2015-Elsevier-Resource Allocation for LTE-based Cognitive Radio Network
2015-Elsevier-Resource Allocation for LTE-based Cognitive Radio Network
Physical Communication
journal homepage: www.elsevier.com/locate/phycom
signal-to-interference-and-noise ratio (SINR). These meth- So far there is no known method that allows us to
ods do not account for important higher-layer QoS met- address all critical issues of interference management and
rics as packet end-to-end delay, loss, or throughput in the resource allocation for a CRN user in a unified framework.
proposed optimization criteria. Therefore, these results are Some authors have focused only on achieving the target
applicable only in some rare cases where the service per- interference caused by the secondary users to the primary
formance of the end-to-end user applications is not a vital users [2–4]. Some other works concentrate only on higher-
issue (e.g., for best-effort traffic streams). layer QoS requirements without considering SINR [5–7].
The second group of papers examine user-perceived The remaining available results do not distinguish between
QoS using theoretical analysis of user behavior in CRNs. the QoS requirements of the primary and secondary
For instance, in [5] a statistical traffic control scheme is users [8,9]. To fill this void, we propose a novel approach
proposed to satisfy the timing constraints of the packets for resource allocation in CRNs. Our method is designed
belonging to different streams with diverse QoS char- to provide best effort service to the secondary users while
acteristics and requirements. Here the authors deploy actively restricting the interference to the primary users. In
admission control and coordinated transmission of the addition, the proposed approach can guarantee acceptable
constant-bit-rate (CBR) and variable-bit-rate (VBR) traf- QoS level for the primary users. Thus, unlike previous
fic. A dynamic channel-selection strategy for autonomous works we simultaneously consider both physical-layer
wireless users transmitting delay-sensitive multimedia requirements and higher-layer QoS guarantees of primary
applications over CRN has been proposed in [6]. Unlike users, and control the bandwidth and the power of the
prior works, the authors of [6] have paid attention to the users to maximize the QoS for both primary and secondary
rate and delay requirements of heterogeneous multime- users.
dia users. To efficiently manage the available spectrum We apply the idea for allocating bandwidth and power
resources in a decentralized manner, the authors use a vir- in a CRN built on a Third Generation Partnership Project
tual queue interface to evaluate the average delays experi- (3GPP) long-term evolution (LTE) standard. LTE is chosen
enced by the traffic with various priority levels. Each user as the implementation platform because of its appealing
utilizes this delay information in a dynamic strategy learn- features, such as spectrum flexibility, fast adaptation to
ing (DSL) algorithm for selecting the channels in order to time-varying channel conditions, high spectral efficiency
maximize some utility function. In [7] the authors propose and robustness against interference [10]. A detailed de-
a spectrum allocation framework that jointly considers the scription of the LTE radio interface can be found, for in-
QoS provisioning for heterogeneous secondary real-time stance, in [11]. In short, LTE is based on the universal
(RT) and non-real time (NRT) users, the spectrum sensing, terrestrial radio access (UTRA) and high-speed down-link
spectrum access decision, channel allocation, and call ad- packet access (HSDPA). In the downlink, LTE uses Orthog-
mission control in a distributed cooperative CRN. Within onal Frequency-Division Multiple Access (OFDMA) which
this framework, the admissible number of the RT users is offers high spectral efficiency and robustness against in-
calculated based on their QoS requirements (measured in terference. Single Carrier Frequency Division Multiple Ac-
terms of channel dropping and packet blocking probabil- cess (SC-FDMA) is used in the uplink of LTE due to its
ities). Then, the available channels are distributed among lower (compared to OFDM) Peak-to-Average Power Ratio
the admitted RT users, whereas the remaining channels are (PAPR) [12]. The numerology of LTE includes a subcarrier
allocated to the NRT users. The set of QoS measures ana- spacing of 15 kHz, support for bandwidths up to 20 MHz,
lyzed in [6,7] does not include physical-layer characteris- and a resource allocation granularity of 180 kHz × 1 ms
tics, such as SINR. However, in CRNs it is essential to control (so-called resource block or RB). The available resource
the interference from the secondary users to the primary blocks are distributed among the users by the medium ac-
users. Even if the allocated capacity (number of channels) cess control (MAC) schedulers in enhanced NodeBs (eNBs).
is large enough for a given traffic stream, the interference Depending on the implementation, the scheduling can be
from the secondary users may result in poor channel qual- done based on the queuing delay, instantaneous channel
ity causing very low service rate, and consequently vary conditions, fairness, etc. [13,14].
unacceptably high delays for the primary users. The rest of the paper is organized as follows. In Section 2
The last group of papers [8,9] focus on the trade-off we describe the system model and radio model of the
between transmission delay and transmission power in network, and formulate the resource allocation problem.
wireless networks. In [8] a delay-power control (DPC) In Section 3 we discuss algorithm implementation. In
scheme is proposed to balance the delay against trans- particular, we present the solution methodology and the
mission power in each wireless link. It is shown that DPC possible settings of algorithm. In Section 4 we carry out
converges to a unique equilibrium. The equilibrium point a performance analysis based on results of simulations in
OPNET environment [15].
satisfies key properties related to the nature of bandwidth
sharing achieved by the links. Distributed resource alloca-
tion based on queue balancing in a multi-hop CRN has been 2. Resource allocation algorithm
investigated in [9]. Here the network resources (power,
channel and data rate) are allocated to the users based on 2.1. The CRN architecture
the assumption of dynamic link capacity. The papers [8,9]
assume all users having equal priorities in accessing the 2.1.1. Network topology
spectrum, and do not pay attention in presenting the QoS We consider a CRN architecture implemented over a
for the primary users. standard infrastructure-based LTE network with frequency
A. Asheralieva, K. Mahata / Physical Communication 14 (2015) 1–13 3
CRM
division duplex (FDD) as shown in Fig. 1. The network the necessary information from the control mechanisms
consists of n primary (licensed) eNBs (PBs) numbered built in LTE.
PB1 , . . . , PBn . In addition, there are m secondary (unli- An LTE system operates on a slotted time basis. The
censed) eNBs (SBs) numbered SB1 , . . . , SBm . In the sequel time axis is partitioned into a sequence of non-overlapping
we frequently use the notation I = {1, . . . , n}, J = time intervals (slots) of the length Ts each. In the sequel
{1, . . . , m} to denote the indices associated with the PBs the integer-valued index of a time slot is denoted by
and the SBs, respectively. All the eNBs are connected to the t. In LTE, each eNB serves a number of wireless user
backbone server via a central resource manager (CRM). The equipments (UE) located within its service area (cell).
communication between the eNBs, the CRM and the server Resources (counted in terms of RBs) are allocated to the
is realized using the high-speed internet protocol (IP) links users by the eNBs using the standard packet scheduling
to facilitate fast data transmission. procedure described in detail in [16]. In this procedure
each UE is required to transmit its buffer status information
2.1.2. Role of the CRM and cognitive functionality at every time slot. In this way the eNB gets to ‘‘know’’
The primary eNBs operate on their fixed licensed the exact amount of uplink data bits enqueued in the
spectrum bands (primary channels). In this work we buffers of UEs. On the other hand, the eNB readily finds
consider the most general scenario when the frequency out the size of the downlink buffer for each UE. The uplink
bands of the PBs do overlap. The fixed licensed spectrum and downlink buffer status information is used by the
band of PBi is denoted by Bi . Note that Bi is an integer, which scheduling algorithm run by the eNB for allocating the
resources to individual UEs on a slot-by-slot basis.
represents the number of RBs that belong to PBi .
In the framework used in this paper both primary
In the network, a CRM retains control over the net-
and secondary eNBs adopt the standard packet scheduling
work resources (bandwidth and the transmission powers)
procedure described above. The CRM uses the buffer
of the individual PBs and SBs. In real network deployments,
status information (transmitted by the users to the eNBs
the PBs often have some spare capacities. In such a situa-
during the scheduling process) to allocate the resources
tion the CRM may allow one or more SBs to make use of
to different eNBs. At every time slot each eNB is required
this spare capacity. So, when PBi has some spare capac-
to report its aggregated traffic demands to the CRM. The
ity, then CRM might allocate that to one or more SBs. The
justification behind using the aggregated traffic demand
resource allocation policy used by CRM should guarantee
lies in the fact that in an LTE system the queuing and
that the transmission of SBs will have minimal impact on
processing delays of the packets at the buffers of the UEs
the quality of service (QoS) and operating conditions of
are practically negligible compared to that at the buffers of
PBs [1].
the eNB [17]. This is mainly because the amount of traffic
arriving at the buffer of a UE is much less than that arriving
2.1.3. Traffic information exchange for resource allocation at the buffer of a eNB.
In order to make effective resource allocation the CRM After the resources are allocated to the eNBs, the eNBs
needs to monitor the traffic load at different eNBs in both distribute them among their users. This second stage of
uplink and downlink directions. In fact, the CRM can gather allotments utilizes the buffer status information of the
4 A. Asheralieva, K. Mahata / Physical Communication 14 (2015) 1–13
different transmitter–receiver pairs located within one PBi at tth time slot. Given the channel gains GPS SS
ij , Gjk , i ∈
cell. In absence of frequency reuse, the co-channel interfer- I, k ∈ J, j ∈ J, SINRSij (t ) is estimated using [24]:
ence should be close to zero (assuming the UEs are properly
synchronized to the eNB). Therefore, the signal transmitted pSij (t )GPS
ij
SINRSij (t ) = ,
(received) by a user to (from) its serving eNB (PB or SB) will
ηijS + pPk (t )GPS pSkl (t )GSS
be distorted only by the users located in different eNBs (PBs ik + kl
and SBs) and transmitting at the same frequency [23]. k∈I/{i} l∈J
Note, that at any slot t the number of RBs allocated for minimize the sum of the maximal queues of the PBs and
data transmission in the licensed bandwidth of PBi cannot SBs subject to the constraint (10). To simplify the notation,
exceed Bi RBs. Thus, we skip the index t below
+
bPi (t ) + bSij (t ) ≤ Bi , ∀ i ∈ I. minimize max qPi + aPi − riP (b, p)
(6a)
i∈I
j∈J
+
Let us define
+ max qSj + aSj − rijS (b, p) (11a)
j∈J
i∈I
B := b bPi (t ) + bSij (t ) ≤ Bi , bPi (t ),
j∈J subject to: riP (b, p) ≥ qPi + aPi − Qitar , ∀i ∈ I, (11b)
which is the set of all admissible values that a vector b can In (11) we minimize the maximum queue size not only
take. Note, that Z+ represents the set of all non-negative for SBs, but also for PBs (this might appear unnecessary
integers. because the queue sizes for PBs are already constrained to
The CRN should allocate the bandwidth and transmis- be bounded). To see the reason, suppose that we do not
sion power to guarantee some QoS levels to the PBs. There- have the first term in (11a), i.e. we minimize the maximum
fore, for each PB we set some minimal guaranteed QoS queue size only for SBs. If we solve this problem, then the
metrics. These are the target queue sizes denoted as Qitar ≥ optimal solution will be such that for all PBs the queue size
0, i ∈ I, expressed in bits, and target interference levels will be equal to the target queue size, i.e.
from SBs denoted as Iitar ≥ 0, i ∈ I, expressed in Watts.1 qPi (t + 1) = Qitar , ∀i ∈ I.
Consequently, we constrain the queue size of the PBs to
be below the specified target queue size, i.e.: Now, if the traffic demands in SBs are very low, then
there might be a situation when the optimal solution for
qPi (t + 1) ≤ Qitar , ∀ i ∈ I, (7) SBs will be such that
which is equivalent to (see (1a)) max qSj (t + 1) ≤ Qitar = qPi (t + 1), ∀i ∈ I.
j∈J
riP (b, p) ≥ qPi (t ) + aPi (t ) − Qitar , ∀ i ∈ I, (8a)
However this is clearly unfair, as the PBs will have larger
riP (b, p) ≤ qPi (t ) + aPi (t ), ∀i ∈ I. (8b) queue sizes than SBs, and therefore will experience longer
delays than SBs.
Note, that in (8) we express the service rate at the PBs given
Note, that the formulation of the resource allocation
by (4) as a function of the bandwidth and transmission
problem given by (11) can be applied only in case if all
power.
the constraints (11b)–(11d) are feasible. However, it is easy
We also constrain the interference from SBs to PBs to be
to check that the constraint (11b) may not be feasible for
below the specified target interference levels. Hence,
some PBs. This is discussed in the next subsection, where
we also suggest a modified version of the primary opti-
pSkj (t )GPS
kj ≤ Ii ,
tar
∀ i ∈ I. (9)
k∈I\{i} j∈J
mization problem (11) which can be used freely without
worrying about the feasibility of (11b).
The constraint (9) is used here to protect the users of the
PBs from the potentially heavy interference from the users
2.4. Detecting infeasibility and associated remedy
of the SBs.
Using (3) and (9), the set of all admissible values that p
In some cases the constraint (11b) may be not feasible.
can take is given as:
This happens when the service capacity of the eNB is not
enough to guarantee that the queue size of a PB will not
P := p pS (t )GPS
kj ≤ Ii ,
tar
k∈I\{i} j∈J kj exceed the target queue size. Let us define
qPi + aPi − Qitar
0 ≤ pPi (t ) ≤ PiP , 0 ≤ pSij (t ) ≤ PjS , Ωi = , ∀ i ∈ I. (12)
i∈I ω · Bi
If SINRPi (p) < 2Ω i − 1, then PBi ’s queue size will exceed
∀ i ∈ I, j ∈ J . (10) the Qitar , and (11b) will be infeasible. Given some p ∈ P we
can construct the set Î = i|i ∈ I, SINR Pi (p) < 2Ωi − 1 .
Now, we can formulate the optimization problem using This set consists of all indices associated with the primary
the queue length of the eNBs as an optimization target. eNBs which are unable to meet the target queue size for
To maximize the QoS for the users in the eNBs we will the given p.
When i ∈ Î then PBi is not in a position to share any re-
sources with the SBs. All of PBi ’s licensed bandwidth is used
1 The settings of Q max and I max will be discussed in Section 3.
i i by itself, i.e. pSij = 0 and bSij = 0, ∀j ∈ J. No target queue size
A. Asheralieva, K. Mahata / Physical Communication 14 (2015) 1–13 7
requirements can be applied to PBi . Consequently, the con- Consequently, the functions fi (p) can be approximated
straints (6a), (7) and (11b) should be changed accordingly by the shifted logistic functions
as ρ
fˆi (p) = gi (SINRPi (p) − 2Ωi + 1)
≤ Bi , ∀i ∈ Î,
bPi (13a) 1
= ,
1 + exp[−2ρ(SINRPi (p) − Ωi + 1)]
kj ≤ 0,
pSkj GPS ∀i ∈ Î, (13b)
k∈I\{i} j∈J ∀i ∈ I. (16)
riP (b, p) ≥ 0, ∀i ∈ Î. (13c) Now we can use the approximation fˆi (p) instead of the
original indicator function fi (p) to construct the modified
Note that the set of indices Î depends on the exact values constraints given by (15):
of p (and SINRPi (p)). Therefore, before resource allocation
bPi + fˆi (p) · bSij ≤ Bi , ∀ i ∈ I, (17a)
we are unable to perform the feasibility test for PBs (i.e., de- j∈J
tect the PBs which are unable to meet the target queue size
kj ≤ fi (p) · Ii , ∀ i ∈ I,
tar
requirements). Instead, we should find some simple mech- pSkj GPS ˆ (17b)
anism to deal with infeasibility during resource allocation. k∈I\{i} j∈J
i ,
≥ SINRtar ∀i ∈ I. (22)
∀ i ∈ I, j ∈ J . (21h) If (22) is feasible, then
pPi GPP
ik − ηi ,
ii
One can easily see that (21) is a non-convex problem pSkj GPS
kj ≤ − pPk GPP P
SINRtar
i
which can be solved using any standard interior-point k∈I\{i} j∈J k∈I\{i}
where enough to keep their queues stable, i.e. for each PB we set
Table 1
Simulation parameters of the model.
Parameter Value
Radio network model: Pass loss L = 40 log10 R + 30 log10 f + 49, R—distance (km), f —carrier frequency (Hz)
Shadow fading Log-normal shadow fading with a standard deviation of 10/12 dB for
outdoor/indoor users
Penetration loss The average building penetration loss is 12 dB with a standard deviation of 8 dB
Multipath fading Spatial Channel Model (SCM), Suburban macro
UE velocity 0 km/s
Transmitter/Receiver antenna 10 dBi (pedestrian), 2 dBi (indoor)
gain
Receiver antenna gain 10 dBi (pedestrian), 2 dBi (indoor)
Receiver noise figure 5 dB
Thermal noise density –174 dB m/Hz
Cable/connector/combiner 2 dB
losses
Physical profile: Operation mode FDD
Cyclic prefix type Normal (7 symbols per slot)
EPC bearer definitions 348 kbit/s (Non-GBR)
Subcarrier spacing 15 kHz
Admission control PDCCH symbols per subframe 3
parameters:
UL loading factor 1
DL loading factor 1
Inactive bearer timeout 20 s
Buffer status report Periodic timer 5 subframes
parameters:
Retransmission timer 2560 subframes
L1/L2 control parameters: Reserved size 2 RBs
Cyclic shifts 6
Starting RBP for format 1 0
messages
Allocation periodicity 5 subframes
Random access Number of preambles 64
parameters:
Preamble format Format 0 (1-subframe long)
Number of RA resources per 4
frame
Preamble retransmission limit 5 subframes
RA response timer 5 subframes
Contention resolution timer 40 subframes
HARQ parameters: Maximal number of 3 (uplink and downlink)
retransmissions
HARQ retransmission timer 8 subframes (uplink and downlink)
Maximal number of HARQ 8 per UE (uplink and downlink)
processes
and development package [15]. The CRM functionalities maintain admissibility and opportunism of SBs. The second
have been implemented in the evolved packet core (EPC) scheme, presented in [8], is used to balance transmission
connected to the eNBs and external server via 1 MBits/s IP delay against transmission power in the wireless channels
links. The primary eNBs operate on fixed licensed spectrum of the eNBs.
bands of the length B1 = 25 RBs, B2 = 50 RBs, B3 = 100 To differentiate the performance of different algorithms
RBs (spanning 5 MHz, 10 MHz and 20 MHz, respectively). in simulations we use the following notation in the sequel:
The radio model of the network has been developed
according to the ITU-T Recommendation M.1225. The – DPCPC (Duo Priority Class Power Control) for the
maximal transmission power of all eNBs (primary and sec- scheme described in [2];
ondary) is equal to 46 dB m. Other simulation parame- – DPC (Delay Power Control) for the scheme derived
ters are set in accordance with the requirements of the LTE in [8];
specifications [10] (the simulation parameters of the net- – SQC (Soft Quality of service based Control) for the
work model are listed in Table 1). scheme proposed in this paper with Iitar and Qitar
In this paper we observe and compare the performance calculated from (22) and (24), respectively, with T = 1;
of the proposed algorithm with the performance of – SPIC (Soft Past Information based Control) for the
two most relevant schemes applicable to the considered scheme proposed in this paper with Iitar and Qitar
system model. In the first scheme described in [2] the calculated from (22) and (24), respectively, with T =
power is allocated to the eNBs to protect QoS of PBs and 10.
A. Asheralieva, K. Mahata / Physical Communication 14 (2015) 1–13 11
Fig. 4. Average number of iterations and solution time in the proposed algorithm.
Fig. 5. Average packet end-to-end delay in the PBs and the SBs.
All the algorithms are simulated with identical LTE consists of one object, whereas one image consists of
parameters and under identical network deployment five objects. The object size is constant and equal to
scenarios (such as channel quality, traffic load, and user 1000 bytes [33].
behavior). The target SINR is equal SINRtar
i = 10 dB in all
simulations. 4.2. Simulation results
The user traffic consists of three most frequently used
network applications: VoIP, video and HTTP. The number
First, we observe the complexity of the proposed algo-
of users of each type is distributed in proportion 2:3:5
rithm in terms of average number of iterations and the so-
for voice, video and data users, respectively. The following
lution time. Fig. 4 shows performance of SQC with different
models are used to simulate voice, video and web users:
number of PBs and SBs, n and m. Each eNB (PB or SB) serves
– The VoIP services model is ON–OFF model with ex- 50 users. Results show that the proposed algorithm has
ponentially distributed ON–OFF periods. The mean relatively low complexity (less than 70 iterations or 115
duration of ON and OFF periods is 0.65 s and 0.352 s, mcs for relatively large network comprising 15 × 4 eNBs).
respectively. The VoIP traffic is generated by using the These results are rather expected, since B&B was always
G.723.1 (12.2 kbps) codec with a voice payload size 40 described as one of the most effective and less complex al-
bytes and a voice payload interval 30 ms [33]. gorithms (see, for instance, reports on complexity of B&B
– Video services are simulated using a high resolu- provided in [28]).
tion video model with a constant frame size equal to We also evaluate performance of the different algo-
6250 bytes, and exponentially distributed frame inter- rithms in terms of average packet end-to-end delay, aver-
arrival intervals (with mean equal to 0.5 s) [33]. age transmission power and average SINR of the users in
– Web users in simulations are HTTP1.1 users generating PBs and SBs. Figs. 5–7 demonstrate simulation results in
pages or images with exponential page inter-arrival in- the network with n = 3 PBs with varying load, and m = 4
tervals (mean equal 60 s). It is assumed that one page SBs with constant load in SBs (each SB serves exactly 50
12 A. Asheralieva, K. Mahata / Physical Communication 14 (2015) 1–13
users). Results show that the duo-priority power control there is no protection of PBs in terms of interference from
scheme proposed in [2] provides consistent performance SBs, as well as no differentiation between the QoS require-
in terms of the average transmitted power and SINR for pri- ments of PBs and SBs [8]. Hence, performance of DPC com-
mary eNBs, but does not improve higher-layer QoS since pared to other schemes is relatively good when it comes to
the packet end-to-end delay in PBs is the largest when SBs, but not acceptable to PBs.
compared to other schemes. Such results can be explained Both schemes, SQC and SPIC proposed in this paper
as follows. Recall, that the objective of power allocation show very similar performance; they work better than
in DPCPC is to minimize the total transmission power DPCPC and DPC in reducing the packet end-to-end delay
of all eNBs (primary and secondary) subject to SNR re- and maintaining the target SINR levels for PBs. Such
quirements of PBs [2]. Consequently, we observe reduced performance can be easily reasoned by the fact that in
consumption of transmission power in the terminals be- our algorithm we take into account both SINR and QoS
longing to the users of PBs and SBs, and improved SINR requirements of PBs. We note in passing, that SPIC shows
conditions in the wireless channels of PBs. Unfortunately, slightly better performance that SQC in terms of packet
the delay and loss requirements of PBs are not considered end-to-end delay because it uses more long history for
in this scheme [2], and as a result, the users of all eNBs get resource allocation, and therefore is more effective in
significant delays during their packet transmissions. maintaining queue stability in PBs.
Delay-power control scheme proposed in [8] demon-
strates better performance than DPCPC in terms of packet 5. Conclusion
end-to-end delay for primary eNBs, but very ineffective
when it comes to SINR which is much lower than that in In this paper we consider a problem of transmission
other schemes. Results also show that the users of SBs and power and bandwidth allocation in a cognitive LTE based
PBs in average have similar consumption of transmission network consisting of primary and secondary eNBs with
power, SINR and delays. To understand such performance, different requirements on SINR and application-layer QoS.
note that in this scheme all eNBs are treated equally, and We propose a novel strategy for resource allocation in
A. Asheralieva, K. Mahata / Physical Communication 14 (2015) 1–13 13
which the total queue size in eNBs (primary and sec- [19] F. Capozzi, et al., Downlink packet scheduling in LTE cellular
ondary) is minimized subject to interference requirements networks: key design issues and a survey, IEEE Commun. Surv. Tutor.
15 (2) (2013) 678–700.
and queue stability constraints of the primary eNBs. Per- [20] Physical Channels and Modulation. 3GPP TS 36.211. (Release 8).
formance of the algorithm has been evaluated using simu- [21] D.V. Lindley, The theory of queues with a single server, Math. Proc.
lations in different network deployment scenarios. Results Cambridge Philos. Soc. 48 (2) (1952) 277–289.
[22] J. Mo, J. Walrand, Fair end-to-end window-based congestion control,
show that the proposed algorithm outperforms previously IEEE/ACM Trans. Netw. 8 (5) (2000) 556–567.
proposed schemes. [23] I.F. Akyildiz, D.M. Gutierrez-Estevez, E.C. Reyes, The evolution to 4G
cellular systems: LTE-advanced, Phys. Commun. 3 (2010) 217–244.
[24] F. Baccelli, B. Blaszczyszyn, Stochastic Geometry and Wireless
References Networks, Volume I—Theory, Volume 3, in: Foundations and Trends
in Networking, vol. 3–4, NoW Publishers, 2009.
[1] M. Buddhikot, Understanding dynamic spectrum access: mod- [25] R.V.L. Hartley, Transmission of information, Bell Syst. Tech. J. (1928).
els, taxonomy, and challenges, in: Proc. IEEE DySPAN, 2007, [26] R. Bracewell, Heaviside’s unit step function, H (x), in: The Fourier
pp. 649–663. Transform and Its Applications, third ed., McGraw-Hill, New York,
2000, pp. 61–65.
[2] S. Sorooshyari, C.W. Tan, M. Chiang, Power control for cognitive radio
[27] P.-F. Verhulst, Notice sur la loi que la population poursuit dans son
networks: axioms, algorithms, and analysis, IEEE/ACM Trans. Netw.
accroissement, Correspondance mathématique et physique, Vol. 10,
20 (3) (2012) 878–891.
pp. 113–121, Retrieved 2009.
[3] S. Parsaeefard, A.R. Sharafat, Robust distributed power control in
[28] A.H. Land, A.G. Doig, An automatic method of solving discrete
cognitive radio networks, IEEE Trans. Mob. Comput. 12 (4) (2013)
programming problems, Econometrica 28 (3) (1960) 497–520.
609–620. [29] S.P. Boyd, L. Vandenberghe, Convex Optimization, Cambridge
[4] M. Zhou, X. Zhao, A power allocation algorithm based on target
University Press, 2004.
capacity, J. Inf. Comput. Sci. 10 (6) (2013) 1839–1845.
[5] S.Y. Lien, K.C. Chen, Statistical traffic control for cognitive radio [30] R.J. Vanderbei, D.F. Shanno, An interior-point algorithm for noncon-
vex nonlinear programming, Comput. Optim. Appl. 13 (1–3) (1999)
empowered LTE-advanced with network MIMO, in: IEEE INFOCOM,
231–252.
2011, pp. 80–84. [31] D.M. Gay, et al., A primal–dual interior method for nonconvex
[6] H.P. Shiang, M. van der Schaar, Queuing-based dynamic channel nonlinear programming, in: Advances in Nonlinear Programming,
selection for heterogeneous multimedia applications over cognitive in: Applied Optimization, vol. 14, 1998, pp. 31–56.
radio networks, IEEE Trans. Multimedia 10 (5) (2008) 896–909. [32] V. Jacobson, Congestion avoidance and control, in: Proc. SIGCOMM,
[7] A. Alshamrani, X. Shen, L.-L. Xie, QoS provisioning for heterogeneous Vol. 18 (4), 1988, pp. 314–329.
services in cooperative cognitive radio networks, IEEE J. Sel. Areas [33] IPOGUE, Internet study 2007 and 2008/2009, Research Report.
Commun. 29 (4) (2011) 819–830.
[8] F. Baccelli, N. Bambos, N. Gast, Distributed delay-power control
algorithms for bandwidth sharing in wireless networks, IEEE/ACM
Trans. Netw. 19 (5) (2011) 1458–1471. Alia Asheralieva has received her Master’s De-
[9] W. Wang, K.G. Shin, W. Wang, Distributed resource allocation based gree in Asian Institute of Technology in Bangkok,
on queue balancing in multihop cognitive radio networks, IEEE/ACM Thailand. She is currently pursuing her Ph.D. at
Trans. Netw. 20 (3) (2011) 837–850. University of Newcastle, Australia. Her research
[10] 3GPP TR 25.913. Requirements for Evolved UTRA (E-UTRA) and interests include Wireless Networks, Cognitive
Evolved UTRAN (E- UTRAN), Release 8. Networks, Performance Evaluation and Teletraf-
[11] E. Dahlman, S. Parkvall, J. Skod, 3G Evolution: HSPA and LTE for fic.
Mobile Broadband, Academic Press, Oxford, UK, 2007.
[12] G. Berardinelli, L.A. Ruiz de Temino, S. Frattasi, M.I. Rahman, P.
Mogensen, OFDMA vs. SC-FDMA: Performance comparison in local
area IMT-A scenarios, IEEE Wirel. Commun. 15 (5) (2008) 64–72.
[13] C.Y. Wong, R.S. Cheng, K.B. Lataief, R.D. Murch, Multiuser OFDM Kaushik Mahata received his Ph.D. from Upp-
with adaptive subcarrier, bit and power allocation, IEEE J. Sel. Areas sala University, Sweden in 2003. Since then he
Commun. 17 (10) (1999) 1747–1758. has been with the University of Newcastle, Aus-
[14] Anna Larmo, et al., The LTE link-layer design, IEEE Commun. Mag. 47 tralia. His research interests include Signal Pro-
(4) (2009) 52–59. cessing, System Identification, Optimization and
[15] OPNET Website: www.opnet.com. their applications.
[16] E-UTRA; MAC protocol specification. 3GPP TS 36.321. (Release 8).
[17] H. Holma, A. Toskala, LTE for UMTS: Evolution to LTE-Advanced, John
Wiley and Sons, 2011.
[18] S.-B. Lee, et al., Proportional fair frequency-domain packet schedul-
ing for 3GPP LTE Uplink, in: Proc. INFOCOM, 2009, pp. 2611–2615.