Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01-12-2010 | Research Article

Cross-Layer Design in Dynamic Spectrum Sharing Systems

Authors: A. Shadmand, K. Nehra, M. Shikh-Bahaei

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2010

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider a dynamic spectrum sharing system consisting of a primary user, whose licensed spectrum is allowed to be accessed by a secondary user as long as it does not violate the prescribed interference limit inflicted on the primary user. Assuming the Nakagami- https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq1_HTML.gif block-fading environment, we aim at maximizing the performance of secondary user's link in terms of average spectral efficiency (ASE) and error performance under the specified packet error rate (PER) and average interference limit constraints. To this end, we employ a cross-layer design policy which combines adaptive power and coded discrete M-QAM modulation scheme at the physical layer with a truncated automatic repeat request (ARQ) protocol at the data link layer, and simultaneously satisfies the aforementioned constraints. Numerical results affirm that the secondary link of spectrum sharing system combining ARQ with adaptive modulation and coding (AMC) achieves significant gain in ASE depending on the maximum number of retransmissions initiated by the ARQ protocol. The results further indicate that the ARQ protocol essentially improves the packet loss rate performance of the secondary link.

1. Introduction

The rapidly growing demand for wireless services has led to deployment of the resource allocation approaches that not only provide higher data rates, but also enable the system to guarantee the quality of service (QoS) desired by various services. Cross-layer design has been considered as a promising candidate in this direction. Adaptive modulation and coding (AMC) at the physical layer is widely used to achieve high spectral efficiency (SE) [13], but it has to compromise between efficiency and reliability. On the other hand, the automatic repeat request (ARQ) protocol used at the data link layer increases reliability by retransmitting the erroneous packets. The systems exploiting joint design of AMC at the physical layer and ARQ at the data link layer enjoy high throughput with increased reliability as compared to those considering separate implementation of AMC and ARQ [4].
Along with efficiency and reliability, bandwidth is an important concern as the wireless applications become more and more sophisticated and widely used. However, the existing spectrum policies are not competent enough to cope with increasing spectrum access demand, and hence induce the shortage of available spectrum range. This is due to the fact that the outdated spectrum policies allow little or no sharing, and thus a large part of the useful spectrum remains idle at any given instant and location [5, 6]. The notion of spectrum sharing provides the means of efficient utilization of unused or underutilized parts of spectrum by enabling the unlicensed (secondary) users to exploit licensed (primary) spectrum bands with certain constraints on the interference imposed on licensed users.
Physical layer aspects of spectrum sharing systems have been sincerely studied in literature including [79]. The capacity of AWGN channels under received power constraints at the primary receiver for different scenarios, including relay networks, multiple access channels with dependent sources and feedback, and collaborative communication, was analysed in [7]. The authors in [8] derived the capacity and optimum power allocation schemes for different capacity metrics, for example, ergodic, outage, and minimum-rate in Rayleigh fading channels under average and peak received-power constraints at the primary's receiver. Spectrum sharing systems with an additional statistical delay QoS constraint along with the interference-power constraint at the primary receiver were studied in [9]. The authors determined the maximal possible arrival rate supported by the secondary user's link satisfying aforementioned constraints.
On the other hand, a substantial amount of work has been carried out in the direction of combined AMC-ARQ in the non spectrum-sharing scenario. In [4], a cross-layer design was developed combining constant-power AMC and truncated-ARQ protocol, with the aim of maximizing the spectral efficiency under target delay and packet loss constraints. Joint implementation of variable-power AMC and truncated-ARQ was proposed in [10], and it was demonstrated that combined AMC-ARQ with adaptive power outperforms that with constant-power in terms of ASE as well as packet loss rate. The authors in [11] presented power and rate adaptation policies for coded M-QAM modulation, in order to minimize the packet delay due to queuing at the data link layer, under the prescribed packet error rate constraint.
As per our best knowledge, cross-layer design combining AMC at the physical layer with the ARQ protocol at the data link layer has not been addressed so far in the context of spectrum sharing. In this paper, we study joint design of variable power AMC and truncated-ARQ protocol in the context of spectrum-sharing systems. Our aim is to devise maximum spectral efficiency of the secondary user's link under the constraints of interference-power at the primary receiver, and the target packet error rate.
The remainder of this paper is organized as follows. Section 2 presents the system and channel models, parameters used throughout the paper, and background of the problem addressed. Section 3 deals with the derivation of ASE of the secondary link subject to the specified constraints, and its packet loss probability. Numerical results are discussed in Section 4. Finally, the paper is concluded in Section 5.

2. System Model

Adopting the spectrum-sharing scenario used in [9], we consider a spectrum-sharing system consisting of single primary and secondary users. The secondary user is allowed to operate within the primary user's licensed spectrum, provided that the average interference power inflicted at the primary receiver does not exceed a certain average threshold. The secondary transmitter employs discrete AMC and power control at the physical layer, and truncated-ARQ protocol at the data link layer. The packets from the secondary's higher layers are stored in an infinite transmit buffer and are grouped into frames for transmission. The secondary transmitter selects an AMC mode, corresponding to a modulation size and forward error correction (FEC) code rate pair [4], and adapts transmit power based on channel state information (CSI) feedback from the secondary and primary receivers. The secondary receiver decodes the received bit streams and places them into a packet structure in order to forward them to the higher layers. Upon erroneous detection of a packet, the ARQ protocol initiates a retransmission and the erroneous packets are selectively retransmitted. The number of retransmissions is bounded by a specific maximum ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq2_HTML.gif ), and the incorrectly received packet after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq3_HTML.gif transmissions is dropped from the receiver buffer. We adhere to the packet and frame structures shown in Figure 1. The system model has been depicted in Figure 2.
We consider discrete-time block-fading channels for the secondary and primary users' links. The channel gains from the secondary transmitter to the primary and secondary receivers are, respectively, denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq4_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq5_HTML.gif . Both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq6_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq7_HTML.gif are assumed to be stationary and ergodic with probability density functions (pdf's) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq8_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq9_HTML.gif , respectively. Furthermore, both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq10_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq11_HTML.gif are assumed to be independent and identically distributed (i.i.d.) processes, following the Nakagami- https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq12_HTML.gif fading distribution with unit variance. The noise power spectral density and the received signal bandwidth are denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq13_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq14_HTML.gif , respectively; without loss of generality we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq15_HTML.gif for the simplicity of analysis [11]. Moreover, the knowledge of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq16_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq17_HTML.gif is assumed to be available at the secondary transmitter. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq18_HTML.gif can be fed back from the secondary receiver to the secondary transmitter. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq19_HTML.gif can be fed back either directly from the primary receiver to the secondary transmitter or indirectly through a band manager which mediates between two parties [5].
We consider a variable power variable rate transmission scheme at the secondary transmitter, utilizing coded discrete M-QAM modulation. It should be noted that adaptive power and rate of the secondary user are functions of both channel gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq20_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq21_HTML.gif . This is due to average interference power constraint imposed on secondary transmission, defined by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq22_HTML.gif is transmit power of the secondary user, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq23_HTML.gif denotes the maximum allowed interference at the primary receiver. Using the fact that interference constraint (1) depends on the channel gains through the ratio of these parameters [9, ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq24_HTML.gif )], we define a new random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq25_HTML.gif with the pdf
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq26_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq27_HTML.gif denote the Nakagami fading parameters for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq28_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq29_HTML.gif , respectively, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq30_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq31_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq32_HTML.gif refers to the Gamma function.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq33_HTML.gif denote the preadaptation secondary received SNR with average secondary transmit power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq34_HTML.gif . In order to perform AMC, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq35_HTML.gif is divided into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq36_HTML.gif nonoverlapping consecutive intervals, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq37_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq38_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq39_HTML.gif is the number of AMC modes. The AMC mode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq40_HTML.gif is chosen when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq41_HTML.gif , and transmission takes place with rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq42_HTML.gif and power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq43_HTML.gif . Both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq44_HTML.gif used in (1) and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq45_HTML.gif are essentially the same, and we will use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq46_HTML.gif to denote transmit power of the secondary user in rest of the expressions. No transmission occurs when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq47_HTML.gif , corresponding to the case when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq48_HTML.gif is weak compared to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq49_HTML.gif . With the purpose of maximizing the spectral efficiency, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq50_HTML.gif , of the secondary user, we use the following expression to approximate the secondary channel https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq51_HTML.gif in mode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq52_HTML.gif as a function of postadaptation received SNR, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq53_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ3_HTML.gif
(3)
The parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq54_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq55_HTML.gif are transmission mode and packet-size dependent, and can be obtained by fitting the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq56_HTML.gif expression given in (3) to the exact https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq57_HTML.gif obtained through simulation. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq58_HTML.gif model corresponding to constant-power allocation at the secondary transmitter has been used and verified in [4].

3. Adaptive Coded Rate and Power Allocation with ARQ

In this section, we deal with the problem of maximizing the spectral efficiency of the secondary user under specified https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq59_HTML.gif and average interference limit constraints. We start with determining the optimal SNR boundaries https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq60_HTML.gif for AMC mode switching, in order to maximize the ASE under the aforementioned constraints.

3.1. AMC at the Physical Layer

The ASE of the secondary link for discrete AMC case is essentially the sum of data rates of all the modes weighted by the probability of occurrence of the respective mode. Upon selection of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq61_HTML.gif th mode, each symbol is transmitted with the rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq62_HTML.gif associated with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq63_HTML.gif constellation size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq64_HTML.gif and FEC code rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq65_HTML.gif . Presuming a Nyquist pulse shaping filter with bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq66_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq67_HTML.gif corresponds to the symbol rate, the ASE achieved at the physical layer without considering possible packet retransmission in the data link layer is expressed by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq68_HTML.gif is the probability of transmission in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq69_HTML.gif th mode, and is defined by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq70_HTML.gif denotes the Gaussian hypergeometric function [12].
In accordance with the defined random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq71_HTML.gif and discrete AMC modes, the average interference constraint given in (1) transforms to
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ6_HTML.gif
(6)
Using (3), power allocated to the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq72_HTML.gif th mode can be expressed in terms of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq73_HTML.gif approximation parameters as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ7_HTML.gif
(7)
with (for average transmit power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq74_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq75_HTML.gif )
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ8_HTML.gif
(8)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq76_HTML.gif represents the achievable instantaneous https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq77_HTML.gif , and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ9_HTML.gif
(9)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq78_HTML.gif denotes the target https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq79_HTML.gif . We formulate the optimization problem of determining the AMC mode switching levels for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq80_HTML.gif , in order to maximize the ASE subject to average interference and instantaneous https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq81_HTML.gif constraints as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ10_HTML.gif
(10)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ11_HTML.gif
(11)
Constraint C1 represents the maximum allowed interference constraint imposed on the secondary users, and we obtained it by assuming equality in expression (8) and replacing (7) in the average interference constraint equation (6). C2 corresponds to the instantaneous https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq82_HTML.gif constraint. It can be shown that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq83_HTML.gif and the constraints C1 and C2 are convex with respect to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq84_HTML.gif (the proof is given in appendix), and Slater's condition holds, so there is no duality gap, and the optimal solution is characterized by the Karush-Khun-Tucker conditions [13]. Proof of fulfillment of Slater's condition is provided in Figure 3. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq85_HTML.gif -axis corresponds to right-hand side of the constraint C1, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq86_HTML.gif -axis shows the difference between respective LHS and RHS values of the same. Figure 3 ensures that all the values on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq87_HTML.gif -axis are negative; therefore, there exists https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq88_HTML.gif for which strict inequality holds in constraint C1.
To solve the optimization problem (10) for AMC mode switching levels of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq89_HTML.gif , the Lagrangian for this problem is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ12_HTML.gif
(12)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq90_HTML.gif is the Lagrangian multiplier. Using the KKT conditions, the optimal solution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq91_HTML.gif and the corresponding Lagrangian multiplayer https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq92_HTML.gif must satisfy the following conditions:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ13_HTML.gif
(13)
Considering (13), the optimal boundary points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq93_HTML.gif can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ14_HTML.gif
(14)
Value of the Lagrangian multiplier https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq94_HTML.gif can be determined by substituting the boundary points in average interference constraint https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq95_HTML.gif of (10) with equality sign. We use numerical methods to determine https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq96_HTML.gif . Value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq97_HTML.gif corresponds to the boundary points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq98_HTML.gif which satisfy the average interference constraint C1 of (10). By using maximum allowed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq99_HTML.gif limit ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq100_HTML.gif ) in (11), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq101_HTML.gif becomes a function of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq102_HTML.gif , its pdf, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq103_HTML.gif (which also can be fixed to a certain value depending upon the interference level allowed by the primary user). As shown in appendix, the optimization problem (10) is a convex optimization problem; therefore, the boundary points obtained in (14) are also optimal. Substitution of optimal boundary points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq104_HTML.gif in (4), and (7) yields the optimum ASE and optimum power allocated in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq105_HTML.gif th transmission mode, respectively. Calculation of adaptive power from (7) requires https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq106_HTML.gif values along with the boundary values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq107_HTML.gif . Based on our initial assumption of availability of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq108_HTML.gif at the secondary transmitter, transmit power in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq109_HTML.gif th mode can be easily determined.

3.2. Power Adaptation and AMC Combined with ARQ

Application of the ARQ protocol at the data link layer facilitates retransmission of the erroneous packets received at the secondary receiver. However, for practical purpose, we assume that the number of retransmissions of a packet with error is bounded by a maximum value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq110_HTML.gif [14, 15]. This is determined by the maximum delay which can be tolerated in communication between the secondary transmitter and the secondary receiver. If a packet is still erroneous after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq111_HTML.gif retransmissions, it will be dropped from the receiver buffer and will be considered lost. ASE of the secondary link incorporating ARQ can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq112_HTML.gif is the effective average number of retransmissions per packet (defined in (18)), and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq113_HTML.gif is the average packet error rate of all modes, and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ16_HTML.gif
(16)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq114_HTML.gif represents the average https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq115_HTML.gif (the ratio of the number of incorrectly received packets over those transmitted using mode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq116_HTML.gif ) in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq117_HTML.gif th mode, and is defined by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ17_HTML.gif
(17)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq118_HTML.gif on the secondary link employing joint AMC-ARQ can be determined from the following equation:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ18_HTML.gif
(18)
As described earlier in this subsection, persistence of error in a packet after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq119_HTML.gif retransmissions results in loss of that packet, and the actual packet loss probability, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq120_HTML.gif , for the considered policy is given as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq121_HTML.gif is the maximum acceptable packet loss probability.

3.3. Truncated ARQ without AMC

This section analyzes performance of secondary system employing truncated-ARQ without AMC at the physical layer. Therefore, transmit power and transmission mode are not adaptive to CSI. The average spectral efficiency for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq122_HTML.gif th transmission mode is calculated with average transmit power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq123_HTML.gif . Replacing adaptive power in (3) with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq124_HTML.gif , and using (2), the average https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq125_HTML.gif at the physical layer can be obtained as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ20_HTML.gif
(20)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq126_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq127_HTML.gif denotes the exponential integral function. Closed form of average https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq128_HTML.gif at the physical layer for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq129_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ21_HTML.gif
(21)
With https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq130_HTML.gif maximum retransmissions, the average number of transmissions per packet is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ22_HTML.gif
(22)
Packet loss probability, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq131_HTML.gif , and the average spectral efficiency, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq132_HTML.gif , can be obtained by the following equations:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ23_HTML.gif
(23)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq133_HTML.gif is the threshold transmit power beyond which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq134_HTML.gif is guaranteed to be not more than the maximum acceptable packet loss probability, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq135_HTML.gif , which may not be true otherwise for nonadaptive systems. It can be identified numerically that the threshold https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq136_HTML.gif exists for mode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq137_HTML.gif , which also satisfies interference constraint imposed by primary users. Spectral efficiency of nonadaptive secondary systems employing truncated ARQ has been plotted in Figures 4 and 5.

4. Numerical Results

This section presents numerical results based on the analytical expressions derived in Section 3, to quantify the performance gain of the proposed scheme in terms of overall spectral efficiency and error performance. The analytical expressions have been developed for the Nakagami- https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq141_HTML.gif block fading channel links https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq142_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq143_HTML.gif . However, to generate the numerical results, in this section we consider two specific cases of the Nakagami distribution namely, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq144_HTML.gif , which is nothing but the Rayleigh distribution, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq145_HTML.gif . Adopting the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq146_HTML.gif approximation parameters of six-mode AMC scheme for packet length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq147_HTML.gif from [4, Table https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq148_HTML.gif ], we choose the maximum allowed packet error probability for the secondary link as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq149_HTML.gif . The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq150_HTML.gif approximation parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq151_HTML.gif are determined by the AMC mode chosen corresponding to the random variable https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq152_HTML.gif , which is the ratio of channels gains. We compare ASE resulting from optimized AMC-ARQ for the secondary link under average interference power constraint, with channel capacity of the corresponding distribution derived in [16].
ASE of the secondary link corresponding to different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq153_HTML.gif is plotted against average inflicted interference limit at the primary receiver in Figures 4 and 5, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq154_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq155_HTML.gif , respectively. It is apparent from (15) that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq156_HTML.gif corresponds to the special case of AMC only. Figures 4 and 5 depict that combined AMC-ARQ at the secondary transmitter provides significant gain in spectral efficiency over AMC only, for both fading scenarios. This is due to the underlying error correcting capability of truncated-ARQ, which depends on the maximum number of retransmissions. Error correcting capability of ARQ increases with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq157_HTML.gif , which benefits physical layer by relaxing the stringent error correction requirements. This lower performance requirement at physical layer is exploited to increase the transmission rates, which results in overall spectral efficiency improvement [4]. Closeness of the spectral efficiency curve corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq158_HTML.gif to the respective channel capacity corroborates this. However, increasing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq159_HTML.gif beyond 2 does not further increase the ASE, which is asserted in Figure 6. Figures 4 and 5 also show the gain in ASE achieved by physical layer optimization, that is, AMC only over nonadaptive system with truncated ARQ. Figure 6 depicts the effect of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq160_HTML.gif on ASE of the secondary user in the Rayleigh and the Nakagami distributed scenarios. It can be clearly noticed that the spectral efficiency in both fading scenarios becomes almost constant after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq161_HTML.gif . Figure 6 also indicates that the spectral efficiency of the secondary link following the Rayleigh distribution is greater than that following the Nakagami distribution. This is in contrast to the spectral efficiency of fading channel under transmit power constraint for which the spectral efficiency increases when the Nakagami parameter increases.
Figure 7 demonstrates error performance of the proposed policy by plotting the packet loss probability as a function of target PER, with and without ARQ. It is evident from the plots that application of the ARQ protocol significantly improves error performance of the secondary link, for both the fading scenarios considered. This is in general true for channel links following the Nakagami- https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq163_HTML.gif distribution.

5. Conclusion

In this paper, we developed a cross-layer design scheme in a dynamic spectrum sharing system consisting of single primary and secondary users. We considered a spectrum sharing scenario, where the secondary user can operate within the primary user's licensed spectrum, provided that the average interference power inflicted at the primary receiver does not exceed a certain average threshold. The secondary transmitter exploited cross-layer design by employing discrete AMC with adaptive power control at the physical layer, and the truncated-ARQ protocol at the data link layer. We determined AMC mode switching levels of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq166_HTML.gif , in order to maximize the performance of the secondary link in terms of ASE and error performance under the specified packet error rate (PER) and average interference limit constraints. Numerical results verified that the secondary link of the considered system combining ARQ with AMC achieves significant gain in ASE depending on the maximum number of retransmissions initiated by ARQ protocol. The results further lead to the conclusion that increasing the number of retransmissions improves packet loss rate probability performance of the secondary link.

Appendix

In order to prove the convexity of (10), let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq167_HTML.gif denote the objective function in (10), that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ24_HTML.gif
(24)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq168_HTML.gif is given by (2). We introduce the following lemma.
Lemma 1.
For a Nakagami-m fading pdf, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq169_HTML.gif is a sufficient condition for convexity of both the function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq170_HTML.gif and constraint function in (10).
Proof.
First consider the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq171_HTML.gif function. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq172_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq173_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq174_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq175_HTML.gif to be convex, it is sufficient to have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq176_HTML.gif [13]. We have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ25_HTML.gif
(25)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq177_HTML.gif , in order to guarantee https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq178_HTML.gif , it is required to have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq179_HTML.gif , for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq180_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ26_HTML.gif
(26)
Since the denominator of the above fraction is always positive, in order to guarantee https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq181_HTML.gif , the numerator should be negative. This leads to
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ27_HTML.gif
(27)
which is satisfied for all AMC modes. Now considering the constraint C1 in (10), denoted by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ28_HTML.gif
(28)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq182_HTML.gif , it is easy to check that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq183_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq184_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq185_HTML.gif , and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_Equ29_HTML.gif
(29)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq186_HTML.gif , the first term in the R.H.S of (29) is positive. From discussion on convexity of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq187_HTML.gif function, we know that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq188_HTML.gif , we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq189_HTML.gif , and therefore, the second term in R.H.S of (29) is also positive and consequently https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq190_HTML.gif , and hence https://static-content.springer.com/image/art%3A10.1155%2F2010%2F458472/MediaObjects/13638_2010_Article_1913_IEq191_HTML.gif function is convex.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Shikh-Bahaei M: Joint optimization of "transmission rate" and "outer-loop SNR target" adaptation over fading channels. IEEE Transactions on Communications 2007, 55(3):398-403.MathSciNetCrossRef Shikh-Bahaei M: Joint optimization of "transmission rate" and "outer-loop SNR target" adaptation over fading channels. IEEE Transactions on Communications 2007, 55(3):398-403.MathSciNetCrossRef
2.
go back to reference Niyato D, Hossain E: Competitive spectrum sharing in cognitive radio networks: a dynamic game approach. IEEE Transactions on Wireless Communications 2008, 7(7):2651-2660.CrossRef Niyato D, Hossain E: Competitive spectrum sharing in cognitive radio networks: a dynamic game approach. IEEE Transactions on Wireless Communications 2008, 7(7):2651-2660.CrossRef
3.
go back to reference Sampei S, Harada H: System design issues and performance evaluations for adaptive modulation in new wireless access systems. Proceedings of the IEEE 2007, 95(12):2456-2471.CrossRef Sampei S, Harada H: System design issues and performance evaluations for adaptive modulation in new wireless access systems. Proceedings of the IEEE 2007, 95(12):2456-2471.CrossRef
4.
go back to reference Liu Q, Zhou S, Giannakis GB: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Transactions on Wireless Communications 2004, 3(5):1746-1755. 10.1109/TWC.2004.833474CrossRef Liu Q, Zhou S, Giannakis GB: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Transactions on Wireless Communications 2004, 3(5):1746-1755. 10.1109/TWC.2004.833474CrossRef
5.
go back to reference Peha JM: Approaches to spectrum sharing. IEEE Communications Magazine 2005, 43(2):10-12.CrossRef Peha JM: Approaches to spectrum sharing. IEEE Communications Magazine 2005, 43(2):10-12.CrossRef
6.
go back to reference Weiss TA, Jondral FK: Spectrum pooling: an innovative strategy for the enhancement of spectrum efficiency. IEEE Communications Magazine 2004, 42(3):S8-S14.CrossRef Weiss TA, Jondral FK: Spectrum pooling: an innovative strategy for the enhancement of spectrum efficiency. IEEE Communications Magazine 2004, 42(3):S8-S14.CrossRef
7.
go back to reference Gastpar M: On capacity under received-signal constraints. In Proceedings of the 42nd Annual Allerton Conference on Communication, Control and Computing, 2004. Citeseer; Gastpar M: On capacity under received-signal constraints. In Proceedings of the 42nd Annual Allerton Conference on Communication, Control and Computing, 2004. Citeseer;
8.
go back to reference Musavian L, Aïssa S: Capacity and power allocation for spectrum-sharing communications in fading channels. IEEE Transactions on Wireless Communications 2009, 8(1):148-156.CrossRef Musavian L, Aïssa S: Capacity and power allocation for spectrum-sharing communications in fading channels. IEEE Transactions on Wireless Communications 2009, 8(1):148-156.CrossRef
9.
go back to reference Musavian L, Aïssa S: Adaptive modulation in spectrum-sharing systems with delay constraints. Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009 1-5. Musavian L, Aïssa S: Adaptive modulation in spectrum-sharing systems with delay constraints. Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009 1-5.
10.
go back to reference Harsini JS, Lahouti F: Joint optimization of adaptive modulation and coding, power control and packet retransmission over block fading channels. Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks (ITW '07), July 2007 1-5. Harsini JS, Lahouti F: Joint optimization of adaptive modulation and coding, power control and packet retransmission over block fading channels. Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks (ITW '07), July 2007 1-5.
11.
go back to reference Harsini JS, Lahouti F: Adaptive transmission policy design for delay-sensitive and bursty packet traffic over wireless fading channels. IEEE Transactions on Wireless Communications 2009, 8(2):776-786.CrossRef Harsini JS, Lahouti F: Adaptive transmission policy design for delay-sensitive and bursty packet traffic over wireless fading channels. IEEE Transactions on Wireless Communications 2009, 8(2):776-786.CrossRef
12.
go back to reference Gel'fand I, Gindikin S, Graev M: Selected Topics in Integral Geometry. Amer Mathematical Society; 2003.MATH Gel'fand I, Gindikin S, Graev M: Selected Topics in Integral Geometry. Amer Mathematical Society; 2003.MATH
13.
go back to reference Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, New York, NY, USA; 2004.CrossRefMATH Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, New York, NY, USA; 2004.CrossRefMATH
14.
go back to reference Shadmand A, Shikh-Bahaei M: Tcp dynamics and adaptive mac retry-limit aware link-layer adaptation over ieee 802.11 wlan. Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR '09), May 2009 193-200. Shadmand A, Shikh-Bahaei M: Tcp dynamics and adaptive mac retry-limit aware link-layer adaptation over ieee 802.11 wlan. Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR '09), May 2009 193-200.
15.
go back to reference Li Q, van der Schaar M: Providing adaptive qos to layered video over wireless local area networks through real-time retry limit adaptation. IEEE Transactions on Multimedia 2004, 6(2):278-290. 10.1109/TMM.2003.822792CrossRef Li Q, van der Schaar M: Providing adaptive qos to layered video over wireless local area networks through real-time retry limit adaptation. IEEE Transactions on Multimedia 2004, 6(2):278-290. 10.1109/TMM.2003.822792CrossRef
16.
go back to reference Ghasemi A, Sousa ES: Capacity of fading channels under spectrum-sharing constraints. Proceedings of the IEEE International Conference on Communications (ICC '06), July 2006 10: 4373-4378. Ghasemi A, Sousa ES: Capacity of fading channels under spectrum-sharing constraints. Proceedings of the IEEE International Conference on Communications (ICC '06), July 2006 10: 4373-4378.
Metadata
Title
Cross-Layer Design in Dynamic Spectrum Sharing Systems
Authors
A. Shadmand
K. Nehra
M. Shikh-Bahaei
Publication date
01-12-2010
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2010/458472

Other articles of this Issue 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Go to the issue

Premium Partner