Maguire, Jr., \u00E2\u0080\u009CCognitive radio: making software radios more personal,\u00E2\u0080\u009D IEEE Personal Communications, vol. 6, no. 4, pp. 13\u00E2\u0080\u009318, August 1999. [3] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [4] Federal Communications Commission, \u00E2\u0080\u009CSpectrum Policy Task Force Report,\u00E2\u0080\u009D FCC 02135, 2002. [5] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [6] G. Bansal, M. J. Hossain, and V. K. Bhargava, \u00E2\u0080\u009CAdaptive power loading for OFDMbased cognitive radio systems,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009907), Glasgow, Scotland, June 2007, pp. 5137 \u00E2\u0080\u0093 5142. [7] T. Qin and C. Leung, \u00E2\u0080\u009CFair adaptive resource allocation for multiuser OFDM cognitive radio systems,\u00E2\u0080\u009D in Proc. of Second International Conference on Communications and Networking in China (CHINACOM \u00E2\u0080\u009907), Shanghai, China, August 2007, pp. 115\u00E2\u0080\u0093119. [8] P. Wang, M. Zhao, L. Xiao, S. Zhou, and J. Wang, \u00E2\u0080\u009CPower allocation in OFDMbased cognitive radio systems,\u00E2\u0080\u009D in Proc. of IEEE Global Telecommunications Conference (GLOBECOM \u00E2\u0080\u009907), Washington, DC, USA, November 2007, pp. 4061\u00E2\u0080\u00934065. [9] P. Cheng, Z. Zhang, H.-H. Chen, and P. Qiu, \u00E2\u0080\u009COptimal distributed joint frequency, rate and power allocation in cognitive OFDMA systems,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 815\u00E2\u0080\u0093826, July 2008. [10] A. J. Goldsmith and S.-G. Chua, \u00E2\u0080\u009CVariable-rate variable-power MQAM for fading channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 45, no. 10, pp. 1218\u00E2\u0080\u00931230, October 1997. [11] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University Press, 2004. [12] R. G. Gallager, Information Theory and Reliable Communication. Wiley & Sons, 1968. New York: John [13] A. Leke and J. M. Cioffi, \u00E2\u0080\u009CA maximum rate loading algorithm for discrete multitone modulation systems,\u00E2\u0080\u009D in Proc. of IEEE Global Telecommunications Conference (GLOBECOM \u00E2\u0080\u009997), vol. 3, Phoenix, AZ, USA, November 1997, pp. 1514\u00E2\u0080\u00931518. 65 \u000C[14] R. W. Daniels, Approximation Methods for Electronic Filter Design. McGraw-Hill, 1974. 66 New York: \u000CChapter 4 Performance of Equal Power Allocation in Multiuser OFDM-based Cognitive Radio Systems 4.1 Introduction Cognitive radio (CR) [1]-[3] is a concept which can potentially alleviate the pending spectrum shortage crisis. As discussed in [3], orthogonal frequency division multiplexing (OFDM) is an attractive modulation candidate for CR systems. It is well-known that the optimal solution to the problem of determining the capacity of a set of M parallel additive white Gaussian noise (AWGN) subchannels, each of which may have a different noise power level, subject to a total input signal power constraint, has a nice water-filling interpretation [4]. We will refer to this as optimal water-filling (OWF). In OWF, the signal powers allocated to different subchannels are in general different and no power is allocated to \u00E2\u0080\u009Csilent\u00E2\u0080\u009D subchannels on which the noise power exceeds a certain threshold (water level). The scheme in which the total available signal power is shared equally among all non-silent subchannels is referred to as constant power water-filling (CPWF) [5] whereas the scheme in which the total available signal power is shared equally among all (silent and non-silent) subchannels is referred to as plain equal power allocation (PEPA). The PEPA scheme is simpler than CPWF since the optimal water level threshold is needed for CPWF but not for PEPA. It is pointed out in [6] that the difference in average achievable bit rates between OWF and CPWF is only about 2% for a Rayleigh fading channel with additive white Gaussian noise. A bound on this difference for the one user case is given in [5]. For the multiple user 1 A paper based on the material in this chapter has been accepted for publication. Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CPerformance of Equal Power Allocation in Multiuser OFDM-based Cognitive Radio Systems,\u00E2\u0080\u009D Hindawi Research Letters in Communications. 67 \u000Ccase, simulation results in [7] indicate that the difference between OWF and PEPA is quite small when each subchannel is assigned to the user with the best channel quality for that subchannel in Rayleigh fading channels. Analytical results in [8] show that the performance difference between OWF and PEPA decreases with the number of users and average signal to noise ratio (SNR). In this chapter, we study the performance difference between PEPA and OWF in a multiuser OFDM-based CR system. It is found that PEPA performs almost as well as OWF when there is little variation in CR user (CRU) average subchannel gains or PU activity level is high. 4.2 System Model We consider a CR system with a total bandwidth of W Hz and L PUs; PU l, l = 1, 2, . . . , L has a bandwidth allocation of Wl Hz. Frequency bands carrying PU signals are referred to as active; non-active bands are also termed spectrum holes. In order to reduce the mutual interference between secondary CRUs and PUs to acceptable levels, some subchannels adjacent to active PU bands are not used by the CRUs [9]. We are interested in downlink transmissions from one CR base station (CRBS) to K CRUs. It is assumed that the CRBS and the CRUs are able to accurately locate the spectrum holes. The system bandwidth of W Hz can accommodate M OFDM subbands (or subchannels), each with noise power \u00CF\u008302 . Interference among the subchannels is assumed to be negligible. The system is time-slotted with a slot duration equal to an OFDM symbol duration, Ts . The subchannels are modelled in discrete-time, with the gain for subchannel m and time slot t from the CRBS to CRU k denoted by t gk,m . For simplicity, it is assumed that for any given value of k, {gk,m , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } are identically distributed random variables (rv\u00E2\u0080\u0099s) with a common probability function (pdf) and cumulated distribution function (cdf) denoted as fGk (gk ) and FGk (gk ) respectively. 68 \u000CAt each time slot t, each subchannel within Mt , the set of available subchannels at time slot t, can be used by the CRBS to transmit to at most one CRU. We use fG (g) and FG (g) t to denote the pdf and the cdf of the selected CRUs, respectively. The number, rm , of bits per OFDM symbol which can be supported by subchannel m in time slot t is given by [10] t = log2 1 + rm t t gm sm \u00CE\u0093\u00CF\u008302 (4.1) t where gm is the subchannel gain of the selected CRU, stm is the power allocated to subchannel m at time slot t, and \u00CE\u0093 is an SNR gap parameter which indicates how far the system is operating from capacity. The available power constraint implies that stm \u00E2\u0089\u00A4 S, \u00E2\u0088\u0080t (4.2) m\u00E2\u0088\u0088Mt where S is the total power per time slot. The availability of a PU band is modelled by a two-state Markov chain. During a time slot t, a PU band can be in one of two states: active or inactive [11]. A PU band can change mode once every Tstate slots. At a transition time, the probability of a PU band changing from active to inactive state is 1 \u00E2\u0088\u0092 pa , and the probability of changing from inactive to active state is 1 \u00E2\u0088\u0092 pn . The number, lCR,t , of available PU bands at time slots {t, t = 1, 2, . . .} then forms a Markov chain, with a transition probability matrix Q = {qij }, i, j = 0, 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L, where state i corresponds to the event that the number of available PU bands at time slot t is equal to i and the probability, qij , of moving from state i to state j is given by L qij = n=0 i L\u00E2\u0088\u0092i (1 \u00E2\u0088\u0092 pn )n pi\u00E2\u0088\u0092n (1 \u00E2\u0088\u0092 pa )n\u00E2\u0088\u0092i+j paL\u00E2\u0088\u0092j\u00E2\u0088\u0092n . n n n\u00E2\u0088\u0092i+j (4.3) The Markov chain is illustrated in Fig. 4.1. Let \u00CE\u00A0 = (\u00CF\u00800 , \u00CF\u00801 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , \u00CF\u0080L )T denote the steady-state probability column vector. Then, we 69 \u000Cq0L q0i q01 q1i q1L qiL q00 q11 i qii L qLL q10 qi0 qi1 qL1 qL0 qLi Figure 4.1: Markov chain model for the number of available PU bands. have [12] \u00CE\u00A0=Q\u00CE\u00A0 (4.4) \u00CE\u00A0 = U\u00E2\u0088\u00921 V (4.5) and where \u00EF\u00A3\u00AE \u00EF\u00A3\u00B9 1, 1, 1, \u00C2\u00B7\u00C2\u00B7\u00C2\u00B7 1 \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF 0, 1 \u00E2\u0088\u0092 q00 + q10 , 1 \u00E2\u0088\u0092 q00 + q20 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 1 \u00E2\u0088\u0092 q00 + qL0 \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF U=\u00EF\u00A3\u00AF q01 \u00E2\u0088\u0092 q21 , \u00C2\u00B7\u00C2\u00B7\u00C2\u00B7 q01 \u00E2\u0088\u0092 qL1 \u00EF\u00A3\u00AF 0, q01 + 1 \u00E2\u0088\u0092 q11 , \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF \u00EF\u00A3\u00AF ................................................... \u00EF\u00A3\u00B0 0, q0L \u00E2\u0088\u0092 q1L , q0L \u00E2\u0088\u0092 q2L , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 q0L + 1 \u00E2\u0088\u0092 qLL \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BA \u00EF\u00A3\u00BB (4.6) and V = (1, 1 \u00E2\u0088\u0092 q00 , q01 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , q0L )T . Suppose that each PU band can accommodate the same number of subchannels, i.e. M/L. Then the number of available subchannels at time slot t is mCR,t = lCR,t M/L, and the probability of having m available subchannels is bm = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 \u00CF\u0080l , if m = \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 0 lM ,l L , otherwise 70 = 0, 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L (4.7) \u000C4.3 Bounds on bit rates for OWF and PEPA Although OWF provides the optimal solution for subchannel power allocation, it is more complex to implement than PEPA. It is therefore useful to compare the bit rates achievable by the two schemes. 4.3.1 Upper Bounds on Achievable Bit Rate for OWF Assuming that OWF is applied to the mCR,t subchannel gains of the selected CRUs at time \u00E2\u0088\u0086 (T ) slot t, we can write the average bit rate (ABR) as BOW F = limT \u00E2\u0086\u0092\u00E2\u0088\u009E BOW F , where [4] (T ) BOW F = 1 Ts T T log2 t=1 \u00CE\u0093\u00CF\u0083 2 m\u00E2\u0088\u0088Mt : t 0 \u00E2\u0089\u00A4LtOW F gm t LtOW F gm \u00CE\u0093\u00CF\u008302 . (4.8) t In (4.8), \u00CE\u0093\u00CF\u008302 /gm can be viewed as the equivalent noise power on subchannel m and LtOW F is the water level at time t. Let Ti be the set of time slots with mCR,t = i, and Ti be the number of elements in set Ti . Grouping the time slots with mCR,t = i, we can re-write (4.8) as (T ) BOW F 1 = Ts T M log2 i=1 ti \u00E2\u0088\u0088Ti \u00CE\u0093\u00CF\u0083 2 ti m\u00E2\u0088\u0088Mti : t 0 \u00E2\u0089\u00A4LOW F,i i gm ti i LtOW F,i gm \u00CE\u0093\u00CF\u008302 (4.9) i where LtOW F,i is the water level at time slot ti . When mCR,t = i, the ABR if OWF is applied at each time slot ti is smaller than that if OWF is applied in one shot to all the iTi subchannel gains of the selected CRUs over the Ti time slots, i.e. (T ) BOW F 1 \u00E2\u0089\u00A4 Ts T (T ) M log2 i=1 ti \u00E2\u0088\u0088Ti \u00CE\u0093\u00CF\u0083 2 (Ti ) m\u00E2\u0088\u0088Mti : t 0 \u00E2\u0089\u00A4LOW F,i i gm 71 i ti LOW F,i gm \u00CE\u0093\u00CF\u008302 (4.10) \u000C(T ) i where LOW F,i is the global water level for set Ti . Taking the limit as T \u00E2\u0086\u0092 \u00E2\u0088\u009E, we have Ti = bi T and BOW F 1 \u00E2\u0089\u00A4 Ts M (\u00E2\u0088\u009E) \u00E2\u0088\u009E ibi 2 \u00CE\u0093\u00CF\u00830 (\u00E2\u0088\u009E) L OW F,i i=1 log2 LOW F,i g \u00CE\u0093\u00CF\u008302 fG (g)dg . (4.11) (T ) i In (4.10), LOW F,i , is lower than the level calculated by including all subchannels at time slots t \u00E2\u0088\u0088 Ti because there may exist some subchannels with above water level noises. Therefore, (Ti ) LOW F,i \u00CE\u0093\u00CF\u008302 t m\u00E2\u0088\u0088Mt gm t\u00E2\u0088\u0088Ti \u00E2\u0089\u00A4 iTi + S . i (4.12) Taking the limit as Ti \u00E2\u0086\u0092 \u00E2\u0088\u009E in (4.12) yields (\u00E2\u0088\u009E) LOW F,i \u00E2\u0089\u00A4 E 1 G \u00CE\u0093\u00CF\u008302 + S . i (4.13) (\u00E2\u0088\u009E) Substituting the two occurrences of LOW F,i in (4.11) by the RHS of (4.13), we obtain BOW F \u00E2\u0089\u00A4 M 1 Ts ibi 1 \u00E2\u0088\u0092 FG i=1 1 Li log2 (Li ) \u00E2\u0088\u009E + 1 Li where Li = Li and Li E 1 G + log2 (g)fG (g)dg (4.14) S . i\u00CE\u0093\u00CF\u008302 (\u00E2\u0088\u009E) The upper bound for LOW F,i in (4.13) can be quite loose. This is because the RHS of (4.13) includes all subchannels regardless of their equivalent noise powers. As g \u00E2\u0086\u0092 0, the equivalent noise power increases without bound. Consequently, the bound in (4.14) is also loose. To obtain a tighter bound, we turn off any subchannel m \u00E2\u0088\u0088 Mt at time slot t \u00E2\u0088\u0088 Ti t , greater than the RHS of (4.13), i.e., we consider with an equivalent noise power, \u00CE\u0093\u00CF\u008302 /gm t > 1/Li in calculating the water levels. The resulting only the subchannels for which gm 72 \u000C(\u00E2\u0088\u009E) water level is still higher than LOW F,i , so that (\u00E2\u0088\u009E) LOW F,i \u00CE\u0093\u00CF\u008302 \u00E2\u0089\u00A4 \u00E2\u0088\u009E 1 f (g)dg g G 1 Li + S i . 1 Li 1 \u00E2\u0088\u0092 FG (4.15) (\u00E2\u0088\u009E) Substituting LOW F,i in (4.11) by the RHS of (4.15), we obtain a tighter bound, namely (4.14) with \u00E2\u0088\u009E 1 f (g)dg 1 g G L Li = 4.3.2 + i 1 \u00E2\u0088\u0092 FG S i\u00CE\u0093\u00CF\u008302 1 Li . (4.16) Achievable Bit Rate for PEPA \u00E2\u0088\u0086 (T ) The ABR for PEPA is BP EP A = limT \u00E2\u0086\u0092\u00E2\u0088\u009E BP EP A where (T ) BP EP A = 1 Ts T T log2 1 + t=1 m\u00E2\u0088\u0088Mt t Sgm mCR,t \u00CE\u0093\u00CF\u008302 . (4.17) . (4.18) Grouping the time slots with mCR,t = i, we have (T ) BP EP A 1 = Ts T M log2 1 + i=1 t\u00E2\u0088\u0088Ti m\u00E2\u0088\u0088Mt t Sgm i\u00CE\u0093\u00CF\u008302 Letting Ti \u00E2\u0086\u0092 \u00E2\u0088\u009E, we obtain BP EP A 4.4 1 = Ts M ibi E log2 1 + i=1 S G i\u00CE\u0093\u00CF\u008302 . (4.19) Rayleigh fading channel In Section 4.3, we studied the ABR for OWF and PEPA for arbitrary pdf\u00E2\u0080\u0099s and cdf\u00E2\u0080\u0099s of the subchannel gains of the selected CRUs. In this section, we obtain the pdf and cdf of the subchannel gains of the selected CRUs for two different subchannel allocation strategies. The subchannel gains of the CRUs are assumed to be Rayleigh distributed, i.e. the power 73 \u000Cgains are exponentially distributed. 4.4.1 Opportunistic Subchannel Assignment Suppose that at each time t, each of the M subchannels is assigned to the CRU with the highest gain for that subchannel. If the average subchannel power gains for all CRUs are equal, the pdf of the power gain for the CRU assigned to any subchannel is readily obtained using a standard result in order statistics [13], i.e., g \u00E2\u0088\u0092 E{G} fG (g) = K 1 \u00E2\u0088\u0092 e K\u00E2\u0088\u00921 g e\u00E2\u0088\u0092 E{G} E{G} (4.20) with corresponding cdf g FG (g) = 1 \u00E2\u0088\u0092 e\u00E2\u0088\u0092 E{G} 4.4.2 K . (4.21) A Fairer Subchannel Assignment Scheme If the average subchannel gains for CRUs are quite different, assigning a subchannel to the CRU with the highest gain may be too unfair to CRUs with poor average subchannel gains. A fairer scheme [14] is to select, for each subchannel, the CRU with the best channel gain relative to its own mean gain, i.e. k \u00E2\u0088\u0097 (t) = argmaxk gk,m (t) . E{Gk } (4.22) The distribution of a CRU\u00E2\u0080\u0099s subchannel gain relative to its own mean is exponential with a mean of 1. Thus the probability of selecting CRU i is 1/K, i.e. P (k \u00E2\u0088\u0097 = i) = 1/K, i = 74 \u000C1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K. The cdf of the power gain of the selected CRU for a subchannel is K P (G \u00E2\u0089\u00A4 g|k \u00E2\u0088\u0097 = i)P (k \u00E2\u0088\u0097 = i) FG (g) = P (G \u00E2\u0089\u00A4 g) = i=1 1 = K K i=1 K gE{Gj } 1 P (Gj \u00E2\u0089\u00A4 )= E{Gi } K j=1 K 1\u00E2\u0088\u0092e g \u00E2\u0088\u0092 E{G K i} . (4.23) i=1 The corresponding pdf is K fG (g) = 1\u00E2\u0088\u0092e g \u00E2\u0088\u0092 E{G i} i=1 4.5 (K\u00E2\u0088\u00921) \u00E2\u0088\u0092 g e E{Gi } . E{Gi } (4.24) Numerical Results To illustrate the ABR difference between OWF and PEPA in a multiuser OFDM-based CR system, OWF, PEPA, and the upper bound for OWF are calculated using (4.8), (4.19), and (4.14) with Li equal to the RHS of (4.16). The two subchannel allocation strategies in Sections 4.4.1 and 4.4.2, hereafter referred to as Case A and Case B respectively, are considered. In Case A, the average subchannel power gain for each CRU is chosen as 2 \u00C3\u0097 10\u00E2\u0088\u009213 . In Case B, we increase the number of CRUs by six at a time. The average subchannel power gains of the six CRUs are chosen as follows: one with value 10\u00E2\u0088\u009212 , two with value 10\u00E2\u0088\u009213 and three with value 10\u00E2\u0088\u009214 . The average subchannel gain for the six CRUs is also 2 \u00C3\u0097 10\u00E2\u0088\u009213 . In our calculations, we also use the following parameter values: \u00CE\u0093 = 1, \u00CF\u008302 = 10\u00E2\u0088\u009216 , S = 0.1 W, W = 2 MHz, Wl = 250 kHz, l \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L}, L = 8, M = 64, pn = 0.9, and Ts = 40 \u00C2\u00B5s. Fig. 4.2 shows the ABR for OWF and PEPA as a function of number, K, of CRUs. For both cases, the ABR of OWF and PEPA increases with K as a result of multiuser diversity. The ABR difference between OWF and PEPA decreases with the number CRUs. The ABR difference between OWF and PEPA in Case A is almost negligible with the improvement of OWF over PEPA being less than 0.05%. In Case B, the improvement of OWF over PEPA 75 \u000C4 Average bit rate (Mb/s) 3.5 \u00E2\u0086\u0090 Case A 3 2.5 \u00E2\u0086\u0090 Case B 2 1.5 6 OWF PEPA Bound for OWF 12 18 24 30 K, number of CRUs 36 42 48 Figure 4.2: ABR as a function of number of CRUs for OWF and PEPA. pa = 0.9 76 \u000C5 4.5 Average bit rate (Mb/s) 4 Case A \u00E2\u0086\u0092 3.5 3 2.5 Case B \u00E2\u0086\u0092 2 1.5 1 OWF PEPA Bound for OWF 0.5 0 0 0.1 0.2 0.3 0.4 0.5 pa 0.6 0.7 0.8 0.9 1 Figure 4.3: ABR as a function of pa for OWF and PEPA. K = 6. is 9% for K = 6 and 2% for K = 48. For both cases, the proposed upper bound for OWF is very close to the actual OWF curve: the difference is less than 0.001% in Case A and is less than 0.12% for Case B. Fig. 4.3 shows the ABR for OWF and PEPA as a function of pa for K = 6. For both cases, the ABR for OWF and PEPA decreases with pa , due to the reduced number of available subchannels. In Case A, the improvement of OWF over PEPA is 0.1% at pa = 0.1 and 0.05% at pa = 0.9. In Case B, the improvement of OWF over PEPA is 14% at pa = 0.1 and 2% at pa = 0.99. The difference between OWF and PEPA decreases with pa because with a fixed total power, the average SNR for the available subchannels increases. The difference between OWF and PEPA is known to decrease with average SNR [8]. For both cases, the 77 \u000Cproposed upper bound for OWF is very close to the actual OWF curve and the difference decreases with pa . The results show that the relative performance of PEPA depends on the activity level of the PUs and the variations in average subchannel gains among the CRUs. 4.6 Conclusions The performance difference between the PEPA and OWF subcarrier power allocation schemes in a multiuser OFDM-based CR system was studied. A proposed upper bound for OWF was shown to be tight. When the PU activity is high or the CRU average gains are similar, the simpler PEPA scheme suffers little loss relative to OWF. 78 \u000CReferences [1] S. Haykin, \u00E2\u0080\u009CCognitive radio: brain-empowered wireless communications,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201\u00E2\u0080\u0093220, February 2005. [2] J. Mitola III and G. Q. Maguire, Jr., \u00E2\u0080\u009CCognitive radio: making software radios more personal,\u00E2\u0080\u009D IEEE Personal Communications, vol. 6, no. 4, pp. 13\u00E2\u0080\u009318, August 1999. [3] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [4] R. G. Gallager, Information Theory and Reliable Communication. Wiley & Sons, 1968. New York: John [5] W. Yu and J. M. Cioffi, \u00E2\u0080\u009CConstant-power waterfilling: Performance bound and lowcomplexity implementation,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 54, no. 1, pp. 23\u00E2\u0080\u009328, January 2006. [6] A. Leke and J. M. Cioffi, \u00E2\u0080\u009CA maximum rate loading algorithm for discrete multitone modulation systems,\u00E2\u0080\u009D in Proc. of IEEE Global Telecommunications Conference (GLOBECOM \u00E2\u0080\u009997), vol. 3, Phoenix, AZ, USA, November 1997, pp. 1514\u00E2\u0080\u00931518. [7] J. Jang and K. B. Lee, \u00E2\u0080\u009CTransmit power adaptation for multiuser OFDM systems,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 21, no. 2, pp. 171\u00E2\u0080\u0093178, February 2003. [8] Y. Zhang and C. Leung, \u00E2\u0080\u009CPerformance of equal power subchannel loading in multiuser OFDM systems,\u00E2\u0080\u009D in Proc. of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim 2007), Victoria, BC, Canada, August 2007, pp. 526\u00E2\u0080\u0093529. [9] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [10] A. J. Goldsmith and S.-G. Chua, \u00E2\u0080\u009CVariable-rate variable-power MQAM for fading channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 45, no. 10, pp. 1218\u00E2\u0080\u00931230, October 1997. [11] H. Su and X. Zhang, \u00E2\u0080\u009CCross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 118\u00E2\u0080\u0093129, January 2008. [12] P. G. Hoel, S. C. Port, and C. J. Stone, Introduction to Stochastic Processes. Boston: Houghton Mifflin Company, 1972. [13] H. A. David and H. N. Nagaraja, Order Statistics. John Wiley & Sons, 2003. 79 \u000C[14] S. Ryu, B. H. Ryu, H. Seo, M. Shin, and S. Park, \u00E2\u0080\u009CWireless packet scheduling algorithm for OFDMA system based on time-utility and channel state,\u00E2\u0080\u009D ETRI Journal, vol. 27, no. 6, pp. 777\u00E2\u0080\u0093787, 2005. 80 \u000CChapter 5 Subchannel Power Loading Schemes in Multiuser OFDM Systems 5.1 Introduction It is well-known that the optimal solution to the problem of determining the capacity of a set of M parallel additive white Gaussian noise (AWGN) subchannels, each of which may have a different noise power level, subject to a total input signal power constraint, has a nice water-filling interpretation [1]. We will refer to this as optimal water-filling (OWF). In OWF, the signal powers allocated to different subchannels are in general different and no power is allocated to \u00E2\u0080\u009Csilent\u00E2\u0080\u009D subchannels on which the noise power exceeds a certain threshold (water level). Unfortunately, the implementation and computational complexities associated with OWF are generally high. Thus, lower complexity suboptimal algorithms have been proposed. The scheme in which the total available signal power is shared equally among all non-silent subchannels is referred to as constant power water-filling (CPWF) [2, 3] whereas the scheme in which the total available signal power is shared equally among all (silent and non-silent) subchannels is referred to as plain equal power allocation (PEPA). The PEPA scheme is simpler than CPWF since the optimal water level threshold is needed for CPWF but not for PEPA. The above mentioned algorithms assume that the number of bits that can be loaded on to a subchannel can be a real number although in practice it is integer valued. Both optimal 1 Portions of this chapter have been published. Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CPerformance of Equal Power Subchannel Loading in Multiuser OFDM systems,\u00E2\u0080\u009D IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim 2007), Victoria, Canada, Aug. 2007. The remaining portions have been submitted for publication. 81 \u000Csolutions (e.g. [4]\u00E2\u0080\u0093[6]) and suboptimal solutions (e.g. [7]\u00E2\u0080\u0093[9]) for the discrete bit loading problem have been proposed for single user systems. As pointed out in [10], continuous bit loading PEPA has a negligible performance loss compared to OWF when the average signal to noise ratio (SNR) is high. In a multiuser OFDM system [11], each subchannel is usually assigned to a user with relatively good channel condition, i.e., high SNR. Consequently, PEPA has been used in many medium access control layer (MAC) resource allocation algorithms, e.g. [12]. Simulation results in [13] show that the difference between OWF and PEPA is quite small when each subchannel is assigned to the user with the best channel quality for that subchannel. In this chapter, we study this difference analytically. Moreover, this best-channel subchannel assignment strategy may not be fair to all users. We thus examine the difference in performance between OWF and PEPA when a subchannel assignment scheme is used which takes fairness into account. We also study the performance differences between the optimal solution and PEPA for both continuous and discrete bit loading in multiuser OFDM systems. A computationally efficient and simple to implement discrete bit loading algorithm based on PEPA is also proposed. 5.2 System Model Consider the downlink of a multiuser OFDM system with one base station (BS) transmitting to K users sharing M subchannels. The OFDM symbols are assumed to have a duration of one time unit and each subchannel is modelled as a discrete-time channel with AWGN samples n(t), t = 1, 2, . . .. Let \u00CF\u008302 be the noise power (variance) for each subchannel so that the total noise power for the M subchannels is M \u00CF\u008302 . Let the amplitude gain for subchannel m of user k at time t be denoted by the random variable (rv) Gk,m (t). It is assumed that the power gain samples for a given value of k {gk,m (t), m = 1, 2, . . . , M, t = 1, 2, . . . , T } are outcomes of independent, identically distributed (i.i.d.) rv\u00E2\u0080\u0099s with a common probability 82 \u000Cdensity function (pdf) fGk (gk ) and cumulated distribution function (cdf) FGk (gk ), where T is the number of time units considered in the allocation scheme. The average received SNR of all users is \u00CE\u00B3 = K k=1 E{Gk }S/(KM \u00CF\u008302 ), where S is the total available power to be allocated K k=1 among the M subchannels. Assuming E{Gk }/K = 1, S is given by S = M \u00CE\u00B3\u00CF\u008302 . (5.1) At each time t, each subchannel can be used by the BS to transmit to at most one user. We use fG (g) and FG (g) to denote the pdf and cdf of the selected user. Let atm and stm denote the user assigned and the power allocated to subchannel m at time t respectively. The number of bits loaded on subchannel m at time t is given by [14] btm = log2 1 + t stm gm \u00CE\u0093\u00CF\u008302 (5.2) t where gm is a simplified notation for gam ,m (t) and \u00CE\u0093 is an SNR gap parameter which indi- cates how far the system is operating from capacity. This gap can be estimated using the techniques described in [14]. The available power constraint implies that M stm \u00E2\u0089\u00A4 S, \u00E2\u0088\u0080t. (5.3) m=1 In practical systems, the number of bits loaded on each subchannel at each time is often an integer j, j \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , J}, where J is the maximum number of bits that can be loaded on a subchannel. In this case, the number of bits loaded on subchannel m at time t is btm = max log2 1 + 83 t stm gm \u00CE\u0093\u00CF\u008302 ,J . (5.4) \u000C5.3 Bit rates for OWF and PEPA Although OWF provides the optimal solution for subchannel power allocation, its implementation and/or computational complexity is generally high compared to PEPA. Since continuous bit loading PEPA has a performance similar to OWF at high SNRs, PEPA is used in many MAC layer resource allocation schemes. When integer bits loading is used, the floor function in (5.4) results in some power wastage. We now examine the bit rates achievable by OWF and PEPA for both continuous and discrete bit loading. 5.3.1 An Upper Bound on Achievable Bit Rate for OWF Assuming that OWF is applied to the M subchannel gains of the selected users at each time t, t \u00E2\u0088\u0088 {1, 2, . . . , T }, we can write the average number of bits per subchannel per OFDM \u00E2\u0088\u0086 (T ) symbol (ABR) as BOW F = limT \u00E2\u0086\u0092\u00E2\u0088\u009E BOW F , where [1] (T ) BOW F = 1 TM log2 \u00CE\u0093\u00CF\u0083 2 m,t: t 0 \u00E2\u0089\u00A4LtOW F gm t LtOW F gm \u00CE\u0093\u00CF\u008302 . (5.5) t In (5.5), \u00CE\u0093\u00CF\u008302 /gm can be viewed as the equivalent noise power on subchannel m and LtOW F is the water level at time t. Taking the limit as M \u00E2\u0086\u0092 \u00E2\u0088\u009E and noting that LtOW F = LOW F,M \u00E2\u0086\u0092\u00E2\u0088\u009E , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T , we have (T ) BOW F = \u00E2\u0088\u009E 2 \u00CE\u0093\u00CF\u00830 LOW F,M \u00E2\u0086\u0092\u00E2\u0088\u009E log2 LOW F,M \u00E2\u0086\u0092\u00E2\u0088\u009E g \u00CE\u0093\u00CF\u008302 fG (g)dg . (5.6) In (5.5), the ABR if OWF is applied at each time t is smaller than that if OWF is applied in one shot to all the T M subchannel gains of the selected users over the T time units, i.e. (T ) BOW F 1 \u00E2\u0089\u00A4 TM (T ) log2 \u00CE\u0093\u00CF\u0083 2 (T ) m,t: t 0 \u00E2\u0089\u00A4LOW F gm 84 t LOW F gm \u00CE\u0093\u00CF\u008302 . (5.7) \u000CTaking the limit as T \u00E2\u0086\u0092 \u00E2\u0088\u009E, we have (\u00E2\u0088\u009E) \u00E2\u0088\u009E BOW F \u00E2\u0089\u00A4 2 \u00CE\u0093\u00CF\u00830 (\u00E2\u0088\u009E) L OW F LOW F g \u00CE\u0093\u00CF\u008302 log2 fG (g)dg . (5.8) (\u00E2\u0088\u009E) In (5.8), the global water level, LOW F , is lower than the level calculated by including all subchannels, because there may exist some subchannels with above water level noises. Note (\u00E2\u0088\u009E) that LOW F = LOW F,M \u00E2\u0086\u0092\u00E2\u0088\u009E . Therefore, (T ) LOW F \u00CE\u0093\u00CF\u008302 M t m=1 gm T t=1 \u00E2\u0089\u00A4 TM + S . M (5.9) Using (5.1) and taking the limit as T \u00E2\u0086\u0092 \u00E2\u0088\u009E in (5.9) yields (\u00E2\u0088\u009E) LOW F \u00E2\u0089\u00A4 E 1 G + \u00CE\u00B3 \u00CE\u0093 \u00CE\u0093\u00CF\u008302 . (5.10) (\u00E2\u0088\u009E) Using the RHS of (5.10) to substitute for LOW F in (5.8), we obtain 1 BOW F \u00E2\u0089\u00A4 (1 \u00E2\u0088\u0092 FG ( )) log2 E L 1 G + \u00CE\u00B3 \u00CE\u0093 \u00E2\u0088\u009E + 1 L where L = L and L E 1 G [log2 g] fG (g)dg, (5.11) + \u00CE\u0093\u00CE\u00B3 . (\u00E2\u0088\u009E) The upper bound for LOW F in (5.10) can be quite loose since it includes every subchannel, t t t regardless of its equivalent noise power \u00CE\u0093\u00CF\u008302 /gm . As gm \u00E2\u0086\u0092 0, \u00CE\u0093\u00CF\u008302 /gm increases without bound. Consequently, the bound in (5.11) is also loose. We obtain a tighter bound by t is greater than the RHS of (5.10), i.e., we turning off any subchannel for which \u00CE\u0093\u00CF\u008302 /gm t > 1/L in calculating the water levels. The consider only the subchannels for which gm 85 \u000C(\u00E2\u0088\u009E) resulting water level is still higher than LOW F , so that (\u00E2\u0088\u009E) LOW F \u00E2\u0088\u009E 1 f (g)dg g G 1 L \u00E2\u0089\u00A4 + \u00CE\u00B3 \u00CE\u0093 \u00CE\u0093\u00CF\u008302 (5.12) 1 \u00E2\u0088\u0092 FG ( L1 ) (\u00E2\u0088\u009E) Substituting LOW F in (5.8) by the RHS of (5.12), we obtain a tighter bound, namely (5.11) with \u00E2\u0088\u009E 1 f (g)dg g G 1 L L= 5.3.2 \u00CE\u00B3 \u00CE\u0093 + \u00CE\u0093\u00CF\u008302 (5.13) 1 \u00E2\u0088\u0092 FG ( L1 ) Achievable Bit Rate for Continuous PEPA \u00E2\u0088\u0086 (T ) From (5.2) with stm = S/M , the ABR for PEPA is BP EP A = limT \u00E2\u0086\u0092\u00E2\u0088\u009E BP EP A where (T ) BP EP A 1 = T T t=1 1 M M log2 1 + m=1 t Sgm M \u00CE\u0093\u00CF\u008302 . (5.14) Using (5.1) in (5.14) and letting T \u00E2\u0086\u0092 \u00E2\u0088\u009E yields BP EP A = E log2 5.3.3 \u00CE\u00B3 1 + \u00CE\u0093 G + E{log2 G}. (5.15) Achievable Bit Rate for Discrete PEPA \u00E2\u0088\u0086 (T ) From (5.4), the ABR for discrete PEPA is B P EP A = limT \u00E2\u0086\u0092\u00E2\u0088\u009E B P EP A where (T ) B P EP A 1 = T T t=1 1 M M log2 1 + m=1 t Sgm M \u00CE\u0093\u00CF\u008302 . (5.16) Using (5.1) in (5.16) and letting T \u00E2\u0086\u0092 \u00E2\u0088\u009E yields \u00E2\u0088\u009E B P EP A = 0 log2 1 + 86 \u00CE\u00B3 g \u00CE\u0093 fG (g)dg (5.17) \u000CWhen log2 (1 + g\u00CE\u00B3/\u00CE\u0093) = j, j \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , J}, we have j \u00E2\u0089\u00A4 log2 1 + \u00CE\u00B3 g 0, then \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E > \u00CE\u00B4, and we \u00E2\u0088\u0097 set \u00CE\u00B4 = \u00CE\u00B4; otherwise, \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E \u00E2\u0089\u00A4 \u00CE\u00B4, and we set \u00CE\u00B4 = \u00CE\u00B4. This process is repeated until |\u00CE\u00B4 \u00E2\u0088\u0092 \u00CE\u00B4| \u00E2\u0089\u00A4 . \u00E2\u0088\u0097 Then, \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E is set to (\u00CE\u00B4 + \u00CE\u00B4)/2. \u00E2\u0088\u0097 Using \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E in (5.25) and following a similar approach as in obtaining (5.20) from (5.17), we have J \u00C2\u00AFP EP A,M \u00E2\u0086\u0092\u00E2\u0088\u009E = J \u00E2\u0088\u0092 B \u00E2\u0088\u0097 FG (2j\u00E2\u0088\u00921+\u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E \u00E2\u0088\u0092 1) j=1 \u00CE\u0093 \u00CE\u00B3 (5.31) \u00E2\u0088\u0097 \u00E2\u0088\u0097 In (5.31), when \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E = 1, the RHS of (5.31) is equal to B P EP A . As \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E decreases, \u00C2\u00AFP EP A,M \u00E2\u0086\u0092\u00E2\u0088\u009E increases. so does FG (\u00C2\u00B7) and B \u00C2\u00AFP EP A , i.e. In practice, M is finite and the RHS of (5.31) is an upper bound on B J \u00C2\u00AFP EP A \u00E2\u0089\u00A4 J \u00E2\u0088\u0092 B \u00E2\u0088\u0097 FG (2j\u00E2\u0088\u00921+\u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E \u00E2\u0088\u0092 1) j=1 5.3.5 \u00CE\u0093 \u00CE\u00B3 . (5.32) Improved Discrete PEPA Algorithm Following the discussion in Section 5.3.4, we can have an ABR higher than B P EP A in (5.20) if (5.21) is used instead of (5.4) and the appropriate \u00CE\u00B4t\u00E2\u0088\u0097 can be found at time t. In this section, we propose an improved discrete PEPA algorithm that uses (5.21) to perform the bit allocation. The key is to find the lowest value, \u00CE\u00B4t\u00E2\u0088\u0097 , of \u00CE\u00B4t that satisfies (5.23), which uses \u00E2\u0088\u0097 \u00E2\u0088\u0097 the bisection method similar as in finding \u00CE\u00B4M \u00E2\u0086\u0092\u00E2\u0088\u009E . Once \u00CE\u00B4t is obtained, the power on each 89 \u000Csubchannel can be calculated by using stm = (2 t /(M \u00CE\u0093\u00CF\u0083 2 ))] \u00E2\u0088\u0097 [log2 (1+Sgm \u00CE\u00B4 0 t t . \u00E2\u0088\u0092 1)\u00CE\u0093\u00CF\u008302 /gm At time t, btm , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M is first calculated using (5.2), \u00CE\u00B4 is set to 0 and \u00CE\u00B4 is set to 1 representing the lowest and highest possible values for \u00CE\u00B4t\u00E2\u0088\u0097 , respectively. Then \u00CE\u00B4t\u00E2\u0088\u0097 is found using an iterative method. During each iteration, first, \u00CE\u00B4 is set to \u00CE\u00B4 = (\u00CE\u00B4 + \u00CE\u00B4)/2, \u00C2\u00AFbt , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M is updated by setting \u00C2\u00AFbt = [bt ]\u00CE\u00B4 and the total required power s is set m m m to the LHS of (5.23); second, if s \u00E2\u0088\u0092 S > 0, \u00CE\u00B4 is set to \u00CE\u00B4 because \u00CE\u00B4t\u00E2\u0088\u0097 > \u00CE\u00B4, otherwise \u00CE\u00B4 is set to \u00CE\u00B4. This iteration process continues until |\u00CE\u00B4 \u00E2\u0088\u0092 \u00CE\u00B4| \u00E2\u0089\u00A4 , which is the precision of the result. Finally, \u00CE\u00B4t\u00E2\u0088\u0097 is set to (\u00CE\u00B4 + \u00CE\u00B4)/2. This algorithm is summarized in Algorithm 4. Algorithm 4 Waterlevel finding algorithm. 1) Calculate btm , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M using (5.2), set \u00CE\u00B4 = 0, \u00CE\u00B4 = 1. 2) If |\u00CE\u00B4 \u00E2\u0088\u0092 \u00CE\u00B4| \u00E2\u0089\u00A4 , go to Step 5), otherwise continue. 3) \u00CE\u00B4 = (\u00CE\u00B4 + \u00CE\u00B4)/2, \u00C2\u00AFbtm = [btm ]\u00CE\u00B4 , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M . Let s be the value of LHS of (5.23). 4) If s \u00E2\u0088\u0092 S > 0, \u00CE\u00B4 = \u00CE\u00B4; otherwise \u00CE\u00B4 = \u00CE\u00B4. Go to Step 2). 5) \u00CE\u00B4t\u00E2\u0088\u0097 = (\u00CE\u00B4 + \u00CE\u00B4)/2. The computational complexity at each iteration is O(M ). Because the range of possible values of \u00CE\u00B4t\u00E2\u0088\u0097 is halved at each iteration, the number of iterations required is a constant, C = log2 (1/ ), where is the accuracy. So the computational complexity of this algorithm is O(M ). 5.4 Rayleigh fading channel In Section 5.3, we studied the ABR for OWF and PEPA for arbitrary pdf\u00E2\u0080\u0099s and cdf\u00E2\u0080\u0099s of the subchannel gains of the selected users. In this section, we obtain the pdf and cdf of the subchannel gains of the selected users for two different subchannel allocation strategies. The subchannel gains of the users are assumed to be Rayleigh distributed, i.e. the power gains are exponentially distributed. 90 \u000C5.4.1 Opportunistic Subchannel Assignment Suppose that at each time t, each of the M subchannels is assigned to the user with the highest gain for that subchannel. If the average subchannel power gains for all users are equal, the pdf of the power gain for the user assigned to any subchannel is readily obtained using a standard result in order statistics [15], i.e., g \u00E2\u0088\u0092 E{G} fG (g) = K 1 \u00E2\u0088\u0092 e K\u00E2\u0088\u00921 g e\u00E2\u0088\u0092 E{G} E{G} (5.33) with corresponding cdf g FG (g) = 1 \u00E2\u0088\u0092 e\u00E2\u0088\u0092 E{G} 5.4.2 K . (5.34) A Fairer Subchannel Assignment Scheme If the average subchannel gains for users are quite different, e.g., the average subchannel gains of users near the cell edge is much lower than that of the users close to the BS, assigning a subchannel to the user with the highest gain may be too unfair to users with poor average subchannel gains. A fairer scheme [12] is to select, for each subchannel, the user with the best channel gain relative to its own mean gain, i.e. k \u00E2\u0088\u0097 (t) = argmaxk gk,m (t) . E{Gk } (5.35) The distribution of a user\u00E2\u0080\u0099s subchannel gain relative to its own mean is exponential with a mean of 1. Thus the probability of selecting user i is 1/K, i.e. P (k \u00E2\u0088\u0097 = i) = 1/K, i = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K. The cdf of the power gain of the selected user for a subchannel is K P (G \u00E2\u0089\u00A4 g|k \u00E2\u0088\u0097 = i)P (k \u00E2\u0088\u0097 = i) FG (g) = P (G \u00E2\u0089\u00A4 g) = i=1 1 = K K i=1 K 1 gE{Gj } )= P (Gj \u00E2\u0089\u00A4 E{Gi } K j=1 91 K 1\u00E2\u0088\u0092e i=1 g \u00E2\u0088\u0092 E{G K i} . (5.36) \u000CThe corresponding pdf is K fG (g) = 1\u00E2\u0088\u0092e g \u00E2\u0088\u0092 E{G i} i=1 5.5 (K\u00E2\u0088\u00921) \u00E2\u0088\u0092 g e E{Gi } . E{Gi } (5.37) Simulation Results To study the performances of continuous and discrete bit loading PEPA and OWF in a multiuser OFDM system, both theoretical and simulation results are provided in this section. For convenience, we will refer to the results from evaluating (5.6) as \u00E2\u0080\u009COWF\u00E2\u0080\u009D, (5.11) with L equal to (5.13) as \u00E2\u0080\u009Cproposed OWF upper bound\u00E2\u0080\u009D, (5.15) as \u00E2\u0080\u009CPEPA\u00E2\u0080\u009D, (5.20) as \u00E2\u0080\u009CD-PEPA\u00E2\u0080\u009D, and (5.32) as \u00E2\u0080\u009CID-PEPA upper bound\u00E2\u0080\u009D. For comparison, the upper bound in [3] was also evaluated. Since this bound applies to the ABR difference between OWF and CPWF, we added the bound to the ABR of CPWF and refer it to as Adjusted YC upper bound. (T ) (T ) (T ) \u00C2\u00AF (T ) , obtained using (5.5), (5.14), Simulation results for BOW F , BP EP A , B P EP A , and B P EP A (5.16), and (5.24) with \u00CE\u00B4 obtained using Algorithm 4, are hereafter referred to as OWF (simu), PEPA (simu), D-PEPA (simu), ID-PEPA (simu). A value of 0.01 is used in calculating the ID-PEPA using Algorithm 4. All simulation results presented are based on a time duration of 2.5 \u00C3\u0097 106 OFDM symbols. The two subchannel allocation strategies in Sections 5.4.1 and 5.4.2, hereafter referred to as Case A and Case B respectively, are considered. In Case A, the average subchannel power gain for each user is chosen as 1. In Case B, the number of CRUs was increased in groups of six at a time with the average subchannel gain per group chosen to be 1. The average subchannel power gains of the six CRUs in a group are chosen as follows: one with value 4.85, two with value 0.5 and three with value 0.05. The multipath fading is assumed to be Rayleigh with a maximum Doppler frequency of 20 Hz. An OFDM symbol duration of 40 \u00C2\u00B5s is used and resource allocation is performed once every ms. In our calculations, we also use the following parameter values: \u00CE\u0093 = 1, \u00CF\u008302 = 10\u00E2\u0088\u00923 , and M = 64. 92 \u000CFigs. 5.1 and 5.2 show the ABR as a function of average SNR with 12 users for Case A and Case B, respectively. In Case A, the performance of OWF and PEPA are almost the same, with a difference of less than 0.5%. The proposed OWF bound is much tighter than the adjusted YC bound. In Case B, the performance difference between OWF and PEPA is less than 10% when SNR is higher than 5 dB, and the difference decreases with SNR. At low SNR, the difference is much more noticeable, at nearly 20% for SNR = 0 dB. The adjusted YC bound is tighter than the proposed bound for SNR values lower than 2 dB, but is looser at higher SNRs. In both cases, the ABR for ID-PEPA is significantly higher than that for D-PEPA. Figs. 5.3 and 5.4 show the ABR difference of continuous and discrete PEPA compared to continuous OWF as a function of average SNR \u00CE\u00B3 for K = 12 users and M = 64 subchannels for Case A and Case B, respectively. In both Cases, the difference between OWF and PEPA decreases with SNR. In Case A, the differences for D-PEPA and ID-PEPA compared to OWF do not change with SNR, at 0.5 bits and 0.05 bits, respectively. In Case B, the differences for D-PEPA and ID-PEPA compared to OWF decrease with SNR. The difference between D-PEPA and OWF changes from 0.7 bits to 0.5 bits, and the difference between ID-PEPA and OWF decreases from 0.2 bits to 0.03 bits. Specifically, in Case B, when SNR is low, ID-PEPA performs better than PEPA. In both cases, the improvement of ID-PEPA over D-PEPA is significant. Figs. 5.5 and 5.6 show the ABR as a function of number, M , of subchannels for Case A and Case B, respectively. In both cases, the theoretical values of PEPA and D-PEPA do not change with M , and agree closely with the simulation results. OWF and ID-PEPA bound curves are constant since M \u00E2\u0086\u0092 \u00E2\u0088\u009E for these curves. As M increases, the simulation values for OWF and ID-PEPA increase and approach their theoretical values. Although OWF increases with M , the increase is very small (less than 0.002% in Case A and less than 2% in Case B), and the performance loss of D-PEPA relative to continuous OWF is about 10% (15%) for Case A (Case B). The performance loss of ID-PEPA relative to OWF decreases 93 \u000C5 Average number of bits per OFDM symbol per subchannel, ABR 4.5 4 3.5 3 2.5 Adjusted YC upper bound Proposed OWF upper bound OWF PEPA ID\u00E2\u0088\u0092PEPA upper bound D\u00E2\u0088\u0092PEPA 2 1.5 1 0 2 4 6 SNR, \u00CE\u00B3 (dB) 8 10 Figure 5.1: ABR as a function of average SNR \u00CE\u00B3 with K = 12 users for Case A. 94 \u000C3.5 Average number of bits per OFDM symbol per subchannel, ABR 3 Adjusted YC upper bound Proposed OWF upper bound OWF PEPA ID\u00E2\u0088\u0092PEPA upper bound D\u00E2\u0088\u0092PEPA 2.5 2 1.5 1 0.5 0 2 4 6 SNR, \u00CE\u00B3 (dB) 8 10 Figure 5.2: ABR as a function of average SNR \u00CE\u00B3 with K = 12 users for Case B. 95 \u000C100 Average bit rate difference relative to OWF 10\u00E2\u0088\u00921 10 \u00E2\u0088\u00922 10 \u00E2\u0088\u00923 10\u00E2\u0088\u00924 10 \u00E2\u0088\u00925 10\u00E2\u0088\u00926 10 D\u00E2\u0088\u0092PEPA D\u00E2\u0088\u0092PEPA (simu) ID\u00E2\u0088\u0092PEPA upper bound ID\u00E2\u0088\u0092PEPA (simu) PEPA PEPA (simu) \u00E2\u0088\u00927 0 5 10 SNR, \u00CE\u00B3 (dB) 15 20 Figure 5.3: ABR difference between OWF and PEPA as a function of average SNR \u00CE\u00B3 for Case A. K = 12 and M = 64. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 96 \u000CAverage bit rate difference relative to OWF 0 10 \u00E2\u0088\u00921 10 \u00E2\u0088\u00922 D\u00E2\u0088\u0092PEPA D\u00E2\u0088\u0092PEPA (simu) ID\u00E2\u0088\u0092PEPA upper bound ID\u00E2\u0088\u0092PEPA (simu) PEPA PEPA (simu) 10 \u00E2\u0088\u00923 0 5 10 SNR, \u00CE\u00B3 (dB) 15 20 Figure 5.4: ABR difference between OWF and PEPA as a function of average SNR \u00CE\u00B3 for Case B. K = 12 and M = 64. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 97 \u000Cwith M , from 10% (15%) at M = 1 to less than 1% (3%) at M = 128 for Case A (Case B). When M = 1, there is no difference in the ABR for D-OWF, D-PEPA, or ID-PEPA. On the other hand, when M = 128, the improvement of using D-OWF or ID-PEPA over D-PEPA is over 10% (16%) for Case A (Case B). This shows that in a system where there is only one channel, e.g., in a narrow band system, D-PEPA is good enough; however, in systems with a large number of subchannels, especially when the average subchannel gains among the users are quite different, the proposed ID-PEPA algorithm provides a noticeable improvement. The performance loss of ID-PEPA relative to D-OWF is small at 0.1% (2%) in Case A (Case B). Figs. 5.7 and 5.8 show the ABR as a function of the number, K, of users for Case A and Case B, respectively. In both cases, the simulation results are very close to theoretical values. The ABR increases with K regardless of the allocation scheme used, due to multiuser diversity. The ABR improvement of ID-PEPA over D-PEPA is around 0.43 bits for the range of K values shown. Since the ABR increases with K, the improvement of ID-PEPA relative to D-PEPA decreases with K, e.g., in Case B, the improvement is 18% at K = 6 and 14% at K = 36. The performance of ID-PEPA is almost the same as D-OWF, with a difference of less than 1% (3%) in Case A (Case B). 5.6 Conclusions A new low computational and implementation complexity discrete bit loading algorithm based on plain equal power allocation for multiuser OFDM systems has been proposed. Bounds for the optimal water-filling algorithm and the proposed bit loading algorithm are derived, and shown to be tight. Simulation results indicate that the proposed bit loading algorithm provides a close to the optimal solution and significant improvement over an equal power allocation scheme in which the number of bits loaded is given by (5.4), especially in a system with widely different average user subchannel gains. 98 \u000CAverage number of bits per OFDM symbol per subchannel, ABR 4.9 4.8 Proposed upper bound OWF OWF (simu) PEPA PEPA (simu) ID\u00E2\u0088\u0092PEPA upper bound D\u00E2\u0088\u0092OWF ID\u00E2\u0088\u0092PEPA (simu) D\u00E2\u0088\u0092PEPA D\u00E2\u0088\u0092PEPA (simu) 4.7 4.6 4.5 4.4 1 2 4 8 16 32 Number of subchannels, M 64 128 Figure 5.5: ABR as a function of number of subchannels M for Case A. K = 12 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 99 \u000CAverage number of bits per OFDM symbol per subchannel, ABR 3.2 3.1 Proposed upper bound OWF OWF (simu) PEPA PEPA (simu) ID\u00E2\u0088\u0092PEPA upper bound D\u00E2\u0088\u0092OWF ID\u00E2\u0088\u0092PEPA (simu) D\u00E2\u0088\u0092PEPA D\u00E2\u0088\u0092PEPA (simu) 3 2.9 2.8 2.7 1 2 4 8 16 32 Number of subchannels, M 64 128 Figure 5.6: ABR as a function of number of subchannels M for Case B. K = 12 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 100 \u000C5.4 Average number of bits per OFDM symbol per subchannel, ABR 5.2 5 4.8 4.6 Proposed upper bound OWF OWF (simu) PEPA PEPA (simu) ID\u00E2\u0088\u0092PEPA upper bound D\u00E2\u0088\u0092OWF ID\u00E2\u0088\u0092PEPA (simu) D\u00E2\u0088\u0092PEPA D\u00E2\u0088\u0092PEPA (simu) 4.4 4.2 4 3.8 6 12 18 24 Number of users, K 30 36 Figure 5.7: ABR as a function of number of users K for Case A. M = 64 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 101 \u000CAverage number of bits per OFDM symbol per subchannel, ABR 3.4 3.2 3 Proposed upper bound OWF OWF (simu) PEPA PEPA (simu) ID\u00E2\u0088\u0092PEPA upper bound D\u00E2\u0088\u0092OWF ID\u00E2\u0088\u0092PEPA (simu) D\u00E2\u0088\u0092PEPA D\u00E2\u0088\u0092PEPA (simu) 2.8 2.6 2.4 2.2 6 12 18 24 Number of users, K 30 36 Figure 5.8: ABR as a function of number of users K for Case B. M = 64 and \u00CE\u00B3 = 10 dB. For simulation curves, T = 1 ms and for theoretical curves, T = \u00E2\u0088\u009E. 102 \u000CReferences [1] R. G. Gallager, Information Theory and Reliable Communication. Wiley & Sons, 1968. New York: John [2] A. Leke and J. M. Cioffi, \u00E2\u0080\u009CA maximum rate loading algorithm for discrete multitone modulation systems,\u00E2\u0080\u009D in Proc. of IEEE Global Telecommunications Conference (GLOBECOM \u00E2\u0080\u009997), vol. 3, Phoenix, AZ, USA, November 1997, pp. 1514\u00E2\u0080\u00931518. [3] W. Yu and J. M. Cioffi, \u00E2\u0080\u009CConstant-power waterfilling: Performance bound and lowcomplexity implementation,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 54, no. 1, pp. 23\u00E2\u0080\u009328, January 2006. [4] D. Hughes-Hartogs, \u00E2\u0080\u009CEnsemble modem structure for imperfect transmission media,\u00E2\u0080\u009D U.S. Patents Nos. 4,679,277 (July 1987), 4,731,816 (March 1988), and 4,833,706 (May 1989). [5] B. S. Krongold, K. Ramchandran, and D. L. Jones, \u00E2\u0080\u009CComputationally efficient optimal power allocation algorithms for multicarrier communication systems,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 48, no. 1, pp. 23\u00E2\u0080\u009327, January 2000. [6] N. Papandreou and T. Antonakopoulos, \u00E2\u0080\u009CA new computationally efficient discrete bitloading algorithm for DMT applications,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 53, no. 5, pp. 785\u00E2\u0080\u0093789, May 2005. [7] P. S. Chow, J. M. Cioffi, and J. A. C. Bingham, \u00E2\u0080\u009CA practical discrete multitone transceiver loading algorithm for data transmission over spectrally shaped channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 43, no. 234, pp. 773\u00E2\u0080\u0093775, February/March/April 1995. [8] J. Campello, \u00E2\u0080\u009CPractical bit loading for DMT,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009999), vol. 2, Vancouver, BC, Canada, June 1999, pp. 801\u00E2\u0080\u0093805. [9] L. Piazzo, \u00E2\u0080\u009CFast algorithm for power and bit allocation in OFDM systems,\u00E2\u0080\u009D IEE Electronics Letters, vol. 35, no. 25, pp. 2173\u00E2\u0080\u00932174, December 1999. [10] S. T. Chung and A. J. Goldsmith, \u00E2\u0080\u009CDegrees of freedom in adaptive modulation: a unified view,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 49, no. 9, pp. 1561\u00E2\u0080\u00931571, September 2001. [11] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, \u00E2\u0080\u009CMultiuser OFDM with adaptive subcarrier, bit, and power allocation,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 17, no. 10, pp. 1747\u00E2\u0080\u00931758, October 1999. [12] S. Ryu, B. H. Ryu, H. Seo, M. Shin, and S. Park, \u00E2\u0080\u009CWireless packet scheduling algorithm for OFDMA system based on time-utility and channel state,\u00E2\u0080\u009D ETRI Journal, vol. 27, no. 6, pp. 777\u00E2\u0080\u0093787, 2005. 103 \u000C[13] J. Jang and K. B. Lee, \u00E2\u0080\u009CTransmit power adaptation for multiuser OFDM systems,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 21, no. 2, pp. 171\u00E2\u0080\u0093178, February 2003. [14] A. J. Goldsmith and S.-G. Chua, \u00E2\u0080\u009CVariable-rate variable-power MQAM for fading channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 45, no. 10, pp. 1218\u00E2\u0080\u00931230, October 1997. [15] H. A. David and H. N. Nagaraja, Order Statistics. John Wiley & Sons, 2003. 104 \u000CChapter 6 Cross-Layer Resource Allocation for OFDM-based Cognitive Radio Systems 6.1 Introduction Cognitive radio (CR) is a new technology which is attracting a lot of research interest. It was first proposed in [1] as a novel wireless communications approach with the ability to sense and learn its environment, change its transmission and reception parameters, and efficiently utilize the radio spectrum whenever and wherever needed. With the ever-increasing demand for mobile wireless applications, the allocation of spectrum for the exclusive use of licensed holders is becoming a hurdle to efficient spectrum utilization. There are few unallocated bands below 6 GHz [2]. However, studies have shown that a large portion of the allocated spectrum is used only sporadically, resulting in poor spectrum utilization [3]. CR, with its ability to sense unused bands and adjust transmission parameters, is an excellent candidate for improving spectrum utilization. The FCC [4] is supporting the use of CR technology to allow unlicensed users to share radio resources with licensed users in a way which is transparent to the latter group. As elaborated in [5], orthogonal frequency division multiplexing (OFDM) is a good modulation candidate for CR systems. However, a number of challenging resource allocation (RA) problems need to be solved in order to realize the full potential of CR. RA in multiuser OFDM systems has been extensively studied at the physical (PHY) layer in terms of subcarrier, bit, and power allocation. In [6]\u00E2\u0080\u0093[9], suboptimal solutions are 1 Portions of this chapter have been accepted for publication. Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CCrossLayer Resource Allocation for Real-Time Services in OFDM-based Cognitive Radio Systems,\u00E2\u0080\u009D Springer Telecommunication Systems. The remaining portions have been submitted for publication. 105 \u000Cproposed to minimize the total transmit power while satisfying the fixed rate and bit error rate (BER) requirements for fixed-rate real-time (RT) services. For non-real-time (NRT) services, maximizing system throughput for a given total transmit power while providing a certain level of fairness among users is often considered [10]\u00E2\u0080\u0093[12]. One of the main difficulties in allocating resources in CR systems is that the interference power generated by cognitive radio users (CRUs) at a primary user (PU) receiver should not exceed a predefined threshold. In [13]\u00E2\u0080\u0093[15], the PHY problem of allocating subcarrier, bit and power to maximize system throughput, while guaranteeing that interference power limits are met, is studied for OFDM-based CR systems. In some situations, it may not be practical to determine the interference power levels at all PU receivers and appropriate guard bands are used to protect the PU bands [16]. At first glance, it may appear that the RA algorithms in [6]\u00E2\u0080\u0093[12], designed for conventional OFDM systems, can be applied directly to OFDM-based CR systems that use guard bands. However, in contrast to conventional OFDM systems which assume that the available spectrum is fixed, the available transmission spectrum in a CR system changes over time. Existing solutions designed for OFDM systems generally assume a fixed rate requirement for each OFDM symbol duration. This assumption is reasonable in OFDM systems, but may not be feasible when the bandwidth available to the CR system is low. A dynamically adjusted rate requirement is more appropriate. Most existing algorithms designed for multiuser OFDM systems assume that a feasible solution to the RA problem exists. This is generally valid when the available bandwidth is fixed, as in most OFDM systems. However, for CR systems, there may be no feasible solution when the available bandwidth is very low. This problem feasibility issue must be addressed in any CR system in which available resources are changing rapidly. Medium access control (MAC) layer RA algorithms have also been devised to satisfy user quality of service (QoS) requirements. Almost all existing studies (e.g. [7],[17],[18], [19]) extend opportunistic scheduling strategies (which use channel state information) for 106 \u000Cthe single carrier case [20] to the OFDM case with multiple subcarriers. In these algorithms, equal subcarrier powers are generally assumed, which may not be optimal. To improve system throughput, users experiencing poor channel conditions postpone their transmissions until conditions improve. To help RT user packets meet their deadlines, an urgency factor [19] is used to improve transmission opportunities for users whose head-of-line (HOL) packets have imminent deadlines. Such a strategy works well in multiuser OFDM systems. However, this urgency factor ignores the fact that available system resources in a CR system are timevarying, resulting in a false urgency issue. When the available system resources are higher than the assumed fixed system resources, some RT users with bad channel qualities may be given transmission opportunities prematurely. This will result in a lower system throughput. On the other hand, when the available system bandwidth drops below the nominal value, the dropped packet rate (DPR) may become unacceptably high. Some researchers have adopted a cross-layer design approach in allocating system resources. In [21]\u00E2\u0080\u0093[23], sub-optimal algorithms for NRT services are proposed; algorithms for both RT and NRT services are studied in [24] and [25]. In [24], the QoS for RT applications is improved by giving high priority to users whose HOL packet deadlines are approaching. Since equal power allocation is assumed in [24], it should be possible to further improve the system performance by relaxing this constraint. Moreover, the high priority strategy is essentially the same as the urgency factor approach and does not resolve the false urgency issue. In [25], the MAC layer QoS requirement is converted to a PHY layer fixed rate requirement based on the average user packet arrival rate and delay constraint. An optimal subchannel and power allocation strategy is proposed which maximizes system throughput subject to a total transmit power limit and user delay requirements. The problem feasibility issue is not addressed. To date, there are few studies on QoS provisioning in OFDM-based CR systems in which the available spectrum is time-varying. In [26], cross-layer based MAC protocols are proposed to allow CRUs to share the spectrum holes, which are detected by the integrated 107 \u000CPHY layer spectrum-sensing policies. In [27], the average rate of the CRU in a single user case is maintained and the rate variance is minimized, subject to power constraints. The schemes in [26] and [27] are designed for NRT applications. To the best of our knowledge, there is no published work on QoS provisioning for RT applications or a mixture of RT and NRT applications in OFDM-based CR systems. In this chapter, we study RA for both RT and NRT services in a multiuser OFDMbased CR system. Given the time-varying nature of available system resources, we adopt a cross-layer approach which improves system resource utilization, while addressing the problem feasibility and false urgency issues that are not typically encountered in OFDM systems. A system that only supports RT services is first investigated. Since power savings is important for portable wireless devices, an optimization problem which aims to minimize power consumption while guaranteeing QoS for RT services is formulated. In the formulation, the MAC layer packet delay requirements are dynamically converted to PHY layer rate requirements; the conversion is a function of the delivery status of queued packets as well as the number of available subchannels. Then an optimization problem that extends the one for RT services to both RT and NRT services is formulated which dynamically converts RT user delay requirements and NRT user average rate requirements to PHY layer rate requirements. The solution has a multi-level water-filling interpretation with fairness among users achieved by adjusting user water-levels. 6.2 System Model We consider a CR system with a total bandwidth of W Hz and L PUs; PU l, l = 1, 2, . . . , L has a bandwidth allocation of Wl Hz. Frequency bands actually carrying PU signals are referred to as active; non-active bands are also termed spectrum holes. In order to reduce the cross-channel interference between the CRUs and the PUs to acceptable levels, some subchannels (guard bands) adjacent to active PU bands are not used by the CRUs [16]. 108 \u000CThe active PU bands, PU guard bands, and the spectrum holes in a certain area at time t are shown in Fig. 6.1. For this example, the number, mCR,t , of subchannels available to the CR system (i.e. those within spectrum holes) at time t can range from 0 to 32. Fig. 6.1 depicts a scenario with mCR,t = 15. PU active frequency bands Guard bands Guard bands W1 W2 Spectrum hole 1 fc 3 5 Spectrum hole 7 9 11 13 15 17 19 21 23 25 27 29 31 f Figure 6.1: Primary users\u00E2\u0080\u0099 active frequency bands, guard bands, spectrum holes and CRU OFDM subchannels. Assume that there is one CR base station (CRBS) communicating with K CRUs. We are interested in downlink transmissions from the CRBS to the CRUs. The CRBS and the CRUs are able to accurately locate the spectrum holes. There are M OFDM subbands (or subchannels) in the system, each with noise power \u00CF\u008302 . Interference among the subchannels is assumed to be negligible. The nominal bandwidth of subband m, m = {1, 2, . . . , M } ranges from fc + (m \u00E2\u0088\u0092 1)\u00E2\u0088\u0086f to fc + m\u00E2\u0088\u0086f . The system is time-slotted with a slot duration equal to an OFDM symbol duration Tsymbol . The subchannels are modelled in discrete-time, with the gain for subchannel m and time slot t from the CRBS to CRU k denoted by t it is assumed that the power gains gk,m t gk,m . For illustrative purposes, are outcomes of independent random variables t (rv\u00E2\u0080\u0099s), and for any given value of k, gk,m , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M are independent t identically distributed (i.i.d.) rv\u00E2\u0080\u0099s. The number, rk,m , of bits per OFDM symbol which can 109 \u000Cbe supported by subchannel m of CRU k in time slot t is given by [28] t rk,m = log2 1 + t gk,m stk,m \u00CE\u0093\u00CF\u008302 (6.1) where stk,m is the transmit power and \u00CE\u0093 is an SNR gap parameter which indicates how far the system is operating from capacity. For simplicity, we assume continuous bit modulation, t can take on real values [28]. i.e. rk,m The availability of a PU band is modelled by a two-state Markov chain. During a time slot t, a PU band can be in one of two states: active or inactive [26]. A state transition may occur once every Tstate slots. At a transition time, the probability of changing from active to inactive state is 1 \u00E2\u0088\u0092 pa , and the probability of changing from inactive to active state is 1 \u00E2\u0088\u0092 pn . The number, lCR,t , of available PU bands at time slots {t, t = 1, 2, . . .} then form a Markov chain, with transition probability matrix Q = {qij }, i, j = 0, 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L, where state i corresponds to the event that the number of available PU bands is equal to i and the probability, qij , of moving from state i to state j is given by L qij = n=0 L\u00E2\u0088\u0092i i (1 \u00E2\u0088\u0092 pa )n\u00E2\u0088\u0092i+j paL\u00E2\u0088\u0092j\u00E2\u0088\u0092n . (1 \u00E2\u0088\u0092 pn )n pi\u00E2\u0088\u0092n n n\u00E2\u0088\u0092i+j n (6.2) The Markov chain is illustrated in Fig. 6.2. If each PU band can accommodate an equal number, M/L, of subchannels, then the number MCR,t of available subchannels at time slots {t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 } form a Markov chain with transition probability matrix P = {pmn }, m, n = 0, 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M , where state m corresponds to the event that MCR,t = m and the probability, pmn , of moving from state m to state n is given by pmn = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 qij , m = \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 0, iM ,n L otherwise. 110 = jM L (6.3) \u000Cq01 q0L q0i q1i q1L qiL q11 q00 i qii L qLL q10 qi0 qi1 qLi qL1 qL0 Figure 6.2: Markov chain model for the number of available PU bands. 6.3 Cross-Layer Resource Allocation for RT Services In this section, we consider a system which supports only RT services. Although only downlink transmissions from the CRBS to the CRUs are studied in this section, the approach proposed is also applicable on the uplink. 6.3.1 The Optimization Problem On arrival, a packet destined for CRU k is placed into CRBS buffer k for transmission in order of packet creation times. The ith packet in buffer k needs to be received by CRU k within dk time slots after packet i\u00E2\u0080\u0099s creation time slot tSk,i ; otherwise, the packet becomes stale and will be discarded. Our objective is to minimize the total CRBS transmit power while ensuring that packets are delivered to CRUs within their specified deadlines. The optimization problem is formulated as T OP1 : K M t atk,m (2rk,m \u00E2\u0088\u0092 1) mint t ak,m ,rk,m t=1 k=1 m=1 111 \u00CE\u0093\u00CF\u008302 t gk,m (6.4) \u000Csubject to K atk,m = 1 k=1 atk,m \u00E2\u0088\u0088 (6.5) \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 {0, 1} m \u00E2\u0088\u0088 Mt \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 {0} (6.6) \u00C2\u00AFt m\u00E2\u0088\u0088M t \u00E2\u0088\u0088 (0, RM AX ) rk,m (6.7) tSk,i + dk > tD k,i , k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} (6.8) u u , u > t} , u \u00E2\u0089\u00A4 t}, but not on {gk,m atk,m , stk,m can depend on {gk,m (6.9) atk,m , stk,m can depend on the length and creation times of packets which have been placed in buffer k, but not on information about packets yet to arrive. (6.10) t t In (6.4), T is the number of time slots considered in the allocation scheme, (2rk,m \u00E2\u0088\u00921)\u00CE\u0093\u00CF\u008302 /gk,m t is the power necessary for the OFDM symbol to support a rate of rk,m as can be seen from (6.1), and atk,m is the subchannel assignment indicator which takes on value 1 if subchannel m is assigned to CRU k at time slot t; otherwise, its value is 0. In (6.6), \u00C2\u00AF t \u00E2\u008A\u0086 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } denotes the set of available (unavailable) subchannels at time t. Mt M Constraints (6.5) and (6.6) imply that at most one CRU can use any given subchannel in any given time slot. In (6.7), RM AX is the maximum number of bits that can be allocated on any subchannel. Constraint (6.8) represents the MAC layer QoS requirement that the delivery time tD k,i for packet i of CRU k must be no later than dk time slots after its creation time slot. Conditions (6.9) and (6.10) reflect the causality constraints for the problem. Problem OP1 is difficult to solve as it involves an optimization over multiple time slots t \u00E2\u0088\u0088 {1, 2, . . . , T }. We propose to solve a simpler problem, Problem OP3, obtained by first converting the MAC layer constraint (6.8) into (generally different) PHY layer rate requirements for each of the T time slots. As mCR,t \u00E2\u0086\u0092 \u00E2\u0088\u009E, the optimal solutions for OP1 112 \u000Cand OP3 will be the same. 6.3.2 Conversion of MAC Layer Requirements to PHY Layer Requirements We now consider the following Problem OP2 U OP2 : K M t atk,m (2rk,m min t atk,m ,rk,m t=1 k=1 m=1 \u00CE\u0093\u00CF\u008302 \u00E2\u0088\u0092 1) t gk,m (6.11) subject to K atk,m = 1 k=1 atk,m \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 {0, 1} m \u00E2\u0088\u0088 Mt \u00E2\u0088\u0088 \u00EF\u00A3\u00B4 \u00C2\u00AFt \u00EF\u00A3\u00B3 {0} m\u00E2\u0088\u0088M t rk,m \u00E2\u0088\u0088 (0, RM AX ) U (6.12) (6.13) (6.14) M t atk,m rk,m = RkU,REQ (6.15) t=1 m=1 atk,m , stk,m can depend on the length and creation times of packets which have been placed in buffer k, but not on information about packets yet to arrive. (6.16) In (6.15), RkU,REQ is the minimum number of bits that needs to be transmitted in time slots 1 through U to meet the delay requirements and U \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T }. Note that Problem OP2 is the same as Problem OP1, except that the causality constraint (6.9) is dropped and the MAC layer constraint (6.8) is replaced by the PHY layer constraint (6.15). t \u00E2\u0088\u0097 \u00E2\u0088\u0097 Theorem 3.1: As mCR,t \u00E2\u0086\u0092 \u00E2\u0088\u009E, t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U , the optimal solution S \u00E2\u0088\u0097 = {rk,m , atk,m } for 113 \u000Cproblem OP2 satisfies M \u00E2\u0088\u0097 t \u00E2\u0088\u0097 atk,m rk,m = rkt,REQ , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, (6.17) m=1 where rkt,REQ m U t=1 CR,t RkU,REQ m(1,U , and m(1, U ) = ) mCR,t . Proof: See Appendix B.1. Comment: An intuitive explanation of the theorem is as follows. The optimal solution for Problem OP2 has a water-filling interpretation [29]. When the number of available subchannels in each time slot is large, the local water level at each time slot is nearly equal to the global water level (i.e. the water level if the subchannels in time slots 1, 2, . . . , U are pooled together). The bit rate for CRU k in time slot t is proportional to the fraction of the total number of available subchannels in time slots 1, 2, . . . , U that are available in slot t . Using Theorem 3.1, Problem OP2 which spans the time slots 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U can be transformed into a series of optimization problems, one for each slot t, t \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U }. The \u00E2\u0088\u0097 t \u00E2\u0088\u0097 values of atk,m and rk,m are obtained as the optimal solution to Problem OP3. K OP3 : M t atk,m (2rk,m \u00E2\u0088\u0092 1) mint t ak,m ,rk,m k=1 m=1 \u00CE\u0093\u00CF\u008302 t gk,m (6.18) subject to (6.12), (6.13), (6.14) and M t atk,m rk,m = rkt,REQ . (6.19) m=1 In practice, mCR,t is finite. The average CRBS power for Problem OP2 is plotted as a \u00C2\u00AF CR,t , of available subchannels in Fig. 6.3 with K = 3 CRUs function of the average number, M and different values of U . The number, MCR,t , of available subchannels is assumed to be \u00C2\u00AF CR,t and 1.5M \u00C2\u00AF CR,t and rt,REQ = 1.5M \u00C2\u00AF CR,t . In Case A, uniformly distributed between 0.5M k the average subchannel power gains for the three CRUs are 0.036 \u00C3\u0097 10\u00E2\u0088\u00929 W, 0.095 \u00C3\u0097 10\u00E2\u0088\u00929 W and 10\u00E2\u0088\u00929 W. In Case B, the average subchannel power gains are equal to 10\u00E2\u0088\u00929 W. In both 114 \u000C0.12 Average total power (W) 0.1 0.08 Case A: U=1 Case A: U=2 Case A: U=5 Case B: U=1 Case B: U=2 Case B: U=5 0.06 0.04 0.02 0 8 16 32 \u00E2\u0088\u0092 Average number M CR,t 64 128 of subchannels 256 Figure 6.3: Average CRBS power for U = 1, 2 and 5 slots. \u00C2\u00AF CR,t increases, the difference among the three cases, \u00CF\u008302 = 10\u00E2\u0088\u009213 W. It can be seen that as M solutions decreases. The difference increases with variation in the average CRU subchannel power gains. But even in the rather large variation scenario of Case A, the difference is \u00C2\u00AF CR,t = 64. Due to running time considerations, each point for U = 1 less than 2% when M was obtained by averaging over 1000 random subchannel gain realizations, each point for U = 2 was obtained using 500 realizations, and each point for U = 5 was obtained using 200 realizations. At time slot t, in order to ensure that CRU k\u00E2\u0080\u0099s first packet in queue, i.e., the head of line (HOL) packet, is delivered on time, for the next Tk,1 = tSk,1 + dk \u00E2\u0088\u0092 t time slots, t+Tk,1 \u00E2\u0088\u00921 u=t M m=1 u auk,m rk,m should be at least the length bk,1 (in bits) of CRU k\u00E2\u0080\u0099s first packet, 115 \u000Cm CR,t i.e. rkt,REQ = bk,1 m(t,t+T . Similarly, to ensure that the ith packet in CRBS buffer k is k,1 \u00E2\u0088\u00921) delivered on time, for the next Tk,i = tSk,i + dk \u00E2\u0088\u0092 t, i n=1 bk,n , i.e. rkt,REQ = mCR,t m(t,t+Tk,i \u00E2\u0088\u00921) t+Tk,i \u00E2\u0088\u00921 u=t M m=1 u auk,m rk,m should be at least i n=1 bk,n . Thus, in order to ensure the on-time delivery of every packet in CRBS buffer k, the CRBS should set rkt,REQ to the maximum among the values for all packets in CRU k\u00E2\u0080\u0099s queue at time t, i.e. rkt,REQ = max i 6.3.3 mCR,t m(t, t + Tk,i \u00E2\u0088\u0092 1) i bk,n . (6.20) n=1 Proposed Algorithm At time slot t, t = 1, 2, . . . , T , we have an instance of Problem OP3 in which rkt,REQ is calculated using (6.20) with mCR,t equal to the number of available subchannels in slot t and m(t, t + Tk,i \u00E2\u0088\u0092 1) can be estimated as discussed in Section 6.3.4. OP3 can be solved by using (B.31) and (B.23) with U = 1. In order to find the set {\u00CE\u00BB\u00E2\u0088\u0097k , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} that satisfies M m=1 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 atk,m rk,m = rkt,REQ , the initial set of water-levels can be obtained by assuming that each CRU in turn has exclusive use of all subchannels, then iteratively increasing each CRU\u00E2\u0080\u0099s water-level until all CRUs reach their target rkt,REQ values. The water-level for a CRU will not change much from slot to slot. So except in cases when new CRUs are joining in, we can use the previous water-levels as the starting point in searching for the optimal solution. t \u00E2\u0088\u0097 The resulting number of bits, rk,m , loaded at slot t for CRU k at subchannel m are real numbers. For systems that require an integer number of bits allocation, a near-optimal t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 procedure is to set the integer-constrained value, r\u00CB\u009Ck,m , to [rk,m ] where [\u00C2\u00B7] denotes the rounding t \u00E2\u0088\u0097 to the nearest integer operation. Although after rounding off rk,m , M m=1 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 atk,m r\u00CB\u009Ck,m may not be equal to rkt,REQ , no adjustment is needed unless the corresponding CRU\u00E2\u0080\u0099s HOL packet will miss its deadline. For these CRUs, i.e., for CRU k that M m=1 atk \u00E2\u0088\u0097,m rkt \u00E2\u0088\u0097,m < bk ,1 and t = TkS ,1 + dk \u00E2\u0088\u0092 1, the following adjustment is necessary: allocate one additional bit at a time to the subchannel that requires the minimum increasing power until 116 M m=1 atk \u00E2\u0088\u0097,m rkt \u00E2\u0088\u0097,m = bk ,1 . \u000C6.3.4 Estimation of the Number of Available Subchannels in the next m(t1 , t2 ) slots To calculate the appropriate rate requirement for CRU k in time slot t using (6.20), we need to know m(t, t + \u00CF\u0084 \u00E2\u0088\u0092 1), the total number of available subchannels in the next \u00CF\u0084 time slots {t, t + 1, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , t + \u00CF\u0084 \u00E2\u0088\u0092 1}. At time slot t, the number, mCR,t , of available subchannels is known. Suppose that state transitions for all PUs occur at time slots Tstate , 2Tstate , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 . Let tn t Tstate Tstate be the time slot at which the next state transition will take place. Then mCR,t stays unchanged for the next tn \u00E2\u0088\u0092 t slots. From time slot tn to tn + Tstate \u00E2\u0088\u0092 1, the probability vector V = (vm0 , vm1 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , vmn , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , vmM ) where vmn is the probability of n available subchannels given mCR,t = m is V = Xm P. (6.21) In (6.21), Xm = (0, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , 1, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , 0) is a 1 \u00C3\u0097 (M + 1) vector with all component being zero \u00C2\u00AF CR (t1 , t2 ) be the total expected except for the (mCR,t + 1)th component being 1. Let M number of available subchannels in time slots t1 through t2 . The total expected number of available subchannels in time slots tn through tn + Tstate \u00E2\u0088\u0092 1 is thus \u00C2\u00AF CR (tn , tn + Tstate \u00E2\u0088\u0092 1) = Tstate VY M (6.22) where Y = (0, 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M )T . Similarly, at time slot tn + Tstate to tn + 2Tstate \u00E2\u0088\u0092 1, we get \u00C2\u00AF CR (tn + Tstate , tn + 2Tstate \u00E2\u0088\u0092 1) = Tstate Xm P2 Y. M Let tl t+\u00CF\u0084 \u00E2\u0088\u00921 Tstate (6.23) Tstate be the time slot at which the last state transition will occur. In 117 \u000Ctime slot tl through t + \u00CF\u0084 \u00E2\u0088\u0092 1, we have t \u00E2\u0088\u0092tn \u00C2\u00AF CR (tl , t + \u00CF\u0084 \u00E2\u0088\u0092 1) = (t + \u00CF\u0084 \u00E2\u0088\u0092 tl )Xm P Tlstate +1 Y . M (6.24) Our estimate, m(t, \u00CB\u0086 t + \u00CF\u0084 \u00E2\u0088\u0092 1) of the total expected number, m(t, t + \u00CF\u0084 \u00E2\u0088\u0092 1), of available subchannels in time slots t through t + \u00CF\u0084 \u00E2\u0088\u0092 1 is then tl \u00E2\u0088\u0092tn Tstate Xm Pu Y m(t, \u00CB\u0086 t + \u00CF\u0084 \u00E2\u0088\u0092 1) = min(tn \u00E2\u0088\u0092 t, \u00CF\u0084 )mCR,t + Tstate u=1 (t + \u00CF\u0084 \u00E2\u0088\u0092 tl )Xm P 6.4 tl \u00E2\u0088\u0092tn +1 Tstate Y. (6.25) Cross-Layer Resource Allocation for Mixed Services 6.4.1 The Optimization Problem In this section, we consider two types of services, namely, RT services and NRT services. Without loss of generality, we assume that the first KRT CRUs are RT, and the remaining CRUs are NRT. The average data rate for NRT CRU k should be at least RkN RT . Our objective is to maximize system throughput while ensuring that RT CRU packets are delivered within their specified deadlines and that the average data rates for NRT CRUs satisfy their rate requirements RkN RT . The optimization problem can be formulated as T OP4 : K M t atk,m rk,m max t atk,m ,rk,m t=1 k=1 m=1 118 (6.26) \u000Csubject to K M atk,m stk,m \u00E2\u0089\u00A4 S (6.27) k=1 m=1 t 2rk,m \u00E2\u0088\u0092 1 stk,m = \u00CE\u0093\u00CF\u008302 t gk,m (6.28) K atk,m = 1 k=1 atk,m \u00E2\u0088\u0088 (6.29) \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 {0, 1} m \u00E2\u0088\u0088 Mt \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 {0} \u00C2\u00AFt m\u00E2\u0088\u0088M t rk,m \u00E2\u0088\u0088 (0, RM AX ) tSk,i + dk > tD k,i , k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } \u00C2\u00AF 1,T \u00E2\u0089\u00A5 RN RT , k \u00E2\u0088\u0088 {KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} R k k t u u atk,m , rk,m can depend on {gk,m , u \u00E2\u0089\u00A4 t}, but not on {gk,m , u > t}. (6.30) (6.31) (6.32) (6.33) (6.34) t atk,m , rk,m can depend on the lengths and creation times of packets already in buffer k, but not on information about packets yet to arrive, k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT }. (6.35) In (6.27), S is the total allowed power per time slot and (6.28) follows from (6.1). Con\u00C2\u00AF 1,T , of NRT CRU k from time slot 1 to straint (6.33) ensures that the average data rate, R k time slot T is no smaller than RkN RT . Problem OP4 involves an optimization over the time slots t \u00E2\u0088\u0088 {1, 2, . . . , T } and is computationally complex. In this section, we formulate a series of simpler related problems, OP5 and OP6. As mCR,t \u00E2\u0086\u0092 \u00E2\u0088\u009E, the optimal solution for OP6 converges to that for OP4. To deal with the issue of problem feasibility, we adopt a goal programming approach which leads to Problem OP7. The transformations and relationships among these optimization problems are shown in Fig. 6.4. The proposed cross-layer resource allocation algorithm is then described in Section 6.4.4. 119 \u000COP4 - no knowledge of future channel gains MAC layer QoS requirements optimization over multiple time slots problem feasibility issue assume knowledge of future channel gains, transform MAC layer QoS requirements to PHY layer rate requirements OP5 dual - optimization over multiple time slots - problem feasibility issue to get insights OP2 - optimization over multiple time slots - problem feasibility issue use Theorem 3.1 to transform to optimization over one time slot, knowledge of future channel gains no longer required OP6 - problem feasibility issue use goal programming techniques OP7 transform to convex optimization problem Solution Figure 6.4: Transformations and relationships among the optimization prblems. 120 \u000C6.4.2 Conversion of MAC Layer Requirements to PHY Layer Requirements We first transform Problem OP4 into the following Problem OP5 U OP5 : K M t atk,m rk,m max t atk,m ,rk,m (6.36) t=1 k=1 m=1 subject to K M atk,m stk,m \u00E2\u0089\u00A4 S (6.37) k=1 m=1 stk,m = t 2rk,m \u00E2\u0088\u0092 1 \u00CE\u0093\u00CF\u008302 t gk,m (6.38) K atk,m = 1 k=1 atk,m \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 {0, 1} m \u00E2\u0088\u0088 Mt \u00E2\u0088\u0088 \u00EF\u00A3\u00B4 \u00C2\u00AFt \u00EF\u00A3\u00B3 {0} m\u00E2\u0088\u0088M t rk,m \u00E2\u0088\u0088 (0, RM AX ) U (6.39) (6.40) (6.41) M t atk,m rk,m = RkU,REQ (6.42) t=1 m=1 t atk,m , rk,m can depend on the lengths and creation times of packets already in buffer k, but not on information about packets yet to arrive, k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT }. (6.43) In (6.42), RkU,REQ is the minimum number of bits that needs to be transmitted in time slots 1 through U to meet the delay requirements of the RT CRUs and the average data rate requirements of the NRT CRUs, and U \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T }. Note that Problem OP5 is the same as Problem OP4, except that the causality constraint (6.34) is dropped and MAC layer constraints (6.32) and (6.33) are replaced by the PHY layer constraint (6.42). To obtain more insight into Problem OP5, we consider its dual problem [30], which is 121 \u000CProblem OP2 that is described in Section 6.3.2. Based on Theorem 3.1, for CRUs who need RkU,REQ bits within the next U time slots, requesting RkU,REQ mCR,t /m(1, U ) bits at time slot t will result in the minimum necessary power. The objective in OP4 is to maximize the system throughput subject to a fixed power constraint. The less is the power used to meet CRU QoS requirements, the more power will be left for system throughput maximization. Using Theorem 3.1, Problem OP5 (which involves a set of time slots 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U ) can be transformed into a series of optimization problems, t \u00E2\u0088\u0097 \u00E2\u0088\u0097 are obtained as the and rk,m one for each time slot t, t \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U }. The values of atk,m optimal solution to Problem OP6, i.e. K OP6 : M t atk,m rk,m maxt t ak,m ,rk,m (6.44) k=1 m=1 subject to (6.37), (6.38), (6.39), (6.40), (6.41) and M t atk,m rk,m = rkt,REQ . (6.45) m=1 We have already obtain the expression for rkt,REQ , k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } in (6.20) for RT. Now we obtain the expression for rkt,REQ for NRT CRUs to ensure that their MAC layer QoS requirements are met. Based on Theorem 3.1, the rate requirement for NRT CRU k is set to rkt,REQ = RkN RT Tsymbol U mCR,t , k \u00E2\u0088\u0088 {KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} . m(1, U ) (6.46) \u00C2\u00AF CR,t U where M \u00C2\u00AF CR,t is the average number of available subchanSubstituting m(1, U ) with M nels, we obtain mCR,t , k \u00E2\u0088\u0088 {KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} . rkt,REQ = RkN RT Tsymbol \u00C2\u00AF MCR,t 122 (6.47) \u000C6.4.3 A Goal Programming Approach for Improving Feasibility With the fixed system bandwidth in multiuser OFDM systems, an admission control algorithm can be used to limit the system load and ensure a feasible solution. However, due to the time-varying nature of the available bandwidth in CR systems, even with a conservative admission control scheme, there will be times when OP6 has no feasible solution. In order to deal with this problem, we adopt a goal programming approach [31]. There are two main steps in applying goal programming. The first step is to introduce slack and surplus variables into the constraints that may not always be satisfied, e.g. (6.45) in OP6. The second step is to rewrite the objective function as a weighted sum of the slack and surplus variables to reflect the goals of the original optimization problem, e.g. (6.44) in OP6. The procedure is now described in more details. First, constraint (6.45) is replaced by M t atk,m rk,m + ntk \u00E2\u0088\u0092 ptk = rkt,REQ , ntk \u00E2\u0089\u00A5 0, ptk \u00E2\u0089\u00A5 0 (6.48) m=1 where ntk is the slack variable and ptk is the surplus variable for CRU k. The term ntk represents the achieved rate sum shortfall relative to rkt,REQ whereas ptk represents the amount by which rkt,REQ is exceeded. Second, we rewrite (6.44) as a weighted sum of the slack and surplus variables by examining our original goals. Because rkt,REQ is transformed from CRU MAC layer QoS requirements, we should reach rkt,REQ as close as possible, thus ntk should be minimized. On the other hand, since the bigger the value of ptk , the higher the value of system throughput, ptk should be maximized; and because the value of ptk has the same effect on system throughput, the weight for ptk can be the same for different values of k, thus, we rewrite (6.44) as K (wkt ntk \u00E2\u0088\u0092 ptk ) . min t atk,m ,rk,m ,ntk ,ptk k=1 123 (6.49) \u000CIn (6.49), because achieving QoS requirements of the CRUs is more important than system throughput maximization, wkt should be bigger than 1. To determine the value of wkt , we need to explore a bit more of our goals. When the system resource is not enough for all CRUs to achieve rkt,REQ , the actual service each CRU receives may not be the same. In this case, to be fair to the CRUs, we maintain fair service degradation among CRUs, i.e., allocate resource so as to equalize the fractional service degradation, ctk , for all CRUs. ctk represents the fraction of service lacking for CRU k from time slot t \u00E2\u0088\u0092 D + 1 to time slot t, i.e., over a sliding window of size D, and is given by \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 Lt\u00E2\u0088\u0092D+1,t , k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 k t\u00E2\u0088\u0092D+1,t \u00C2\u00AF R \u00C2\u00AF t\u00E2\u0088\u0092D+1,t < RN RT , k \u00E2\u0088\u0088 {KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} ctk = 1 \u00E2\u0088\u0092 Rk N RT , R k k \u00EF\u00A3\u00B4 k \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 0, \u00C2\u00AF t\u00E2\u0088\u0092D+1,t \u00E2\u0089\u00A5 RN RT , k \u00E2\u0088\u0088 {KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} R k k (6.50) \u00C2\u00AF t\u00E2\u0088\u0092D+1,t is the average data rate for NRT where Lt\u00E2\u0088\u0092D+1,t is the DPR of RT CRU k and R k k CRU k over the sliding window. The system fairness in allocation of resources to CRUs is measured by the fairness index [32] defined by t \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 f = ( K \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 1, K t 2 k=1 ck ) K t2 k=1 ck , \u00E2\u0088\u0083k such that ctk > 0 ct1 = ct2 = \u00C2\u00B7\u00C2\u00B7\u00C2\u00B7 = ctK (6.51) =0 f t is maximized at 1 when ct1 = ct2 = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = ctK , i.e., all CRUs have the same service lacking ratio. In order to maximize f t , i.e., maintain equalized ctk for all CRUs, more weights should be given to CRUs with high ctk while less weights should be given to CRUs with low ctk , considering that wkt > 1, we use an exponential function to map the value of ctk to the value of wkt as follows wkt In (6.52), c\u00C2\u00AFt = K t k=1 ck /K = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 \u00CE\u00B12\u00CE\u00B2(ctk \u00E2\u0088\u0092\u00C2\u00AFct ) , ct > c\u00C2\u00AFt \u00E2\u0088\u0092 k \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 1 + \u00CE\u00B4, 1 \u00CE\u00B2 log2 (\u00CE\u00B1) . (6.52) otherwise is the average value of ctk over all CRUs. \u00CE\u00B1 is a large positive 124 \u000Cconstant (e.g. M RM AX ) so that ntk is given more consideration than ptk . This assigns greater importance to satisfying CRU rate requirements than maximizing system throughput. The parameter \u00CE\u00B2 is a positive constant which reflects the relative importance of achieving a high fairness index or high system throughput. The relative importance of fairness increases with \u00CE\u00B2. \u00CE\u00B4 is a small positive number, e.g., 10\u00E2\u0088\u00926 . Using the weights in (6.52), a CRU whose service lacking parameter ctk is higher than the average value c\u00C2\u00AFt will have a higher value of wkt . As will be shown in Section 6.4.4, a higher value of wkt gives a CRU a better chance to meets its rate requirement which promotes fairness. 6.4.4 The Cross-Layer Resource Allocation Algorithm We now describe the cross-layer RA algorithm. Since the optimization problem depends only on the parameter values in the current time slot, the time index t is dropped to simplify the notation. We thus have K OP7 : min ak,m ,rk,m ,nk ,pk (wk nk \u00E2\u0088\u0092 pk ) (6.53) k=1 subject to (6.27), (6.28), (6.29), (6.30), (6.31), (6.48) and rkM AX \u00E2\u0088\u0092 rkREQ \u00E2\u0089\u00A5 pk , k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } (6.54) In (6.48) and (6.54), rkREQ is calculated using (6.20) for RT CRUs and (6.47) for NRT CRUs. In (6.53), wk is obtained using (6.52). In (6.54), rkM AX = Ik i=1 bk,i where Ik is the number of packets in CRU k\u00E2\u0080\u0099s queue. Constraint (6.54) is used to ensure that resources are not wasted in practice if the buffer for RT CRU k is not backlogged, e.g. when channel conditions for CRU k are good. OP7 is a constrained nonlinear programming problem which is, in general, computa- 125 \u000Ctionally complex. It is shown in Appendix B.2 that Problem OP7 can be converted to a convex problem with the following optimal solution which has a multi-level water-filling interpretation [29]. \u00E2\u0088\u0097 Theorem 4.1: As mCR,t \u00E2\u0086\u0092 \u00E2\u0088\u009E, t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T , the optimal solution S \u00E2\u0088\u0097 = {a\u00E2\u0088\u0097k,m , rk,m , n\u00E2\u0088\u0097k , p\u00E2\u0088\u0097k } for Problem OP7 has the following properties 1. for any given subchannel m, the optimal subchannel assignment strategy is a\u00E2\u0088\u0097k,m = 1, k = k \u00E2\u0088\u0097 and m \u00E2\u0088\u0088 Mt a\u00E2\u0088\u0097k,m = 0, otherwise (6.55) where k \u00E2\u0088\u0097 = argmaxk hk,m (6.56) and hk,m \u00EF\u00A3\u00B1 \u00CE\u0093\u00CF\u0083 2 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00CE\u00BBk < gk,m0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 M AX gk,m \u00CE\u0093\u00CF\u008302 \u00CE\u0093\u00CF\u008302 2R \u00CE\u0093\u00CF\u008302 = \u00E2\u0088\u0092 \u00CE\u00BB \u00E2\u0088\u0092 , \u00CE\u00BBk ln \u00CE\u00BBk \u00CE\u0093\u00CF\u0083 \u00E2\u0089\u00A4 \u00CE\u00BB \u00E2\u0089\u00A4 2 k k g g g k,m k,m k,m \u00EF\u00A3\u00B4 0 \u00EF\u00A3\u00B4 M AX \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00CE\u0093\u00CF\u008302 \u00EF\u00A3\u00B3 \u00CE\u00BBk ln(2)RM AX \u00E2\u0088\u0092 (2RM AX \u00E2\u0088\u0092 1) \u00CE\u0093\u00CF\u008302 , \u00CE\u00BBk > 2R gk,m gk,m (6.57) In (6.57), \u00CE\u00BBk is the water level for CRU k. \u00E2\u0088\u0097 2. for a given CRU k, for the subchannels with a\u00E2\u0088\u0097k,m = 0, we have rk,m = 0; and for the subchannels with a\u00E2\u0088\u0097k,m = 1, the optimal bit loading strategy is \u00E2\u0088\u0097 rk,m \u00EF\u00A3\u00B1 \u00CE\u0093\u00CF\u008302 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00CE\u00BB < \u00EF\u00A3\u00B4 k gk,m \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 M AX gk,m \u00CE\u0093\u00CF\u008302 2R \u00CE\u0093\u00CF\u008302 = log2 \u00CE\u00BBk \u00CE\u0093\u00CF\u00832 , gk,m \u00E2\u0089\u00A4 \u00CE\u00BBk \u00E2\u0089\u00A4 gk,m \u00EF\u00A3\u00B4 0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 RM AX \u00CE\u0093\u00CF\u0083 2 \u00EF\u00A3\u00B4 2 \u00EF\u00A3\u00B3 RM AX , 0 \u00CE\u00BBk > . gk,m 126 (6.58) \u000C3. The water level \u00CE\u00BBk satisfies \u00CE\u00BBk \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 = wk \u00CE\u00BBB , n\u00E2\u0088\u0097k > 0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00E2\u0089\u00A4 wk \u00CE\u00BBB , n\u00E2\u0088\u0097k = 0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 = \u00CE\u00BBB , p\u00E2\u0088\u0097k > 0, k = KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K; \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00E2\u0089\u00A5 \u00CE\u00BBB , \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 \u00E2\u0089\u00A4 \u00CE\u00BBB , 0 < p\u00E2\u0088\u0097k < rkM AX \u00E2\u0088\u0092 rkREQ , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT (6.59) p\u00E2\u0088\u0097k = 0 p\u00E2\u0088\u0097k = rkM AX \u00E2\u0088\u0092 rkREQ , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT . where \u00CE\u00BBB \u00E2\u0089\u00A5 0 can be treated as the base water level for all CRUs. Proof: See Appendix B.2. Theorem 4.1 shows that if we can find the set of water levels {\u00CE\u00BBk }, then we will get the optimal subchannel and bit allocation from (6.55) and (6.58). From (6.59), we can see that for CRUs with n\u00E2\u0088\u0097k > 0, i.e., do not achieve their rkREQ , the water levels are proportional to \u00CE\u00BBB . The higher the value of wk , the higher the value of \u00CE\u00BBk , and from (6.55) and (6.58), the higher is the number, M m=1 ak,m rk,m , of allocated bits for CRU k. We also observe that for RT CRUs with 0 < p\u00E2\u0088\u0097k < rkM AX \u00E2\u0088\u0092 rkREQ , and for NRT CRUs with p\u00E2\u0088\u0097k > 0, i.e. are allocated a larger number of bits than rkREQ , the water levels are set at \u00CE\u00BBB . This property makes finding the water levels for these CRUs very simple. For CRUs with n\u00E2\u0088\u0097k = 0 and p\u00E2\u0088\u0097k = 0, i.e. just meet their rkREQ , the water levels are between \u00CE\u00BBB and wk \u00CE\u00BBB . Moreover, for RT CRUs that have p\u00E2\u0088\u0097k = rkM AX \u00E2\u0088\u0092 rkREQ , i.e. the allocated number of bits is equal to the maximum number of bits in their buffers, the water levels are lower than \u00CE\u00BBB . Based on the above-mentioned observations, we can devise the following two-phase crosslayer RA algorithm. When some CRUs cannot achieve their rkREQ , i.e. \u00E2\u0088\u0083k such that n\u00E2\u0088\u0097k > 0, the system does not have enough resources to satisfy all CRU QoS requirements and we say that the system is resource-limited. On the other hand, if all CRUs can achieve their rkREQ , i.e. n\u00E2\u0088\u0097k = 0, \u00E2\u0088\u0080k, the system is said to be resource-abundant. 127 \u000CIn Phase 1, i.e., the resource-limited phase, \u00CE\u00BBB is set to a small number and all CRUs are in set A whose members have a water level of wk \u00CE\u00BBB . A binary search is then used to find the appropriate value of \u00CE\u00BBB that satisfies K k=1 M m=1 ak,m sk,m = S. During each iteration of the binary search, \u00CE\u00BBk is set to wk \u00CE\u00BBB for CRUs that are in set A, and the Assignment algorithm performs the subchannel and bit allocation using (6.55) and (6.58). If after the allocation, the total consumed power is less than the total power constraint (i.e. and CRU k\u00E2\u0080\u0099s number of allocated bits is higher than its request ( K k=1 M m=1 M m=1 ak,m sk,m < S) ak,m rk,m > rkREQ ), CRU k is removed from set A, indicating that CRU k now has n\u00E2\u0088\u0097k = 0 and its \u00CE\u00BBk is lower than wk \u00CE\u00BBB . As a result, CRU k\u00E2\u0080\u0099s water level no longer changes with \u00CE\u00BBB but instead its water level changes to ensure that its number of allocated bits is equal to rkREQ after the allocation. There are two possible outcomes of Phase 1: Outcome A if we find the optimal solution ( K k=1 M m=1 ak,m sk,m = S) and Outcome B if the number of allocated bits for each CRU has reached its rkREQ . In the former case, the algorithm terminates; in the latter case, the algorithm proceeds to Phase 2. In Phase 2, i.e., the resource-abundant phase, all CRUs are able to achieve their rkREQ and K k=1 M m=1 ak,m sk,m < S. Consequently, we have n\u00E2\u0088\u0097k = 0 and p\u00E2\u0088\u0097k \u00E2\u0089\u00A5 0, \u00E2\u0088\u0080k. In this phase, as a starting point, \u00CE\u00BBB is set to the lowest water level among all CRUs, and set A contains only this CRU. At each iteration, \u00CE\u00BBB is raised to the lowest water level among the CRUs that are not in set A. The Assignment algorithm is then executed: 1) the subchannel and bit allocation using (6.55) and (6.58); 2) for any CRU not in set A, the number of allocated bits is set to rkREQ by adjusting \u00CE\u00BBk . After the allocation, if CRU k\u00E2\u0080\u0099s water level is equal to \u00CE\u00BBB , k is added to set A. This process continues until either is the optimal solution, or K k=1 M m=1 K k=1 M m=1 ak,m sk,m = S, which ak,m sk,m > S. In the latter case, the algorithm uses a binary search to find the appropriate value of \u00CE\u00BBB that satisfies K k=1 A flowchart for the cross-layer RA algorithm is given in Appendix C. 128 M m=1 ak,m sk,m = S. \u000C6.5 Simulation Results To evaluate the proposed algorithms, simulations were performed for the downlink of a multiuser OFDM-based CR system within a 2.5 km\u00C3\u00972.5 km area with the CRBS located at the center. The propagation path loss is calculated using P L = A + 10\u00CE\u00B3 log10 (d/d0 ) [33], where A = 80 dB is the path loss at the reference point, \u00CE\u00B3 = 4 is the path loss exponent, d is the distance between the transmitter and the receiver and d0 = 100 m is the distance between the transmitter and the reference point. The transmit and receiver antenna gains are 30 dB and 0 dB, respectively. The multipath fading is assumed to be Rayleigh. The parameter \u00CE\u0093 is set to 5, obtained using ln(5BER)/(\u00E2\u0088\u00921.5) [28] with a BER of 10\u00E2\u0088\u00924 . In addition, \u00CF\u008302 = 10\u00E2\u0088\u009213 W and RM AX = 8. RT CRUs are assumed to be video conference users, each with an average data rate of RRT = 150 kbps. Each conference call consists of variable-length video packets, generated one every 40 ms, using the algorithm in [34], and dk = 90 ms for all CRUs; the packet lengths are chosen according to a self-similar distribution with an average packet length of 6 kb and a maximum packet length of 25 kb. For RRT = 150 kbps, the traffic is obtained by adjusting the packet lengths accordingly. The NRT CRUs are assumed to be always backlogged with 1500 bit long packets and each NRT CRU has a bit rate requirement of RN RT = 150 kbps. There are eight PUs in the system, each with a 250 kHz band (including the guard bands) for a total bandwidth of 2 MHz. For the CR system, the 2 MHz bandwidth is used to support 64 OFDM subchannels. The duration of each OFDM symbol is Tsymbol = 40 \u00C2\u00B5s, the guard t interval is 8 \u00C2\u00B5s, and Tstate = 250 time slots. It is assumed that the subchannel gain, gk,m , is constant over 1 ms periods, i.e. 25 OFDM symbols and independent from period to period. RA is performed once every 1 ms. The simulation parameters are listed in Table 6.1. 129 \u000CCell size Number of CRUs Reference point path loss Distance of the reference point to the CRBS Path loss exponent Transmit antenna gain Receiver antenna gain Multi-path fading Total bandwidth Number of PU bands Widths of the PU bands Number of OFDM subchannels Duration of OFDM symbol Duration of guard interval Noise power, \u00CF\u008302 , of each subchannel \u00CE\u0093 M AX R Average video data rate Packet generation rate Average packet length Maximum packet length Packet delay requirement Maximum tolerable DPR Simulation length for each set of values of pn , pa , and RRT Number of packets generated 2.5 km \u00C3\u00972.5 km K=8 A = 80 dB 100 m \u00CE\u00B3=4 30 dB 0 dB Rayleigh W = 2 MHz L=8 W1 = W2 = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = W8 = 250 kHz M = 64 Tsymbol = 40 \u00C2\u00B5s 8 \u00C2\u00B5s 10\u00E2\u0088\u009213 W 5 8 RRT = 150 kbps 25 packets/second 6 kb 25 kb dk = 90 ms 0.05% 2, 500, 000 time slots 2500 Table 6.1: Simulation parameters. 130 \u000C6.5.1 RT Services We considered an eight RT CRUs system to assess the performance of the proposed suboptimal algorithm in Section 6.3.3. The distances of CRU 1, CRU 2,..., and CRU 8 to the CRBS are chosen as 1.2 km, 2.0 km, 2.4 km, 1.8 km, 1.6 km, 0.8 km, 1.4 km, and 1.9 km, respectively. The CRU video conference sessions start at 10 ms, 20 ms, 20 ms, 30 ms, 30 ms, 40 ms, 10 ms, and 20 ms, respectively. To compare the proposed algorithm with existing algorithms designed for OFDM systems, we also simulated the MAC layer solution in [19] and the PHY layer solution proposed in [6] for multiuser OFDM systems. The MAC layer solution uses equal power allocation and treats sets of eight adjacent subchannels as a group, each of which is allocated to the CRU with the best channel gain relative to its own average channel gain to maximize system throughput. An urgency function is introduced to improve on-time delivery of the packets; this function gives higher priority to CRUs as their HOL packets approach their respective deadlines. The power used in the MAC solution was adjusted to achieve a DPR target value of 0.05%. In the PHY layer solution, rkREQ is set to 150 kbps \u00C3\u0097 40 \u00C2\u00B5s = 6 bits during each time slot. To help better understand the proposed algorithm, as an example, we refer to Fig. 6.5 which shows the number of available subchannels, mCR,t , requested rate, and required power for CRU 4 for the proposed, PHY, and MAC algorithms from time 260 ms to 310 ms with \u00C2\u00AF CR,t , of available pn = pa = 0.99 and RRT = 150 kbps. Since pn = pa , the average number, M subchannels is 32. Fig. 6.5 shows that the requested rate, i.e., r4t,REQ , is always set to the average requirement at 150 bits per 1 ms in the PHY solution. In this example, it was always possible to achieve a rate equal to the requested rate for all three algorithms. For the proposed algorithm, r4t,REQ changes with mCR,t . For example, from time 260 to 270, mCR,t = 40, a \u00C2\u00AF CR,t and r4t,REQ for the proposed algorithm is set to a relatively high value compared to M 131 \u000CmCR,t 40 32 24 16 260 800 265 270 275 280 285 290 295 300 310 MAC PHY Proposed 700 600 Rates (bits) 305 500 400 300 200 100 0 260 8 265 270 275 280 285 290 295 300 310 MAC PHY Proposed 7 Required power (W) 305 6 5 4 3 2 1 0 260 265 270 275 280 285 290 Time (ms) 295 300 305 310 Figure 6.5: Resource allocation time diagram for CRU 4 with pn = pa = 0.99 and RRT = 150 kbps. 132 \u000Cvalue that is higher than 150 bits; from time 285 to 289, mCR,t is only 16 and r4t,REQ is set to a lower value. This behaviour follows from (6.20) since rkt,REQ is proportional to mCR,t . Theorem 3.1 indicates that setting rkt,REQ according to mCR,t minimizes power, and it is thus expected that the proposed algorithm will require less average power than PHY. It might seem surprising that at time 267, PHY requires 0.3 W whereas the proposed algorithm requires 0.5 W. But this is because the proposed algorithm has its r4t,REQ set to a value higher than 150 bits. At time 288, mCR,t is relatively low and PHY requires a power of 1 W to obtain 150 bits, while the proposed algorithm sets r4t,REQ to a value lower than 150 bits in order to use a power of only 0.51 W, a level which is not very different from that at time 267. For times 267 and 288, the proposed algorithm requires an average power of 0.51 W, while PHY requires 0.65 W. Since the MAC solution assigns eight subchannels as a group to CRUs, CRU 4 is not able to obtain a subchannel assignment at each time; hence when it obtains subchannel assignment, the rate requirement needs to be high in order to achieve an average rate of 150 kbps. As a result, the power required at each time is also higher. This power allocation strategy is far from optimal as can be seen from Fig. 6.5. From time 260 to 310, the average required power per transmitted bit is 0.0037 W, 0.0047 W, and 0.0077 W for the proposed, PHY, and MAC algorithms, respectively. Fig. 6.6 shows the average total power for the eight CRUs as a function of pn with pn = pa . For each value of pn , 2, 500, 000 time slots were simulated. The variance of MCR,t decreases with pn . It can be seen that the proposed algorithm performs much better than the MAC and PHY algorithms. The CRBS transmit power reduction over the PHY solution increases as pn decreases, which shows that the proposed cross-layer algorithm adapts well to the channel variations. The improvement over the PHY solution is over 40% for pn < 0.5, and about 30% for pn = 0.9. The improvement over the MAC solution increases with pn . The reason is that as pn increases, mCR,t stays the same over a longer period of time; when mCR,t is low, to maintain a reasonable DPR value, the required power has to be quite high. 133 \u000C1 MAC PHY Proposed 0.9 Average total power (W) 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 Probability of PUs staying in the same state, p 0.9 1 n Figure 6.6: Average total power of eight video conference CRUs as a function of pn with pn = pa and RRT = 150 kbps. 134 \u000CThe improvement of the proposed algorithm over the MAC solution is over 65% for pn < 0.5, and nearly 75% for pn = 0.9. The DPR values for the three simulated algorithms for different pn values are listed in Table 6.2. Table 6.2 clearly indicates that DPR is the lowest when using the proposed algorithm, and is the highest when using the MAC layer solution. Note that a DPR value of 0.04% corresponds to one packet dropped among the 2500 packets simulated. pn Proposed PHY MAC 0 0 0.04% 0.04% 0.09 0 0.04% 0.04% 0.5 0 0.04% 0.04% 0.9 0.99 0.04% 0 0.04% 0.04% 0.04% 0.84% 0.999 0 0.04% 0.92% 1.00 0 0.44% 0.88% Table 6.2: Dropped packet rates for different values of pn with pn = pa and RRT = 150 kbps. The average power of each CRU is shown in Fig. 6.7 with pn = pa = 0.9 and RRT = 150 kbps. It can be seen that the proposed algorithm requires less average power for all eight CRUs compared to PHY and MAC solutions. CRU 3 requires the highest average power among the 8 CRUs for any of the three algorithms, because it is farthest away from the CRBS and thus has the worst average channel condition. CRU 6 requires the lowest average power because it is closest to the CRBS. The MAC solution assumes equal power on all subchannels, although it takes into account the channel conditions of the CRUs when assigning subchannels. As a result, power is wasted especially for CRUs with very good channel conditions, e.g., for CRUs 6 and 1. Fig. 6.8 and Table 6.3 illustrate the average total power for the eight CRUs and DPR as a function of RRT with pn = pa = 0.5. It can be seen that as the system load (represented by RRT ) increases, the total required CRU power increases. The proposed algorithm performs better than the other two algorithms regardless of the system load. The improvement over the PHY solution is 28% for RRT = 75 kbps, and is about 45% for RRT = 375 kbps. The improvement over the MAC layer solution is over 60% for all values of RRT . Fig. 6.9 and Table 6.4 illustrate the average total power for the eight CRUs and DPR as 135 \u000C0.09 Proposed PHY MAC 0.08 Average power (W) 0.07 0.06 0.05 0.04 0.03 0.02 0.01 0 CRU 1 CRU 2 CRU 3 CRU 4 CRU 5 CRU 6 CRU 7 CRU 8 Figure 6.7: Transmit CRU power with pn = pa = 0.9 and RRT = 150 kbps. Data rate (kbps) Proposed PHY MAC 75 0.0% 0.04% 0.04% 150 0.0% 0.04% 0.04% 225 0.0% 0.04% 0.04% 300 0.04% 0.04% 0.04% 375 0.04% 0.04% 0.04% Table 6.3: Dropped packet rate with respect to video data rate, RRT with pn = pa = 0.5 136 \u000C2.5 Average total power (W) 2 MAC PHY Proposed 1.5 1 0.5 0 75 150 225 300 RT Video data rate (kbps), R 375 Figure 6.8: Average total power for eight video conference CRUs as a function of video data rate, RRT with pn = pa = 0.5. 137 \u000C2.5 Average total power (W) 2 MAC PHY Proposed 1.5 1 0.5 0 75 150 225 300 RT Video data rate (kbps), R 375 Figure 6.9: Average total power for eight video conference CRUs as function of video data rate, RRT with pn = 0.5 and pa = 0.1. a function of RRT with pn = 0.5 and pa = 0.1. As in Fig. 6.8 and Table 6.3, the proposed algorithm performs better than PHY and MAC. The improvement over the PHY solution is over 20% for RRT = 75 kbps and over 30% for RRT = 375 kbps. The improvement over the \u00C2\u00AF CR,t is 32, MAC layer solution is over 60% for all values of RRT . In Fig. 6.8 and Table 6.3, M \u00C2\u00AF CR,t is 41 in Fig. 6.9 and Table 6.4 since the probability, pa , of a PU staying in whereas M the active state is reduced from 0.5 to 0.1. As a result, the required power for the proposed, PHY, and MAC solutions are all lower than in Fig. 6.8. The DPRs for the proposed, PHY, and MAC solutions in Fig. 6.9 are similar to those in Fig. 6.8. 138 \u000CData rate (kbps) Proposed PHY MAC 75 0.0% 0.04% 0.04% 150 0.0% 0.04% 0.04% 225 0.0% 0.04% 0.04% 300 0.0% 0.04% 0.04% 375 0.0% 0.04% 0.04% Table 6.4: Dropped packet rate with respect to video data rate, RRT . pn = 0.5 and pa = 0.1 6.5.2 Mixed Services To evaluate the proposed algorithm for mixed services, we consider a system with four file transfer users representing NRT CRUs, and six video conference users representing RT CRUs. The power limit of the CRBS is S = 12.8 W. The distances of CRUs 1 to 6 (the RT CRUs) to the CRBS are chosen as 1.2 km, 2.0 km, 2.4 km, 1.8 km, 1.6 km, and 0.8 km. The distances of CRUs 7 to 10 (the NRT CRUs) to the CRBS are chosen as 1.4 km, 1.9 km, 1.0 km, and 2.2 km. The RT CRUs video conference sessions start at 10 ms, 37 ms, 3 ms, 25 ms, 30 ms, 18 ms, respectively. t It is assumed that the subchannel gain gk,m is constant during 1 ms periods, i.e. 25 OFDM symbols. Of the 25 OFDM symbols, 15 are used for downlink transmission and 10 are used for uplink transmission. Thus, resource allocation is performed once every 1 ms. In the simulations, OP7 is solved using the algorithm proposed in Section 6.4.4 with \u00CE\u00B1 = 512 and \u00CE\u00B2 = 20. To illustrate the operation of the algorithm proposed in Section 6.4.4, we plot in Fig. 6.10 the RA time diagram for CRUs 3 and 6 from time 120 ms to 200 ms with pa = pn = 0.9 and RRT = 600 kbps. The number of available subchannels to the CR system is also shown in Fig. 6.10. Recall that CRU 3 has the worst average channel condition among the 10 CRUs. Consequently, it receives little extra rate beyond r3t,REQ . Based on Theorem 3.1, CRU 3\u00E2\u0080\u0099s rate request was dynamically calculated based on (6.20) to use the least possible power so as to preserve power for system throughput maximization. It can be seen that the r3t,REQ curve follows closely that for mCR,t . The biggest difference is at time 163, when a new packet ar139 \u000CBits/ms for CRU 6 Bits/ms for CRU 3 Number of subchannels mCR,t Rate request of CRU 6 Rate allocation of CRU 6 Rate request of CRU 3 Rate allocation of CRU 3 Available subchannels 2700 2400 2100 1800 1500 1200 900 600 300 0 600 450 300 150 0 48 40 32 24 120 130 140 150 160 170 Time t (ms) 180 190 200 Figure 6.10: Resource allocation time diagram for CRUs 3 and 6. rives. Since this new packet is relatively long, using r3162,REQ cannot ensure on-time delivery of the packet and hence rk163,REQ is adjusted to a higher value based on (6.20). Recall that CRU 6 enjoys the best average SNR among the 10 CRUs. Most of the time, it achieves a bit rate that is higher than r6t,REQ . Consequently, most of its packets are delivered before its next packet arrives. For example, the first packet arrives at time 138 and is delivered at time 160 before the next packet arrives. In order not to waste system resources, r6t,REQ is set to 0 from time 160 to time 177 since its queue is empty. At time 178, the next packet arrives and r6178,REQ is set to a non-zero value which can ensure on-time delivery of this packet. To compare the proposed algorithm with existing algorithms designed for OFDM systems, 140 \u000Cthe following algorithms were also simulated. (1) PHY refers to the solution for Problem OP4 with rkt,REQ set as follows: rkt,REQ = RRT Tsymbol for RT CRUs, and rkt,REQ = RN RT Tsymbol for NRT users. (2) MAC refers to the MAC layer solution in [19]. It uses equal power allocation and treats sets of eight adjacent subchannels as a group, each of which is allocated to the CRU with the best channel gain relative to its own average channel gain. An urgency function, which gives higher priority to CRUs as their HOL packets approach their deadlines, is introduced to improve on-time delivery of packets. (3) HLL refers to the cross-layer algorithm in [25] applied to Problem OP4 with both RT CRU delay and NRT CRU average rate requirements converted to fixed rate requirements as follows: rkt,REQ = 1.268RRT Tsymbol for RT CRUs, and rkt,REQ = RN RT Tsymbol for NRT CRUs. (4) JJJ refers to the cross-layer solution in [24] which uses equal power subchannel allocation. RT CRU packet delays are improved by giving higher priority to CRUs whose HOL packet\u00E2\u0080\u0099s relative waiting time has exceeded a predefined threshold. The remaining system resources are allocated to CRUs with better average channel conditions among remaining RT CRUs and NRT CRUs. A frame structure is assumed, with each frame lasting 1 ms and containing 15 OFDM symbols. Both PHY and HLL suffer from the problem feasibility issue, although they work quite well for OFDM systems. A commercial optimization software was used to test the feasibility of PHY and HLL solutions. The results, shown in Table 6.5, show that as the system load (represented by RRT ) increases, the feasibility of PHY and HLL solutions decreases. At RRT = 450 kbps, when the overall QoS requirements of the RT and NRT CRUs can be supported by the available system resources1 , the non-feasibility ratio, defined as the fraction of RAs with no feasible solution, is 64% for HLL and 35% for PHY. These high non-feasibility ratio values indicate that HLL and PHY are unsuitable for CR systems. 1 Fig. 6.11 shows that for RRT = 450 kbps, the DPR for the proposed algorithm, JJJ, and MAC are all below 0.03. 141 \u000CRRT (kbps) PHY HLL 75 150 16% 19% 8% 9% 225 24% 19% 300 375 36% 39% 20% 32% 450 64% 35% 525 85% 63% 600 92% 65% Table 6.5: Non-feasible ratio of PHY and HLL. For the proposed algorithm in Section 6.4.4, MAC, and JJJ, solutions (assuming the number of bits can take on a real value) were obtained. Figs. 6.11, 6.12, 6.13, and Table 6.6 show the DPR, average throughput for NRT CRUs, the system throughput, and fairness index of the three algorithms as a function of video data rate RRT . For each value of RRT , 100, 000 RAs were simulated. RRT (kbps) Proposed MAC JJJ 75 1.0000 1.0000 1.0000 150 1.0000 1.0000 0.9999 225 1.0000 1.0000 0.9686 300 375 1.0000 1.0000 1.0000 1.0000 0.9282 0.9105 450 1.0000 0.9999 0.8795 525 0.9999 0.9991 0.8422 600 0.9998 0.9968 0.8123 Table 6.6: Fairness index comparison for three different schedulers. Figs. 6.11 and 6.12 show that the DPR increases and the average throughput for NRT CRUs decreases with RRT . As the RT CRU rate increases, the system resources needed to satisfy the RT CRU and NRT CRU QoS requirements also increase, leaving less power for the NRT CRUs to increase their throughput. It can be seen that the proposed algorithm performs much better than JJJ or MAC. At RRT = 525 kbps, for RT CRUs, the DPR for the proposed algorithm is less than 1%, but is over 4% for MAC and nearly 6% for JJJ; for NRT CRUs, the average throughput improvement of the proposed algorithm over MAC and JJJ is 57% and 55%, respectively. There are two reasons for the performance improvement achievable with the proposed algorithm compared to MAC and JJJ. First, the proposed algorithm is optimal whereas MAC and JJJ are both suboptimal. Second, both MAC and JJJ suffer from the false urgency issue in CR systems. The urgency mechanism used in MAC and JJJ to improve the ontime delivery of RT CRU packets assumes a fixed amount of available system resources. This 142 \u000C0.12 Dropped Packet Rate 0.1 Proposed JJJ MAC 0.08 0.06 0.04 0.02 0 75 150 225 300 375 450 RT Video data rate (kbps), R 525 600 Figure 6.11: Dropped packet rate of RT CRUs as a function of video bit rate. 143 \u000CAverage throughput for NRT CRU (kbps) 900 Proposed JJJ MAC 800 700 600 500 400 300 200 100 75 150 225 300 375 450 RT Video data rate (kbps), R 525 600 Figure 6.12: Average throughput of NRT CRUs as a function of video bit rate. 144 \u000C4 3.8 Throughput (Mbps) 3.6 3.4 3.2 3 2.8 Proposed JJJ MAC 2.6 75 150 225 300 375 450 RT Video data rate (kbps), R 525 Figure 6.13: System throughput as a function of video bit rate. 145 600 \u000Cresults in inaccurate information about a packet\u00E2\u0080\u0099s urgency in a CR system with time-varying system resources. At times when there are more available subchannels, some RT CRUs with poor channel qualities might be given unnecessarily frequent transmission opportunities. This lowers the overall system throughput. On the other hand, when the number of available subchannels is low, many packets may fail to meet their deadlines, resulting in a high DPR. Fig. 6.13 shows that the proposed algorithm yields a significantly higher system throughput than JJJ or MAC. The improvement is 52% over MAC and 36% over JJJ at RRT = 75 kbps, and decreases to 15% over both JJJ and MAC at RRT = 600 kbps. The system throughput for the proposed algorithm decreases for RRT > 450 kbps because for high video data rates, system resources may not always be sufficient to ensure on-time delivery for all RT packets. To ensure fair degradation, CRUs that have high DPR values are given high wk values based on (6.52); these correspond to high water levels in Phase 1 of the algorithm based on (6.59) for n\u00E2\u0088\u0097k > 0. So even though their subchannel conditions are poor, they are able to obtain some subchannels based on (6.55) because of their high water levels. The drawback of using this fair degradation mechanism is a lower system throughput. Table 6.6 shows that the proposed algorithm provides a slightly better fairness index than MAC, and a much higher fairness index than JJJ. JJJ yields a poor fairness index because the NRT CRUs are always given low priority: they are not allocated subchannels unless their average subchannel conditions are relatively high. In the simulations, NRT CRUs 8 and 10 have relatively low average subchannel gains. For RRT = 450 kbps, the average bit rates for the NRT CRUs with JJJ are 502 kbps, 78 kbps, 465 kbps, and 1 kbps, i.e., 335%, 52%, 310%, and 1% of their requested bit rates. Thus, CRUs 8 and 10 are harshly penalized. 6.6 Conclusions Cross-layer RA algorithms combining packet scheduling with subchannel, bit, and power allocation on the downlink of a multiuser OFDM-based CR system were proposed, one for 146 \u000CRT applications and one for a mixture of RT and NRT applications. The MAC layer QoS requirements are dynamically converted to PHY layer rate requirements in a way which takes into account the delivery status of packets waiting in the CRBS buffers as well as the number of available subchannels. The problem feasibility issue is addressed using a goal programming approach. Simulation results show that: (1) the proposed resource allocation algorithm for RT services can provide substantial CRBS transmit power reductions compared to existing PHY layer and MAC layer solutions designed for multiuser OFDM systems; and (2) the algorithm proposed for mixed services provides satisfactory QoS to both RT and NRT CRUs, and performs better than existing algorithms designed for multiuser OFDM systems. 147 \u000CReferences [1] J. Mitola III and G. Q. Maguire, Jr., \u00E2\u0080\u009CCognitive radio: making software radios more personal,\u00E2\u0080\u009D IEEE Personal Communications, vol. 6, no. 4, pp. 13\u00E2\u0080\u009318, August 1999. [2] National Telecommunications and \u00E2\u0080\u009CUnited states frequency allocation http://www.ntia.doc.gov/osmhome/allochrt.html Information Administration, chart.\u00E2\u0080\u009D [Online]. Available: [3] D. Cabric, S. M. Mishra, D. Willkomm, R. Brodersen, and A. Wolisz, \u00E2\u0080\u009CA cognitive radio approach for usage of virtual unlicensed spectrum,\u00E2\u0080\u009D in Proc. of 14th IST Mobile Wireless Communications Summit, Dresden, Germany, June 2005. [4] Federal Communications Commission, \u00E2\u0080\u009CFCC adopts rule changes for smart radios,\u00E2\u0080\u009D Cognitive Radio Technologies Proceeding (CRTP), ET Docket No. 03-108, 2005. [5] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [6] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, \u00E2\u0080\u009CMultiuser OFDM with adaptive subcarrier, bit, and power allocation,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 17, no. 10, pp. 1747\u00E2\u0080\u00931758, October 1999. [7] M. Ergen, S. Coleri, and P. Varaiya, \u00E2\u0080\u009CQoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems,\u00E2\u0080\u009D IEEE Transactions on Broadcasting, vol. 49, no. 4, pp. 363\u00E2\u0080\u0093370, December 2003. [8] G. Zhang, \u00E2\u0080\u009CSubcarrier and bit allocation for real-time services in multiuser OFDM systems,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC 2004), vol. 5, Paris, France, June 2004, pp. 2985\u00E2\u0080\u00932989. [9] G. Yu, Z. Zhang, Y. Chen, J. Shi, and P. Qiu, \u00E2\u0080\u009CA novel resource allocation algorithm for real-time services in multiuser OFDM systems,\u00E2\u0080\u009D in Proc. of IEEE 63rd Vehicular Technology Conference (VTC 2006-Spring), vol. 3, Melbourne, Australia, May 2006, pp. 1156\u00E2\u0080\u00931160. [10] Z. Shen, J. G. Andrews, and B. L. Evans, \u00E2\u0080\u009CAdaptive resource allocation in multiuser OFDM systems with proportional rate constraints,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 6, pp. 2726\u00E2\u0080\u00932737, November 2005. [11] I. C. Wong, Z. Shen, B. L. Evans, and J. G. Andrews, \u00E2\u0080\u009CA low complexity algorithm for proportional resource allocation in OFDMA systems,\u00E2\u0080\u009D in Proc. of IEEE Workshop on Signal Processing Systems (SIPS 2004), Austin, TX, USA, October 2004, pp. 1\u00E2\u0080\u00936. [12] G. Yu, Z. Zhang, Y. Chen, P. Cheng, and P. Qiu, \u00E2\u0080\u009CSubcarrier and bit allocation for OFDMA systems with proportional fairness,\u00E2\u0080\u009D in Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2006), vol. 3, Las Vegas, NV, USA, April 2006, pp. 1717\u00E2\u0080\u00931722. 148 \u000C[13] T. Qin and C. Leung, \u00E2\u0080\u009CFair adaptive resource allocation for multiuser OFDM cognitive radio systems,\u00E2\u0080\u009D in Proc. of Second International Conference on Communications and Networking in China (CHINACOM \u00E2\u0080\u009907), Shanghai, China, August 2007, pp. 115\u00E2\u0080\u0093119. [14] A. Attar, O. Holland, M. R. Nakhai, and A. H. Aghvami, \u00E2\u0080\u009CInterference-limited resource allocation for cognitive radio in orthogonal frequency-division multiplexing networks,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 806\u00E2\u0080\u0093814, July 2008. [15] P. Cheng, Z. Zhang, H.-H. Chen, and P. Qiu, \u00E2\u0080\u009COptimal distributed joint frequency, rate and power allocation in cognitive OFDMA systems,\u00E2\u0080\u009D IET Communications, vol. 2, no. 6, pp. 815\u00E2\u0080\u0093826, July 2008. [16] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [17] P. Svedman, S. K. Wilson, and B. Ottersten, \u00E2\u0080\u009CA QoS-aware proportional fair scheduler for opportunistic OFDM,\u00E2\u0080\u009D in Proc. of IEEE 60th Vehicular Technology Conference (VTC 2004-Fall), vol. 1, Los Angeles, CA, USA, September 2004, pp. 558\u00E2\u0080\u0093562. [18] P. Parag, S. Bhashyam, and R. Aravind, \u00E2\u0080\u009CA subcarrier allocation algorithm for OFDMA using buffer and channel state information,\u00E2\u0080\u009D in Proc. of IEEE 62nd Vehicular Technology Conference (VTC 2005-Fall), vol. 1, Dallas, TX, USA, September 2005, pp. 622\u00E2\u0080\u0093625. [19] S. Ryu, B. H. Ryu, H. Seo, M. Shin, and S. Park, \u00E2\u0080\u009CWireless packet scheduling algorithm for OFDMA system based on time-utility and channel state,\u00E2\u0080\u009D ETRI Journal, vol. 27, no. 6, pp. 777\u00E2\u0080\u0093787, 2005. [20] R. Knopp and P. A. Humblet, \u00E2\u0080\u009CInformation capacity and power control in single-cell multiuser communications,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009995), vol. 1, Seattle, WA, USA, June 1995, pp. 331\u00E2\u0080\u0093335. [21] G. Song and Y. Li, \u00E2\u0080\u009CCross-layer optimization for OFDM wireless networks-part I: theoretical framework,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 2, pp. 614\u00E2\u0080\u0093624, March 2005. [22] Y. J. Zhang and K. B. Letaief, \u00E2\u0080\u009CEnergy-efficient MAC-PHY resource management with guaranteed QoS in wireless OFDM networks,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC 2005), vol. 5, Seoul, Korea, May 2005, pp. 3127\u00E2\u0080\u00933131. [23] C. Mohanram and S. Bhashyam, \u00E2\u0080\u009CJoint subcarrier and power allocation in channelaware queue-aware scheduling for multiuser OFDM,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp. 3208\u00E2\u0080\u00933213, September 2007. [24] S. S. Jeong, D. G. Jeong, and W. S. Jeon, \u00E2\u0080\u009CCross-layer design of packet scheduling and resource allocation in OFDMA wireless multimedia networks,\u00E2\u0080\u009D in Proc. of IEEE 63rd Vehicular Technology Conference (VTC 2006-Spring), vol. 1, Melbourne, Australia, May 2006, pp. 309\u00E2\u0080\u0093313. 149 \u000C[25] D. S. W. Hui, V. K. N. Lau, and W. H. Lam, \u00E2\u0080\u009CCross-layer design for OFDMA wireless systems with heterogeneous delay requirements,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 6, no. 8, pp. 2872\u00E2\u0080\u00932880, August 2007. [26] H. Su and X. Zhang, \u00E2\u0080\u009CCross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 118\u00E2\u0080\u0093129, January 2008. [27] J. W. Mwangoka, K. B. Letaief, and Z. Cao, \u00E2\u0080\u009CRobust end-to-end QoS maintenance in non-contiguous OFDM based cognitive radios,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009908), Beijing, China, May 2008, pp. 2905\u00E2\u0080\u00932909. [28] A. J. Goldsmith and S.-G. Chua, \u00E2\u0080\u009CVariable-rate variable-power MQAM for fading channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 45, no. 10, pp. 1218\u00E2\u0080\u00931230, October 1997. [29] R. G. Gallager, Information Theory and Reliable Communication. Wiley & Sons, 1968. New York: John [30] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University Press, 2004. [31] M. J. Schniederjans, Goal programming: methodology and applications. Springer, 1995. [32] R. Jain, D. Chiu, and W. Hawe, \u00E2\u0080\u009CA quantitative measure of fairness and discrimination for resource allocation in shared computer systems,\u00E2\u0080\u009D DEC (Digital Equipment Corporation) Research Report TR-301, September 1984. [33] V. Erceg, L. J. Greenstein, S. Y. Tjandra, S. R. Parkoff, A. Gupta, B. Kulic, A. A. Julius, and R. Bianchi, \u00E2\u0080\u009CAn empirically based path loss model for wireless channels in suburban environments,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 7, no. 7, pp. 1205\u00E2\u0080\u00931211, July 1999. [34] M. W. Garrett and W. Willinger, \u00E2\u0080\u009CAnalysis, modeling and generation of self-similar VBR video traffic,\u00E2\u0080\u009D ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 269\u00E2\u0080\u0093280, October 1994. 150 \u000CChapter 7 Resource Allocation for Non-Real-Time Services in OFDM-based Cognitive Radio Systems 7.1 Introduction Cognitive radio (CR) is a concept which may be used to alleviate the looming spectrum shortage crisis [1]. As discussed in [2], orthogonal frequency division multiplexing (OFDM) is an attractive modulation candidate for CR systems. The subcarrier, bit, and power allocation problem for non-real-time (NRT) users in multiuser OFDM systems, subject to total power and user proportional rate (PR) constraints during each OFDM symbol duration, has been studied in [3, 4]. In these papers, suboptimal solutions are proposed that are close to optimal when the number of subcarriers is much greater than the number of users. These algorithms assume that the PR constraint has to be satisfied for each OFDM symbol duration; however, this may not be necessary for most NRT applications because some delay can usually be tolerated. More importantly, in contrast to conventional OFDM systems, in a CR system, the number of available subcarriers is timevarying. When the number of CR users (CRUs) exceeds the number of available subcarriers, and making the usual assumption that each subcarrier is used at any given time by at most one CRU, it may not be possible to maintain PR for all CRUs during each OFDM symbol duration. In this chapter, we take into account the time-varying nature of available spectrum 1 A paper based on the material in this chapter has been accepted for publication. Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CResource Allocation for Non-Real-Time Services in OFDM-based Cognitive Radio Systems,\u00E2\u0080\u009D IEEE Communications Letters. 151 \u000Cresources in an OFDM-based CR system, and propose a resource allocation (RA) algorithm for NRT applications which provides statistical PR among CRUs. 7.2 System Model We consider a CR system with a total bandwidth of W Hz and L primary users (PUs). Frequency bands actually carrying PU signals are referred to as active; non-active bands are also termed spectrum holes. It is assumed that some subchannels adjacent to active PU bands are not used in order to reduce the cross-channel interference [5] generated by the CRUs to the PUs to acceptable levels. Thus, in this chapter, we ignore mutual cross-channel interference between PUs and CRUs. Assume that there is one CR base station (CRBS) communicating with K CRUs. We are interested in downlink transmissions from the CRBS to the CRUs. The CRBS and the CRUs are able to accurately locate the spectrum holes. There are M OFDM subbands (or subchannels) in the system, each with noise power \u00CF\u008302 . Interference among the subchannels is assumed to be negligible. The system is time-slotted with a slot duration equal to an OFDM symbol Tsymbol . The subchannels are modelled in discrete-time, with the time-varying gain for subchannel m and time slot t from the CRBS to CRU k denoted by t gk,m . It is assumed that the power t gains {gk,m } are outcomes of independent random variables (rv\u00E2\u0080\u0099s); furthermore, for any given value of k, the gain rv\u00E2\u0080\u0099s {Gk,m , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } are identically distributed, with probability density function (PDF) fGk (gk ) and cumulative distribution function (CDF) FGk (gk ). The t number of bits, rk,m , per OFDM symbol which can be supported by subchannel m of CRU k in time slot t is given by [6] t = log2 1 + rk,m 152 t gk,m stk,m \u00CE\u0093\u00CF\u008302 (7.1) \u000Cwhere stk,m is the transmit power and \u00CE\u0093 is an SNR gap parameter which indicates how far the system is operating from capacity. The availability of a PU band is modelled by a two-state Markov chain. During a time slot t, a PU band can be in one of two modes: active or inactive [7]. A mode transition may occur once every Tstate slots, with a probability 1 \u00E2\u0088\u0092 pa of changing from active to inactive mode and a probability 1 \u00E2\u0088\u0092 pn of changing from inactive to active mode. The number of available subchannels in time slot t is denoted by mCR,t . The CRUs are NRT users, with CRU k having a nominal rate requirement of RkP R . The rate, Rk1,T , for CRU k within T time slots is required to satisfy 1,T R11,T R21,T RK = = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = =d PR R1P R R2P R RK (7.2) where d is the service share for each CRU. In [3, 4], it is implicitly assumed that T = 1. This is overly stringent for most NRT applications which can tolerate some delays. Furthermore, in a CR system in which each subchannel can accomodate at most one CRU at a time, it is not possible to satisfy (7.2) for T = 1 when mCR,t < K. We thus consider the following optimization problem. T OP1 : K M t atk,m rk,m max t atk,m ,rk,m t=1 k=1 m=1 153 (7.3) \u000Csubject to T K M t atk,m 2rk,m \u00E2\u0088\u0092 1 t=1 k=1 m=1 K atk,m = 1, atk,m \u00E2\u0088\u0088 k=1 T \u00CE\u0093\u00CF\u008302 \u00E2\u0089\u00A4 TS t gk,m (7.4) \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 {0, 1}, m \u00E2\u0088\u0088 Mt (7.5) \u00EF\u00A3\u00B4 \u00C2\u00AFt \u00EF\u00A3\u00B3 {0}, m \u00E2\u0088\u0088 M M t = dRkP R atk,m rk,m t=1 m=1 t atk,m , rk,m (7.6) u , u \u00E2\u0089\u00A4 t}, can depend on {gk,m u but not on {gk,m , u > t}. (7.7) t t In (7.4), S is the average total allowed power per time slot and (2rk,m \u00E2\u0088\u0092 1)\u00CE\u0093\u00CF\u008302 /gk,m is the t power necessary for the OFDM symbol to support a rate of rk,m as can be seen from (7.1). \u00C2\u00AF t \u00E2\u008A\u0086 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } denotes the set of available (unavailable) subchannels at In (7.5), Mt M time t; this constraint also implies that each subchannel can be used by at most one CRU in any given time slot. Constraint (7.6) follows from (7.2) since Rk1,T = T t=1 M m=1 t atk,m rk,m . Condition (7.7) reflects the causality constraints for the problem. 7.3 Resource Allocation Algorithm Problem OP1 is hard to solve as it involves the causality constraint (7.7). Instead, we consider Problem OP2, which is the same as OP1 except that constraint (7.7) is dropped. The solution to OP2 thus provides an upper bound on that for Problem OP1. OP2 is a constrained nonlinear optimization problem which is still computationally complex. We consider the convex optimization problem OP3 obtained by letting atk,m take on t t a real value in [0, 1] and substituting rk,m by r\u00CB\u0086k,m /atk,m . Using the Karush-Kuhn-Tucker (KKT) conditions [8], it can be shown that as T M \u00E2\u0086\u0092 \u00E2\u0088\u009E the optimal solution to OP3 has a multi-level water-filling interpretation [9] with the following characteristics. 154 \u000C1) For any given subchannel m and time slot t, the optimal subchannel assignment strategy is \u00E2\u0088\u0097 atk,m = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 1, k = k \u00E2\u0088\u0097 and m \u00E2\u0088\u0088 Mt (7.8) \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 0, otherwise where k \u00E2\u0088\u0097 = argmaxk htk,m and htk,m + t gk,m = \u00CE\u00BBk ln \u00CE\u00BBk 2 \u00CE\u0093\u00CF\u00830 \u00CE\u0093\u00CF\u0083 2 \u00E2\u0088\u0092 \u00CE\u00BBk \u00E2\u0088\u0092 t 0 gk,m + . (7.9) \u00E2\u0088\u0086 In (7.9), [x]+ = max (0, x) and \u00CE\u00BBk is the global waterlevel over all time slots of subchannels assigned to CRU k. \u00E2\u0088\u0097 t \u00E2\u0088\u0097 2) For a given CRU k, for the subchannels with atk,m = 0, we have rk,m = 0; when \u00E2\u0088\u0097 atk,m = 1, the optimal bit loading strategy is t \u00E2\u0088\u0097 rk,m = log2 t gk,m \u00CE\u00BBk 2 \u00CE\u0093\u00CF\u00830 + . (7.10) The derivation of the above results is provided in Appendix D. \u00E2\u0088\u0097 Since the variables {atk,m } assume only values 0 or 1, the optimal solution to OP3 is also optimal for OP2. Characteristic 1) shows that subchannel m in time slot t should be allocated to the CRU k with the highest value of htk,m . Characteristic 2) shows that for the t subchannels allocated to CRU k, no power is loaded if the equivalent noise, \u00CE\u0093\u00CF\u008302 /gk,m , is t higher than the waterlevel; otherwise, the power loaded is \u00CE\u00BBk \u00E2\u0088\u0092 \u00CE\u0093\u00CF\u008302 /gk,m . We note that if we know the waterlevels {\u00CE\u00BBk , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} that satisfy (7.2) and (7.4), then at each time slot t, we can simply use (7.8) and (7.10) to perform the subchannel and bit allocation. However, in Problem OP1, we do not have these waterlevels since we do not u know the channel gains {gk,m , u > t} exactly. Nevertheless, as T M \u00E2\u0086\u0092 \u00E2\u0088\u009E, we can estimate the waterlevels \u00CE\u009B = {\u00CE\u00BB\u00E2\u0088\u009E k,m , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } using statistical information about the subchannel gains. In the following, we devise an algorithm for finding the set \u00CE\u009B 155 \u000Cof waterlevels. When Gk = gk , the probability that CRU k is allocated a given subchannel is FGi (h\u00E2\u0088\u00921 i (hk (gk ))) pk (gk ) = (7.11) i=k where h\u00E2\u0088\u00921 is the inverse of hi and hk is the same as htk,m in (7.9) with superscript t and subi script m dropped since for a given CRU k, Gtk,m are independent and identically distributed rv\u00E2\u0080\u0099s. The term FGi (h\u00E2\u0088\u00921 i (hk (gk ))) represents the probability that CRU i has a value of hi that is lower than hk (gk ), i.e., the probability that CRU i will not be allocated the subchannel. When there are a total of m subchannels available to all CRUs, the average number of bits that are loaded for CRU k is given by Rk\u00E2\u0088\u009E (m) = m \u00E2\u0088\u009E 2 \u00CE\u0093\u00CF\u00830 \u00CE\u00BBk pk (gk )fGk (gk ) log2 \u00CE\u00BBk gk \u00CE\u0093\u00CF\u008302 dgk (7.12) and the average total power used is K \u00E2\u0088\u009E S (m) = m k=1 \u00E2\u0088\u009E 2 \u00CE\u0093\u00CF\u00830 \u00CE\u00BBk \u00CE\u0093\u00CF\u008302 pk (gk )fGk (gk ) \u00CE\u00BBk \u00E2\u0088\u0092 gk dgk . (7.13) The basic idea for finding \u00CE\u009B is to iteratively increase the waterlevel for the CRU with the lowest service share by a step size, \u00CE\u00B4, until S \u00E2\u0088\u009E (m) is close to S and (7.2) is nearly satisfied. The value of \u00CE\u00B4 is dynamically adjusted to provide rapid convergence to accurate values of {\u00CE\u00BB\u00E2\u0088\u009E k,m }. In the first round, \u00CE\u00B4 is set to 1/C, where C > 1 is typically a number between 2 to \u00CB\u009C k where k = argmin R\u00E2\u0088\u009E (m)/RP R and \u00CE\u00BB \u00CB\u009C k is the estimated 4. We then increase \u00CE\u00BBk by \u00CE\u00B4 \u00CE\u00BB k k k initial waterlevel for CRU k . This process continues until S \u00E2\u0088\u009E (m) > S, which indicates that some values of \u00CE\u00BBk are higher than \u00CE\u00BB\u00E2\u0088\u009E k,m . To address this excess power problem and to ensure \u00CB\u009C k and that some users do not get unfairly high service shares, we lower each \u00CE\u00BBk to \u00CE\u00BBk \u00E2\u0088\u0092 \u00CE\u00B4 \u00CE\u00BB go to the next round with a smaller step size \u00CE\u00B4 = \u00CE\u00B4/C. We proceed by decreasing the step size at each round until S \u00E2\u0088\u009E (m) is close to S and (7.2) is nearly satisfied or \u00CE\u00B4 < , where 156 is \u000Csome small positive number. A pseudo-code listing of the algorithm is shown below. Algorithm 5 Waterlevel finding algorithm. \u00CB\u009C k = S/M, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}. 1) Initialize {\u00CE\u00BBk = , \u00CE\u00BB 2) For each available subchannel m from M down to 1, do steps 3) and 4). 3) Set \u00CE\u00B4 = 1/C, repeat 3.1) and 3.2) until S \u00E2\u0088\u009E (m) = S and (7.2) or \u00CE\u00B4 < . 3.1) Calculate Rk\u00E2\u0088\u009E (m) and S \u00E2\u0088\u009E (m) using (7.12) and (7.13). \u00CB\u009C k , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, \u00CE\u00B4 = \u00CE\u00B4/C; 3.2) If S \u00E2\u0088\u009E (m) > S, \u00CE\u00BBk = \u00CE\u00BBk \u00E2\u0088\u0092 \u00CE\u00B4 \u00CE\u00BB \u00CB\u009C k where k = argmin R\u00E2\u0088\u009E (m)/RP R . otherwise, set \u00CE\u00BBk = \u00CE\u00BBk + \u00CE\u00B4 \u00CE\u00BB k k k \u00CB\u009C = \u00CE\u00BB , \u00CE\u00BB = \u00CE\u00BB , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K. 4) Set \u00CE\u00BB\u00E2\u0088\u009E k k k k,m In Step 3), during each round, the number of iterations required is roughly CK, since each CRU needs about C iterations to reach its waterlevel. Since the maximum number of rounds necessary is logC (1/ ), the number of iterations required for Step 3) to converge is Nit = CK logC (1/ ). Since Steps 3.1) and 3.2) has complexity O(K) and needs CK logC (1/ ) iterations to converge, the complexity of Step 3) is O(K 2 ). The complexity of Algorithm 5 is O(K 2 M ) since Step 3) is executed M times. We note that Algorithm 5 does not need to be executed at each time slot t; it is re-run only when the subchannel gain distributions or power limit S change. Once the waterlevels \u00CE\u00BB\u00E2\u0088\u009E k,m , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M are obtained using Algorithm 5, the subchannel and bit allocation in time slot t proceeds as follows: Algorithm 6 Subchannel and bit allocation algorithm. 1) Set \u00CE\u00BBk = \u00CE\u00BB\u00E2\u0088\u009E k,mCR,t , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K. 2) Allocate subchannels and bits according to (7.8) and (7.10). The computational complexity of Algorithm 6 is O(KM ), which is similar to the algorithms in [3] and [4]. The proposed algorithm provides a statistical proportional rate solution whereas the algorithms in [3, 4] provide a solution designed to meet power and rate constraints at each time slot. 157 \u000C7.4 Simulation Results To assess the performance of the proposed algorithm, we consider the downlink of a multiuser OFDM-based CR system operating within a 2.5 km \u00C3\u00972.5 km cell with the CRBS located in the middle of the cell. The propagation path loss exponent is chosen as 4, the variance of the shadowing effect is 10 dB, and the multipath fading is assumed to be Rayleigh [10]. The number, K, of CRUs in the system varies from 8 to 64 and is increased by adding a group of eight CRUs at a time. The average subchannel gains of the eight CRUs in a group are 0.043 \u00C3\u0097 10\u00E2\u0088\u009212 , 0.062 \u00C3\u0097 10\u00E2\u0088\u009212 , 0.077 \u00C3\u0097 10\u00E2\u0088\u009212 , 0.153 \u00C3\u0097 10\u00E2\u0088\u009212 , 0.260 \u00C3\u0097 10\u00E2\u0088\u009212 , 0.482 \u00C3\u0097 10\u00E2\u0088\u009212 , 1.00 \u00C3\u0097 10\u00E2\u0088\u009212 and 2.44 \u00C3\u0097 10\u00E2\u0088\u009212 . In addition, \u00CE\u0093 = 5, \u00CF\u008302 = 10\u00E2\u0088\u009216 W, S = 1 W, and T = 10, 00 slots (0.4 S). There are eight PUs in the system, each with a 250 kHz band (including the guard bands) for a total bandwidth of 2 MHz. For the CR system, the 2 MHz bandwidth is used to support 64 OFDM subchannels. The duration of each OFDM symbol is Tsymbol = 40 \u00C2\u00B5s, \u00C2\u00AF CR = 0.5M . Tstate = 1 slot and pa = pn = 0.5 so that M For comparison with existing algorithms (designed for multiuser OFDM systems), we also simulated the algorithms proposed in [3] and [4], hereafter referred to as SAE and MB, respectively. To assess fairness in the service share of CRUs, we use the fairness index in [11] defined as F I = Rk1,T K k=1 RkP R 2 / K K k=1 Rk1,T RkP R 2 . When all CRU service shares, Rk1,T /RkP R , k = 1, 2, . . . , K, are exactly the same, F I attains its maximum value of 1. K Proposed SAE MB 8 16 1.0 1.0 1.0 1.0 1.0 0.99 24 1.0 1.0 0.97 32 40 1.0 1.0 0.98 0.91 0.91 0.81 48 1.0 0.80 0.70 56 64 1.0 1.0 0.70 0.61 0.61 0.53 Table 7.1: Fairness index. Fig. 7.1 and Table 7.1 show the average throughput and fairness index as a function of the number, K, of CRUs. It can be seen that the proposed algorithm performs better than SAE and MB in terms of both throughput and fairness index. The relative improvement 158 \u000C4.8 Average throughput ( \u00C3\u0097 Mbps) 4.6 Proposed SAE MB 4.4 4.2 4 3.8 3.6 3.4 3.2 8 16 24 32 40 K, number of CRUs 48 56 64 Figure 7.1: System throughput with respect to number of CRUs with RkP R = 1, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K. 159 \u000Cincreases with K. The throughput improvement of the proposed algorithm over SAE is 8% at K = 8 and 37% at K = 64; the improvement over MB is 13% at K = 8 and 6% at K = 64. The throughputs of both the proposed and MB algorithms increase with K due to the benefit of \u00C2\u00AF CR (e.g., at multiuser diversity. SAE also benefits from multiuser diversity when K << M K = 8 and K = 16); however, as K increases beyond 16, the throughput decreases with K. This is because SAE is designed for the case K << mCR,t . When this is not the case, the subchannel allocation becomes almost random, resulting in a lower throughput. The F I values for the proposed, SAE and MB algorithms are close to 1 when the number, K, of users is small. As K increases, the F I values for SAE and MB decrease. The reason for this is as follows. Although SAE and MB try to satisfy (7.2) among the CRUs which are allocated at least one subchannel, they cannot provide any rate to CRUs which are not allocated any subchannel. As K increases, so does the number of CRUs with no subchannel allocation and this results in a lower F I value. As an example, for K = 64, the maximum CRU throughputs are 107 kbps (SAE) and 199 kbps (MB), whereas the minimum CRU throughputs are only 245 bits (SAE) and 46 bits (MB). 7.5 Conclusions A resource allocation (RA) algorithm for NRT applications in a multiuser OFDM-based CR system was proposed. Unlike existing RA algorithms designed for multiuser OFDM systems, which are unable to guarantee proportional rate allocation in a CR system when the number of CRUs exceeds the number of available subchannels, the proposed algorithm provides statistically proportional rates as well as an improved system throughput. These benefits are achieved by relaxing the per time-slot power and rate constraints. 160 \u000CReferences [1] Federal Communications Commission, \u00E2\u0080\u009CFCC adopts rule changes for smart radios,\u00E2\u0080\u009D Cognitive Radio Technologies Proceeding (CRTP), ET Docket No. 03-108, 2005. [2] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [3] Z. Shen, J. G. Andrews, and B. L. Evans, \u00E2\u0080\u009CAdaptive resource allocation in multiuser OFDM systems with proportional rate constraints,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 6, pp. 2726\u00E2\u0080\u00932737, November 2005. [4] C. Mohanram and S. Bhashyam, \u00E2\u0080\u009CA sub-optimal joint subcarrier and power allocation algorithm for multiuser OFDM,\u00E2\u0080\u009D IEEE Communication Letters, vol. 9, no. 8, pp. 685\u00E2\u0080\u0093 687, August 2005. [5] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [6] A. J. Goldsmith and S.-G. Chua, \u00E2\u0080\u009CVariable-rate variable-power MQAM for fading channels,\u00E2\u0080\u009D IEEE Transactions on Communications, vol. 45, no. 10, pp. 1218\u00E2\u0080\u00931230, October 1997. [7] H. Su and X. Zhang, \u00E2\u0080\u009CCross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 118\u00E2\u0080\u0093129, January 2008. [8] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University Press, 2004. [9] R. S. Cheng and S. Verdu, \u00E2\u0080\u009CGaussian multiaccess channels with ISI: capacity region and multiuser water-filling,\u00E2\u0080\u009D IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 773\u00E2\u0080\u0093785, May 1993. [10] V. Erceg, L. J. Greenstein, S. Y. Tjandra, S. R. Parkoff, A. Gupta, B. Kulic, A. A. Julius, and R. Bianchi, \u00E2\u0080\u009CAn empirically based path loss model for wireless channels in suburban environments,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 7, no. 7, pp. 1205\u00E2\u0080\u00931211, July 1999. [11] R. Jain, D. Chiu, and W. Hawe, \u00E2\u0080\u009CA quantitative measure of fairness and discrimination for resource allocation in shared computer systems,\u00E2\u0080\u009D DEC (Digital Equipment Corporation) Research Report TR-301, September 1984. 161 \u000CChapter 8 A Distributed Algorithm for Resource Allocation in OFDM-based Cognitive Radio Systems 8.1 Introduction It has been suggested [1] that the looming communications spectrum shortage crisis can be alleviated using cognitive radio (CR) technology [2]. It allows unlicensed users to use licensed frequency bands when the licensed users are not active. The highly dynamic nature of the bandwidth available to a CR system makes resource allocation very challenging. Due to its flexibility in dynamically allocating radio resources to multiple users and low interference between adjacent subcarriers, orthogonal frequency division multiplexing (OFDM) is considered an attractive modulation scheme for CR systems [3]. Due to the time-varying resources available in a CR system, it is possible that the nominal bit rates for CR users cannot be provided. In resource-limited situations, it is desirable to provide an equitable level of rate degradation among the CR users. The proportional rate schemes in [4] and [5] provide fair degradation among data users in OFDM systems by guaranteeing specified rate ratios. However, they consider that the rate ratios should be maintained even after user nominal rate requirements have met; this often limits efficient use of resources. The above-mentioned algorithms are centralized. Distributed algorithms may be more suitable in multi-cell systems or ad hoc systems. In such systems, subcarriers are simultaneously shared among several users and cochannel interference has to be considered in allocating resources. In [6], the cochannel interference in an OFDM-based digital subscriber 1 The material in this chapter is largely based on the following paper: Yonghong Zhang and Cyril Leung, \u00E2\u0080\u009CA Distributed Algorithm for Resource Allocation in OFDM-based Cognitive Radio Systems,\u00E2\u0080\u009D IEEE 68th Vehicular Technology Conference (VTC 2008-fall), Calgary, Canada, Sept. 2008. 162 \u000Cline (DSL) system is treated as noise and the power allocation problem is viewed as a noncooperative game. A distributed iterative waterfilling (ITWF) algorithm is proposed which requires knowledge of the user highest achievable target rates (HATRs) in order to obtain the optimal power allocation solution. Obtaining this knowledge is difficult for a distributed algorithm in a time-varying wireless channel environment. In [7], a distributed algorithm is designed to maximize system throughput for an OFDM system with no nominal user bit rates. The distributed algorithm for multi-cell systems in [8] can handle nominal user bit rates but does not consider fair user degradation in resource-limited scenarios. In this paper, we consider subcarrier, power, and bit allocation for user applications with nominal bit rates in an OFDM-based CR system. In contrast to conventional OFDM systems, the available resources in a CR system are changing over time. When resources are scarce, the goal is to provide fair degradation among all CR users. When resources are abundant, we try to maximize system throughput while ensuring that the nominal rates for all users are satisfied. 8.2 System Model Consider a CR system, with bandwidth W , in which the (licensed) primary users (PUs) are not active all the time. Assume that there are altogether K CR transceiver pairs (CRPs), all of which use OFDM. The CRPs may use a PU frequency band whenever the PU is sensed not to be active. There are M subbands (subchannels) and the nominal bandwidth of subband m, m = {1, 2, . . . , M } ranges from fc + (m \u00E2\u0088\u0092 1)\u00E2\u0088\u0086f to fc + m\u00E2\u0088\u0086f . The subbands (or subchannels) are modelled in discrete-time, with the time-varying gain for subchannel m from CRP i\u00E2\u0080\u0099s transmitter to CRP j\u00E2\u0080\u0099s receiver denoted by m gj,i . Let the power gains m m , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M be outcomes of independent random variables (rv\u00E2\u0080\u0099s), and let gi,j gj,i be independent identically distributed (i.i.d.) rv\u00E2\u0080\u0099s for any given values of i and j. It is assumed that there is no inter-carrier interference (ICI). Each subchannel is shared among 163 \u000CCRPs, and the signal of any CRP is considered to be interference to other CRPs. We note that in general the interference powers experienced at the two transceivers of a given CRP are not equal. In order to reduce the cross-channel interference between the CRPs and the PUs, the subchannels adjacent to PU bands are not used by CRPs [9]. The PU active frequency bands, PU guard bands, the spectrum holes, and CRU OFDM subchannels are shown in Figure 8.1. Because the active PU bands vary over time, the number, MCR , of subchannels available to CRPs can range from 0 to 32. For the example shown in Figure 8.1, MCR = 15 at this time at this location. PU active frequency bands Guard bands Guard bands W1 W2 Spectrum hole 1 fc 3 5 Spectrum hole 7 9 11 13 15 17 19 21 23 25 27 29 31 f Figure 8.1: PU active frequency bands, guard bands, spectrum holes and CRU OFDM subchannels. The rapidly time-varying nature of available resources complicates resource allocation, especially if CRPs have nominal bit rate targets. Suppose that the nominal rate requirement for CRP k is RkN OM . When the number of available subchannels is low, not every CRP\u00E2\u0080\u0099s nominal rate may be achieved, i.e., for some CRP k, Rk < RkN OM where Rk is the bit rate over all subchannels for CRP k. In this case, we ensure fair degradation among CRPs, i.e. allocate resources so as to equalize the fractional rate degradation, vk = (RkN OM \u00E2\u0088\u0092 Rk )/RkN OM , RkN OM > Rk for all CRPs. The system degradation fairness is measured using 164 \u000Cthe fairness index in [10], i.e. ( FI = K K 2 k=1 vk ) K 2 k=1 vk . (8.1) When all K CRP rate degradations are the same, i.e. vk = \u00CF\u0086, \u00E2\u0088\u0080k, the fairness index attains its maximum value of 1. The lowest value is F I = 1/K. The F I-value roughly reflects the fraction of CRPs that receive similar service. Under resource-limited conditions, the goal is to maximize some function h of the fairness index, F I, and the sum rate, K k=1 Rk , for CRPs. When resources are adequate, i.e., in a resource-abundant situation, the goal is to maximize the throughput of the CR system while ensuring that the nominal user bit rate requirements are satisfied. The optimization problem OP1 can thus be formulated as O1 : max h sk,m ( K K K 2 k=1 vk ) , K 2 k=1 vk k=1 Rk if Rk < RkN OM for some k K Rk if Rk \u00E2\u0089\u00A5 RkN OM for all k O2 : max sk,m (8.2) k=1 subject to \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 vk = RkN OM \u00E2\u0088\u0092Rk RkN OM \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 1 Rk < RkN OM Rk \u00E2\u0089\u00A5 (8.3) RkN OM MCR Rk = rk,m (8.4) m=1 rk,m = log2 1 + m gk,k sk,m 2 \u00CE\u0093(\u00CF\u00830 + Ik,m ) (8.5) MCR sk,m \u00E2\u0089\u00A4 Sk (8.6) m=1 K m gk,l sl,m Ik,m = (8.7) l=1,l=k where subscripts k and m refer to CRP k and subchannel m respectively, Sk is the total 165 \u000Ctransmit power constraint for CRP k, \u00CE\u0093 is a SNR gap parameter which indicates how far the system is operating from capacity, sk,m is the transmit power, \u00CF\u008302 is the noise power, and Ik,m is the interference power from other CRPs. Problem OP1 is a two-objective non-linear optimization problem, which is generally hard to solve. Here, we study the case in which fair degradation is guaranteed, i.e., F I = 1. In a resource-abundant situation, the condition Rk \u00E2\u0089\u00A5 RkN OM , \u00E2\u0088\u0080k implies that F I = 1 from (8.3). In a resource-limited situation, to ensure that F I = 1, we need Rk N OM Rk = 1 \u00E2\u0088\u0092 \u00CF\u0086, 0 \u00E2\u0089\u00A4 \u00CF\u0086 \u00E2\u0089\u00A4 1, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K; if \u00E2\u0088\u0083k, Rk < RkN OM . (8.8) As a result, when F I = 1 is guaranteed, Problem OP1 can be transformed to K OP2 : max sk,m Rk (8.9) k=1 subject to constraints (8.4)-(8.7), and (8.8). Because Problem OP2 involves constraint (8.8), which only applies in the resource-limited situations, it is still hard to solve. We can simplify Problem OP2 using a goal programming approach [11]. There are usually two steps involved in goal programming, i.e., (1) introduce slack and surplus variables to combine the different requirements in resource-limited situations (require (8.8)) and resource-abundant situations (require Rk \u00E2\u0089\u00A5 RkN OM , \u00E2\u0088\u0080k); (2) rewrite the objective function in (8.9) to reflect the goals of the original problem. Then, the objective of Problem OP2 becomes K OP3 : max sk,m K RkN OM pk \u00E2\u0088\u0092 \u00CF\u0086 k=1 (8.10) k=1 and constraint (8.8) is replaced with Rk + \u00CF\u0086RkN OM \u00E2\u0088\u0092 pk = RkN OM , 0 \u00E2\u0089\u00A4 \u00CF\u0086 \u00E2\u0089\u00A4 1, pk \u00E2\u0089\u00A5 0, \u00CF\u0086pk = 0 166 (8.11) \u000Cwhere \u00CF\u0086RkN OM and pk are the slack and surplus variables for CRP k. The slack variable, \u00CF\u0086RkN OM , is the difference between RkN OM and Rk when Rk < RkN OM . The surplus variable, pk , is the difference between Rk and RkN OM when Rk > RkN OM . Since the slack value for CRP k is proportional to CRP k\u00E2\u0080\u0099s nominal rate requirement, the resulting fairness index will be equal to 1. We will refer to the set of user rates {Rk\u00E2\u0088\u0097 , k = 1, 2, . . . , K} which results from solving problem (8.10) as the highest achievable target rate (HATR) set and Rk\u00E2\u0088\u0097 as the individual HATR for CRP k. The optimization problem in (8.10) can be solved using a non-linear single objective optimizer. However, the computational complexity for such a centralized approach is generally very high and requires knowledge of the subchannel power gains from each CRP transmitter to each CRP receiver. We next propose a distributed algorithm with lower complexity which is especially suited for ad hoc or multi-cell infrastructure systems because each CRP only needs the subchannel power gains from its own transmitter to its own receiver. 8.3 Distributed Algorithm As mentioned in [6], if each transmitter knows its HATR, then an iterative waterfilling algorithm yields a Nash equilibrium if we view the allocation problem as a non-cooperative game. In the following subsections, we examine the following issues: (1) how can CRPs determine if a set of target rates is achievable, (2) how can a CRP determine its individual HATR when the system is resource-limited, (3) how can a CRP determine its individual HATR when system are abundant, and (4) how to design the distributed algorithm for resource allocation. Since in practical systems, the number of bits has to be an integer, this constraint is taking into account in this section. 167 \u000C8.3.1 Determining Achievability of Target Rates Let us first consider the case with only one subchannel. Assume that each receiver of a CRP sends back its current interference level to its corresponding transmitter. Suppose that the target rate for CRP k is rk . Since the subchannel is shared by multiple CRPs, each trying to maintain its target rate, an increase in the power of any CRP transmitter will result in an increase in interference to the other CRP receivers, which would in turn cause an increase in the other CRP transmitter powers. These higher powers will generate more interference to the original CRP\u00E2\u0080\u0099s receiver, causing its transmitter to increase power again. This process of growing CRP transmitter powers continues until either an equilibrium point is attained or some of the CRP transmitters reach their power limits unable to meet their target rates. A CRP thus knows that if it is unable to reach its target rate, given the current interference power level and it has reached its transmit power limit, then that target rate is not achievable. This strategy can be extended to multiple subchannels by treating the RA problem, which minimizes the total transmit power subject to rate requirements {RkT AR , k = 1, 2 \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}, as a non-cooperative game [6, 8]. In this game, each CRP competes for data rates with the sole objective of minimizing its own total transmit power while viewing the signals of other CRPs as interference. When the powers of the other CRPs are not changing, the solution to the RA problem for CRP k has a water-filling interpretation [12]. Since a change in one CRP\u00E2\u0080\u0099s power corresponds to changes in the interference power levels of other CRPs, each CRP needs to iteratively use water-filling algorithm based on its current interference power level. If the resulting total rate over all subchannels is still below the CRP\u00E2\u0080\u0099s target rate RkT AR when its transmit power limit is reached, then the CRP knows that RkT AR is not achievable. The CRP then broadcasts a \u00E2\u0080\u009CNot achievable (NA)\u00E2\u0080\u009D message to inform other CRPs that the current set of target rates is not achievable. A pseudo-code listing for the algorithm is given in Algorithm 7. The parameter trun is the 168 \u000Crunning time of this algorithm. The parameter \u00CF\u0084 is the time needed to determine whether a given HATR set is achievable or not, which is the time needed for the non-cooperative game to converge. The input parameter RkDAT A is the rate at which CRP k can transmit data. Algorithm 7 provides the minimum total transmit power that achieves RkT AR for CRP k given that the other CRPs\u00E2\u0080\u0099 power allocation do not change. As a result, the resulting outcome is a Nash equilibrium, i.e., no CRP can improve its total transmit power by only changing its own power allocation. Conditions for the existence and uniqueness of the Nash equilibrium are studied in [6]. If such conditions can be satisfied, then Algorithm 7 converges within \u00CF\u0084 , which indicates that the rate set {RkT AR , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} is achievable; otherwise, the CRP(s) that reach(es) its power limit Sk without achieving RkT AR broadcast(s) message \u00E2\u0080\u009CNA\u00E2\u0080\u009D before time \u00CF\u0084 expires. Algorithm 7 Achievable Rate Algorithm. input: RkT AR , RkDAT A output: achievable DAT A (1) initialize rm and rm to 0, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , MCR (2) if trun \u00E2\u0089\u00A5 \u00CF\u0084 , exit; otherwise, do steps (3) to (8) (3) measure current interference power Ik,m for each subchannel DAT A (4) get rm and rm by using water-filling MCR (5) if m=1 rm \u00E2\u0089\u00A5 RkT AR , achievable = true; otherwise achievable = f alse, broadcast message \u00E2\u0080\u009CNA\u00E2\u0080\u009D (6) if receive message \u00E2\u0080\u009CNA\u00E2\u0080\u009D, set achievable = f alse. DAT A (7) load rm bits to subchannel m (8) go to step (2) 8.3.2 Determining HATR in a Resource-limited Situation Initially, each CRP set RkN OM as its target rate. Once it is determined that the target rate set {RkN OM , k = 1, 2, . . . , K} is not achievable, then the goal is to determine the HATR set while ensuring fair degradation. For this purpose, we propose to use a binary search approach. The idea is based on the binary search algorithm [13] for finding a particular value in a sorted list. 169 \u000CEach CRP k keeps track of two individual target rates, Rk,l and Rk,h : the value of Rk,l is the current highest ATR plus 1, whereas Rk,h is the current lowest non-achievable TR minus 1. The actual value of HATR is in the set R = {Rk,l \u00E2\u0088\u0092 1, Rk,l , Rk,l + 1, . . . , Rk,h }. Initially, Rk,l is set to 1 and Rk,h is set to RkN OM . Then at each round, the CRP sets its target rate to rk = (Rk,l + Rk,h )/2 . If the target rate turns out to be achievable, Rk,l is set to rk + 1, otherwise, Rk,h is set to rk \u00E2\u0088\u0092 1. This process continues until the rate Rk,l exceeds Rk,h . At each round, the size of the set R is halved, since either the top half is removed if the target rate is not achievable or the lower half is removed if the target rate is achievable. CRP k can determine its individual HATR in O(log(RkN OM )) rounds. A pseudo-code listing for the binary rate search algorithm is given in Algorithm 8: Rk,min specifies the minimum rate that should be used for its individual HATR. In a resource-limited situation, Rk,min is set to 0. Algorithm 8 Binary Rate Search Algorithm. input Rk,l , Rk,h , Rk,min output RkHAT R (1) if Rk,l = Rk,h , then let RkHAT R = Rk,l and exit (2) if Rk,l \u00E2\u0089\u00A4 Rk,h , then do steps (2.1) to (2.3); otherwise, go to (3) (2.1) rk = (Rk,l + Rk,h )/2 (2.2) call Algorithm 7 with input RkT AR = max(rk , Rk,min ) RkDAT A = Rk,l \u00E2\u0088\u0092 1 (2.3) if the output of Algorithm 7 is achievable, then Rk,l = rk + 1; otherwise, Rk,h = rk \u00E2\u0088\u0092 1. Go to step (2) (3) RkHAT R = Rk,l \u00E2\u0088\u0092 1 8.3.3 Determining HATR in a Resource-abundant Situation If the HATR for each CRP k is at least RkN OM , the system is resource-abundant. Based on the current interference level at the rate set {RkN OM , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}, the HATR can be \u00CB\u009C M AX using water-filling and assuming that the interference power level will estimated as R k 170 \u000C\u00CB\u009C M AX , k = 1, 2, . . . , K} not be raised. Since the level will actually increase if the rate set {R k \u00CB\u009C M AX is an upperbound on the HATR. is used, R k Since plain equal power allocation, in which power is equally allocated to all subchannels, yields similar results as water-filling [14], we can estimate RkM AX as \u00CB\u009C kM AX = R MCR log2 m=1 m Sk gk,k 1+ MCR \u00CE\u0093 (\u00CF\u008302 + Ik,m ) (8.12) where Ik,m is the interference power that results when all CRP rates are set to their nominal values. The HATR for CRP k can be found using Algorithm 8 with Rk,l = 1 and Rk,h = \u00CB\u009C M AX . By setting Rk,min to RN OM , we ensure that the HATR is no less than RN OM . R k k k 8.3.4 The Proposed Distributed Algorithm The proposed distributed algorithm for finding a suboptimal solution to problem (8.10) can be stated as follows. Each CRP k first sets its target rate at RkN OM . Using the procedure in Subsection 8.3.1, it determines if the target rate set {RkN OM , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} is achievable. If the target rate set is not achievable, CRP k then uses Algorithm 8 to find its HATR between 1 and its RkN OM . If the target rate set is achievable, CRP k then uses Algorithm 8 \u00CB\u009C M AX . to find its HATR between RkN OM and R k CRP k then uses its HATR as the target rate and performs iterative waterfilling. Figure 8.2 shows a block diagram of the algorithm. 8.4 Simulation Results To evaluate the effectiveness of the proposed distributed algorithm summarized in Fig. 8.2, simulations were performed on a system covering a 3 km \u00C3\u0097 3 km area. The transmitters are uniformly distributed within that area and each receiver is uniformly distributed within a 300 meter circle centered on its corresponding transmitter. The propagation path loss is 171 \u000CCall Algorithm 1 (input: RkTAR=RkNOM, RkDATA=0) Y ~ Rk,l=1,Rk,h=RMAX Rk,min=RkNOM achievable? Rk,l=1,Rk,h=RkNOM Rk,min=0 N Call Algorithm 2 (input: Rk,l, Rk,h, Rk,min output: RkBATR) Iterative water-filling with RBATR Figure 8.2: Flow chart of the distributed allocation algorithm. calculated using P L = A + 10\u00CE\u00B3 log10 (d/d0 ) [15], where A = 50 dB is the path loss at the reference point, \u00CE\u00B3 = 4 is the path loss exponent, d is the distance between the transmitter and the receiver and d0 = 10 m is the distance between the transmitter and the reference point. The multipath fading is assumed to be Rayleigh. The duration of each OFDM symbol is 40 \u00C2\u00B5s. The CRP bit error rate requirement is 10\u00E2\u0088\u00924 , which corresponds to a \u00CE\u0093 value of 5. The number, MCR , of subchannels available to CRPs ranges from 2 to 16 and each subchannel has a noise power \u00CF\u008302 of 10\u00E2\u0088\u009215 W. For performance comparison, we obtained the optimal solution for Problem OP3 for each of a number of different realizations of CRP locations using a commercial optimization software package. Similarly, the optimal solution with a fixed fractional rate degradation for all CRPs in resource-limited as well as resource-abundant situations, hereafter referred to as \u00E2\u0080\u009Cproportional rate\u00E2\u0080\u009D, was also obtained. The proportional rate constraint is equivalent to N OM . R1 /R1N OM = R2 /R2N OM = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = RK /RK (8.13) Fig. 8.3 shows the average number of bits per OFDM symbol (ANB) per CRP as a function of the number of available subchannels. The results for the optimal solution is obtained by solving Problem OP3, and the results for the optimal proportional rate solution is obtained by solving Problem OP2 but with constraint (8.8) replaced by (8.13). To keep 172 \u000C80 70 Optimal (real bits) Proposed (integer bits) Proportional rate (real bits) ANB per CRP 60 50 40 30 20 10 2 4 6 8 10 12 Number of available subchannels, M 14 16 CR Figure 8.3: Average number of bits per OFDM symbol duration per CRP as a function of the number of available subchannels with Sk = 10\u00E2\u0088\u00923 W, K = 3, R1N OM = 25, R2N OM = 30, R3N OM = 35. the running times for obtaining optimal solutions reasonable, the value for each point in Fig. 8.3 is averaged over 1000 realizations of CRP locations. It can be seen from Figure 8.3 that the proposed distributed algorithm provides an ANB (throughput) close to (within 8% of) optimal. The throughput with the proportional rate constraint is considerably lower because it limits efficient use of the extra available system resources. The throughput improvement with the proposed algorithm relative to the proportional rate solution increases with the number of available subchannels from 3% with 4 subchannels to 56% with 16 subchannels. The fairness indices in all three cases are close to 1. 173 \u000CThe ANB per CRP curves with R1N OM = R2N OM = R3N OM = 20 are plotted in Fig. 8.4. The ANB for the proposed distributed algorithm is within 8% of optimal. Compared to Fig. 8.3, the ANB is higher for the optimal and proposed algorithms, especially when MCR is high. The reason is as follows: the nominal CRP rate requirements in Fig. 8.4 are lower than in Fig. 8.3, thus the system is more often in the resource abundant situation resulting in a higher throughput. Since the proportional rate algorithm always maintains CRP rates proportionally, the ANB difference between Fig. 8.3 and Fig. 8.4 is small. The ANB improvement of the proposed algorithm relative to the proportional rate solution increases with MCR , from 4% with 4 subchannels to 80% with 16 subchannels. The fairness indices in all three cases are close to 1. Fig. 8.5 shows the ANB per CRP as a function of the total power constraint, Sk , with MCR = 8. The proposed algorithm provides an ANB which is within 8% of optimal. The ANB of the proposed algorithm is about 50% higher than the proportional rate solution for the range of Sk values plotted. To explain the relative performances of the optimal, proportional rate and proposed algorithms, we consider a system with four subchannels and a randomly selected realization of CRP locations. Table 8.1 lists the subchannel gains from CRP j\u00E2\u0080\u0099s transmitter to CRP i\u00E2\u0080\u0099s receiver. i 1 2 3 j sub 1 1 919 2 1.77 3 1.23 1 0.051 2 140 3 0.038 1 0.078 2 0.322 3 180 sub 2 7723 1.32 0.598 0.07 1696 0.052 0.083 0.198 193 sub 3 2058 4.46 0.567 0.038 2227 0.032 0.052 0.009 135 sub 4 6910 2.19 0.324 0.042 566 0.065 0.013 0.269 85 Table 8.1: Subchannel gains (\u00C3\u009710\u00E2\u0088\u009210 ) from CRP j\u00E2\u0080\u0099s transmitter to CRP i\u00E2\u0080\u0099s receiver. 174 \u000C90 80 Optimal (real bits) Proposed (integer bits) Proportional rate (real bits) ANB per CRP 70 60 50 40 30 20 10 2 4 6 8 10 12 Number of available subchannels, M 14 16 CR Figure 8.4: Average number of bits per OFDM symbol duration per CRP as a function of the number of available subchannels with Sk = 10\u00E2\u0088\u00923 W, K = 3, R1N OM = 20, R2N OM = 20, R3N OM = 20. 175 \u000C90 80 ANB per CRP 70 60 50 40 Optimal (real bits) Proposed (integer bits) Proportional rate (real bits) 30 20 1 2 3 4 5 6 7 Power limit, S (mW) 8 9 10 k Figure 8.5: Average number of bits per OFDM symbol duration per CRP as a function of total power with MCR = 8, K = 3, R1N OM = 20, R2N OM = 20, R3N OM = 20. 176 \u000CThe three CRPs have equal transmit power limits, namely Sk = 0.1 mW. The total (summed over all four subchannels) number of bits per OFDM symbol duration for each CRP is shown in Table 8.2. Results are given for each of the three algorithms and four different sets of nominal CRP rate requirements. Note that in Table 8.2 the results for the optimal and the proportional rate algorithms have been rounded to the nearest integer. For the first set of nominal CRP rate requirements, i.e. RkN OM = 10 bits per OFDM symbol duration, the system is resource-limited and all three CRPs cannot achieve their nominal rates. The goal is to allocate as many bits as possible while keeping the rate ratios Rk /RkN OM for the three CRPs as close as possible. All three algorithms yield CRP rates of 8 bits per OFDM symbol duration and a fairness value of 1. For the second set of nominal CRP rate requirements, i.e. R1N OM = 10 bits, R2N OM = 15 bits, R3N OM = 20 bits, the CR system is even more resource-limited. The CRP sum rate and the fairness index for the proposed algorithm is slightly lower than the optimal and proportional rate values. We note that the optimal and proportional rate algorithms produce the same solutions when the system is resource-limited because then the constraint in (8.13) applies to both. For the third and fourth sets of nominal CRP rate requirements, the CR system is resource-abundant. The goal is to maximize the overall system throughput while ensuring that all CRP nominal rates are met. The proposed algorithm gives a fairness value of 1 and sum rates which are within 4% of the optimal values. When the system is resource-abundant, the proportional rate algorithm does not make efficient use of the surplus resources and its sum rates are lower than those of the proposed algorithm by 32% and 74%, respectively. 8.5 Conclusions The subchannel, bit, and power allocation problem for users with nominal bit rate requirements in an OFDM-based CR system was formulated as a multi-objective non-linear op- 177 \u000CAlgorithm Optimal Proposed Proportional Algorithm Optimal Proposed Proportional Algorithm Optimal Proposed Proportional Algorithm Optimal Proposed Proportional R1N OM = 10, R2N OM = 10, R3N OM = 10 CRP 1 CRP 2 CRP 3 sum rate 8 8 8 24 8 8 8 24 rate 8 8 8 24 N OM N OM N OM R1 = 10, R2 = 15, R3 = 20 CRP 1 CRP 2 CRP 3 sum rate 4 6 8 18 3 6 8 17 rate 4 6 8 18 N OM N OM N OM R1 = 6, R2 = 6, R3 =4 CRP 1 CRP 2 CRP 3 sum rate 24 17 8 49 23 17 7 47 rate 12 12 8 32 N OM N OM N OM R1 = 1, R2 = 2, R3 =4 CRP 1 CRP 2 CRP 3 sum rate 24 17 8 49 23 17 7 47 rate 2 4 8 14 fair index 1 1 1 fair index 1 0.997 1 fair index 1 1 1 fair index 1 1 1 Table 8.2: Number of bits per OFDM symbol and fairness index for each of the three algorithms and four different sets of nominal rate requirements. 178 \u000Ctimization problem. The goal is to provide a fair bit rate degradation among users in resource-limited situations and to maximize system throughput while satisfying user nominal rate requirements when resources are plentiful. A goal programming approach was used to transform the problem into a single objective non-linear optimization problem. A distributed algorithm was designed to solve the problem. Simulation results were provided which show that the proposed algorithm has a performance which is within 8% of optimal. 179 \u000CReferences [1] Federal Communications Commission, \u00E2\u0080\u009CFacilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies,\u00E2\u0080\u009D notice of proposed rulemaking and order, FCC 03-322, 2003. [2] S. Haykin, \u00E2\u0080\u009CCognitive radio: brain-empowered wireless communications,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201\u00E2\u0080\u0093220, February 2005. [3] T. A. Weiss and F. K. Jondral, \u00E2\u0080\u009CSpectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 42, no. 3, pp. S8\u00E2\u0080\u0093S14, March 2004. [4] Z. Shen, J. G. Andrews, and B. L. Evans, \u00E2\u0080\u009CAdaptive resource allocation in multiuser OFDM systems with proportional rate constraints,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 6, pp. 2726\u00E2\u0080\u00932737, November 2005. [5] G. Yu, Z. Zhang, Y. Chen, P. Cheng, and P. Qiu, \u00E2\u0080\u009CSubcarrier and bit allocation for OFDMA systems with proportional fairness,\u00E2\u0080\u009D in Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2006), vol. 3, Las Vegas, NV, USA, April 2006, pp. 1717\u00E2\u0080\u00931722. [6] W. Yu, G. Ginis, and J. M. Cioffi, \u00E2\u0080\u009CDistributed multiuser power control for digital subscriber lines,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 20, no. 5, pp. 1105\u00E2\u0080\u00931115, June 2002. [7] G. Kulkarni, S. Adlakha, and M. Srivastava, \u00E2\u0080\u009CSubcarrier allocation and bit loading algorithms for OFDMA-based wireless networks,\u00E2\u0080\u009D IEEE Transactions on Mobile Computing, vol. 4, no. 6, pp. 652\u00E2\u0080\u0093662, November-December 2005. [8] Z. Han, Z. Ji, and K. J. R. Liu, \u00E2\u0080\u009CNon-cooperative resource competition game by virtual referee in multi-cell OFDMA networks,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1079\u00E2\u0080\u00931090, August 2007. [9] T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, \u00E2\u0080\u009CMutual interference in OFDMbased spectrum pooling systems,\u00E2\u0080\u009D in Proc. of IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, Milan, Italy, May 2004, pp. 1873\u00E2\u0080\u00931877. [10] R. Jain, D. Chiu, and W. Hawe, \u00E2\u0080\u009CA quantitative measure of fairness and discrimination for resource allocation in shared computer systems,\u00E2\u0080\u009D DEC (Digital Equipment Corporation) Research Report TR-301, September 1984. [11] M. J. Schniederjans, Goal programming: methodology and applications. Springer, 1995. [12] R. G. Gallager, Information Theory and Reliable Communication. Wiley & Sons, 1968. New York: John [13] D. Knuth, The Art of Computer Programming, Volume 3: Sorting and Searching. Addison-Wesley, 1997. 180 \u000C[14] Y. Zhang and C. Leung, \u00E2\u0080\u009CPerformance of equal power subchannel loading in multiuser OFDM systems,\u00E2\u0080\u009D in Proc. of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim 2007), Victoria, BC, Canada, August 2007, pp. 526\u00E2\u0080\u0093529. [15] J. B. Andersen, T. S. Rappaport, and S. Yoshida, \u00E2\u0080\u009CPropagation measurements and models for wireless communications channels,\u00E2\u0080\u009D IEEE Communications Magazine, vol. 33, no. 1, pp. 42\u00E2\u0080\u009349, January 1995. 181 \u000CChapter 9 Conclusions 9.1 Contributions and Discussions In this thesis, we studied various resource allocation (RA) problems in OFDM-based CR systems. The sharing of PU bands by CRUs is categorized into aggressive or protective sharing. In aggressive sharing, any portion of the spectrum can be shared by CRUs as long as such use does not interfere unduly with PU operation. To successfully share PU bands aggressively, the key is to monitor the generated interference to the PUs by CRUs. Two types of CRU-generated interference must be considered, namely, cross-channel interference which results from sharing of subchannels adjacent to PU active frequency bands and cochannel interference from sharing of PU active frequency bands. In the literature, each type of interference has been considered separately by different researchers, but not jointly. The two types of interference are studied jointly in Chapters 2 and 3. In Chapter 2, a model that takes into account both cross-channel and co-channel interference is presented for a multiuser OFDM-based multi-cell CR system. A suboptimal but low-complexity algorithm, Max-Min, is proposed for the RA problem. Simulation results show that the Max-Min algorithm yields solutions that are close to optimal (within 0.1% for the single-user case and 5% for the multi-user case). The multi-user Max-Min algorithm can be applied on the downlink of a multi-cell cellular system. Although the Max-Min has a much lower computational complexity than algorithms for solving general MDKP problems, e.g. [1], its complexity is still high. For example, for the 182 \u000Csingle-user case, Max-Min has complexity O(LM R), where L is the number of PUs, M is the number of subchannels, and R is the total number of allocated bits. A simplified model of that in Chapter 2 is therefore proposed in Chapter 3, based on: (1) the fact that crosschannel interference from CRUs to PUs is mainly limited to a few subchannels adjacent to the PU bands, and (2) the assumption that the bandwidth of a PU is much larger than that of an OFDM subchannel and that there is usually a guard band between two adjacent PU bands. A power and bit allocation algorithm for a single user is proposed with complexity O(M log(M )) + O(LM ), which is much lower than that of Max-Min. Simulation results show that the proposed suboptimal solution is close to optimal, with a difference of less than 4%. Simulation results in Chapters 2 and 3 show that aggressively sharing the whole band can provide a substantial performance improvement over protective sharing. Aggressive sharing is preferable to protective sharing in terms of spectrum efficiency; however, in some practical situations, only protective sharing is possible. This situation can occur in a broadcast PU system, in which PU receivers are densely located so that the probability of a CRU transmission not unduly disturbing any PU receiver is almost zero. Note that RA algorithms proposed in Chapters 2 and 3 designed for aggressive sharing systems can be applied to protective sharing systems by setting the PU interference power threshold at each active PU receiver equals to 0. However, the protective sharing model greatly simplifies RA design because CRU interference to PU receivers does not need to be considered. For example, the single CRU Max-Min algorithm has a complexity O(LM R), whereas similar algorithms assuming protective sharing has a complexity O(M ) (e.g. [2]). Although interference to PUs is not a factor in protective sharing, the time-varying nature of the available spectrum due to PU activities is a hurdle to meeting CRU QoS/fairness constraints. Few studies in the literature have considered such QoS provisioning difficulties in resource allocation for CR systems. In Chapters 4 to 8, we presented RA algorithms that provide good QoS to the users to operate in a fading environment with time-varying spectrum. 183 \u000CAssuming that the objective is to maximize system throughput, we showed in Chapter 4 and 5 that the performance difference between the PEPA and optimal solutions is quite small. This difference increases with the number of subchannels available to CRUs. A discretePEPA algorithm with low-complexity is proposed in Chapter 5 that yields close to optimal solutions. Since both continuous and discrete bits PEPA are very simple to implement, it is preferable in CR systems when simplicity is more important than performance. To improve spectrum utilization efficiency, a cross-layer approach was adopted in Chapter 6 for both real-time (RT) services and mixed services. A MAC-PHY RA scheme combining packet scheduling with subchannel, bit, and power allocation for RT applications was proposed. The MAC layer QoS requirements are dynamically converted to PHY layer rate requirements in a way that takes into account the delivery status of packets waiting in the CRBS buffers as well as the number of available subchannels. Simulation results show that the proposed RA algorithm can provide substantial CRBS transmit power reductions compared to existing PHY layer and MAC layer solutions designed for multiuser OFDM systems. The algorithm was extended to include NRT services, each of which has a nominal rate requirement. Similar to the RT services, the nominal rate requirements in the MAC layer are converted to PHY layer rate requirements. We then formulated a rate maximization problem in the PHY layer, of which the optimal solution was provided. In contrast to existing algorithms designed for multiuser OFDM systems, the proposed algorithm solves the problem feasibility issue by using the goal programming approach and avoids the false urgency issue caused by variations in available system resources by using a proposed rate requirement calculation mechanism. Simulation results show that the proposed algorithm provides fairness and satisfactory QoS to both RT and NRT CRUs, and performs much better than existing algorithms designed for multiuser OFDM systems. In Chapter 7, we proposed a RA algorithm for a type of NRT service, in which the average user rates are to be maintained proportionally. As an example, this type of NRT service could be used in a wireless router to maintain proportional rates for different flows. 184 \u000CIn contrast to existing RA algorithms designed for multiuser OFDM systems, which are unable to guarantee proportional rate allocation in a CR system when the number of CRUs exceeds the number of available subchannels, the proposed algorithm provides statistically proportional rates as well as improved system throughput. The protective sharing RA algorithms presented in Chapters 4 to 7 are designed for cellular systems, in which centralized algorithms are appropriate. In Chapter 8, we considered RA in an ad hoc system, in which distributed algorithms are more practical. The subchannel, bit, and power allocation problem for CRUs with nominal rate requirements in an OFDMbased CR system was formulated as a multi-objective non-linear optimization problem. The goal is to provide a fair bit rate degradation among users in resource-limited situations and to maximize system throughput while satisfying user nominal rate requirements when resources are plentiful. A distributed algorithm was designed to solve the problem. Simulation results show that the proposed distributed algorithm provides good fairness and significantly higher system throughput compared with the proportional rate algorithm when resources are abundant. To summarize, we showed in Chapters 2 and 3 that aggressive sharing provides a significant performance improvement over protective sharing. Although it is more efficient, aggressive sharing is more difficult to implement and may not be possible in some situations; protective sharing is easier to implement and can be used in most scenarios. RA algorithms using protective sharing are proposed in Chapters 4 to 8. We showed, in Chapters 4 and 5, that PEPA provides a close to optimal performance if the objective is to maximize system throughput. PEPA is therefore preferable in CR systems in which simplicity is more important than performance. To improve spectrum utilization efficiency while meeting fairness and QoS contraints, efficient RA algorithms designed for RT and NRT services are proposed in Chapters 6 to 8 for CR systems with time-varying available system resources. 185 \u000C9.2 Future Work As a new technology, cognitive radio presents new challenges in resource allocation. One of the main difficulties is that the interference power generated by CRUs at a PU receiver has to be kept below a predefined interference power threshold. There are mainly two ways of controlling this interference power: (1) aggressive sharing, which makes use of the whole spectrum with close monitoring of the total generated interference power; and (2) protective sharing, which avoids CRU interference to PU bands by allowing sharing of only the spectrum holes. Because interference avoidance is adopted in protective sharing, the interference-toPU issue does not arise. In aggressive sharing, both cross-channel interference and co-channel interference to PU bands need to be considered. Another difficulty is caused by the effects of the time-varying nature of the available spectrum on CRUs. Existing RA algorithms (e.g. [3]\u00E2\u0080\u0093[5]) at the PHY layer for multiuser OFDM systems generally assume implicitly that the available spectrum is fixed; although the fading characteristics of wireless communication channels is taken into account in these algorithms, the time-varying nature of the available spectrum has a bigger impact that must be considered in resource allocation in OFDM-based CR systems to provide satisfactory QoS to CRUs. In this thesis, we have studied the interference-to-PU issue in aggressive sharing and have addressed the spectrum time-varying issue in protective sharing in RA for OFDMbased CR systems. However, the spectrum time-varying issue in aggressive sharing was not addressed, although similar approaches to our proposals for protective sharing could be adopted. Furthermore, most of the algorithms (except the one in Chapter 8) proposed in the thesis are centralized; distributed algorithms would be useful as well. These topics are left for further investigation. The following is a list of specific topics for future study: \u00E2\u0080\u00A2 In aggressive sharing, in addition to the cross-channel and co-channel interference generated by CRUs to PU bands, time-varying nature of the available spectrum should 186 \u000Cbe taken into account in order to provide CRUs with satisfactory QoS. RA algorithms that address both issues together need to be developed. \u00E2\u0080\u00A2 To operate in fading environment with time-varying available spectrum either using aggressive or protective sharing, appropriate MAC layer RA algorithms would be of interest. \u00E2\u0080\u00A2 Distributed RA algorithms that allow aggressive sharing of PU bands need to be developed for ad hoc or multi-cell cellular systems that deal with both interference to PU bands and the time-varying nature of the available spectrum. \u00E2\u0080\u00A2 Distributed cross-layer RA algorithms that protectively share PU bands should be designed for ad hoc or multi-cell cellular systems to efficiently use the available spectrum. 187 \u000CReferences [1] B. Gavish and H. Pirkul, \u00E2\u0080\u009CEfficient algorithms for solving multiconstraint zero-one knapsack problems to optimality,\u00E2\u0080\u009D Springer Mathematical Programming, vol. 31, no. 1, pp. 78\u00E2\u0080\u0093105, January 1985. [2] J. Campello, \u00E2\u0080\u009CPractical bit loading for DMT,\u00E2\u0080\u009D in Proc. of IEEE International Conference on Communications (ICC \u00E2\u0080\u009999), vol. 2, Vancouver, BC, Canada, June 1999, pp. 801\u00E2\u0080\u0093805. [3] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, \u00E2\u0080\u009CMultiuser OFDM with adaptive subcarrier, bit, and power allocation,\u00E2\u0080\u009D IEEE Journal on Selected Areas in Communications, vol. 17, no. 10, pp. 1747\u00E2\u0080\u00931758, October 1999. [4] M. Ergen, S. Coleri, and P. Varaiya, \u00E2\u0080\u009CQoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems,\u00E2\u0080\u009D IEEE Transactions on Broadcasting, vol. 49, no. 4, pp. 363\u00E2\u0080\u0093370, December 2003. [5] Z. Shen, J. G. Andrews, and B. L. Evans, \u00E2\u0080\u009CAdaptive resource allocation in multiuser OFDM systems with proportional rate constraints,\u00E2\u0080\u009D IEEE Transactions on Wireless Communications, vol. 4, no. 6, pp. 2726\u00E2\u0080\u00932737, November 2005. 188 \u000CAppendix A Optimal Solutions for Optimization Problems in Chapter 3 A.1 Solution for OP1 \u00E2\u0088\u0097(1) Let {sm , \u00CE\u00BD \u00E2\u0088\u0097 , \u00C2\u00B5\u00E2\u0088\u0097l , \u00CF\u0086\u00E2\u0088\u0097m , l = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } be the optimal solution; then KarushKuhn-Tucker (KKT) conditions [1] state that \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00C2\u00B5\u00E2\u0088\u0097l \u00E2\u0089\u00A5 0, \u00CF\u0086\u00E2\u0088\u0097m \u00E2\u0089\u00A5 0 (A.1) M \u00CE\u00BD\u00E2\u0088\u0097 s\u00E2\u0088\u0097(1) m \u00E2\u0088\u0092S =0 (A.2) m=1 M \u00C2\u00B5\u00E2\u0088\u0097l CR th s\u00E2\u0088\u0097(1) m fl,m \u00E2\u0088\u0092 Il m=1 \u00E2\u0088\u0097 \u00E2\u0088\u0097(1) \u00CF\u0086m sm = \u00E2\u0088\u0092 (A.3) 0 (A.4) L 1 Nm + =0 CR \u00C2\u00B5\u00E2\u0088\u0097l fl,m \u00E2\u0088\u0092 \u00CF\u0086\u00E2\u0088\u0097m = 0 \u00E2\u0088\u0097 \u00E2\u0088\u0097(1) sm +\u00CE\u00BD + (A.5) l=1 \u00E2\u0088\u0097(1) in addition, the optimal values {sm , \u00CE\u00BD \u00E2\u0088\u0097 , \u00C2\u00B5\u00E2\u0088\u0097l , \u00CF\u0086\u00E2\u0088\u0097m , l = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , L, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } need to satisfy (3.3)-(3.5). Equation (A.5) is obtained by setting \u00E2\u0088\u0082F \u00E2\u0088\u0082sm = 0 where F is the Lagrangian in (3.6). \u00E2\u0088\u0097(1) Solving for sm from (A.5), we obtain s\u00E2\u0088\u0097(1) m = 1 L l=1 CR \u00C2\u00B5\u00E2\u0088\u0097l fl,m + \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CF\u0086\u00E2\u0088\u0097m 189 \u00E2\u0088\u0092 Nm (A.6) \u000C\u00E2\u0088\u0097(1) Since sm \u00E2\u0089\u00A5 0, from (A.6), we have 1 L l=1 When Nm \u00E2\u0089\u00A4 L l=1 1 CR +\u00CE\u00BD \u00E2\u0088\u0097 , \u00C2\u00B5\u00E2\u0088\u0097l fl,m CR \u00C2\u00B5\u00E2\u0088\u0097l fl,m + \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CF\u0086\u00E2\u0088\u0097m L l=1 1 CR +\u00CE\u00BD \u00E2\u0088\u0097 , \u00C2\u00B5\u00E2\u0088\u0097l fl,m 1 L l=1 CR \u00C2\u00B5\u00E2\u0088\u0097l fl,m + \u00CE\u00BD\u00E2\u0088\u0097 \u00E2\u0088\u0092 Nm (A.8) from (A.7), we have 1 L l=1 (A.7) it follows from (A.7) that \u00CF\u0086\u00E2\u0088\u0097m = 0. Thus from (A.6), we have s\u00E2\u0088\u0097(1) m = When Nm > \u00E2\u0089\u00A5 Nm CR + \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CF\u0086\u00E2\u0088\u0097m \u00C2\u00B5\u00E2\u0088\u0097l fl,m \u00E2\u0089\u00A5 Nm > 1 L l=1 CR + \u00CE\u00BD\u00E2\u0088\u0097 \u00C2\u00B5\u00E2\u0088\u0097l fl,m (A.9) \u00E2\u0088\u0097(1) It follows from (A.9) that \u00CF\u0086\u00E2\u0088\u0097m > 0. Based on (A.4), we must have sm = 0. Together with (A.8), we have (3.7). A.2 Solution for OP3 The Lagrangian [1] can be written as \u00EF\u00A3\u00B6 \u00EF\u00A3\u00AB F =\u00E2\u0088\u0092 log2 1 + m\u00E2\u0088\u0088M+ l sm +\u00CF\u0081 \u00EF\u00A3\u00AD Nm CR sm fm \u00E2\u0088\u0092 Ilth \u00EF\u00A3\u00B8\u00E2\u0088\u0092 m\u00E2\u0088\u0088M+ l \u00CE\u00B3m sm + m\u00E2\u0088\u0088M+ l m\u00E2\u0088\u0088M+ l \u00CE\u00B1m (sm \u00E2\u0088\u0092\u00CE\u00BB+Nm ) (A.10) where \u00CF\u0081, and \u00CE\u00B3m , \u00CE\u00B1m , m \u00E2\u0088\u0088 M+ l are Lagrange multipliers. \u00E2\u0088\u0097(3) \u00E2\u0088\u0097 \u00E2\u0088\u0097 , m \u00E2\u0088\u0088 M+ , \u00CE\u00B1m Let {sm , \u00CF\u0081\u00E2\u0088\u0097 , \u00CE\u00B3m l } be the optimal solution; then KKT conditions [1] state 190 \u000Cthat \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CF\u0081\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CE\u00B3m \u00E2\u0089\u00A5 0, \u00CE\u00B1m \u00E2\u0089\u00A50 \u00EF\u00A3\u00AB \u00EF\u00A3\u00B6 (A.11) \u00CF\u0081\u00E2\u0088\u0097 \u00EF\u00A3\u00AD (A.12) CR th \u00EF\u00A3\u00B8 s\u00E2\u0088\u0097(3) = 0, l \u00E2\u0088\u0088 L m fm \u00E2\u0088\u0092 Il m\u00E2\u0088\u0088M+ l \u00E2\u0088\u0097 \u00E2\u0088\u0097(3) \u00CE\u00B3m sm = 0 (A.13) \u00E2\u0088\u0097 \u00CE\u00B1m (s\u00E2\u0088\u0097(3) m \u00E2\u0088\u0092 \u00CE\u00BB + Nm ) = 0 (A.14) \u00E2\u0088\u0092 1 Nm + \u00E2\u0088\u0097(3) sm CR \u00E2\u0088\u0097 \u00E2\u0088\u0097 + \u00CF\u0081\u00E2\u0088\u0097 fm \u00E2\u0088\u0092 \u00CE\u00B3m + \u00CE\u00B1m =0 (A.15) \u00E2\u0088\u0097(3) \u00E2\u0088\u0097 \u00E2\u0088\u0097 in addition, the optimal values {sm , \u00CF\u0081\u00E2\u0088\u0097 , \u00CE\u00B3m , \u00CE\u00B1m , m \u00E2\u0088\u0088 M+ l } need to satisfy (3.13)-(3.14). Equation (A.15) is obtained by setting \u00E2\u0088\u0097(3) Solving for sm \u00E2\u0088\u0082F \u00E2\u0088\u0082sm = 0, where F is given in (A.10). from (A.15), we obtain s\u00E2\u0088\u0097(3) m = CR \u00CF\u0081\u00E2\u0088\u0097 fm Now, we consider the cases when 1 CR \u00CF\u0081 \u00E2\u0088\u0097 fm 1 \u00E2\u0088\u0092 Nm \u00E2\u0088\u0097 + \u00CE\u00B1\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B3m m < N m , Nm \u00E2\u0089\u00A4 1 CR \u00CF\u0081 \u00E2\u0088\u0097 fm (A.16) \u00E2\u0089\u00A4 \u00CE\u00BB, and 1 CR \u00CF\u0081 \u00E2\u0088\u0097 fm > \u00CE\u00BB in the following. (1) 1 CR \u00CF\u0081 \u00E2\u0088\u0097 fm \u00E2\u0088\u0097(3) < Nm . Since sm \u00E2\u0089\u00A5 0, from (A.16), we have CR \u00CF\u0081 \u00E2\u0088\u0097 fm 1 \u00E2\u0089\u00A5 Nm . \u00E2\u0088\u0097 + \u00CE\u00B1\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B3m m From (A.17) and the condition that Nm > CR \u00CF\u0081\u00E2\u0088\u0097 fm 1 CR , \u00CF\u0081\u00E2\u0088\u0097 fm (A.17) we have 1 1 > \u00E2\u0088\u0097 CR . \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B3m + \u00CE\u00B1m \u00CF\u0081 fm (A.18) \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 > 0. From (A.13), < 0. Together with (A.11), we must have \u00CE\u00B3m + \u00CE\u00B1m Thus, we have \u00E2\u0088\u0092\u00CE\u00B3m \u00E2\u0088\u0097(3) we obtain sm = 0. 191 \u000C1 CR \u00CF\u0081\u00E2\u0088\u0097 fm (2) Nm \u00E2\u0089\u00A4 \u00E2\u0088\u0097(3) \u00E2\u0089\u00A4 \u00CE\u00BB. Because 0 \u00E2\u0089\u00A4 sm \u00E2\u0089\u00A4 \u00CE\u00BB \u00E2\u0088\u0092 Nm , from (A.16), we get 0\u00E2\u0089\u00A4 1 \u00E2\u0088\u0092 Nm \u00E2\u0089\u00A4 \u00CE\u00BB \u00E2\u0088\u0092 N m CR \u00E2\u0088\u0092 \u00CE\u00B3 \u00E2\u0088\u0097 + \u00CE\u00B1\u00E2\u0088\u0097 \u00CF\u0081 \u00E2\u0088\u0097 fm m m From (A.19) and the condition Nm \u00E2\u0089\u00A4 1 CR \u00CF\u0081 \u00E2\u0088\u0097 fm 1 CR \u00CF\u0081\u00E2\u0088\u0097 fm = (A.19) \u00E2\u0089\u00A4 \u00CE\u00BB, we have CR \u00CF\u0081\u00E2\u0088\u0097 fm 1 \u00E2\u0088\u0097 + \u00CE\u00B1\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B3m m (A.20) \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 Thus, we have \u00E2\u0088\u0092\u00CE\u00B3m + \u00CE\u00B1m = 0. From (A.13) and (A.14), \u00CE\u00B3m and \u00CE\u00B1m cannot be positive at \u00E2\u0088\u0097 \u00E2\u0088\u0097 the same time. Together with (A.11), we must have \u00CE\u00B3m = 0 and \u00CE\u00B1m = 0. From (A.16), we \u00E2\u0088\u0097(3) obtain sm = (3) 1 CR \u00CF\u0081 \u00E2\u0088\u0097 fm 1 CR \u00CF\u0081\u00E2\u0088\u0097 fm \u00E2\u0088\u0092 Nm . \u00E2\u0088\u0097(3) > \u00CE\u00BB. Because sm < \u00CE\u00BB \u00E2\u0088\u0092 Nm , from (A.16), we get CR \u00CF\u0081\u00E2\u0088\u0097 fm 1 \u00E2\u0088\u0092 Nm < \u00CE\u00BB \u00E2\u0088\u0092 N m \u00E2\u0088\u0097 + \u00CE\u00B1\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B3m m From (A.21) and the condition that \u00CE\u00BB < CR \u00CF\u0081 \u00E2\u0088\u0097 fm 1 CR , \u00CF\u0081\u00E2\u0088\u0097 fm (A.21) we have 1 1 < \u00E2\u0088\u0097 CR \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CF\u0081 fm \u00E2\u0088\u0092 \u00CE\u00B3m + \u00CE\u00B1m (A.22) \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 Thus, we get \u00E2\u0088\u0092\u00CE\u00B3m + \u00CE\u00B1m > 0. It follows from (A.11) that \u00CE\u00B1m > 0. From (A.14), we must \u00E2\u0088\u0097(3) have sm = \u00CE\u00BB \u00E2\u0088\u0092 Nm . Summarize the three cases, we have s\u00E2\u0088\u0097(3) m = Substituting 1 \u00CF\u0081\u00E2\u0088\u0097 \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 CR , \u00CF\u00811\u00E2\u0088\u0097 < Nm fm 1 CR CR \u00E2\u0089\u00A4 \u00CF\u00811\u00E2\u0088\u0097 \u00E2\u0089\u00A4 \u00CE\u00BBfm , N m fm CR \u00E2\u0088\u0092 Nm \u00CF\u0081\u00E2\u0088\u0097 fm \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 CR \u00EF\u00A3\u00B3 \u00CE\u00BB \u00E2\u0088\u0092 Nm < \u00CF\u00811\u00E2\u0088\u0097 , \u00CE\u00BBfm with \u00CE\u00B2, we obtain (3.15). 192 (A.23) \u000CReferences [1] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University Press, 2004. 193 \u000CAppendix B Proofs of Theorems in Chapter 6 B.1 Proof for Theorem 3.1 In Problem OP2, if we relax constraint (6.6) to allow atk,m to take on a real value in [0, 1], t t and use the transformation r\u00CB\u0086k,m = atk,m rk,m , the following convex optimization problem is obtained U OP \u00E2\u0088\u0092 B1 : K M mint t ak,m ,\u00CB\u0086 rk,m t r \u00CB\u0086k,m t atk,m (2 ak,m \u00E2\u0088\u0092 1) t=1 k=1 m=1 \u00CE\u0093\u00CF\u008302 t gk,m (B.1) subject to K atk,m \u00E2\u0088\u0092 1 = 0 k=1 U Rkt,REQ \u00E2\u0088\u0092 M t r\u00CB\u0086k,m = 0 t=1 m=1 t r\u00CB\u0086k,m \u00E2\u0088\u0092 RM AX atk,m Functions atk,m (2 (B.3) \u00E2\u0089\u00A4 0 (B.4) t \u00E2\u0088\u0092\u00CB\u0086 rk,m \u00E2\u0089\u00A4 0 (B.5) atk,m \u00E2\u0088\u0092 1 \u00E2\u0089\u00A4 0, m \u00E2\u0088\u0088 Mt (B.6) \u00E2\u0088\u0092atk,m \u00E2\u0089\u00A4 0, m \u00E2\u0088\u0088 Mt (B.7) \u00C2\u00AFt . atk,m = 0, m \u00E2\u0088\u0088 M t r \u00CB\u0086k,m at k,m (B.2) (B.8) t in (B.1) are convex functions in convex set C = {atk,m \u00E2\u0088\u0088 \u00E2\u0088\u00921)\u00CE\u0093\u00CF\u008302 /gk,m t [0, 1], r\u00CB\u0086k,m \u00E2\u0088\u0088 [0, RM AX atk,m ]}, because the Hessian matrix of each function is positive semidef- 194 \u000Cinite [1] throughout C. The functions in the LHS of (B.2) to (B.8) are affine. The Lagrangian [2, 3] for OP-B1 can be written as U K M atk,m (2 L = t r \u00CB\u0086k,m at k,m t=1 k=1 m=1 K + \u00CE\u0093\u00CF\u0083 2 \u00E2\u0088\u0092 1) t 0 + gk,m U M K t \u00CE\u00B3m t=1 m=1 atk,m \u00E2\u0088\u0092 1 k=1 M Rkt,REQ \u00E2\u0088\u0092 \u00CE\u00BBk U t r\u00CB\u0086k,m t=1 m=1 k=1 U K U M \u00C2\u00B5tk,m + t r\u00CB\u0086k,m \u00E2\u0088\u0092 RM AX atk,m M t t r\u00CB\u0086k,m \u00CE\u00B6k,m \u00E2\u0088\u0092 t=1 k=1 m=1 t=1 k=1 m=1 U K M U K M \u00CF\u0086tk,m (atk,m \u00E2\u0088\u0092 1) \u00E2\u0088\u0092 + K t=1 k=1 m=1 t \u00CE\u00B2k,m atk,m (B.9) t=1 k=1 m=1 t t t , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } are where {\u00CE\u00B3m , \u00CE\u00BBk , \u00C2\u00B5tk,m , \u00CE\u00B6k,m , \u00CF\u0086tk,m , \u00CE\u00B2k,m the Lagrange multipliers. \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 Let {atk,m , r\u00CB\u0086k,m , \u00CE\u00B3m , \u00CE\u00BB\u00E2\u0088\u0097k , \u00C2\u00B5tk,m , \u00CE\u00B6k,m , \u00CF\u0086tk,m , \u00CE\u00B2k,m , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } be an optimal solution. Then the Karush-Kuhn-Tucker (KKT) conditions state that [3] t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00CE\u00B3m \u00E2\u0089\u00A5 0, \u00CE\u00BB\u00E2\u0088\u0097k \u00E2\u0089\u00A5 0, \u00C2\u00B5tk,m \u00E2\u0089\u00A5 0, \u00CE\u00B6k,m \u00E2\u0089\u00A5 0, \u00CF\u0086tk,m \u00E2\u0089\u00A5 0, \u00CE\u00B2k,m \u00E2\u0089\u00A50 (B.10) K \u00E2\u0088\u0097 atk,m \u00E2\u0088\u0092 1) = 0 t \u00E2\u0088\u0097 \u00CE\u00B3m ( (B.11) k=1 U \u00CE\u00BBk (RkU,REQ M \u00E2\u0088\u0092 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00C2\u00B5tk,m (\u00CB\u0086 rk,m \u00E2\u0088\u0092 t \u00E2\u0088\u0097 r\u00CB\u0086k,m )=0 t=1 m=1 \u00E2\u0088\u0097 RM AX atk,m ) (B.12) =0 (B.13) t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00CE\u00B6k,m r\u00CB\u0086k,m = 0 (B.14) \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CF\u0086tk,m (atk,m \u00E2\u0088\u0092 1) = 0 (B.15) t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00CE\u00B2k,m ak,m = 0 (B.16) \u00CE\u0093\u00CF\u008302 2 t gk,m \u00CE\u0093\u00CF\u008302 t gk,m t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m 2 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 =0 \u00E2\u0088\u0092 \u00CE\u00B6k,m ln(2) \u00E2\u0088\u0092 \u00CE\u00BB\u00E2\u0088\u0097k + \u00C2\u00B5tk,m t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m \u00E2\u0088\u00921\u00E2\u0088\u00922 t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m t \u00E2\u0088\u0097 r\u00CB\u0086k,m ln(2) t \u00E2\u0088\u0097 ak,m (B.17) t \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 = 0 .(B.18) \u00E2\u0088\u0092 \u00CE\u00B2k,m + \u00CF\u0086tk,m \u00E2\u0088\u0092 RM AX \u00C2\u00B5tk,m + \u00CE\u00B3m 195 \u000C\u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 In addition, the optimal values {atk,m , r\u00CB\u0086k,m , \u00CE\u00B3m , \u00CE\u00BB\u00E2\u0088\u0097k , \u00C2\u00B5tk,m , \u00CE\u00B6k,m , \u00CF\u0086tk,m , \u00CE\u00B2k,m , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , U, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } need to satisfy (B.2)-(B.8). Equations (B.17) and (B.18) are obtained by setting \u00E2\u0088\u0082L t \u00E2\u0088\u0082 r\u00CB\u0086k,m = 0 and \u00E2\u0088\u0082L \u00E2\u0088\u0082atk,m = 0, respectively. \u00E2\u0088\u0097 From (B.17), when atk,m = 0, we have \u00E2\u0088\u0097 t \u00E2\u0088\u0097 = atk,m log2 r\u00CB\u0086k,m Now, we consider the cases when 2 RM AX \u00CE\u0093\u00CF\u00830 t gk,m 2 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t (\u00CE\u00BB\u00E2\u0088\u0097k + \u00CE\u00B6k,m \u00E2\u0088\u0092 \u00C2\u00B5tk,m )gk,m ln(2)\u00CE\u0093\u00CF\u008302 \u00CE\u00BB\u00E2\u0088\u0097k ln(2) < \u00CE\u0093\u00CF\u008302 \u00CE\u0093\u00CF\u008302 , t t gk,m gk,m \u00E2\u0089\u00A4 \u00CE\u00BB\u00E2\u0088\u0097k ln(2) . (B.19) \u00E2\u0089\u00A4 2R M AX \u00CE\u0093\u00CF\u008302 , t gk,m \u00CE\u00BB\u00E2\u0088\u0097k ln(2) and > in the following. \u00CE\u00BB\u00E2\u0088\u0097k ln(2) (1) Case \u00CE\u0093\u00CF\u008302 : t gk,m < t \u00E2\u0088\u0097 from (B.19) and the fact that r\u00CB\u0086k,m \u00E2\u0089\u00A5 0, we obtain 1. This together with the condition \u00CE\u00BB\u00E2\u0088\u0097k ln(2) < \u00CE\u0093\u00CF\u008302 t gk,m t \u00E2\u0088\u0097 \u00E2\u0088\u0092\u00C2\u00B5t \u00E2\u0088\u0097 )g t (\u00CE\u00BB\u00E2\u0088\u0097k +\u00CE\u00B6k,m k,m k,m ln(2)\u00CE\u0093\u00CF\u008302 \u00E2\u0089\u00A5 , yields t \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CE\u00B6k,m \u00E2\u0088\u0092 \u00C2\u00B5tk,m >0. (B.20) \u00E2\u0088\u0097 t \u00E2\u0088\u0097 From (B.10), (B.13) and (B.14), \u00C2\u00B5tk,m and \u00CE\u00B6k,m are both nonnegative and cannot be both \u00E2\u0088\u0097 t \u00E2\u0088\u0097 positive; using (B.20), we must have \u00C2\u00B5tk,m = 0 and \u00CE\u00B6k,m > 0. Then, from (B.14), we must t \u00E2\u0088\u0097 have r\u00CB\u0086k,m = 0. (2) Case \u00CE\u0093\u00CF\u008302 t gk,m we have 1 \u00E2\u0089\u00A4 2R M AX \u00CE\u0093\u00CF\u008302 , t gk,m \u00CE\u00BB\u00E2\u0088\u0097k ln(2) \u00E2\u0089\u00A4 \u00E2\u0089\u00A4 2R M AX t \u00E2\u0088\u0097 \u00E2\u0088\u0092\u00C2\u00B5t \u00E2\u0088\u0097 )g t (\u00CE\u00BB\u00E2\u0088\u0097k +\u00CE\u00B6k,m k,m k,m ln(2)\u00CE\u0093\u00CF\u008302 \u00CE\u0093\u00CF\u008302 : t gk,m \u00E2\u0089\u00A4 2R t \u00E2\u0088\u0097 \u00E2\u0088\u0097 from (B.19) and the fact that 0 \u00E2\u0089\u00A4 r\u00CB\u0086k,m \u00E2\u0089\u00A4 RM AX atk,m , M AX . This together with the condition \u00CE\u0093\u00CF\u008302 t gk,m \u00E2\u0089\u00A4 \u00CE\u00BB\u00E2\u0088\u0097k ln(2) \u00E2\u0089\u00A4 yields t \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CE\u00B6k,m \u00E2\u0088\u0092 \u00C2\u00B5tk,m =0. (B.21) \u00E2\u0088\u0097 t \u00E2\u0088\u0097 Since \u00C2\u00B5tk,m and \u00CE\u00B6k,m are both nonnegative and cannot be both positive; using (B.21), we \u00CE\u00BB\u00E2\u0088\u0097 g t k k,m \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 must have \u00C2\u00B5tk,m = 0 and \u00CE\u00B6k,m = 0. Then it follows from (B.19) that r\u00CB\u0086k,m = atk,m log2 ( ln(2)\u00CE\u0093\u00CF\u0083 2 ). 0 (3) Case \u00CE\u00BB\u00E2\u0088\u0097k ln(2) t \u00E2\u0088\u0097 \u00E2\u0088\u0092\u00C2\u00B5t \u00E2\u0088\u0097 )g t (\u00CE\u00BB\u00E2\u0088\u0097k +\u00CE\u00B6k,m k,m k,m ln(2)\u00CE\u0093\u00CF\u008302 > M AX \u00CE\u0093\u00CF\u0083 2 0 2R : t gk,m \u00E2\u0089\u00A4 2R M AX from (B.19) and the fact that . This together with the condition t \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CE\u00B6k,m \u00E2\u0088\u0092 \u00C2\u00B5tk,m <0. 196 t \u00E2\u0088\u0097 r\u00CB\u0086k,m \u00CE\u00BB\u00E2\u0088\u0097k ln(2) \u00E2\u0089\u00A4 \u00E2\u0088\u0097 RM AX atk,m , > 2R M AX \u00CE\u0093\u00CF\u008302 , t gk,m we obtain yields (B.22) \u000C\u00E2\u0088\u0097 t \u00E2\u0088\u0097 Since \u00C2\u00B5tk,m and \u00CE\u00B6k,m are both nonnegative and cannot be both positive; using (B.22), we \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 must have \u00C2\u00B5tk,m > 0 and \u00CE\u00B6k,m = 0. Then, from (B.13), we must have r\u00CB\u0086k,m = RM AX atk,m . t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 Combining the three cases, and since rk,m = r\u00CB\u0086k,m /atk,m , the optimal bit allocation for \u00E2\u0088\u0097 CRU k for subchannels with atk,m > 0 is thus given by t \u00E2\u0088\u0097 rk,m \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 t \u00CE\u00BB\u00E2\u0088\u0097k gk,m = log2 ln(2)\u00CE\u0093\u00CF\u0083 , 2 \u00EF\u00A3\u00B4 0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 RM AX , \u00CE\u00BB\u00E2\u0088\u0097k ln(2) < \u00CE\u0093\u00CF\u008302 t gk,m \u00CE\u0093\u00CF\u008302 t gk,m \u00E2\u0089\u00A4 \u00CE\u00BB\u00E2\u0088\u0097k ln(2) \u00CE\u00BB\u00E2\u0088\u0097k ln(2) > 2R \u00E2\u0089\u00A4 2R M AX \u00CE\u0093\u00CF\u008302 t gk,m (B.23) M AX \u00CE\u0093\u00CF\u008302 t gk,m . From (B.23) and (6.1), we obtain the optimal power allocation for CRU k for subchannels \u00E2\u0088\u0097 with atk,m > 0 as \u00E2\u0088\u0097 stk,m = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 \u00E2\u0088\u0097 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 \u00CE\u00BBk ln(2) (2R \u00E2\u0088\u0092 M AX \u00CE\u0093\u00CF\u008302 , t gk,m \u00E2\u0088\u00921)\u00CE\u0093\u00CF\u008302 t gk,m , \u00CE\u00BB\u00E2\u0088\u0097k ln(2) < \u00CE\u0093\u00CF\u008302 t gk,m \u00CE\u0093\u00CF\u008302 t gk,m \u00E2\u0089\u00A4 \u00CE\u00BB\u00E2\u0088\u0097k ln(2) \u00CE\u00BB\u00E2\u0088\u0097k ln(2) > 2R \u00E2\u0089\u00A4 2R M AX \u00CE\u0093\u00CF\u008302 (B.24) t gk,m M AX \u00CE\u0093\u00CF\u008302 t gk,m . In (B.24), \u00CE\u00BB\u00E2\u0088\u0097k / ln(2) can be interpreted as the water level for CRU k. t \u00E2\u0088\u0097 r \u00CB\u0086k,m Substituting (B.23) into (B.18) and noting that \u00CE\u00BB\u00E2\u0088\u0097k = \u00E2\u0088\u0097 \u00CE\u0093\u00CF\u008302 atk,m 2 t gk,m \u00E2\u0088\u0097 t \u00E2\u0088\u0097 ln(2) + \u00C2\u00B5tk,m \u00E2\u0088\u0092 \u00CE\u00B6k,m from (B.17), we have t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 htk,m \u00E2\u0088\u0092 \u00CE\u00B3m \u00E2\u0088\u0092 \u00CF\u0086tk,m + \u00CE\u00B2k,m =0 (B.25) where htk,m \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 t \u00CE\u00BB\u00E2\u0088\u0097k gk,m \u00CE\u00BB\u00E2\u0088\u0097k \u00CE\u0093\u00CF\u0083 2 = \u00CE\u00BB\u00E2\u0088\u0097k log2 ln(2)\u00CE\u0093\u00CF\u0083 \u00E2\u0088\u0092 ln(2) \u00E2\u0088\u0092 gt 0 , 2 \u00EF\u00A3\u00B4 0 k,m \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 2 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 \u00CE\u00BB\u00E2\u0088\u0097 RM AX \u00E2\u0088\u0092 (2RM AX \u00E2\u0088\u0092 1) \u00CE\u0093\u00CF\u0083 0 , k gt k,m \u00CE\u00BB\u00E2\u0088\u0097k ln(2) < \u00CE\u0093\u00CF\u008302 t gk,m \u00CE\u0093\u00CF\u008302 t gk,m \u00E2\u0089\u00A4 \u00CE\u00BB\u00E2\u0088\u0097k ln(2) \u00CE\u00BB\u00E2\u0088\u0097k ln(2) > 2R \u00E2\u0089\u00A4 2R M AX \u00CE\u0093\u00CF\u008302 t gk,m (B.26) M AX \u00CE\u0093\u00CF\u008302 t gk,m \u00E2\u0088\u0097 \u00E2\u0088\u0097 Suppose that atk,m > 0 for CRUs k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC , C > 1. Constraint (B.2) implies atk,m < \u00E2\u0088\u0097 t \u00E2\u0088\u0097 1, k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC . From (B.15) and (B.16), we have \u00CF\u0086tk,m = 0 and \u00CE\u00B2k,m = 0. Then, from 197 \u000Ct \u00E2\u0088\u0097 (B.25), we conclude that htk,m = \u00CE\u00B3m , k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC , i.e. htk1 ,m = htk2 ,m = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = htkC ,m . From (B.26), unless \u00CE\u00BB\u00E2\u0088\u0097k ln(2) < \u00CE\u0093\u00CF\u008302 , t gk,m (B.27) it is highly unlikely that any of the two htk,m will be equal t t since htk,m is a function of gk,m , and {gk,m , k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC } are outcomes of independent, real-valued random variables. We conclude that for any given time slot t and subchannel m \u00E2\u0088\u0088 M, there is only one CRU, say CRU k , that has a non-zero value and atk \u00E2\u0088\u0097,m = 1 from (B.2). In the following, we will show how to find this CRU k . \u00E2\u0088\u0097 Since atk \u00E2\u0088\u0097,m = 1, from (B.15) and (B.16), we obtain \u00CF\u0086tk \u00E2\u0088\u0097,m \u00E2\u0089\u00A5 0 and \u00CE\u00B2kt ,m = 0, respectively. Then from (B.25), we have t \u00E2\u0088\u0097 \u00CE\u00B3m = htk ,m \u00E2\u0088\u0092 \u00CF\u0086tk \u00E2\u0088\u0097,m . (B.28) \u00E2\u0088\u0097 \u00E2\u0088\u0097 For CRUs that k = k , since atk,m = 0, from (B.15) and (B.16), we obtain \u00CF\u0086tk,m = 0 and t \u00E2\u0088\u0097 \u00CE\u00B2k,m \u00E2\u0089\u00A5 0, respectively. Then from (B.25), we have t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00CE\u00B3m = htk,m + \u00CE\u00B2k,m . (B.29) From (B.28), (B.29), and (B.10), we obtain htk ,m \u00E2\u0089\u00A5 htk,m . (B.30) As mentioned earlier, it is highly unlikely that any two htk,m will be equal, so we conclude that the subchannel allocation strategy for subchannel m at time slot t should be \u00E2\u0088\u0097 = 1, k = k \u00E2\u0088\u0097 and m \u00E2\u0088\u0088 Mt atk,m \u00E2\u0088\u0097 = 0, otherwise atk,m 198 (B.31) \u000Cwhere k \u00E2\u0088\u0097 = argmaxk htk,m . (B.32) In the unlikely event that for a given t and m, the htk,m values are equal for several users, \u00E2\u0088\u0097 we arbitrarily set atk,m to be 1 for one of the users and 0 for all the others. We now complete the proof of Theorem 3.1. Suppose that the set of {\u00CE\u00BBk , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} which allows the user rates {RkU,REQ , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} to be achieved is {\u00CE\u00BB\u00E2\u0088\u0097k , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}. It follows from (6.15) and (B.23) that U RkU,REQ = t=1 \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, M \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 \u00E2\u0088\u0097 log2 atk,m \u00EF\u00A3\u00B4 m=1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 RM AX , t \u00CE\u00BBk gk,m , ln(2)\u00CE\u0093\u00CF\u008302 \u00CE\u00BBk ln(2) < \u00CE\u0093\u00CF\u008302 t gk,m \u00CE\u0093\u00CF\u008302 t gk,m \u00E2\u0089\u00A4 \u00CE\u00BBk ln(2) \u00CE\u00BBk ln(2) > 2R \u00E2\u0089\u00A4 M AX 2R \u00CE\u0093\u00CF\u008302 t gk,m M AX \u00CE\u0093\u00CF\u008302 t gk,m (B.33) . Let the probability that a given subchannel is assigned to CRU k be pk . Assume that t the probability that the power gain of the assigned channel satisfies \u00CE\u0093\u00CF\u008302 /gk,m \u00E2\u0089\u00A4 \u00CE\u00BBk / ln(2) \u00E2\u0089\u00A4 2R M AX t t \u00CE\u0093\u00CF\u008302 /gk,m , i.e. \u00CE\u0093\u00CF\u008302 ln(2)/\u00CE\u00BBk \u00E2\u0089\u00A4 gk,m \u00E2\u0089\u00A4 2R M AX \u00CE\u0093\u00CF\u008302 ln(2)/\u00CE\u00BBk , is pak , and let the mean of \u00C2\u00AF k . Suppose that the probability that the power gain of log2 (Gtk,m ) for such subchannels be G the assigned channel satisfies \u00CE\u00BBk / ln(2) > 2R RkU,REQ M AX t \u00CE\u0093\u00CF\u008302 /gk,m is pbk . As m(1, U ) \u00E2\u0086\u0092 \u00E2\u0088\u009E, we have log2 = M AX 2 ln(2) 2 ln(2) 2R \u00CE\u0093\u00CF\u00830 \u00CE\u0093\u00CF\u00830 t \u00E2\u0088\u0097 =1 \u00E2\u0089\u00A4gk,m \u00E2\u0089\u00A4 ,atk,m \u00CE\u00BBk \u00CE\u00BBk t \u00CE\u00BBk gk,m ln(2)\u00CE\u0093\u00CF\u008302 RM AX + t gk,m > 2R M AX 2 ln(2) \u00CE\u0093\u00CF\u00830 \u00E2\u0088\u0097 =1 ,atk,m \u00CE\u00BBk = m(1, U )pk pak log2 \u00CE\u00BBk ln(2)\u00CE\u0093\u00CF\u008302 t log2 (gk,m ) + 2 ln(2) \u00CE\u0093\u00CF\u00830 2R t \u00E2\u0089\u00A4gk,m \u00E2\u0089\u00A4 \u00CE\u00BBk M AX 2 ln(2) \u00CE\u0093\u00CF\u00830 \u00E2\u0088\u0097 =1 ,atk,m \u00CE\u00BBk +m(1, U )pk pbk RM AX = m(1, U ) pk pak log2 \u00CE\u00BBk ln(2)\u00CE\u0093\u00CF\u008302 199 \u00C2\u00AF k + pk pbk RM AX + pk pak G (B.34) \u000CRewriting (B.34), we have RkU,REQ = pk pak log2 m(1, U ) \u00CE\u00BBk ln(2)\u00CE\u0093\u00CF\u008302 \u00C2\u00AF k + pk pb RM AX + pk pak G k (B.35) At time t, the optimal number of bits allocated to CRU k is M M \u00E2\u0088\u0097 t \u00E2\u0088\u0097 rk,m atk,m \u00E2\u0088\u0097 atk,m = t \u00E2\u0088\u0097 gk,m stk,m 1+ \u00CE\u0093\u00CF\u008302 log2 m=1 m=1 . (B.36) As mCR,t \u00E2\u0086\u0092 \u00E2\u0088\u009E and using the same subchannel assignment strategy as in (B.31), the probability of a subchannel being assigned to CRU k, the probability that the power gain of the assigned channel satisfies \u00CE\u00BBk / ln(2) > 2R M AX t , the probability that the power gain \u00CE\u0093\u00CF\u008302 /gk,m t of the assigned channel satisfies \u00CE\u0093\u00CF\u008302 /gk,m \u00E2\u0089\u00A4 \u00CE\u00BBk / ln(2) \u00E2\u0089\u00A4 2R M AX t \u00CE\u0093\u00CF\u008302 /gk,m and the mean of t \u00C2\u00AF k , respectively. Using a similar log2 (gk,m ) of these subchannels are given by pk , pbk , pak , and G procedure to that leading to (B.33),(B.34) and (B.35), we obtain M m=1 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 atk,m rk,m mCR,t = pk pak log2 \u00CE\u00BBk ln(2)\u00CE\u0093\u00CF\u008302 \u00C2\u00AF k + pk pb RM AX . + pk pak G k (B.37) Finally, from (B.35) and (B.37), we have M \u00E2\u0088\u0097 t \u00E2\u0088\u0097 atk,m rk,m = RkU,REQ m=1 B.2 mCR,t . m(1, U ) (B.38) Proof for Theorem 4.1 In Problem OP7, if we relax constraint (6.30) to allow ak,m to be a real value in [0, 1], and replace rk,m by r\u00CB\u0086k,m = ak,m rk,m , the following convex optimization problem is obtained K OP \u00E2\u0088\u0092 B2 : min ak,m ,\u00CB\u0086 rk,m ,nk ,pk 200 (wk nk \u00E2\u0088\u0092 pk ) k=1 (B.39) \u000Csubject to K M \u00CE\u0093\u00CF\u008302 \u00E2\u0088\u0092S \u00E2\u0089\u00A4 0 gk,m (B.40) ak,m \u00E2\u0088\u0092 1 = 0 (B.41) r\u00CB\u0086k,m r\u00CB\u0086k,m \u00E2\u0089\u00A4 0, \u00E2\u0088\u0092 RM AX \u00E2\u0089\u00A4 0 ak,m ak,m (B.42) ak,m 2 r \u00CB\u0086k,m ak,m \u00E2\u0088\u00921 k=1 m=1 K ak,m \u00E2\u0088\u0092 1 \u00E2\u0089\u00A4 0, \u00E2\u0088\u0092ak,m \u00E2\u0089\u00A4 0, k=1 \u00E2\u0088\u0092 pk \u00E2\u0088\u0092 rkM AX + rkREQ \u00E2\u0089\u00A4 0, k \u00E2\u0088\u0088 {1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } (B.43) M rkREQ \u00E2\u0088\u0092 r\u00CB\u0086k,m \u00E2\u0088\u0092 nk + pk = 0 (B.44) m=1 \u00E2\u0088\u0092pk \u00E2\u0089\u00A4 0, \u00E2\u0088\u0092nk \u00E2\u0089\u00A4 0 . The functions {ak,m (2 r \u00CB\u0086k,m ak,m (B.45) \u00E2\u0088\u0092 1)\u00CE\u0093\u00CF\u008302 /gk,m , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } in (B.40) are convex in convex set C = {ak,m \u00E2\u0088\u0088 [0, 1], r\u00CB\u0086k,m \u00E2\u0088\u0088 [0, RM AX ak,m ]} since the Hessian matrix of each function is positive semidefinite [1] in C. The functions in (B.39), and the LHS of (B.41) to (B.45) are affine. The Lagrangian [3][2] for OP-B2 can be written as K K M k=1 M + m=1 K k=1 m=1 K K ak,m \u00E2\u0088\u0092 1 \u00CF\u0095m \u00C2\u00B5k,m k=1 m=1 K k=1 K + M M \u00CF\u0086k,m (ak,m \u00E2\u0088\u0092 1) \u00E2\u0088\u0092 r\u00CB\u0086k,m \u00E2\u0088\u0092 RM AX ak,m \u00CE\u00B3k (rkREQ \u00E2\u0088\u0092 + M K M \u00E2\u0088\u0092 \u00CE\u00B6k,m k=1 m=1 K r\u00CB\u0086k,m \u00E2\u0088\u0092 nk + pk ) \u00E2\u0088\u0092 m=1 \u00CE\u00B2k,m ak,m k=1 m=1 KRT k=1 m=1 k=1 M + r \u00CB\u0086k,m ak,m 2 ak,m \u00E2\u0088\u0092 1 \u00E2\u0088\u0092 S (wk nk \u00E2\u0088\u0092 pk ) + \u00CE\u00BD L = r\u00CB\u0086k,m + ak,m \u00CE\u00B7k (pk \u00E2\u0088\u0092 rkM AX + rkREQ ) k=1 K \u00CF\u0088k nk \u00E2\u0088\u0092 k=1 \u00CE\u00BEk pk (B.46) k=1 where {\u00CE\u00BD, \u00CF\u0095m , \u00CF\u0086k,m , \u00CE\u00B2k,m , \u00C2\u00B5k,m , \u00CE\u00B6k,m , \u00CE\u00B3k , \u00CF\u0088k , \u00CE\u00BEk , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}, and {\u00CE\u00B7k , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } are the Lagrange multipliers. \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 , \u00C2\u00B5\u00E2\u0088\u0097k,m , \u00CE\u00B6k,m , \u00CE\u00B3k\u00E2\u0088\u0097 , \u00CF\u0088k\u00E2\u0088\u0097 , \u00CE\u00BEk\u00E2\u0088\u0097 , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M, k = Let {a\u00E2\u0088\u0097k,m , r\u00CB\u0086k,m , n\u00E2\u0088\u0097k , p\u00E2\u0088\u0097k , \u00CE\u00BD \u00E2\u0088\u0097 , \u00CF\u0095\u00E2\u0088\u0097m , \u00CF\u0086\u00E2\u0088\u0097k,m , \u00CE\u00B2k,m 201 \u000C1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}, and {\u00CE\u00B7k\u00E2\u0088\u0097 , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } be an optimal solution; then the Karush-KuhnTucker (KKT) conditions state that [3] \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CF\u0095\u00E2\u0088\u0097m \u00E2\u0089\u00A5 0, \u00CE\u00B7k\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CE\u00B3k\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CF\u0088k\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CE\u00BEk\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CF\u0086\u00E2\u0088\u0097k,m \u00E2\u0089\u00A5 0, \u00CE\u00B2k,m \u00E2\u0089\u00A5 0, \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0089\u00A5 0, \u00CE\u00B6k,m \u00E2\u0089\u00A50 K \u00CE\u00BD M \u00E2\u0088\u0097 a\u00E2\u0088\u0097k,m 2 k=1 m=1 K \u00E2\u0088\u0097 \u00CF\u0095m a\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 1 k=1 \u00E2\u0088\u0097 \u00CF\u0086k,m (a\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 1) = 0, \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0097 r \u00CB\u0086k,m a\u00E2\u0088\u0097 k,m \u00E2\u0088\u00921 \u00E2\u0088\u0092S (B.47) =0 =0 (B.49) \u00E2\u0088\u0097 \u00CE\u00B2k,m a\u00E2\u0088\u0097k,m = 0 \u00E2\u0088\u0097 r\u00CB\u0086k,m \u00E2\u0088\u0092 RM AX a\u00E2\u0088\u0097k,m (B.48) \u00E2\u0088\u0097 = 0, \u00CE\u00B6k,m (B.50) \u00E2\u0088\u0097 r\u00CB\u0086k,m =0 a\u00E2\u0088\u0097k,m \u00CE\u00B7k\u00E2\u0088\u0097 (p\u00E2\u0088\u0097k \u00E2\u0088\u0092 rkM AX + rkREQ ) = 0, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT (B.51) (B.52) M \u00CE\u00B3k\u00E2\u0088\u0097 (rkREQ \u00E2\u0088\u0092 \u00E2\u0088\u0097 r\u00CB\u0086k,m \u00E2\u0088\u0092 n\u00E2\u0088\u0097k + p\u00E2\u0088\u0097k ) = 0 (B.53) m=1 \u00CF\u0088k\u00E2\u0088\u0097 n\u00E2\u0088\u0097k = 0 (B.54) \u00CE\u00BEk\u00E2\u0088\u0097 p\u00E2\u0088\u0097k = 0 \u00CE\u00BD \u00E2\u0088\u00972 \u00E2\u0088\u0097 r \u00CB\u0086k,m a\u00E2\u0088\u0097 k,m \u00CE\u0093\u00CF\u0083 2 \u00CE\u00BD\u00E2\u0088\u0097 0 gk,m (B.55) \u00CE\u0093\u00CF\u008302 gk,m ln(2) + \u00E2\u0088\u00921 + 2 \u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B2k,m \u00E2\u0088\u0092 \u00E2\u0088\u0097 r \u00CB\u0086k,m a\u00E2\u0088\u0097 k,m \u00C2\u00B5\u00E2\u0088\u0097k,m a\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 \u00E2\u0088\u0097 \u00CE\u00B6k,m a\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 \u00CE\u00B3k\u00E2\u0088\u0097 = 0 (B.56) r \u00CB\u0086\u00E2\u0088\u0097 \u00E2\u0088\u0097 r\u00CB\u0086k,m ln(2) ak,m \u00E2\u0088\u0097 \u00E2\u0088\u0092 2 k,m \u00E2\u0088\u0097 ak,m + \u00CF\u0095\u00E2\u0088\u0097m + \u00CF\u0086\u00E2\u0088\u0097k,m \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00C2\u00B5\u00E2\u0088\u0097k,m r\u00CB\u0086k,m \u00CE\u00B6k,m r\u00CB\u0086k,m + =0 2 2 a\u00E2\u0088\u0097k,m a\u00E2\u0088\u0097k,m (B.57) wk \u00E2\u0088\u0092 \u00CE\u00B3k\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CF\u0088k\u00E2\u0088\u0097 = 0 (B.58) \u00E2\u0088\u00921 + \u00CE\u00B3k\u00E2\u0088\u0097 + \u00CE\u00B7k\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00BEk\u00E2\u0088\u0097 = 0, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT (B.59) \u00E2\u0088\u00921 + \u00CE\u00B3k\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00BEk\u00E2\u0088\u0097 = 0, k = KRT + 1, KRT + 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K . (B.60) \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 In addition, the optimal values \u00CE\u00BD \u00E2\u0088\u0097 , {a\u00E2\u0088\u0097k,m , r\u00CB\u0086k,m , \u00CF\u0086\u00E2\u0088\u0097k,m , \u00CE\u00B2k,m , \u00C2\u00B5\u00E2\u0088\u0097k,m , \u00CE\u00B6k,m , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}, {n\u00E2\u0088\u0097k , p\u00E2\u0088\u0097k , \u00CE\u00B3k\u00E2\u0088\u0097 , \u00CF\u0088k\u00E2\u0088\u0097 , \u00CE\u00BEk\u00E2\u0088\u0097 , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K}, {\u00CF\u0095\u00E2\u0088\u0097m , m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M }, and {\u00CE\u00B7k\u00E2\u0088\u0097 , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , KRT } need to satisfy (B.40) to (B.45). 202 \u000CEquations (B.56), (B.57), and (B.58) are obtained by setting \u00E2\u0088\u0082L nk \u00E2\u0088\u0082L r\u00CB\u0086k,m \u00E2\u0088\u0082L ak,m = 0, = 0, respectively. Equations (B.59) and (B.60) are obtained by setting \u00E2\u0088\u0082L pk = 0, and = 0 for RT CRUs and NRT CRUs, respectively. It follows from (B.56) that r \u00CB\u0086\u00E2\u0088\u0097 \u00E2\u0088\u0097 k,m \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 \u00CE\u00B6k,m \u00CE\u00B3k\u00E2\u0088\u0097 \u00CE\u0093\u00CF\u008302 a\u00E2\u0088\u0097 k,m = \u00E2\u0088\u0092 2 . \u00CE\u00BD \u00E2\u0088\u0097 a\u00E2\u0088\u0097k,m ln(2) \u00CE\u00BD \u00E2\u0088\u0097 ln(2) gk,m (B.61) \u00E2\u0088\u0097 cannot be both positive, and from (B.47), we From (B.51), we know that \u00C2\u00B5\u00E2\u0088\u0097k,m and \u00CE\u00B6k,m \u00E2\u0088\u0097 \u00E2\u0088\u0097 have to are nonnegative. Hence the values of \u00C2\u00B5\u00E2\u0088\u0097k,m and \u00CE\u00B6k,m know that both \u00C2\u00B5\u00E2\u0088\u0097k,m and \u00CE\u00B6k,m be in one of the following three cases \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00C2\u00B5\u00E2\u0088\u0097k,m > 0, \u00CE\u00B6k,m = 0 or \u00C2\u00B5\u00E2\u0088\u0097k,m = 0, \u00CE\u00B6k,m > 0 or \u00C2\u00B5\u00E2\u0088\u0097k,m = 0, \u00CE\u00B6k,m =0 When \u00CE\u00B3k\u00E2\u0088\u0097 \u00CE\u00BD \u00E2\u0088\u0097 ln(2) < \u00CE\u0093\u00CF\u008302 , gk,m (B.62) \u00E2\u0088\u0097 it follows from (B.61) that \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 \u00CE\u00B6k,m < 0 and from (B.62), we \u00E2\u0088\u0097 \u00E2\u0088\u0097 must have \u00C2\u00B5\u00E2\u0088\u0097k,m = 0 and \u00CE\u00B6k,m > 0. From (B.51), we must have r\u00CB\u0086k,m = 0. When \u00E2\u0088\u0097 \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0092\u00CE\u00B6k,m \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CE\u00BD ak,m ln(2) \u00CE\u0093\u00CF\u008302 gk,m \u00E2\u0089\u00A4 \u00E2\u0089\u00A4 2R \u00CE\u00B3k\u00E2\u0088\u0097 \u00CE\u00BD \u00E2\u0088\u0097 ln(2) M AX \u00E2\u0089\u00A4 2R \u00CE\u0093\u00CF\u008302 . gk,m M AX \u00CE\u0093\u00CF\u008302 , gk,m it follows from (B.61) and (B.42) that \u00CE\u0093\u00CF\u008302 gk,m \u00E2\u0089\u00A4 \u00CE\u00B3k\u00E2\u0088\u0097 \u00CE\u00BD \u00E2\u0088\u0097 ln(2) \u00E2\u0088\u0092 \u00E2\u0088\u0097 \u00E2\u0088\u0097 Thus, we must have \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 \u00CE\u00B6k,m = 0. Solving for r\u00CB\u0086k,m from (B.61), \u00CE\u00B3\u00E2\u0088\u0097g \u00E2\u0088\u0097 k k,m we obtain r\u00CB\u0086k,m = a\u00E2\u0088\u0097k,m log2 ( \u00CE\u00BD \u00E2\u0088\u0097 ln(2)\u00CE\u0093\u00CF\u0083 2 ). 0 When \u00CE\u00B3k\u00E2\u0088\u0097 \u00CE\u00BD \u00E2\u0088\u0097 ln(2) > M AX \u00CE\u0093\u00CF\u0083 2 0 2R , gk,m it follows from (B.61) that \u00E2\u0088\u0097 \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0092\u00CE\u00B6k,m \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CE\u00BD ak,m ln(2) = 2R M AX \u00E2\u0088\u0097 \u00E2\u0088\u0097 \u00CE\u0093\u00CF\u0083 2 \u00CE\u0093\u00CF\u008302 \u00E2\u0088\u00922r\u00CB\u0086k,m /ak,m gk,m0 gk,m \u00E2\u0088\u0097 \u00E2\u0088\u0097 0, so that \u00C2\u00B5\u00E2\u0088\u0097k,m \u00E2\u0088\u0092 \u00CE\u00B6k,m > 0. Hence from (B.62), we must have \u00C2\u00B5\u00E2\u0088\u0097k,m > 0 and \u00CE\u00B6k,m = 0. Finally, \u00E2\u0088\u0097 from (B.51), we must have r\u00CB\u0086k,m = a\u00E2\u0088\u0097k,m RM AX . To summarize, we have the following optimal bit distribution policy \u00E2\u0088\u0097 r\u00CB\u0086k,m \u00EF\u00A3\u00B1 \u00CE\u0093\u00CF\u0083 2 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00CE\u00BBk < gk,m0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 M AX gk,m \u00CE\u0093\u00CF\u0083 2 2R \u00CE\u0093\u00CF\u008302 = a\u00E2\u0088\u0097k,m log2 \u00CE\u00BBk \u00CE\u0093\u00CF\u0083 , gk,m0 \u00E2\u0089\u00A4 \u00CE\u00BBk \u00E2\u0089\u00A4 2 g k,m \u00EF\u00A3\u00B4 0 \u00EF\u00A3\u00B4 M AX \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 2R \u00CE\u0093\u00CF\u008302 \u00EF\u00A3\u00B3 a\u00E2\u0088\u0097 RM AX , \u00CE\u00BB > k k,m gk,m 203 (B.63) > \u000Cwhere \u00CE\u00BBk = \u00CE\u00B3k\u00E2\u0088\u0097 \u00CE\u00BBB (B.64) and \u00CE\u00BBB = \u00CE\u00BD\u00E2\u0088\u0097 1 . ln(2) (B.65) The term \u00CE\u00BBk can be viewed as the waterlevel for CRU k. When the equivalent noise \u00CE\u0093\u00CF\u008302 /gk,m of subchannel m for CRU k is higher than the waterlevel, no bit is loaded onto the channel; when the waterlevel exceeds the threshold, 2R M AX \u00CE\u0093\u00CF\u008302 /gk,m , needed to achieve a rate of RM AX , a\u00E2\u0088\u0097k,m RM AX bits are loaded onto the channel; otherwise, s\u00E2\u0088\u0097k,m = \u00CE\u00BBk \u00E2\u0088\u0092 \u00CE\u0093\u00CF\u008302 /gk,m \u00E2\u0088\u0097 = a\u00E2\u0088\u0097k,m log2 (\u00CE\u00BBk gk,m /(\u00CE\u0093\u00CF\u008302 )) bits are loaded onto the channel. and r\u00CB\u0086k,m \u00E2\u0088\u0097 Substituting r\u00CB\u0086k,m in (B.57) by (B.63), and using (B.51) and (B.61) we have \u00E2\u0088\u0097 \u00CE\u00BD \u00E2\u0088\u0097 hk,m \u00E2\u0088\u0092 \u00CF\u0095\u00E2\u0088\u0097m \u00E2\u0088\u0092 \u00CF\u0086\u00E2\u0088\u0097k,m + \u00CE\u00B2k,m =0 (B.66) where hk,m is defined by hk,m \u00EF\u00A3\u00B1 \u00CE\u0093\u00CF\u008302 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 0, \u00CE\u00BB < \u00EF\u00A3\u00B4 k gk,m \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 M AX gk,m \u00CE\u0093\u00CF\u008302 \u00CE\u0093\u00CF\u008302 2R \u00CE\u0093\u00CF\u008302 = \u00E2\u0089\u00A4 \u00CE\u00BB \u00E2\u0089\u00A4 \u00CE\u00BBk ln \u00CE\u00BBk \u00CE\u0093\u00CF\u00832 \u00E2\u0088\u0092 \u00CE\u00BBk \u00E2\u0088\u0092 gk,m , k gk,m gk,m \u00EF\u00A3\u00B4 0 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B4 2 RM AX \u00CE\u0093\u00CF\u0083 2 \u00EF\u00A3\u00B4 M AX \u00CE\u0093\u00CF\u0083 2 \u00EF\u00A3\u00B3 \u00CE\u00BBk ln(2)RM AX \u00E2\u0088\u0092 (2R 0 \u00E2\u0088\u0092 1) gk,m0 , \u00CE\u00BBk > gk,m . (B.67) Suppose that a\u00E2\u0088\u0097k,m > 0 for CRUs k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC , C > 1. Constraint (B.41) implies that \u00E2\u0088\u0097 a\u00E2\u0088\u0097k,m < 1, k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC . From (B.50), we have \u00CF\u0086\u00E2\u0088\u0097k,m = 0 and \u00CE\u00B2k,m = 0. Then, from (B.66), we conclude that \u00CE\u00BD \u00E2\u0088\u0097 hk,m = \u00CF\u0095\u00E2\u0088\u0097m , k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC , i.e. hk1 ,m = hk2 ,m = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = hkC ,m . From (B.67), we note that unless \u00CE\u00BBk < \u00CE\u0093\u00CF\u008302 , gk,m (B.68) it is highly unlikely that any two of {hk,m , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } will be equal since hk,m is a function of gk,m , and {gk,m , k = 204 \u000Ck1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC } are outcomes of independent, real-valued random variables. We conclude that for any given time slot t and subchannel m \u00E2\u0088\u0088 M, there is only one CRU, say CRU k , that has a non-zero value of a\u00E2\u0088\u0097k ,m and a\u00E2\u0088\u0097k ,m = 1 from (B.41). In the following, we describe how to determine k . From (B.50), we have \u00CF\u0086\u00E2\u0088\u0097k ,m \u00E2\u0089\u00A5 0 and \u00CE\u00B2k\u00E2\u0088\u0097 ,m = 0, and it follows from (B.66) that \u00CF\u0095\u00E2\u0088\u0097m = \u00CE\u00BD \u00E2\u0088\u0097 hk ,m \u00E2\u0088\u0092 \u00CF\u0086\u00E2\u0088\u0097k ,m . (B.69) \u00E2\u0088\u0097 \u00E2\u0089\u00A5 0. It follows For a CRU k = k , a\u00E2\u0088\u0097k,m = 0, and from (B.50), we have \u00CF\u0086\u00E2\u0088\u0097k,m = 0 and \u00CE\u00B2k,m from (B.66) that \u00E2\u0088\u0097 . \u00CF\u0095\u00E2\u0088\u0097m = \u00CE\u00BD \u00E2\u0088\u0097 hk,m + \u00CE\u00B2k,m (B.70) From (B.69) and (B.70), we have hk ,m \u00E2\u0089\u00A5 hk,m . (B.71) The subchannel allocation strategy for subchannel m at time slot t is then a\u00E2\u0088\u0097k,m = 1, k = k \u00E2\u0088\u0097 and m \u00E2\u0088\u0088 Mt a\u00E2\u0088\u0097k,m = 0, otherwise (B.72) where k \u00E2\u0088\u0097 = argmaxk hk,m . (B.73) In the unlikely event that for a given t and m, the hk,m values are equal for several users, we arbitrarily set a\u00E2\u0088\u0097k,m to be 1 for one of the users and 0 for all the others. When n\u00E2\u0088\u0097k > 0, it follows from (B.54) that \u00CF\u0088k\u00E2\u0088\u0097 = 0. Then, from (B.58), we must have \u00CE\u00B3k\u00E2\u0088\u0097 = wk , and from (B.64), we have \u00CE\u00BBk = wk \u00CE\u00BBB . When n\u00E2\u0088\u0097k = 0, it follows from (B.54) that \u00CF\u0088k\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0. Then, from (B.58), we must have 205 \u000C\u00CE\u00B3k\u00E2\u0088\u0097 \u00E2\u0089\u00A4 wk , and from (B.64), we have \u00CE\u00BBk \u00E2\u0089\u00A4 \u00CE\u00BBB wk . For NRT CRUs, when p\u00E2\u0088\u0097k > 0, it follows from (B.55) that \u00CE\u00BEk\u00E2\u0088\u0097 = 0. Then, from (B.60), \u00CE\u00B3k\u00E2\u0088\u0097 = 1 and from (B.64) \u00CE\u00BBk = \u00CE\u00BBB . Similarly, when p\u00E2\u0088\u0097k = 0, \u00CE\u00B3k\u00E2\u0088\u0097 = 1 + \u00CE\u00BEk\u00E2\u0088\u0097 and \u00CE\u00BBk \u00E2\u0089\u00A5 \u00CE\u00BBB . For RT CRUs, when 0 < p\u00E2\u0088\u0097k < (rkM AX \u00E2\u0088\u0092 rkREQ ), it follows from (B.52) and (B.55) that \u00CE\u00B7k\u00E2\u0088\u0097 = 0 and \u00CE\u00BEk\u00E2\u0088\u0097 = 0. From (B.59) and (B.64), we have \u00CE\u00B3k\u00E2\u0088\u0097 = 1 and \u00CE\u00BBk = \u00CE\u00BBB . When p\u00E2\u0088\u0097k = 0, it follows from (B.52) and (B.55) that \u00CE\u00B7k\u00E2\u0088\u0097 = 0 and \u00CE\u00BEk\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0. Then from (B.59) and (B.64), we have \u00CE\u00B3k\u00E2\u0088\u0097 = 1 + \u00CE\u00BEk\u00E2\u0088\u0097 and \u00CE\u00BBk \u00E2\u0089\u00A5 \u00CE\u00BBB . When p\u00E2\u0088\u0097k = (rkM AX \u00E2\u0088\u0092 rkREQ ), it follows from (B.52) and (B.55) that \u00CE\u00BEk\u00E2\u0088\u0097 = 0 and \u00CE\u00B7k\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0. Finally, from (B.59) and (B.64), we have \u00CE\u00B3k\u00E2\u0088\u0097 = 1 \u00E2\u0088\u0092 \u00CE\u00B7k\u00E2\u0088\u0097 and \u00CE\u00BBk \u00E2\u0089\u00A4 \u00CE\u00BBB . 206 \u000CReferences [1] D. G. Luenberger, Introduction to Linear and Nonlinear programming. sachusetts: Addison-Wesley, 1973. Reading, Mas- [2] \u00E2\u0080\u0094\u00E2\u0080\u0094, Optimization by Vector Space Methods. New York: Wiley, 1969. [3] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University Press, 2004. 207 \u000CAppendix C Flowcharts for Algorithm in Section 6.4.4 Fig. C.1 and Fig. C.2 show the flow charts for the resource-limited phase and the resourceabundant phase of the cross-layer RA algorithm, respectively. The flow chart for the Assignment algorithm is shown in Fig. C.3 in which fk,m is defined by fk,m = \u00EF\u00A3\u00B1 \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B2 h\u00E2\u0088\u00921 (maxk hk,m + \u00CE\u00B4) ak,m = 0 k,m \u00EF\u00A3\u00B4 \u00EF\u00A3\u00B3 \u00E2\u0088\u009E otherwise where \u00CE\u00B4 is a small positive number. 208 (C.1) \u000CFigure C.1: Flow chart for the cross layer resource allocation algorithm: Phase 1, the resource-limited phase. Point B refers to the entry point of the resource-abundant phase. 209 \u000CFigure C.2: Flow chart for the cross layer resource allocation algorithm: Phase 2, the resource-abundant phase. 210 \u000CFigure C.3: Flow chart for the Assignment algorithm used in the cross layer resource allocation algorithm. 211 \u000CAppendix D Derivation of The Results in (7.8) (7.10) In Problem OP2, if we relax constraint (7.5) to allow atk,m to be a real value in [0, 1] and t t t replace rk,m by r\u00CB\u0086k,m = atk,m rk,m , the following convex optimization problem is obtained T OP3 : K M t r\u00CB\u0086k,m max t atk,m ,\u00CB\u0086 rk,m (D.1) t=1 k=1 m=1 subject to K atk,m \u00E2\u0088\u0092 1 = 0 (D.2) \u00CE\u0093\u00CF\u008302 \u00E2\u0088\u0092 TS \u00E2\u0089\u00A4 0 t gk,m (D.3) k=1 T K M atk,m 2 t r \u00CB\u0086k,m at k,m \u00E2\u0088\u00921 t=1 k=1 m=1 T M RkP R d \u00E2\u0088\u0092 t r\u00CB\u0086k,m = 0 (D.4) t \u00E2\u0088\u0092\u00CB\u0086 rk,m \u00E2\u0089\u00A4 0 (D.5) t=1 m=1 atk,m \u00E2\u0088\u0092 1 \u00E2\u0089\u00A4 0, m \u00E2\u0088\u0088 Mt (D.6) \u00E2\u0088\u0092atk,m \u00E2\u0089\u00A4 0, m \u00E2\u0088\u0088 Mt (D.7) \u00C2\u00AFt atk,m = 0, m \u00E2\u0088\u0088 M (D.8) \u00E2\u0088\u0092d < 0 The functions {atk,m (2 t r \u00CB\u0086k,m at k,m (D.9) t , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } \u00E2\u0088\u00921)\u00CE\u0093\u00CF\u008302 /gk,m t in (D.3) are convex in convex set C = {atk,m \u00E2\u0088\u0088 [0, 1], r\u00CB\u0086k,m \u00E2\u0088\u0088 [0, \u00E2\u0088\u009E)}, since the Hessian matrix of each function is positive semidefinite [1] in C. The functions in (D.1), the LHS of (D.2), 212 \u000Cand (D.4) to (D.9) are affine. The Lagrangian [2, 3] for OP3 can be written as T K M T t r\u00CB\u0086k,m L = \u00E2\u0088\u0092 T K K \u00CF\u0095tm + t=1 k=1 m=1 M 2 t=1 k=1 m=1 K M \u00CF\u0086tk,m (atk,m t=1 k=1 m=1 t r \u00CB\u0086k,m at k,m k=1 \u00E2\u0088\u00921 T T + K T k=1 \u00CE\u0093\u00CF\u008302 \u00E2\u0088\u0092 TS t gk,m K M t atk,m \u00CE\u00B2k,m \u00E2\u0088\u0092 1) \u00E2\u0088\u0092 t=1 k=1 m=1 T K M M \u00CE\u00B3k (RkP R d \u00E2\u0088\u0092 + atk,m \u00E2\u0088\u0092 1 t=1 m=1 atk,m +\u00CE\u00BD M t r\u00CB\u0086k,m )\u00E2\u0088\u0092 t=1 m=1 t t \u00CE\u00B6k,m r\u00CB\u0086k,m \u00E2\u0088\u0092 \u00CE\u00B8d (D.10) t=1 k=1 m=1 t t , \u00CE\u00B8, t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } are the where {\u00CF\u0095tm , \u00CE\u00BD, \u00CF\u0086tk,m , \u00CE\u00B2k,m , \u00CE\u00B3k , \u00CE\u00B6k,m Lagrange multipliers. \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 Let {atk,m , r\u00CB\u0086k,m , \u00CF\u0086tk,m , \u00CE\u00B2k,m , \u00CE\u00B6k,m , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M }, d\u00E2\u0088\u0097 , \u00CE\u00BD \u00E2\u0088\u0097 , \u00CE\u00B8\u00E2\u0088\u0097 , {\u00CF\u0095tm\u00E2\u0088\u0097 , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M }, {\u00CE\u00B3k\u00E2\u0088\u0097 , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} be an optimal 213 \u000Csolution; then the Karush-Kuhn-Tucker (KKT) conditions state that [3] \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00CF\u0095tm\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CE\u00BD \u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CF\u0086tk,m \u00E2\u0089\u00A5 0, \u00CE\u00B2k,m \u00E2\u0089\u00A5 0, \u00CE\u00B3k\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0, \u00CE\u00B6k,m , \u00CE\u00B8\u00E2\u0088\u0097 \u00E2\u0089\u00A5 0 (D.11) K \u00CF\u0095tm\u00E2\u0088\u0097 \u00E2\u0088\u0097 atk,m \u00E2\u0088\u00921 =0 (D.12) k=1 T \u00CE\u00BD K M \u00E2\u0088\u0097 \u00E2\u0088\u0097 atk,m t=1 k=1 m=1 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0092 1) = \u00CF\u0086k,m (atk,m 2 t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m \u00E2\u0088\u00921 \u00CE\u0093\u00CF\u008302 \u00E2\u0088\u0092 TS t gk,m =0 (D.13) 0 (D.14) t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 ak,m = 0 \u00CE\u00B2k,m (D.15) t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 r\u00CB\u0086k,m = 0 \u00CE\u00B6k,m (D.16) T \u00CE\u00B3k\u00E2\u0088\u0097 (RkP R d\u00E2\u0088\u0097 M t \u00E2\u0088\u0097 r\u00CB\u0086k,m )=0 \u00E2\u0088\u0092 (D.17) t=1 m=1 \u00CE\u00B8 \u00E2\u0088\u0097 d\u00E2\u0088\u0097 = 0 \u00CE\u00BD\u00E2\u0088\u0097 \u00CE\u0093\u00CF\u008302 t gk,m (D.18) 2 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m \u00E2\u0088\u00921 + \u00CE\u00BD ln(2)2 \u00E2\u0088\u00921\u00E2\u0088\u00922 t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m t \u00E2\u0088\u0097 r \u00CB\u0086k,m at \u00E2\u0088\u0097 k,m ln(2) t \u00E2\u0088\u0097 r\u00CB\u0086k,m \u00E2\u0088\u0097 atk,m \u00E2\u0088\u0097 t \u00E2\u0088\u0097 + \u00CF\u0095tm\u00E2\u0088\u0097 + \u00CF\u0086tk,m \u00E2\u0088\u0092 \u00CE\u00B2k,m =0 \u00CE\u0093\u00CF\u008302 t \u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B3k\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CE\u00B6k,m =0. t gk,m (D.19) (D.20) \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 In addition, the optimal values {atk,m , r\u00CB\u0086k,m , \u00CF\u0086tk,m , \u00CE\u00B2k,m , \u00CE\u00B6k,m , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M }, d\u00E2\u0088\u0097 , \u00CE\u00BD \u00E2\u0088\u0097 , \u00CE\u00B8\u00E2\u0088\u0097 , {\u00CF\u0095tm\u00E2\u0088\u0097 , t = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , T, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M }, {\u00CE\u00B3k\u00E2\u0088\u0097 , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K} need to satisfy (D.2)-(D.9). Equations (D.19), (D.20) are obtained by setting \u00E2\u0088\u0082L \u00E2\u0088\u0082atk,m = 0, \u00E2\u0088\u0082L t \u00E2\u0088\u0082 r\u00CB\u0086k,m = 0, respectively. t \u00E2\u0088\u0097 \u00E2\u0088\u0097 t \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00E2\u0088\u0097 Solving for r\u00CB\u0086k,m /atk,m from (D.20) and notice that rk,m = r\u00CB\u0086k,m /atk,m \u00E2\u0089\u00A5 0, we obtain t \u00E2\u0088\u0097 rk,m where \u00CE\u00BBk = \u00CE\u00B3k\u00E2\u0088\u0097 +1 \u00CE\u00BD \u00E2\u0088\u0097 ln(2) = \u00E2\u0088\u0097 atk,m log2 t gk,m \u00CE\u00BBk 2 \u00CE\u0093\u00CF\u00830 + . (D.21) can be interpreted as the water level for CRU k. Substituting (D.21) into (D.19), we get \u00E2\u0088\u0097 t \u00E2\u0088\u0097 \u00CE\u00BD \u00E2\u0088\u0097 htk,m \u00E2\u0088\u0092 \u00CF\u0095tm\u00E2\u0088\u0097 \u00E2\u0088\u0092 \u00CF\u0086tk,m + \u00CE\u00B2k,m =0. 214 (D.22) \u000Cwhere htk,m is calculated using (7.9). \u00E2\u0088\u0097 \u00E2\u0088\u0097 Suppose that atk,m > 0 for CRUs k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC , C > 1. Constraint (D.2) implies atk,m < \u00E2\u0088\u0097 t \u00E2\u0088\u0097 1, k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC . From (D.14) and (D.15), we have \u00CF\u0086tk,m = 0 and \u00CE\u00B2k,m = 0. Then, from (D.22), we conclude that \u00CE\u00BD \u00E2\u0088\u0097 htk,m = \u00CF\u0095tm\u00E2\u0088\u0097 , k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC , i.e. htk1 ,m = htk2 ,m = \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 = htkC ,m . From (7.9), we note that unless \u00CE\u00BBk < \u00CE\u0093\u00CF\u008302 , t gk,m (D.23) it is highly unlikely that any two of {htk,m , t = t , and 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , k = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , K, m = 1, 2, \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , M } will be equal since htk,m is a function of gk,m t {gk,m , k = k1 , k2 , \u00C2\u00B7 \u00C2\u00B7 \u00C2\u00B7 , kC } are outcomes of independent, real-valued random variables. We conclude that for any given time slot t and subchannel m \u00E2\u0088\u0088 M, there is only one CRU, say CRU k , that has a non-zero value and atk \u00E2\u0088\u0097,m = 1 from (D.2). In the following, we describe how to determine k . \u00E2\u0088\u0097 Since atk \u00E2\u0088\u0097,m = 1, from (D.14) and (D.15), we obtain \u00CF\u0086tk \u00E2\u0088\u0097,m \u00E2\u0089\u00A5 0 and \u00CE\u00B2kt ,m = 0, respectively. Then from (D.22), we have \u00CF\u0095tm\u00E2\u0088\u0097 = \u00CE\u00BD \u00E2\u0088\u0097 htk ,m \u00E2\u0088\u0092 \u00CF\u0086tk \u00E2\u0088\u0097,m . (D.24) \u00E2\u0088\u0097 \u00E2\u0088\u0097 For CRUs that k = k , since atk,m = 0, from (D.14) and (D.15), we obtain \u00CF\u0086tk,m = 0 and t \u00E2\u0088\u0097 \u00CE\u00B2k,m \u00E2\u0089\u00A5 0, respectively. Then from (D.22), we have t \u00E2\u0088\u0097 \u00CF\u0095tm\u00E2\u0088\u0097 = \u00CE\u00BD \u00E2\u0088\u0097 htk,m + \u00CE\u00B2k,m . (D.25) From (D.24), (D.25), and (D.11), we obtain htk ,m \u00E2\u0089\u00A5 htk,m . (D.26) As mentioned earlier, it is highly unlikely that any two htk,m will be equal, so we obtain (7.8). In the unlikely event that for a given t and m, the htk,m values are equal for several users, 215 \u000C\u00E2\u0088\u0097 we arbitrarily set atk,m to be 1 for one of the users and 0 for all the others. From (7.8) and (D.21), we obtain Characteristic 2). 216 \u000CReferences [1] D. G. Luenberger, Introduction to Linear and Nonlinear programming. sachusetts: Addison-Wesley, 1973. Reading, Mas- [2] \u00E2\u0080\u0094\u00E2\u0080\u0094, Optimization by Vector Space Methods. New York: Wiley, 1969. [3] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University Press, 2004. 217 "@en .
"Thesis/Dissertation"@en .
"2009-05"@en .
"10.14288/1.0065581"@en .
"eng"@en .
"Electrical and Computer Engineering"@en .
"Vancouver : University of British Columbia Library"@en .
"University of British Columbia"@en .
"Attribution-NonCommercial-NoDerivatives 4.0 International"@en .
"http://creativecommons.org/licenses/by-nc-nd/4.0/"@en .
"Graduate"@en .
"Cognitive radio"@en .
"OFDM"@en .
"Power allocation"@en .
"Cross-layer"@en .
"Wireless communication"@en .
"Resource allocation for OFDM-based cognitive radio systems"@en .
"Text"@en .
"http://hdl.handle.net/2429/2828"@en .
*