# Distributed execution of cognitive relaying with time incentive: multiple PU scenario

- Taskeen Nadkar
^{1}Email author, - Vinay Thumar
^{1}, - Uday B Desai
^{2}and - Shabbir N Merchant
^{1}

**2012**:332

https://doi.org/10.1186/1687-1499-2012-332

© Nadkar et al.; licensee Springer. 2012

**Received: **9 February 2012

**Accepted: **28 September 2012

**Published: **2 November 2012

## Abstract

The prime focus of this study is in developing distributed algorithms for *cognitive relaying with time incentive for multiple primary users (CRTI-M)*. *CRTI-M* is a symbiotic paradigm in which the incumbent *primary users (PUs)* of the spectrum, with weak transmission links, seek cooperation from the cognitive *secondary user (SU)* nodes in their vicinity, and in return reward them with an *incentive time* for the latter’s own communication. When relaying through the SU network, each PU can either use its own spectrum or that of the other PUs. Cross-layer optimization problems are formulated to enable both these possibilities in a multi-hop multi-channel cognitive radio network with the objective of maximizing the *cumulative time incentive* for the SUs. Corresponding distributed algorithms are developed, which face the challenge of meeting the constraints of the formulated problems with only local information and the lack of a centralized controller. Further, to make the *CRTI-M* schemes practically realizable, a MAC scheduling protocol is suggested, which gives emphasis to the distributed implementation and provides a unified framework for the *PUs* and *SUs*. Simulation results are furnished to demonstrate the effectiveness of the proposed algorithms.

## Keywords

## Introduction

*Cognitive radio (CR)* attempts to alleviate the imbalance between spectrum allocation and its use, created by the current *command-and-control* spectrum access policy. It temporarily allows unused portions of the spectrum (*spectrum holes*/*white-spaces*), owned by the licensed users *(primary users–PUs)*, to be accessed by unlicensed users *(secondary users—SUs)*, without causing intrusive interference to the former’s communication[1]. This approach can lead to a significant increase in spectrum efficiency, networking efficiency, and energy efficiency[2].

Many schools of thought have evolved from the revolutionary CR paradigm to accommodate substantially different technologies and solutions, one of them being *symbiotic cooperative relaying (SCR)*. According to this model, the *PU* seeks to enhance its own communication by leveraging other users in its vicinity, having better channel conditions, as cooperative relays for its transmission, and in return provides suitable remuneration to them[3–7]. The *SU* nodes, being scavengers of the licensed PU spectrum, are potential candidates as relays. Besides, they have cognitive capabilities, which gives a large amount of flexibility of reconfiguration for resource allocation. The cooperation from the SU network results in enhanced transmission rate of the PU, which translates into reduced transmission time for the same amount of information bits of the PU as those transmitted on its direct link. Then, the time saved can be offered to the SUs for their own communication as a reward for cooperating with the PU (with a fixed rate demand). The SUs can achieve their communication in the *time incentive* without the need for spectrum sensing. The authors have previously formulated a cross-layer design to enable the *SCR* scheme called *cognitive relaying with time incentive* *(CRTI)*, for an orthogonal frequency division multiplexing (OFDM)-based multi-hop CR network[8]. The authors have also proposed that it is possible to reward the SUs with incentive frequency bands, i.e., *cognitive relaying with frequency incentive*[7, 9]. While all of the aforementioned works focus on providing centralized solutions to the schemes for a single PU scenario, the main concern of this article is to address a multiple PU model and propose distributed algorithms for the same.

Some unique challenges are faced when the *SCR* paradigm is enabled on the spectra of multiple PUs, viz. *CRTI for multiple PUs (CRTI-M)*[10, 11]. The complexity that arises in this scheme as opposed to *CRTI* for a single PU transceiver is the fact that every PU has its own distinct bandwidth of operation. Consequently, it is crucial to decide the most favorable way in which the available frequency bands be utilized during the relaying process in a multi-hop multi-channel environment. We suggest two methods of *CRTI-M*: *band-restricted relaying (BRR)*, in which each PU uses its own band when relaying through the SU network, and *all-band relaying (ABR)*, in which each PU can use all the available bands (its own, as well as those of the other PUs) when relaying through the SU network. We then formulate cross-layer optimization problems which address the power allocation, frequency domain scheduling, and routing for the two proposed methods, evaluate their upper bound and devise feasible centralized solutions to them.

While the feasible centralized solutions may give reasonably good results in case of a small network, they will require heavy signalling overheads to communicate the global network information to a centralized node in larger CR networks. Also, the computational ability of the node may become a bottleneck. We are thus motivated to explore a solution methodology to the optimization problems for the *CRTI-M* schemes, viz. *ABR* and *BRR*, that can be distributedly implemented among the SU nodes. This is the major contribution of the article.

The proposed algorithms address the complexity of distributed resource allocation in a multi-hop multi-channel SU network—an issue which is less commonly addressed in literature. The distinguishing features of the algorithm are as follows: (i) they ensure efficient utilization of the available node power by balancing the throughput along a selected path; (ii) they use a path selection metric which gives due weightage to both the throughput of the complete path as well as that link which may pose a bottleneck for the path; and (iii) incase of a conflict (common resources) between the paths for multiple PUs’ sessions, the one which provides the maximum benefit is selected.

Besides, to make the *CRTI-M* schemes practically realizable, the MAC layer scheduling and physical layer issues are approached in this article with some important concerns: (i) ensuring a completely distributed execution of the schemes among the SU nodes; (ii) developing a unified framework for both the entities (PUs and SUs); and (iii) isolating the PUs from the operation of the SUs, like in the *Commons model* of CR. However, we do take some liberty of allowing explicit signaling from the PUs to the SUs initially, which happens in the *property-rights model* (and not in the commons model)[12, 13].

The article organization is as follows: (2) section describes the communication scenario and system model. (3) section presents the centralized problem formulation for both the *CRTI-M* schemes, viz. *BRR* and *ABR*. The schemes are compared in (4) section. (5) section provides the details of the proposed distributed algorithms. (6) section explains the utilization of the *time incentive* by the SUs. (7) section furnishes the details of the distributed implementation and MAC scheduling protocol. (8) section presents simulation results and their detailed analysis. (9) section reports related work, while (10) section concludes the article.

## System model

*CRTI-M*is enabled when one or more PUs, with weak links, seek cooperation from the SU network. We define $\mathbb{Q}\phantom{\rule{0.5em}{0ex}}$as the set of PU transceivers participating in the

*CRTI-M*scheme in a specified time frame. OFDM is the communication technology used in the network. We have assumed unit bandwidth for each OFDM sub-carrier. The band-set of each PU is denoted by ${\mathbb{M}}_{q}$, $q\in \mathbb{Q}$. Each PU transmitter

*PU*

*T*

*x*

_{ q }acts as the source, the receiver

*PU*

*R*

*x*

_{ q }as the destination, and the SU nodes act as relays in the multi-hop communication (Figure1b). Decode-and-forward is the relaying technique at each node. The fading gains for various links are mutually independent and are modeled as zero mean complex circular Gaussian random variables. The protocol interference model is assumed[14]. The channel gains are invariant within a frame, but vary over frames (i.e., block-fading channels). We assume that the channel gains from each

*PU*

*T*

*x*

_{ q }to the SU network, the SU network to

*PU*

*R*

*x*

_{ q }, and those among the SUs, are good enough to provide a significantly higher end-to-end throughput as compared to the direct link of the PU transceiver, resulting in performance gains for both the PUs and SUs.

## Problem formulation

*q*th PU transceiver, and ${C}_{{\mathrm{textrel}}_{q}}$ is the maximum throughput achieved when relaying the

*q*th PU’s data through the SU network, then the

*time incentive*obtained for the SUs on band-set ${\mathbb{M}}_{q}$ in a frame duration (normalized to unity) is given by

Ideally, the incentive obtained from each PU ( ${\lambda}_{{t}_{q}}$) should be scaled by its bandwidth (*B*_{
q
}) to effectively capture the incentive obtained, i.e., ${\lambda}_{{t}_{q}}{B}_{q}$, $q\in \mathbb{Q}$. However, since we have assumed the same bandwidth for all the PUs, we define the *cumulative time incentive* as ${\sum}_{q}{\lambda}_{{t}_{q}}$. To efficiently exploit the channel diversities available in the multi-hop multi-channel SU network, we allow flow splitting, and spatial reuse of frequencies outside the interference range of nodes. The optimization problem involves a cross-layer view for power allocation, frequency band scheduling, and routing. A relay with poor channel conditions on all its links will be eliminated from the routes which strive to achieve maximum throughput; thus, relay selection is automatically achieved by the problem. In the following sections, two schemes for *CRTI-M* are proposed.

### BRR

In the first *CRTI-M* scheme, referred to as *BRR*, the data from each PU are relayed on its respective frequency band-set ${\mathbb{M}}_{q}$ within the SU network (Figure1b). If we define the communication between each unique participating PU transceiver, i.e., PU *T* *x*_{
q
}−PU *R* *x*_{
q
}, $q\in \mathbb{Q}$, as a session, the problem entails solving a multi-session optimization with the objective of maximizing the *cumulative time incentive*, i.e., ${\sum}_{q}{\lambda}_{{t}_{q}}$. Since each PU communicates on its own band within the SU network, the sessions can be thought of as independent problems; hence the variables ${x}_{\mathit{\text{ij}}}^{m}$, ${P}_{\mathit{\text{ij}}}^{m}$, and *f*_{
ij
} (which denote the band assignment, power allocation, and flow, respectively) are indexed by the session number. These problems are, however, connected by the node power and interference constraints.

*Optimization problem (P1):*

*Flow constraints:*

We assume bidirectional links; each node *i* in the graph has a transmit/receive set of nodes *T*_{
i
}. *f*_{
ij
}(*q*) is the data flow (bits/s) from node *i* to node *j* for the *q* th session. Equation (4) indicates that, except for the source (PU *T* *x*_{
q
}) and destination (PU *R* *x*_{
q
}) nodes, the inflow into a node is equal to the outflow. Equation (5) ensures that all the flows are non-negative. Equation (6) refers to the fact that the flows on a link cannot exceed its capacity according to Shannon’s channel capacity theorem[15]. ${h}_{\mathit{\text{ij}}}^{m}$ denotes the channel power gain on band *m* and ${P}_{\mathit{\text{ij}}}^{m}\left(q\right)$ denotes the corresponding power allocation for the *q* th session. In (6), the *log* function contains only *σ*^{2} in the denominator due to the use of an interference model, which ensures that when node *i* is transmitting to node *j* on band *m*, the interference from all other nodes in this band must remain negligible due to the frequency domain scheduling and interference constraints. $\mathbb{N}\phantom{\rule{0.5em}{0ex}}$denotes the node set of the network (including PU *T* *x*_{
q
}, PU *R* *x*_{
q
}, $\forall q\in \mathbb{Q}$ and the SUs), and $\mathbb{E}\phantom{\rule{0.5em}{0ex}}$denotes the edge set.

*Frequency Domain Scheduling Constraints:*

*i*has used a band

*m*for transmission or reception, it cannot be used by node

*i*again for any other transmission or reception. ${x}_{\mathit{\text{ij}}}^{m}\left(q\right)$ is a binary variable which takes the value 1 if and only if band $m\in {\mathbb{M}}_{q}$ is active on link

*(i,j)*, i.e.,

*Power constraints:*

Equations (9) and (10) ensure that ${P}_{\mathit{\text{ij}}}^{m}\left(q\right)\in \left[{P}_{{T}_{\mathit{\text{ij}}}}^{m},{P}_{\text{peak}}\right]$ if the band *m* is selected, and ${P}_{\mathit{\text{ij}}}^{m}\left(q\right)=0$ if the band is not selected. The data transmission from node *i* to *j* is successful only if the received transmission power exceeds a power threshold *P*_{
T
}, from which we can calculate the minimum required transmission power on a band *m* at node *i* as ${P}_{{T}_{\mathit{\text{ij}}}}^{m}={P}_{T}/{h}_{\mathit{\text{ij}}}^{m}$. *P*_{peak} denotes the maximum power that can be allocated to any band *m*. Equation (11) ensures that the power consumed at node *i* for all the sessions over all the bands cannot exceed the node power ${P}_{{\text{node}}_{i}}$.

*Interference constraints:*

Equation (12) ensures that for a successful transmission on link *i* to *j*, on an interfering link *k* to *h*, the transmit power on any band *m* cannot exceed *P*_{peak} if ${x}_{\mathit{\text{ij}}}^{m}\left(q\right)=0$; if ${x}_{\mathit{\text{ij}}}^{m}\left(q\right)=1$ then the total interference received by node *j* on band *m* cannot exceed the interference threshold *P*_{
I
}.

*Upper bound and a feasible centralized solution:*

In the above formulation ${h}_{\mathit{\text{ij}}}^{m}$, *σ*^{2}, *P*_{
T
}, *P*_{
I
}, *P*_{peak}, ${P}_{{\text{node}}_{i}}$ are all constants, while ${x}_{\mathit{\text{ij}}}^{m}\left(q\right)$, ${P}_{\mathit{\text{ij}}}^{m}\left(q\right)$, *f*_{
ij
}(*q*) are the optimization variables. It is clearly a *mixed integer non-linear programming problem*. Based on the discussion on similar problems in[14, 16] and the references therein, we conjecture that the given problem is NP-hard. A linear relaxation of the *log* term by the use of tangential supports[9] will drastically simplify the formulation and will provide an upper bound to the original problem solution. Also, a feasible sub-optimum solution can be obtained by *decoupling* the operations of power allocation and band scheduling, and that of flow computation, as follows:

- (1)
The power allocation and band scheduling $\left({P}_{\mathit{\text{ij}}}^{m}\right(q),{x}_{\mathit{\text{ij}}}^{m}(q\left)\right)$ are obtained from the log relaxed problem with tangential supports. This solution, however, may violate the flow constraints.

- (2)
(2) The above $\left({P}_{\mathit{\text{ij}}}^{m}\right(q),{x}_{\mathit{\text{ij}}}^{m}(q\left)\right)$ are substituted in the original problem, which is then solved only with respect to

*f*_{ ij }(*q*) as the optimization variable. The overall result represents a feasible solution to the original problem*P*1.

### ABR

In the second scheme of *CRTI-M* called *ABR*, the data from each PU can be relayed on the complete frequency band available within the SU network (which is the union of the band-sets of the participating PUs). This is unlike *BRR*, where the PU’s data are relayed only on its own band-set. The data from the various PUs are thus frequency interleaved on all available bands within the SU network in *ABR* (Figure1b).

The objective is to maximize the *cumulative time incentive* obtained from all the PUs. Though majority of the problem formulation for *ABR* is similar to that for *BRR*, the main difference is in the fact that in the latter the constraints have to be posed for each PU’s band-set, while in the former the constraints are posed on the complete available band-set.

*Optimization problem (P2):*

*Flow constraints:*

in which $\widehat{\mathbb{M}}$= $\bigcup _{q\in \mathbb{Q}}{\mathbb{M}}_{q}$. Equation (16) indicates that the sum of the flows of all sessions on a link cannot exceed the capacity of a link according to Shannon’s channel capacity theorem. Furthermore, Equation (17) describes the fact that only the PU’s own frequency band-set ${\mathbb{M}}_{q}$ will be available on the first and last hops, i.e., PU *T* *x*_{
q
} to the SU network and SU network to PU *R* *x*_{
q
}, while within the SU network, the total bandwidth of all the participating PUs is available.

*BRR*, with ${\mathbb{M}}_{q}$ replaced by $\mathbb{M}\phantom{\rule{0.5em}{0ex}}$(17). However, an additional frequency domain scheduling constraint is introduced to ensure that a band on a given edge is not used by more than one PU. There are two reasons for incorporating this constraint: (i) It results in a much simpler formulation than if multiple PUs were allowed to use the same band; and (ii) it allows a different QoS parameter to be set for each PU if desired.

*Note: In the ABR problem formulation, it is possible to allow multiple sessions to use the same band rather simply (thereby eliminating constraint (18)), without separating the power for the sessions as* ${P}_{\mathit{\text{ij}}}^{m}\left(q\right),q\in \mathbb{Q}$. *However, when the SUs are rewarded with the incentive time on each PU’s band, it is possible that they utilize it ‘selfishly’, i.e., in proportion to the power spent in relaying each PUs data. Given this situation, the above formulation seems the most appropriate.*

The nature of problem *P1* is the same as that of *P2*, and consequently, the upper bound and feasible centralized solution are computed in the same way as *BRR*.

## Comparing BRR and ABR

As described earlier, *ABR* allows the data from each PU to be relayed on frequency bands which do not necessarily belong to its own band-set, providing more channel diversity and consequently higher end-to-end throughput for the PUs, as compared to *BRR*. *BRR*, however, has one distinct advantage over *ABR*—if interference management has to be done for the individual PUs (this may be needed in case of PU prioritization, critical data transmission, or stringent QoS requirements), it is much easier in *BRR* since the PUs are always communicating on their own band-set, even within the SU network. The band-set utilized by each PU is contiguous and is known *a priori*, unlike *ABR*, wherein the data from the different PUs are interleaved on all available frequency bands.

## Distributed algorithms

Motivated by the need to diminish the communication overheads of transferring the network information to a centralized controller (which may also have limited processing power) to solve the optimization problems for *BRR* and *ABR*, in this section we devise distributed algorithms for the schemes.

### Distributed BRR

In *BRR*, only the PUs’ own band-set ${\mathbb{M}}_{q}$ is available within the SU network while trying to maximize the *cumulative time incentive*.

The algorithm comprises the following modules: *Initialization, Cost Computation, Path Selection, Band Assignment, Power Allocation, Update Allocation*, and *Flow Computation*. Each module operates on information locally available at the SU node for its computations. First, we describe the details of each of the modules, and then explain how the modules interact in the distributed algorithm for *BRR*.

In this module, the band allocation ${x}_{\mathit{\text{ij}}}^{m}$ and power allocation ${P}_{\mathit{\text{ij}}}^{m}$ are initialized to 0. The peak power ${P}_{{\text{peak}}_{\mathit{\text{ij}}}}^{m}$ is initially assigned a fixed value *P*_{peak}, but will be later updated based on the interference constraints. The detection threshold ${P}_{{T}_{\mathit{\text{ij}}}}^{m}$ is computed and ${\text{bcost}}_{\mathit{\text{ij}}}^{m}$ is initialized to 0.

*Cost Computation:*

In *Cost computation*, we define two costs which will be used in the *path selection* metric: the *band cost (bcost)* and the *link cost (lcost)*. The *bcost* is the inverse of the throughput that can be achieved from the band. The *lcost* is the least *bcost* from among all the bands on a link. Those bands whose detection threshold exceeds the peak power constraint are removed by making the *bcost* infinite. The computation of the *bcost* is different in the two events: in case of a new allocation, the *bcost* is based on the peak power (limited by the available node power); in case of an already allocated band, it depends on the difference between the allocated power and peak power (limited by the available node power).

*Path Selection:*

*The Distributed Dijkstra’s Algorithm [*[17]*] is used to compute the least cost path on* ${\mathbb{M}}_{q}$*from the* *PU* *T* *x*_{
q
}*to the* *PU* *R* *x*_{
q
}, *using the metric:* $\mathrm{Met}={w}_{1}\ast \sum _{(i,j)\in \mathrm{path}}{\text{lcost}}_{\mathit{\text{ij}}}+{w}_{2}\ast {\text{max}}_{(i,j)\in \mathrm{path}}\phantom{\rule{0.3em}{0ex}}{\text{lcost}}_{\mathit{\text{ij}}}$*If no path is found by the algorithm, found = 0.*

*w*_{1} and *w*_{2} are the weights assigned in the metric to give the desired importance to the sum of the *lcost* s and the bottleneck link (which is determined by ${max}_{(i,j)\in \mathit{\text{path}}}{\text{lcost}}_{\mathrm{ij}}$Following the *path selection*, in every iteration the *band assignment* module assigns frequency bands on the selected path. The algorithm exits the current iteration when no path can be found by *path selection*.

The *Band assignment* module consists of two main parts: assigning a band on each link of the selected path, and ensuring that the band assigned is not used again by the same node for transmission or reception (frequency domain scheduling constraints). For allocation, the band with the least *bcost* is preferred. ${\mathbb{L}}_{\text{set}}$ represents the link-set of the path under consideration, in order from source to destination. ${\mathbb{M}}_{\mathit{\text{ij}}}$ is the band-set on link (*i*,*j*) on the current path. In case of a conflict on adjacent links, the band with the next highest *bcost* is chosen. If that is not possible, then the current path is revoked, and the *path selection* module is used to compute a new path. It should be noted that the variables $x{o}_{\mathrm{ik}}^{m}$ and $P{o}_{\mathrm{ik}}^{m}$ are used to denote the band assignment and power allocation, respectively, in the current iteration, while ${x}_{\mathrm{ik}}^{m}$ and ${P}_{\mathrm{ik}}^{m}$ denote the overall allocation. When a path is not found by the *path selection* module, the flag *found* is reset and the variable *mcap* is assigned zero. The flag *revoke* is reset if a suitable path cannot be found without violating the frequency domain scheduling constraints by *band assignment*.

*Power allocation:*

The main objective of the *power allocation* module is to allocate the power based on the least capacity from among all the links of the selected path (*mcap*). We first compute the capacity based on the current allocation of bands and power constraints. We refer to it as the *residual capacity* ( $\mathrm{ca}{p}_{\mathit{\text{ij}}}^{m}$). This is because, in case the band is already allocated, it is a difference of the capacity based on the previous allocation and the current allocation. Besides balancing the capacities, the module ensures that the power constraints and interference constraints described in the centralized problem are met. In the module, ${\mathbb{N}}_{\text{set}}$ denotes the node-set of the path under consideration, and *in* *t*_{
j
} is the measured interference power at node *j*.

*Initialization, Cost Computation, Path Selection, Band Assignment, Power Allocation*modules are executed to obtain a single path with the corresponding power allocation and band assignment. The power allocation and band assignment are stored but not fixed. Then the stored assignments for each PU are compared on the basis of the minimum capacity along the path (

*mcap*(

*q*)). The power allocation and band assignment for the PU

*T*

*x*

_{ q }−PU

*R*

*x*

_{ q }pair with the highest ratio of

*mcap*(

*q*) to ${C}_{{\text{dir}}_{q}}$ is fixed, while the other assignments are revoked. Based on this assignment, the

*update allocation*module is executed. The overall band and power allocation ( ${x}_{\mathit{\text{ij}}}^{m},{P}_{\mathit{\text{ij}}}^{m}$) are updated with that of the current iteration ( $x{o}_{\mathit{\text{ij}}}^{m},P{o}_{\mathit{\text{ij}}}^{m}$).

*Update allocation:*

When no paths are found for any of the sessions in a given iteration, the algorithm terminates and computes the flow.

*Flow computation:*

*The Ford-Fulkerson algorithm [*[18]*] is used to compute the maximum network flow originating from the* $\mathit{PU}\phantom{\rule{.03em}{0ex}}T{x}_{q},q\in \mathbb{Q}$.

*Note: What is described above is what happens when the algorithm is programmed. As far as the practical distributed implementation is concerned, the SUs will simultaneously compute the assignment for all* *PU* *T* *x*_{
q
}−*PU* *R* *x*_{
q
}*pairs. In case the path belonging to two or more pairs encounters a common node, there is a conflict in the resource allocation. In such a situation, the common node, which will have knowledge of the ‘* *mcaps* *’ of the paths passing through it, will allocate the path of that* *PU* *T* *x*_{
q
}−*PU* *R* *x*_{
q
}*pair with the ‘highest ratio of* *mcap*(*q*)
*while the others will be revoked*

### Distributed ABR

The distributed algorithm for *ABR* involves the same modules as *BRR*, and operates in a similar manner as the latter. However, an important difference is that in *ABR*, the total band-set of all the participating PUs, i.e., $\widehat{\mathbb{M}}=\bigcup _{q\in \mathbb{Q}}{\mathbb{M}}_{q}$, is available within the SU network, while only the PU’s own frequency band-set ${\mathbb{M}}_{q}$ is available on the first and last hops, i.e., PU *T* *x*_{
q
} to the SU network and SU network to PU *R* *x*_{
q
}.

Another difference in the distributed algorithm for *ABR* is the requirement of keeping the various PU’s sessions on distinct bands (as described in the corresponding centralized problem *P2*). For this purpose, an additional module called *Band Masking* is incorporated. The details of the module are as follows.

When executing the iteration for a certain PU *T* *x*_{
q
} − PU *R* *x*_{
q
} pair, the bands which have been utilized so far for all the sessions except the current session are masked by setting their *bcost* to infinity. It prevents the same band from being used by more than one session. Besides that, the *update allocation* module is modified accordingly.

## Utilization of the time incentive

It was discussed in the previous sections that in the *CRTI-M* scheme (deploying *BRR* or *ABR*), each PU takes assistance from the multi-hop network of SUs to relay its data when the link between its transmitter and receiver is weak. In return, the PU rewards them with an incentive time. As defined earlier, ${C}_{{\text{dir}}_{q}}$ is the throughput obtained by using the weak link between PU *T* *x*_{
q
} and PU *R* *x*_{
q
}, $q\in \mathbb{Q}$, and ${C}_{{\text{rel}}_{q}}$ is the maximum throughput obtained when relaying the *q* th PU’s data through the SU network. If ${C}_{{\text{dir}}_{q}}=(1-{\lambda}_{{t}_{q}}$) ${C}_{{\text{rel}}_{q}}0\le {\lambda}_{{t}_{q}}\le 1$, then ${\lambda}_{{t}_{q}}$ is the *time incentive* obtained in a unit time slot on the band-set ${\mathbb{M}}_{q}$.

*time incentive*that will be obtained for the SUs may be different on the different PUs’ bands, depending on ${C}_{{\text{dir}}_{q}}$ and ${C}_{{\text{rel}}_{q}}$. For instance, in (

*t*

_{ a }−

*t*

_{ b }) only ${\mathbb{M}}_{2}$ is available, while in (

*t*

_{ b }−

*t*

_{ c }) ${\mathbb{M}}_{1}\bigcup {\mathbb{M}}_{2}$ is available. For each such interval (

*t*

_{ x }−

*t*

_{ y }) in a frame, on the available band-set ${\mathbb{M}}_{\mathrm{xy}}$, a multi-session sum throughput maximization problem can be solved for the SUs to efficiently exploit the transmission opportunity

*created*by

*CRTI-M*.

## Protocol design

### Physical layer considerations

The execution of the distributed algorithms assumes the knowledge of accurate *channel state information (CSI)* at the nodes. The estimation of local CSI is done by measuring the received power of the pilot signals. Discontiguous OFDM is used for data transmission, which allows the relays to decode only a fraction of the total sub-carriers. A control channel is dedicated for all the signalling that enables and coordinates the entire *CRTI-M* scheme.

### MAC layer co-ordination and distributed implementation

To make the *CRTI-M* scheme workable, a MAC layer schedule is needed to co-ordinate the cross-layer activities in the network. Under normal operation, each PU is communicating on its direct link, and the SUs are monitoring the licensed spectrum to detect a transmission opportunity. When a PU detects that its direct link is weak (based on high BER or delayed acknowledgements), it seeks cooperation from the SUs to relay its data. Consequently, the PU *T* *x*_{
q
} sends a *cooperation request (CREQ*_{
q
}*)* to the SU network ( $q\in \mathbb{Q}$, initially $\mathbb{Q}\phantom{\rule{0.5em}{0ex}}$is the set of requesting PUs). It is piggy-backed with the information of the throughput that the PU is experiencing on its weak direct link ( ${C}_{{\text{dir}}_{q}}$). This knowledge is used in computing the *time incentive* in the given frame. The information is received by the SUs within the radio range of each PU *T* *x*_{
q
}. We design the relaying scheme considering the fact that the PU does not have any cognitive processing capability, and apart from the initial *CREQ* signaling, the PU should be oblivious to the relaying strategy adopted by the SU network.

As such, it is proposed that the nodes which are in the immediate radio range of each PU transmitter act as a *proxy source* for the SU network (Figure4b). CREQs from multiple PUs may be received in the control interval of the frame (the MAC frames will be explained subsequently). Those received in the data interval will be queued to be serviced in the control interval of the next frame. Upon receiving the CREQ_{
q
}, the *proxy source* nodes for each PU transceiver form a cluster and designate a cluster-head *P* *S*_{
q
}. Each *P* *S*_{
q
} sends a *frame initialization (FI)* command which is propagated throughout the SU network to indicate the beginning of the symbiotic relaying. This is followed by local channel state estimation at each node.

We propose that the nodes of the last hop, which terminate in the PU *R* *x*_{
q
}, form a cluster called the *proxy destination* to shield the PU *R* *x*_{
q
} from the operation of the SU network (Figure4b). On receiving the *FI*, the PU *R* *x*_{
q
} responds by sending an *Acknowledgement for the Cooperation Request* (*CAC* *K*_{
q
}) and pilots so that its channel can be estimated by the *proxy destination* nodes. The *CAC* *K*_{
q
} propagates through the network and reaches the *proxy source* nodes to indicate that the network is ready for *CRTI-M*.

Each SU node now executes the distributed algorithm (either *BRR* or *ABR*) for resource allocation. The algorithm is executed simultaneously and independently for each PUs’ session. Periodic exchange of beacons with its neighbors is required at each node to execute the modules described earlier. It is only when a node is shared by multiple sessions, that a conflict in the resource allocation arises. The common node resolves the conflict by giving preference to the session $q\in \mathbb{Q}$ with the highest ratio of *mcap*(*q*) to ${C}_{{\text{dir}}_{q}}$.

*proxy destination*nodes for each PU receiver also designate a cluster-head

*P*

*D*

_{ q }. They are designated to play two important roles: (i) They sum the

*mcap*of every iteration of the corresponding PU session, which aides the determination of the final ${C}_{{\text{rel}}_{q}}$, and consequently the

*time incentive*${\lambda}_{{t}_{q}}$; (ii) if ${C}_{{\text{rel}}_{q}}<{C}_{{\text{dir}}_{q}}$ for any $q\in \mathbb{Q}$, that PU is eliminated from participating in

*CRTI-M*and the algorithm is repeated for the others; and (iii) they track the algorithm termination, in which case the

*Algorithm Termination Information (ATI)*propagates on the reverse paths towards the

*proxy source*nodes, which in turn inform the corresponding PU

*T*

*x*

_{ q }to start data transmission on the allocated resources by means of the

*READ*

*Y*

_{ q }signal. The complete event diagram with respect to each PU is depicted in Figure5.

The proposed MAC scheduling protocol is meant to provide a unified framework for both the entities of the *CRTI-M* scheme, viz. the PU and SU. If an SU has its own data to transmit in the *time incentive*, these requests are captured in the control interval and the distributed algorithm for their sum throughput maximization is also executed. Then in the data interval, the PU and SUs data are time division multiplexed (Figure4c). The total time for the control interval is acceptable, provided it is a small fraction of the channel coherence time, which is true in a slow fading environment as is assumed in this study.

## Simulation results and discussion

^{2}units as shown in Figure6a. Nodes 2–8 represent the SU relay nodes. Two PU transceivers have been considered: Nodes 1–9 represent

*PU*

*T*

*x*

_{1}-

*PU*

*R*

*x*

_{1}and nodes 10–11 represent PU

*T*

*x*

_{2}−PU

*R*

*x*

_{2}. All the links undergo Rayleigh multi-path fading, defined in the time domain by ${\sum}_{l=0}^{L-1}{h}_{l}\delta (t-\mathrm{lT})$ where

*h*

_{ l }is the complex amplitude of path

*l*, and

*L*is the number of channel taps. The

*l*th channel coefficient between two nodes with a distance

*d*between them is distributed as $\mathcal{N}(0,1/{d}^{\eta})$ and the frequency domain channel is given by its Fourier Transform. The path loss exponent

*η*= 2

*.*5

*.*Each PU’s band-set comprises four OFDM bands: bands 1–4 for PU 1 and bands 5–8 for PU 2. The OFDM subcarrier bandwidth unit is Hz. The other system parameters are

*σ*

^{2}= 10

^{−4}

*W*,

*P*

_{ T }= 0

*.*01

*W*,

*P*

_{ I }= 0

*.*001

*W*,

*P*

_{peak}= 0

*.*5

*W*, ${P}_{{\text{node}}_{i}}=2W$ (it is the same for each node

*i*).

MATLAB has been used to simulate the environment and to execute the distributed algorithms. The LINGO[19] software has been used to obtain the centralized solutions to the *BRR* and *ABR* optimization problems. LINGO deploys the branch-and-bound technique to tackle the integer variables ${x}_{\mathit{\text{ij}}}^{\left(m\right)}$, and its nonlinear solver employs successive linear programming at each branch. For an extremely small network (one-hop, and two bands on each link), the results obtained from LINGO have been theoretically verified using the above techniques, though not included in the article. But for the network assumed in the simulation, the combinatorial nature of the problems makes it computationally prohibitive to do so.

*BRR*problem, for a single instance of the channel conditions. The flow splitting and flow conservation are depicted in Figure6a, where the numbers denote the flow in bits/s/Hz. The maximized sum throughput of the two PUs’ sessions is obtained as 27.54 bits/s/Hz. Table1 reports the corresponding band assignment and power allocation. It can be observed that the session of PU

*T*

*x*

_{1}−PU

*R*

*x*

_{1}always occupies its own band-set, i.e., {1,2,3,4}, while the session of PU

*T*

*x*

_{2}−PU

*R*

*x*

_{2}occupies its band-set {5,6,7,8}.

**Results for**
BRR

Edge | Frequency band | Power (W) |
---|---|---|

(i,j) | ${x}_{\mathit{\text{ij}}}^{\left(m\right)}$ | ${P}_{\mathit{\text{ij}}}^{\left(m\right)}$ |

(1,2) | [0 0 1 0 0 0 0 0] | [0 0 0.5 0 0 0 0 0] |

(1,5) | [0 1 0 0 0 0 0 0] | [0 0.5 0 0 0 0 0 0] |

(1,7) | [1 0 0 1 0 0 0 0] | [0.5 0 0 0.5 0 0 0 0] |

(2,4) | [0 0 0 1 0 0 0 0] | [0 0 0 0.5 0 0 0 0] |

(2,5) | [1 0 0 0 0 1 1 0] | [0.3144 0 0 0 0 0.5 0.5 0] |

(3,9) | [1 0 0 0 0 0 0 0] | [0.5 0 0 0 0 0 0 0] |

(4,3) | [0 0 0 0 0 1 0 0] | [0 0 0 0 0 0.5 0 0] |

(4,6) | [0 0 0 0 1 0 0 1] | [0 0 0 0 0.5 0 0 0.4377] |

(5,4) | [0 0 1 0 0 0 0 0] | [0 0 0.5 0 0 0 0 0] |

(5,6) | [0 0 0 1 1 0 0 0] | [0 0 0 0.5 0.1091 0 0 0] |

(5,7) | [0 0 0 0 0 0 0 1] | [0 0 0 0 0 0 0 0.4026] |

(6,9) | [0 1 1 0 0 0 0 0] | [0 0.5 0.5 0 0 0 0 0] |

(6,11) | [0 0 0 0 0 1 1 0] | [0 0 0 0 0 0.5 0.5 0] |

(7,8) | [0 1 1 0 0 1 1 0] | [0 0.5 0.5 0 0 0.5 0.5 0] |

(8,6) | [1 0 0 0 0 0 0 0] | [0.5 0 0 0 0 0 0 0] |

(8,9) | [0 0 0 1 0 0 0 0] | [0 0 0 0.5 0 0 0 0] |

(8,11) | [0 0 0 0 1 0 0 1] | [0 0 0 0 0.5 0 0 0.5] |

(10,2) | [0 0 0 0 1 0 0 1] | [0 0 0 0 0.3247 0 0 0.3561] |

(10,4) | [0 0 0 0 0 1 1 0] | [0 0 0 0 0 0.5 0.5 0] |

*ABR*, for the same channel conditions as those used above, are reported in Figure6b and Table2. The maximized sum throughput of the PUs’ sessions is obtained as 28.15 bits/s/Hz. It can be observed that the sessions occupy the complete available band-set, i.e., {1–8} within the SU network, but from PU

*T*

*x*

_{ q }to the SU network and the SU network to PU

*R*

*x*

_{ q }, only the respective band sets are used.

**Results for**
ABR

Edge | Frequency band | Power (W) |
---|---|---|

(i,j) | ${x}_{\mathit{\text{ij}}}^{\left(m\right)}$ | ${P}_{\mathit{\text{ij}}}^{\left(m\right)}$ |

(1,5) | [0 0 1 1 0 0 0 0] | [0 0 0.5 0.5 0 0 0 0] |

(1,7) | [1 1 0 0 0 0 0 0] | [0.5 0.5 0 0 0 0 0 0] |

(2,5) | [1 0 0 0 0 0 1 0] | [0.5 0 0 0 0 0 0.5 0] |

(3,6) | [0 0 0 0 0 0 1 0] | [0 0 0 0 0 0 0.5 0] |

(3,9) | [0 1 0 0 0 0 0 0] | [0 0.5 0 0 0 0 0 0] |

(4,3) | [1 0 0 0 0 0 0 0] | [0.5 0 0 0 0 0 0 0] |

(4,6) | [0 0 1 1 0 0 0 0] | [0 0 0.5 0.5 0 0 0 0] |

(5,4) | [0 0 0 0 1 1 0 0] | [0 0 0 0 0.5 0.5 0 0] |

(5,7) | [0 0 0 0 0 0 0 1] | [0 0 0 0 0 0 0 0.5] |

(6,8) | [0 1 0 0 0 0 0 0] | [0 0.5 0 0 0 0 0 0] |

(6,9) | [1 0 0 0 0 0 0 0] | [0.2994 0 0 0 0 0 0 0] |

(6,11) | [0 0 0 0 1 1 0 0] | [0 0 0 0 0.5 0.2863 0 0] |

(7,8) | [0 0 0 0 1 0 0 0] | [0 0 0 0 0.4011 0 0 0] |

(8,9) | [0 0 1 1 0 0 0 0] | [0 0 0.5 0.5 0 0 0 0] |

(8,11) | [0 0 0 0 0 0 1 1] | [0 0 0 0 0 0 0.5 0.5] |

(10,2) | [0 0 0 0 1 0 0 0] | [0 0 0 0 0.5 0 0 0] |

(10,3) | [0 0 0 0 0 1 0 0] | [0 0 0 0 0 0.5 0 0] |

(10,4) | [0 0 0 0 0 0 1 1] | [0 0 0 0 0 0 0.5 0.5] |

*cumulative time incentive*obtained in a unit time slot, i.e., ${\sum}_{q}{\lambda}_{{t}_{q}}$, by varying the number of PU transceivers. ${C}_{{\text{dir}}_{q}}$ was assumed as 4 bits/s/Hz for each PU, and ${C}_{{\text{rel}}_{q}}$ was obtained from the centralized cross-layer optimization results. As expected,

*ABR*provides a higher

*time incentive*as compared to

*BRR*. Also, the difference in the incentive obtained from both schemes increases with the number of users. This is due to the fact that each participating PU provides its own bandwidth for use by all other PUs during the relaying process in

*ABR*, which results in greater channel diversity as compared to

*BRR*. These results were obtained by adding PUs randomly to the topology described earlier; they have been averaged over three different positions of nodes in the network (in the given area of 10

^{2}units), with 10 independent channel realizations in each case, i.e., totally 30 instances. We have been unable to incorporate any more than 4 users, as the

*constraint and variable limitation*in the version of LINGO used made it computationally prohibitive. We anticipate that by adding more PUs, a point will be reached beyond which the

*cumulative time incentive*will not increase any further—the power constraint will not allow any further increase in the relay throughput even with the addition of frequency bands. Intuitively, this saturation will be reached earlier for

*BRR*as compared to

*ABR*.

*BRR*is depicted iteration-wise (first four iterations) for a single instance of the channel and two PU transceivers, in Figure8a–d. It can be observed that on execution of the algorithm, first a path is formed between PU

*T*

*x*

_{1}−PU

*R*

*x*

_{1}. The bands used on each link and the corresponding flow (bits/s/Hz) are indicated in the figure. In the third iteration, another physical path is formed between the same source–destination pair. In the fourth iteration, a path is formed for the second session, i.e., PU

*T*

*x*

_{2}−PU

*R*

*x*

_{2}. The final allocation is shown in Figure8e. The corresponding power allocation and band assignment are documented in Table3.

**Results for distributed**
BRR

Edge | Frequency band | Power (W) |
---|---|---|

(i,j) | ${x}_{\mathit{\text{ij}}}^{\left(m\right)}$ | ${P}_{\mathit{\text{ij}}}^{\left(m\right)}$ |

(1,2) | [0 0 1 1 0 0 0 0] | [0 0 0.4511 0.3876 0 0 0 0] |

(1,5) | [1 1 0 0 0 0 0 0] | [0.2192 0.1654 0 0 0 0 0 0] |

(2,3) | [1 1 0 0 0 0 0 0] | [0.5 0.5 0 0 0 0 0 0] |

(2,5) | [0 0 0 0 0 1 0 0] | [0 0 0 0 0 0.0581 0 0] |

(3,6) | [0 0 0 0 0 0 1 1] | [0 0 0 0 0 0 0.5 0.5] |

(3,9) | [0 0 1 1 0 0 0 0] | [0 0 0.1645 0.1444 0 0 0 0] |

(4,5) | [0 0 0 0 0 0 0 1] | [0 0 0 0 0 0 0 0.0687] |

(5,6) | [0 0 1 1 0 0 0 0] | [0 0 0.5 0.5 0 0 0 0] |

(5,7) | [0 0 0 0 0 0 1 0] | [0 0 0 0 0 0 0.04 0] |

(5,8) | [0 0 0 0 1 0 0 0] | [0 0 0 0 0.5 0 0 0] |

(6,9) | [1 1 0 0 0 0 0 0] | [0.5 0.5 0 0 0 0 0 0] |

(6,11) | [0 0 0 0 1 1 0 0] | [0 0 0 0 0.4471 0.2961 0 0] |

(7,8) | [0 0 0 0 0 1 0 0] | [0 0 0 0 0 0.5 0 0] |

(8,11) | [0 0 0 0 0 0 1 1] | [0 0 0 0 0 0 0.1853 0.1224] |

(10,2) | [0 0 0 0 0 0 0 1] | [0 0 0 0 0 0 0 0.5] |

(10,3) | [0 0 0 0 1 1 0 0] | [0 0 0 0 0.2227 0.1893 0 0] |

(10,4) | [0 0 0 0 0 0 1 0] | [0 0 0 0 0 0 0.2333 0] |

Similar results will be observed on executing the distributed *ABR* algorithm.

*cumulative time incentive*for

*BRR*with respect to channel instances, obtained on the execution of the distributed algorithm. It is compared with the upper bound obtained by tangential supports to the

*log*curve and the feasible centralized solution (Figure9a). As expected, the centralized solution provides a higher incentive than the distributed algorithm which relies on local information. However, the solution obtained from the distributed algorithm is quite close to the centralized result, for instance, for channel conditions 1 and 6, the distributed result is 98.07 and 98.01% of the corresponding upper bound. Which means these results are even closer to the actual solution. On an average, the distributed result is 87.51% of the centralized solution. These results were plotted for two PU transceivers, and ${C}_{{\text{dir}}_{q}}$ was assumed as 4 bits/s/Hz for each to compute the

*time incentive*. Similar results are observed for

*ABR*, with the distributed result being 92.4% of the corresponding centralized solution (Figure9b).

*CRTI-M*schemes to illustrate the point that

*ABR*performs better than

*BRR*due to the higher channel diversity it provides. This trend was also observed earlier for the centralized solutions, and further validates the proposed distributed algorithms. On an average, the

*time incentive*obtained from

*ABR*exceeds that obtained from

*BRR*. In a few cases, though, the result of

*ABR*is lower than that for

*BRR*, which may be attributed to the dominating influence of the channel conditions and the limitations of the distributed algorithms as compared to the centralized.

## Related study

We review the literature in the following contexts, which are relevant to the current work.

### SCR for CR

Surrounding the concept of *SCR* the following models have been proposed: Simeone et al.[3] have used game theoretic tools to analyze the performance of cooperation in a CR network, wherein the PU leases the owned spectrum to an adhoc network of SUs in exchange for cooperation in the form of transmission power from the SUs. The model proposed by Zhang and Zhang[4] is more rational; when the PU’s demand is satisfied, it is willing to enhance its benefit in any other format, for instance, by collecting a higher revenue from the SU. Xue et al.[5] have considered a single full-duplex amplify-and-forward (AF) SU relay to assist the PU transmission. Gong et al.[6] have analyzed the power and diversity gains obtained by AF relaying of the PU’s data by multiple cooperating SUs. All of the aforementioned works in literature have considered either a single relay node or single channel CR networks. The authors have also contributed significantly towards *SCR* paradigms for multi-channel multi-hop networks[7–11], the details of which are provided in (1) section.

### Cross-layer optimization for multi-channel networks

Cross-layer optimization problems have received considerable attention in literature ([14–22] and the references therein). Shi et al.[14] have addressed power control, frequency band scheduling, and flow routing for the *physical model* in a multi-hop multi-channel CR network with the objective of maximizing the rates of a set of user communication sessions. The power is quantized to a finite number of levels, and a centralized solution is developed using the *branch-and-bound* framework. Ma and Tsang[21] use a similar model but a simplistic problem formulation, with the assumption of uniform power and only band assignment and flow routing as the variables. The formulation of Zhang et al.[16] aims at minimizing the transmission time for the user sessions by joint consideration of spectrum allocation, routing, and time scheduling. Besides these, there also exist cross-layer formulations for conventional multi-channel wireless networks with all or some of the flow, scheduling, power constraints, typically with the objective of maximizing users’ throughput, or minimizing power consumption[22–24].

### Distributed algorithms for cross-layer formulations

The work pertaining to distributed algorithms for cross-layer optimization problems is limited. Lin and Shroff[25] consider maximizing the sum of the users’ utility functions, assuming a single path for each user and a single channel network, to determine the rate and link schedule. Palomar and Chiang[26] also formulate a similar problem within a power constrained situation, which they address using different decomposition techniques. Lin and Rasool[27] have developed a distributed algorithm that jointly solves the channel-assignment, time scheduling and routing problem to maximize the system capacity, with fixed power, in a multi-channel network. Joint allocation of power, frequency bands, and routing in a multi-channel multi-hop network in a distributed manner is more challenging. The centralized framework suggested by Shi et al.[28] is quite similar to ours, hence we feel the need to provide a detailed comparison with the former. The main difference in the cross-layer formulations is that this study incorporates the requirements of *BRR* (each PU relaying on its own band) and *ABR* (each PU utilizing all the available bands), while that of Shi et al. is concerned with throughput maximization of SUs’ sessions. Also, we consider the sum interference from all the neighboring nodes for power allocation. The distributed algorithm described by Shi et al. differ from ours in the following aspects: (i) the metric used by the former for path selection is *bandwidth footprint product* which targets optimal spatial occupancy, whereas the authors use a metric which gives weightage to both the net throughput that can be obtained from a path and also that link which may pose a bottleneck, which seems more appropriate in a throughput maximization scenario; (ii) the former’s strategy involves a *Conservative Iteration Process*, which allocates resources for the sessions and an *Aggressive Iteration Process*, which tries to increase the throughput of sessions with lower throughput (lower scaling factors) by releasing the allocated resources of the others with higher throughput. The authors, on the other hand, propose that on encountering paths from multiple sessions, a common node will instantaneously resolve the conflict by giving preference to that session which is likely to derive a higher benefit—this approach befits a distributed implementation in terms of practical execution and time; (iii) given the fact that the source and destination are PUs, while the relay nodes are SUs, the exchange of information between the two entities is rather restricted. In this study, the detailed MAC schedule is provided, which will address this issue while facilitating the distributed algorithm for resource allocation. In the work of Shi et al., there is no such concern since only one entity, viz. the SU is involved in the process; (iv) the algorithm of Shi et al. allocates power on unused bands based on the detection threshold which results in the same metric for all bands irrespective of the channel gains. On the other hand, the proposed algorithm operates on the peak power, which gives importance to the gains when selecting high throughput paths. Moreover, the proposed algorithm is more meticulous in meeting the constraints of the centralized problem, and has specialized modules to account for *BRR* and *ABR*.

## Conclusion

The main focus of this article is to develop distributed algorithms for the two methods of *CRTI-M*, viz. *BRR* and *ABR*. *ABR* which allows a PU to use all other PUs’ bands when relaying through the SU network provides a higher *cumulative time incentive* for the SUs. *BRR*, on the other hand, which allows every PU to only use its own band, makes management and PU prioritization easier. The proposed distributed algorithms are meticulous in meeting the constraints of the corresponding centralized problems and the results are in close proximity of the centralized results. A MAC scheduling protocol is described which gives emphasis to the distributed implementation and presents a unified framework for the PUs and SUs.

## Declarations

### Acknowledgements

This study was supported by the Ministry of Communication and Information Technology, Government of India, New Delhi. The study was also supported by the Microsoft Corporation and Microsoft Research India under the Microsoft Research India PhD Fellowship Award 2009. A small part of this study (only the centralized problem formulation) has been presented at IEEE VTC Fall 2011.

## Authors’ Affiliations

## References

- Haykin S: Cognitive radio: brain-empowered wireless communications.
*IEEE Trans. Sel. Areas Commun*2005, 23: 201-220.View ArticleGoogle Scholar - Zhang H: Cognitive radio networking for green communications and green spectrum. [Online] Available from http://www.comnets.org/keynote.html
- Simeone O, Bar-Ness Y, Spagnolini U: Cooperative cognitive radio. In
*Cooperative Wireless Communications*. Edited by: Zhang Y, Chen H, Guizani M. Auerbach Publications, CRC Press, Boca Raton; 2009:pp. 209-230.Google Scholar - Zhang J, Zhang Q: Stackelberg game for utility-based cooperative cognitive radio networks.
*Proc. of ACM MobiHoc,*2009, 23-32.Google Scholar - Xue P, Gong P, Cao N, Kim DK: Symbiotic architecture for the cognitive radio networks with amplify-and-forward relaying cooperation. In
*Proc. of KICS the 18th, JCCI,*. Jeju, Korea; 2009:pp. 49-54.Google Scholar - Gong P, Park JH, Yoo JM, Bo-Sun Y, Kim DK: Throughput maximization with multiuser non-selfish cognitive relaying in CR networks.
*Proc. of 4th International Symposium on Wireless Pervasive Computing,*2009, 1-5.Google Scholar - Nadkar T, Thumar V, Desai UB, Merchant SN: Symbiotic cooperative relaying in cognitive radio networks with time and frequency incentive. Springer Telecommun. Syst. J.: Special Issue on Mobile Computing and Networking Technologies. 10.1007/s11235-011-9494-4Google Scholar
- Nadkar T, Thumar VM, Desai UB, Merchant SN: A cross-layer framework for symbiotic relaying in cognitive radio networks.
*Proc. of IEEE Symp. on New Frontiers in Dynamic Spectrum Access Networks (DySPAN),*2011, 498-509.View ArticleGoogle Scholar - Nadkar T, Thumar VM, Shenoy G, Desai UB, Merchant SN: Cognitive relaying with frequency incentive.
*Proc. of the IEEE Global Telecommunications Conference, IEEE GLOBECOM,*2011, 1-6.Google Scholar - Nadkar T, Thumar VM, Shenoy G, Desai UB, Merchant SN: Cognitive relaying with time incentive:protocol design for multiple primary users.
*Proc. of IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC),*2011, 577-582.Google Scholar - Thumar VM, Nadkar T, Shenoy G, Desai UB, Merchant SN: Cognitive relaying with time incentive: multiple primary users.
*Proc. of IEEE Vehicular Technology Conference (VTC),*2011, 1-5.Google Scholar - Peha JM: Approaches to spectrum sharing.
*IEEE Commun. Mag*2005, 43(2):10-12.View ArticleGoogle Scholar - Lehr W, Crowcroft J: Managing shared access to a spectrum commons.
*Proc. of First IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks,*2005, 420-444.Google Scholar - Shi Y, Hou Y, Kompella S: A cross-layer approach to multi-hop networking with cognitive radios.
*Proc. of IEEE MILCOM’08,*2008, 1-7.Google Scholar - Cover TM, Thomas JA:
*Elements of Information Theory*. Wiley-Interscience, New York; 2006.MATHGoogle Scholar - Zhang J, Zhang Z, Luo H, Huang A: A column generation approach for spectrum allocation in cognitive wireless mesh network.
*Proc. of the IEEE Global Telecommunications Conference, IEEE GLOBECOM,*2008, 1-5.Google Scholar - Humblet PA: An adaptive distributed, Dijkstra shortest path algorithm. Technical Report CICS-P-60, Center for Intelligent Control Systems, MIT, (1981)Google Scholar
- Cormen TH, Leiserson CE, Rivest RL, Stein C MIT Press and McGraw-Hill; 2001:pp. 651-664.Google Scholar
- LINGO: User’s guide. (LINDO Systems Inc., 2006)Google Scholar
- Bertsekas DP: Network Optimization—Continuous and Discrete models. Athena Scientific, Belmont, MA);Google Scholar
- Ma M, Tsang DHK: Joint spectrum sharing and fair routing in cognitive radio networks.
*Proc. of 5th IEEE Consumer Communications and Networking Conference CCNC,*2008, 978-982.Google Scholar - Bhatia R, Kodialam MS: On power efficient communication over multi-hop wireless networks: joint routing, scheduling and power control.
*Proc. of IEEE INFOCOM,*2004, 1457-1466.Google Scholar - Alicherry M, Bhatia R, Erran Li L: Joint channel assignment and routing for throughput optimization in multiradio wireless mesh networks.
*IEEE J. Sel. Areas Commun*2006, 24(11):1960-1971.View ArticleGoogle Scholar - Karakayali K, Kang JH, Kodialam M, Balachandran K: Joint resource allocation and routing for OFDMA-based broadband wireless mesh networks.
*Proc. of IEEE ICC,*2007, 5088-5092.Google Scholar - Lin X, Shroff NB: The impact of imperfect scheduling on cross-layer rate control in wireless networks. In
*Proc. IEEE Infocom,*. Miami; 2005:pp. 1804-1814.Google Scholar - Palomar DP, Chiang M: Alternative decompositions for distributed maximization of network utility: framework and applications. In
*Proc. IEEE Infocom,*. Spain; 2006:pp. 1-13.Google Scholar - Lin X, Rasool S: A distributed joint channel-assignment, scheduling and routing algorithm for multi-channel ad hoc wireless networks. In
*Proc. IEEE Infocom,*. Anchorage; 2007:pp. 1118-1126.Google Scholar - Shi Y, Thomas Hou Y, Zhou H, Midkiff S: Distributed cross-layer optimization for cognitive radio networks.
*IEEE Trans. Veh. Technol*2010, 59(8):4058-4069.View ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.