In this article, we deal with a novel access protocol design for cognitive cooperative networks with multiple antennas. According to the principles of cognitive radio, the secondary user (SU) can exploit the primary user (PU) burstiness to access the licensed spectrum in the proposed access protocol. To get more access opportunities to the licensed spectrum, the SU simultaneously relays the PU’s packets and transmits its own packets based on the superposition coding. Furthermore, to concurrent transmission of the PU’s packets and SU’s packets based on the superposition coding such that they are received without the interference at the primary receiver and secondary receiver respectively, two weight vectors at the SU equipped with multiple antennas are designed based on zero-forcing algorithm. Specifically, from a networking perspective, we analyze the performance of the proposed access protocol in terms of the maximum stable throughput and the average end-to-end delay for both the PU and SU based on the principles of queueing theory. In addition, to protect the PU’s performance and exhibit the advantage of adopting multiple antenna technology, we jointly optimize the parameter of superposition coding and the number of antennas, and define the maximum stable throughput cooperative gain compared to the non-cooperative access scheme. More importantly, the impact of imperfect channel state information (CSI) at the SU on the maximum stable throughput and the average end-to-end delay performance is evaluated in the simulations from a practical point of view. Analysis and simulation results demonstrate that the proposed access protocol achieves significant performance gains for both the PU and the SU, outperforms the existing cooperative access protocol based on the dirty-paper coding, and keeps robust against to the imperfect CSI.
The online version of this article (doi:10.1186/1687-1499-2013-70) contains supplementary material, which is available to authorized users.
Competing interests
The authors declare that they have no competing interests.
1 Introduction
Cognitive radio has been proposed as a promising technology to solve the contradiction between the inefficient utilization of spectrum and the limitation of spectrum resources in recent years [1]. In cognitive radio networks, the secondary user (SU) is allowed to share the licensed spectrum when the performance of the primary user (PU) is not affected. Currently, the SU can access the licensed spectrum through three schemes: interweaved spectrum sharing, underlay spectrum sharing and overlay spectrum sharing [2]. In the interweaved spectrum sharing scheme, the SU can access the licensed spectrum when the PU is detected to be absent, known as spectral hole. In the underlay spectrum sharing scheme, the SU is allowed to share the licensed spectrum if the interference from the SU causing to the PU is below a given threshold, i.e., interference temperature. In the overlay spectrum sharing scheme, the SU needs to obtain the PU’s message, such as modulation and coding modes, to aid PU’s transmission to get more access opportunities. In this article, we focus on evaluating the performance of an overlay spectrum sharing system from a networking perspective.
Recently, relaying transmission has been proposed as a way to improve the throughput and coverage of wireless communication systems [3]. Considering the advantage of relaying transmission, it has been broadly applied in cognitive radio networks. Most of the existing works on the combined topic focus on solving the problems in the physical layer [4‐10], such as the enhancement of the sensing ability for the SU and the improvement of the outage and error performances for both the PU and SU. When delay-sensitive applications are considered, other performance metrics about the maximum stable throughput and the average end-to-end delay become critical. Nowadays, various access protocols for cognitive cooperative networks were proposed where the SU cooperatively relayed the PU’s packets in exchange for more access opportunities [11‐14]. Simeone et al. [11] analyzed the maximum stable throughput for both the primary system and the secondary system with and without relaying capability in the basic four nodes with single antenna configuration. Sadek et al. [12] investigated the stability and the delay of a cognitive multiple access relay channel, where the cognitive user acted as a cooperative node for relaying PU’s packets without having its own packets. Krikidis et al. [13] proposed various protocol designs for a single antenna cognitive cooperative system with a cluster of SUs by using dirty-paper coding (DPC) and opportunistic relay selection. However, the system model considered in [13] was not practical which required the information to be perfectly exchanged with the inner of the cluster and rigorous synchronization for each user. In addition, there was the interference at the primary receiver (PR) and the secondary receiver (SR) in the proposed access protocol based on the complicated DPC [13], which resulted in the poor performances of PU and SU. Bao et al. [14] studied the performance of a single antenna cognitive cooperative system with coexisting multiple PUs and one SU in terms of the maximum stable throughput and the average end-to-end delay.
Anzeige
While these prior works have improved our understanding on the protocol design and performance analysis for cognitive cooperative systems, the key limitation of these works is that they all assume a single antenna system. With the fact that the multiple antenna technique will be adopted as one of the key enabling technologies for the next generation wireless communication systems, the importance of understanding the fundamental performance of cognitive multiple antenna networks becomes increasingly evident [15‐18]. Therefore, we are interested in the scenario where a SU equipped with multiple antennas and making a comprehensive analysis of the proposed protocol design for cognitive cooperative networks in this article. To the best of our knowledge, the evaluation of the application of multiple antenna technique to cognitive cooperative networks has not been reported in the literature from a networking point of view. Hence, the goal of the work is to evaluate the stable throughput for PU and SU and the end-to-end delay performance for the PU by using the principle of queuing theory. To get more access opportunities, we make the SU as a relay for the PU and allow the SU to simultaneously transmit the PU’s packets and its own packets based on the superposition coding in the cognitive cooperative networks. Furthermore, to avoid the interference to each other, two weight vectors are designed at the SU for the PR and the SR based on zero-forcing algorithm, respectively. More importantly, the impact of imperfect channel state information (CSI) on the performance of the proposed access protocol is also considered in the simulations. Results demonstrate that the designed protocol is robust against to the imperfect CSI and achieves significant performance gains for the PU and the SU, respectively.
The rest of this article is organized as follows. In Section 2, a system model is described. Section 3 designs the cognitive cooperative protocol and analyzes the maximum stable throughput of the proposed access protocol for both the PU and the SU, respectively. In Section 4, we define the cooperative gain of the proposed cooperative protocol and jointly optimize the parameter of the superposition coding and the number of antennas. In Section 5, the average end-to-end delay performance for the PU is analyzed. Finally, conclusions are drawn in Section 6.
2 System model
As illustrated in Figure 1, we consider a cognitive cooperative system which consists of a PU, a PR, a SU equipped with M antennas and a SR.a We make an assumption that both the PU and SU have an infinite buffer to store the incoming packets as in [11‐14]. The channel is slotted in time and the transmission time of each packet equals to a slot duration. The packets’ arrival at the PU and the SU are Bernoulli random process, independently and stationary from slot to slot with mean λp and λs (packets per slot), respectively. Due to the effect of the fading channel, a packet can be successfully or unsuccessfully received by the intended receiver, which requires the feedback acknowledgment (ACK) and negative acknowledgment (NACK),b respectively.
×
2.1 Physical layer model
We assume that all channels experience independent stationary Rayleigh flat-fading with channel coefficients being denoted as in Figure 1, which are circularly symmetric complex Gaussian random variable with zero-mean and unit-variance. Thus we have , , , , and , where α (2≤α≤5) denotes the path-loss exponent and dij,i∈{PU,SU},j∈{PR,SR} represents the distance between the respective transmitter and receiver. Throughout the article, we assume that the CSI about g0, f0 and f1 is known at the SU.c The transmit powers at the PU and the SU are denoted by Pp and Ps, respectively. is complex additive white Gaussian noise (AWGN) at the PR and SR. is the AWGN vector at the SU. Accordingly, the signal xp received at the SU and the PR from the PU at time t can be respectively expressed as
(1)
(2)
Anzeige
where the index t is dropped without loss of generality.
In this article, we consider that the success or failure of packet reception for each link i→j is characterized by outage events and outage probabilities. The outage event Oij is defined as the instantaneous achievable rate C falls below a given rate R with an outage probability Pr{Oij}= Pr{C<R}. In order to overcome the impact of the fading channel and decrease the outage probability between the PU and the SU, we apply a 1×M weight vector wr to the received signal ySU at the SU, then the resultant scalar signal at the SU is given by
(3)
where (·)‡ denotes the conjugate transpose operation and as stated in [19, 20].
From (2) and (3), the received signal-to-noise ratio (SNR) of the primary signal at the PR and the SU can be respectively derived as
(4)
Correspondingly, the outage probability for a given target rate Rp between the PU and the PR is represented as
(5)
where and .
Similarly, the outage probability between the PU and the SU is given by
(6)
where , γ(·,·) and Γ(·) denote the lower incomplete gamma function and gamma function [21], respectively.
2.2 Queueing stability
In a communication network, the stability of the queue is a fundamental performance metric. Stability is defined as the state where all the queues in the network are stable. According to Rao and Ephremides [22], a queue is stable if and only if there exists a positive probability for the queue being empty, i.e.,
(7)
where Qi(t) denotes the size of the i th queue at time t. For a more rigorous definition of stability, we can refer to [22, 23]. If the arrival and departure rates of a queueing system are stationary, the stability can be checked by using Loynes’ theorem [24]. The theorem states that the queue is strictly stationary which requires the average arrival rate less than the average departure rate of the queue, i.e., the service rate. Otherwise, the queue is unstable.
3 Cognitive cooperative protocol design with multiple antennas
In this section, we investigate a novel cognitive cooperative access protocol which can efficiently combine the principles of cognitive radio with multiple antenna technology. From higher network layer viewpoint, we focus on analyzing the maximum stable throughput for both the PU and SU by using the queuing theory. Furthermore, we assume that the SU has perfect spectral sensing ability and mainly analyze the impact of multiple antennas on the cooperative access protocol for the PU and the SU in the article. The impact of imperfect spectral sensing problems is beyond the scope of our consideration.
3.1 Non-cooperative access scheme
In order to evaluate the gains obtained from the cooperative access scheme, the non-cooperative access scheme is analyzed as a baseline scenario, in which the PU transmits its data through the primary link directly without getting any assistance from the SU. The queue size of the PU or SU at time t, denoted by Qi(t),i∈{p,s}, evolves as follows:
(8)
where Xi(t) represents the number of packet arrivals at time t and is a Bernoulli stationary process with finite mean E[Xi(t)]=λi. Yi(t) denotes the number of packet departures from the queue Qi at time t. The values of Xi(t) and Yi(t) are taken from {0,1}. The function (·)+ is defined as (x)+= max(x,0).
In the non-cooperative access scheme, the service process of the PU can be modeled as , where 1[·] is the indicator function, denotes the complement of the outage event for link a→b at time t. From the definition of the service process, the average service process of the PU is given by
(9)
Due to assuming perfect spectral sensing at the SU, the PU’s queue and the SU’s queue are not interacting. Therefore, according to Loynes’ theorem, the average service process is also defined as the maximum stable throughput of the corresponding queue. Hence, the stability of the PU’s queue, under the non-cooperative access scheme, should satisfy
(10)
According to the principles of cognitive radio, the SU is allowed to access the licensed spectrum without producing the interference to the PR. Therefore, the SU can access the licensed spectrum when the PU does not have any packet in its queue. We can model the service process of the SU as [13, 14]
(11)
where {Qp(t)=0} represents the event that the PU’s queue is empty at time t. According to Little’s theorem [24], it has probability . Hence, the average service process of the SU is given by
(12)
where , . Correspondingly, the stability of the SU’s queue, under the non-cooperative access scheme, requires
(13)
3.2 Cooperative access scheme
In this section, we investigate a cognitive cooperative access scheme, in which the SU acts as a relay to deliver the PU’s packets unsuccessfully received by the PR through the primary link directly. Therefore, in contrast to the non-cooperative access scheme, the PU’s packet is removed from its queue whenever it is correctly received by the PR or the SU. Moreover, the conventional non-cooperative ACK/NACK mechanism should be revised and the SU is allowed to send an ACK to notify the PU for successful decoding the packet [11‐13]. To get more access opportunities, the SU simultaneously relays the PU’s packets and transmits its own packets based on the superposition coding in the cooperative access scheme. Further, to concurrent relay the PU’s packets and transmit its own packets based on the superposition coding such that they are received without interference at the PR and SR respectively, we design two M×1 weight vectors at the SU to the PU’s signal and the SU’s signal, i.e., wp and ws, respectively. Thus, the received signal at the PR and SR can be represented as
(14)
(15)
where β(0≤β≤1) denotes the power allocation factor, i.e., the parameter of the superposition coding. In order to eliminate the interference signal and maximize the desired signal at the PR and SR, we adopt the zero-forcing algorithm to design the weight vectors for simplicity. Then, two weight vectors wp and ws can be obtained by the following optimization problems [15, 25]
(16)
It seems difficult to solve the two optimization problems to get the zero-forcing beamforming weight vectors wp and ws. In fact, we can use projection matrix theory [26] to get the optimum weight vectors as follows:
(17)
where V PR⊥ and V SR⊥ are the projection matrices for the PR and SR and given, respectively, by
(18)
To this end, the received SNR at the PR and the SR can be calculated from (14)–(17), after some algebraic manipulations, as
(19)
To derive the maximum stable throughput for the primary system and the secondary system under the cognitive cooperative access scheme, we first present the following theorem [15, 25].
Theorem 1.Let,and. Then ∥V⊥h0∥2is Chi-square distributed with 2(M−1) degrees of freedom, and its probability density function is given as
(20)
In what follows, we analyze the maximum stable throughput of the cognitive cooperative access scheme and compare with that of the non-cooperative access scheme.
3.2.1 PU stability
In contrast to the non-cooperative access scheme, the SU has two queues in the cognitive cooperative access scheme, i.e., one queue Qs storing its own packets and one queue Qsp containing the packets from the PU which are not successfully received by the PR. Hence, the packets in the queue Qp will be removed in the cooperative access scheme whenever the packets are successfully received by the PR or the SU, which means that the maximum stable throughput of the PU depends on both the stability of the queue Qp and Qsp. Hence, the service process of the PU can be modeled as
(21)
Then, the average of the service process of the PU in the cognitive cooperative access scheme can be derived as
(22)
In what follows, we analyze the stability of the queue Qsp. The evolution of the queue Qsp can also be modeled as
(23)
where denotes the number of packet departures from the queue Qsp and is the number of packet arrivals of the queue Qsp at time t, respectively. It is worth noting from (23) that only the queue Qp is empty, the SU will access the channel to transmit its own packets and the packets in the queue Qsp based on the superposition coding to get more access opportunities.
Correspondingly, the average packet arrival rate and departure rate for the queue Qsp, at time t, can be respectively computed as
(24)
(25)
where . To this end, according to Loynes’ theorem [23], the stability condition of the PU’s queue in the proposed cooperative access scheme can be derived from (22)–(25) as
(26)
3.2.2 SU stability
According to the cognitive cooperative access scheme, the service process of the SU can be modeled as
(27)
where {Qsp(t)=0} denotes the event that the queue Qsp is empty at time t and the probability of the empty of the queue Qsp based on Little’s theorem [24] is given by
(28)
For the empty of the queue Qsp condition, the SU only establishes a communication between itself and the SR. From (27), the average service rate of the SU can be derived as
(29)
where .
Using Loynes’ theorem [23], the stability condition of the SU’s queue in the cognitive cooperative access scheme requires
(30)
4 Cooperative gains and parameters optimization
4.1 Cooperative gains
In this section, we first analyze the cooperative gains for the PU and the SU in the cognitive cooperative access scheme, respectively. In what follows, we define the maximum stable throughput cooperative gains for the PU and the SU as
(31)
Theorem 2.The upper bounds of the maximum stable throughput cooperative gains for both the PU and the SU are, respectively, given by
(32)
Proof. In case where M grows asymptotically large, we have
(33)
From (26) and (33), the maximum stable throughput of the PU with cooperation can be derived as
(34)
Since the maximum stable throughput of the PU without cooperation is independent of M, it keeps constant when M grows asymptotically large. To this end, the cooperative gain bound of the PU can be derived as (32). □
By following the similar proof for that of the PU, the cooperative gain bound of the SU can be obtained after some simple mathematical manipulations.
4.2 Parameters optimization
Due to the fact that the parameter of superposition coding, i.e., the power allocation factor β, introduces an interesting tradeoff between the maximum stable throughput of the PU and the SU. Hence, we optimize the appropriate power allocation factor β to maximize the stable throughput of the SU while supporting the pre-selected PU’s stable throughput λp 0 () in this section. The optimization problem can be formulated as
(35)
It is worth pointing out that the solution of the optimization problem should satisfy the inequality λp(M,β)≥λp 0. Since it is difficult to obtain a closed form expression for βopt, we numerically evaluate βopt by Monte Carlo simulations. As shown in Figure 2, the stable throughput of the SU decreases with the power allocation factor β whereas the stable throughput of the PU presents the flat behavior when the power allocation factor β exceeds a certain value. Hence, the optimal power allocation factor βopt can always be found for all practical SNR values under different antenna configurations through simulations. Besides, note that the use of βopt and Mopt based on (35), will simultaneously (i) achieve a significant performance improvement for the stable throughput at both the PU and the SU, and (ii) guarantee that the PU’s stable throughput of the cooperative access scheme will equal to or outperform the PU’s stable throughput of the non-cooperative scheme.
×
4.3 Numerical results for stable throughput performance
In this section, we make extensive numerical results to evaluate the performance of the proposed cooperative access scheme. To present the advantage of the proposed cooperative access scheme, the existing cooperative access scheme based on DPC in [13] is provided for comparison in the simulations. Throughout the article, a system topology where the PU, SU, and PR are collinear is considered. Unless otherwise specify, the simulation parameters are set as follows: dPU,PR=1, dPU,SU=1−d, dSU,PR=d, dSU,SR=d, σ2=1, α=2, Rp=2, and Rs=2.
Figure 3 compares the maximum stable throughput of cooperative and non-cooperative access schemes as a function of the PU’s arrival rate λp using the fixed power allocation factor β=0.5. We label the proposed cooperative access scheme based on zero-forcing algorithm as ZF-cooperation. It is noted from the figure that the proposed cooperative access scheme outperforms its non-cooperative counterpart. Further, as can be expected in any conventional multiple antennas system since the extra number of antennas provides additional space diversity gain, the maximum stable throughput of the SU is significantly improved in the proposed cooperative access scheme. However, in contrast to the cooperative access scheme, increasing the number of antennas at the SU does not provide any diversity gain in the non-cooperative access scheme due to the restriction of access opportunities for the SU. Hence, increasing the number of antennas only provides the additional coding gain for the SU in the non-cooperative access scheme.
×
In Figure 4, we compare the proposed cooperative access scheme, i.e., ZF-cooperation, with the conventional cooperative access scheme by using DPC in [13] (labeled as DPC-cooperation). We adopt the selection algorithm for the parameter of superposition coding in [13], in which the power allocation factor β is selected from the PU’s point of view. Hence, we select β0=0.6 and β1=0.7 for the ZF-cooperation scheme and the DPC-cooperation scheme, respectively. To a fair comparison between the two schemes, we assume that for ZF-cooperation scheme the PU and SU transmit with power Pp and Ps, respectively, while for the DPC-cooperation scheme the PT and SU transmit with power Pp and , respectively. This is due to the fact that two SUs are selected to transmit its own packets and relay the PU’s packets in the DPC-cooperation scheme. As can be observed in the figure, the proposed ZF-cooperation scheme significantly outperforms the DPC-cooperation scheme for both primary and secondary stable throughput. Furthermore, the non-cooperative access scheme achieves better performance than that of the DPC-cooperation scheme under low SNR regime. This is can be explained by the fact that the DPC-cooperation scheme introduces a severe interference to the primary transmission in the low SNR regime, which results in a lower gain throughput for the SU. However, different from the DPC-cooperation scheme, there exists no interference at the PU and SU in all SNR region in the proposed ZF-cooperation scheme.
×
Figure 5 illustrates the impact of the number of antennas M on the maximum PU’s stable throughput performance when Ps=5 and Pp=1,3,5 dB, respectively. As can be expected, when the transmit power of the PU increases, the maximum PU’s stable throughput is significantly improved. It is also observed that the maximum PU’s stable throughput of the proposed ZF-cooperation scheme is improved as the number of antennas M increases due to the fact that a higher diversity gain can be obtained by increasing the number of antenna. However, the maximum PU’s stable throughput almost keeps constant when M≥6 under different transmit powers of the PU, which implies that an adequate number of antennas can be selected for the design of the system to reduce the complexity of our scheme.
×
Figure 6 plots the cooperative gain of the PU versus the transmit power Ps when Pp=1 dB and 3 dB, respectively. It is noted from this figure that more cooperative gain of the PU can be obtained when the quality of PU’s link is poor. In addition, we can observe that the cooperative gain can be gradually improved by increasing the transmit power Ps of the SU and the number of antennas M. Specifically, when the number of antennas increases to a certain value, the full cooperative gain can be achieved in the proposed cooperative access scheme, which verifies our analysis in Section 4.
×
Figure 7 shows the impact of imperfect CSI on the PU and the SU performances of the proposed ZF-cooperation scheme. In previous analysis, we assume that perfect CSI about the links can be obtained at the SU. Such an assumption, however, does not hold in practical systems. The reason is that channel knowledge is always outdated due to the effect of delay and time-varying of the wireless link, which implies that we need to consider the impact of imperfect CSI. Since we are more interested in studying the impact of imperfect CSI on the designed weight vectors at the SU, we only consider the imperfect CSI about the channel f0 between the SU and the SR and the channel f1 between the SU and the PR in the simulation. The imperfect CSI can be described, using the correlation model [27‐29], as follows:
(36)
×
(37)
where denotes the outdated CSI between the SU and the SR, and is the outdated CSI between the SU and the PR. n0 and n1 are independent CSCG random vectors with each element having zero mean and unit variance, and Δδ2 (0≤Δδ2≤1) represents the variance of the outdated CSI. As shown in Figure 7, the stable throughput for the PU and the SU decreases for higher Δδ2. The result can be expected since increases of Δδ2 represent that the channel information about and becomes more inaccuracy at the SU. On the other hand, while the stable throughput of the PU decreases when the variance of the outdated CSI Δδ2 becomes larger, the proposed ZF-cooperation scheme still outperforms the non-cooperative access scheme, which means that the proposed ZF-cooperation scheme keeps robust against the imperfect CSI.
Figure 8 shows how the distance dPU,SU affects the maximum stable throughput for the PU and SU when M=3 and Pp=Ps=1 dB. From the figure, we see that the proposed cooperative access scheme achieves a better stable throughput performance than the non-cooperative access scheme for the PU over all values of dPU,SU. In addition, as we can observe, there exists an optimal dPU,SU to the maximum stable throughput of the PU and the SU, respectively. For the proposed cooperative access scheme, we note that the PU’s stable throughput improves for increasing dPU,SU when 0.1≤dPU,SU<0.7, but gets worse when 0.7≤dPU,SU≤0.9. This is due to the fact that the PU’s performance for the proposed cooperative access scheme is dominated by the worst link as the conventional relay networks. For 0.1≤dPU,SU<0.7, the SU-PR link is the worst link compared to the PU-SU link, it has a lower SNR due to the longer distance. While for 0.7≤dPU,SU≤0.9, the longer distance results in the poor link between the PU and the SU.
×
5 Delay analysis
In this section, we analyze the average end-to-end delay of the PU in the proposed cooperative access scheme. Before delving into the details, we first give the definition of the end-to-end delay for a packet, which is described as the time from the packet arrives at the queue Qi till it is correctly received by the respective receiver.
5.1 Non-cooperative access scheme
According to Little’s theorem, the average end-to-end delay of a packet in the queue Qp can be modeled as
(38)
where E[Qp] denotes the average queue size.
Theorem 3.The average end-to-end delay for a packet of the PU in the non-cooperative access scheme is
(39)
Proof. In order to analyze the average end-to-end delay of a packet in the corresponding queue Qp, we first define two state transition probabilities as follows:
(40)
where Qq(t)=n represents that the length of the queue, at time t, is n. As the queue evolution model in (8), we can get , and . Therefore, the stable distribution of the queue Qp can be derived by solving the balance equation [23]. Define as Pr(Qp=n), we have
(41)
(42)
To this end, the average queue size of Qp can be derived as
(43)
This completes the proof of Theorem 3. □
5.2 Cooperative access scheme
For the proposed cooperative access scheme, the packet is dropped from the queue Qp as long as it is successfully received by the PR or the SU. Thus, the average end-to-end delay of the PU’s packet consists of two parts, one delay in the queue Qp and the other delay in the queue Qsp.
Theorem 4.The average end-to-end delay for a packet of the PU in the proposed cooperative access scheme is
(44)
Proof. From the above analysis, we obtain that the total average end-to-end delay encountered by a packet in the PU’s queue can be modeled as
(45)
where and . The event A denotes that a packet is successfully transmitted from the PU to the PR through the primary link directly. The probability of the event A is given by
(46)
To this end, the average end-to-end delay for the packet of the queue Qp in the proposed cooperative scheme is given by
(47)
The closed-form expressions for the average delay of and can be derived by following the similar process in the non-cooperative access scheme. This completes the proof of Theorem 4. □
5.3 Results and discussions
Here we compare the average end-to-end PU’s queue delay of the proposed ZF-cooperation scheme with that of the non-cooperation scheme. We now consider the following two cases of interest in the simulations. Case 1: SU owning perfect CSI and Case 2: SU owning imperfect CSI.
Figures 9 and 10 illustrate that the delay performance of the proposed cooperative access scheme versus the PU’s arrival rate λp under perfect CSI and imperfect CSI cases, respectively. As shown in Figure 9, the average end-to-end delay performance of the proposed ZF-cooperation scheme outperforms that of the non-cooperation scheme. Moreover, the packet of the PU’s queue suffers severe delay with the increasing of the PU’s arrival rate. However, increasing the number of antennas can significantly improve the average end-to-end delay performance of the proposed ZF-cooperation scheme due to more diversity gain. In Figure 10, we investigate the impact of the imperfect CSI on the average end-to-end delay performance for the PU with different antenna configurations. It is observed that the average delay of the PU is almost not affected by the imperfect CSI at low arrival rate and can be improved by increasing the number of antennas. In addition, the proposed cooperative access scheme still outperforms the non-cooperative access scheme under the imperfect CSI, which demonstrates that the proposed cooperative access scheme keeps robust against the imperfect CSI at the SU.
×
×
6 Conclusions
In this article, we have dealt with the protocol design in cognitive cooperative networks with multiple antennas. To simultaneously transmit the PU’s data and its own data based on the superposition coding such that they were received without interference at the PR and SR respectively, two weight vectors were designed at the SU based on zero-forcing algorithm. Specifically, we analyzed the maximum stable throughput and the average end-to-end delay performance of the proposed cooperative access scheme based on zero-forcing algorithm and compared with that of the existing cooperative access scheme based on the DPC. Simulation results demonstrated that the proposed cooperative access scheme achieved a better performance than the existing cooperative access scheme by using the DPC. In addition, the cooperative stable throughput gains for the PU and the SU were defined to study the effect of antennas on the performance of cognitive cooperative networks, and the upper bounds for the PU and the SU were also derived, respectively. Through analysis and simulations, we found that the upper bound of cooperative gain could be obtained by increasing the transmit power of the SU or the number of antennas. Furthermore, the impact of imperfect CSI on the performance of the proposed cooperative access scheme was investigated from the practical view and simulation results showed that the proposed cooperative access scheme kept robust against the imperfect CSI at the SU.
Endnotes
aThe system model, corresponding to a practical scenario in which a secondary base station is serving one SU, is also considered in [15].bAssuming that the packet ACK or NACK feedback is no error due to the fact that the short length of ACK/NACK packets can be coded at very low rate in the feedback channel [11‐13].cIn practice, the CSI between the SU and the SR can be obtained through the classic channel estimation and feedback mechanisms as in [30]. While the CSI about g0 and f1 can be obtained at the SU by direct estimating pilot signals from the primary system or by using the band manager which can exchange the channel information between the PU and the SU [31].
Acknowledgements
This work was supported by the National Basic Research Program of China under Grant No. 2009CB320400, the National Science Foundation of China under Grant Nos. 60932002, 61072044 and 61172062, and in part by the Jiangsu Province Natural Science Foundation under Grant No. BK2011116.
Open Access
This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (
https://creativecommons.org/licenses/by/2.0
), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Competing interests
The authors declare that they have no competing interests.