 Research
 Open Access
 Published:
Optimal power policies and throughput scaling analyses in fading cognitive broadcast channels with primary outage probability constraint
EURASIP Journal on Wireless Communications and Networking volume 2014, Article number: 35 (2014)
Abstract
This paper focuses on a spectrumsharingbased fading cognitive radio broadcast channel (BC) with a singleantenna secondary base station (SBS) and M singleantenna secondary receivers (SRs) utilizing the same spectrum band with a delaysensitive primary user (PU). The servicequality requirement for the primary user is set by an outage probability constraint (POC). We address the optimal power allocation problem for the SBS ergodic sum capacity (ESC) maximization in the secondary BC network subject to POC and a transmit power constraint at SBS specified by either a longterm or a shortterm power constraint. The optimality conditions reveal that in each joint channel state, the SBS allocates transmission power to the only one selected SR with the highest value of a certain metric consisting of the ratio of the SR’s direct channel power gain and the sum of interference power and noise power at the SR. Then, the secondary network throughput scaling analysis as the number of SRs becomes large, is also investigated, showing that if PU applies a truncated channel inversion (TCI) power policy, the SBS ESC scales like ε_{ p } log(logM) where ε_{ p } is the PU outage probability threshold. To reduce the amount of channel side information (CSI) transferred between the two networks, we propose a suboptimal transmission scheme which requires only 1bit feedback from the delaysensitive PR (partial CSI). We show that the new power control policy is asymptotically optimal, i.e. the SBS ESC under this reduced feedback scheme still scales like ε_{ p } log(logM).
1 Introduction
Inefficiency of spectrum usage has become one of the main concerns in wireless communications technology today as most of the exclusively allocated spectrum remains underutilized by licensed/primary users (PUs) [1]. This has inspired the concept of cognitive radio (CR) technology, which was originally proposed in [2]. The rationale is that unlicensed/secondary users (SUs) are allowed to use the same spectrum with PUs as long as the qualityofservice (QoS) of the primary transmission is protected. To date, there are three main approaches for CR to manage resultant interference: interweave, overlay, and underlay [3]. In the underlay paradigm which is the paradigm of interest in this paper, SUs can share the spectrum regardless of the ON/OFF status of the primary network, providing that the QoS of primary link is still guaranteed. To protect the service quality of the primary transmission in underlay paradigm, several types of constraints have been proposed in literature including peak/average interference power constraint (PIPC/AIPC), primary capacity loss constraint, and primary outage probability constraint (see [4] and references therein).
Optimal power allocation strategy for noncognitive BC has been extensively investigated under various perspectives, such as achievable ergodic capacity [5] and outage capacity [6] regions in fading broadcast channels or the optimal power allocation for maximizing ergodic sum downlink capacity in noncognitive BC [7]. However, in a multiuser cognitive environment, optimal power allocation problems are even more challenging because of the strict guarantee of the QoS constraint in primary networks, especially in delaysensitive applications. Furthermore, the asymptotic behaviour of the secondary sum downlink throughput scaling under the optimal power allocation policy, termed as optimal throughput scaling, when the number of secondary receivers grows large, has not been previously addressed under a primary outage probability constraint. Thus motivated, our first aim is to provide an analysis of optimal throughput scaling with full channel side information (CSI) at the secondary transmitter. While the requirement of full CSI at the SU transmitter, in particular, those of the primary channels is impractical. Nonetheless, these results will constitute a benchmark for assessing the performance of any other suboptimal power allocation scheme which may be designed in practical scenarios with partial channel side information about primary and secondary channels. Indeed, our second aim in this paper is to analyze secondary throughput scaling with a suboptimal power allocation scheme that only requires partial information about the channels involving only the primary terminals (see Section 6 for further details).
1.1 Contributions
In this paper, we focus on a singleinput singleoutput (SISO) fading cognitive broadcast channel (CBC) with M SUs, coexisting with a delaysensitive primary link under average and peak transmit power constraint at the secondary base station (SBS). The novel contributions of this paper can be summarized as follows:

1.
We derive the optimal power control policy for the ergodic sum capacity (ESC) maximization problem under a PU outage probability constraint (POC), under both longterm and shortterm power constraints at the SBS transmitter assuming perfect knowledge of all involved channel gains at the SBS along with the PU’s transmission power control policy. (A typical PU is oblivious to the secondary network and thus its power control policy only depends on the direct gain between primary terminals rather than interferences from the secondary network.)

(a)
Since the primary outage probability constraint has no closedform expression in general, the MACBC duality result from [8] cannot be applied directly. Different from [8, 9], we propose a novel technique to establish the optimality of an opportunistic scheduling structure that maximizes the SBS ergodic sum rate. This result is then used to transform the originally nonconvex ESC maximization problem to a convex optimization problem.

(a)
We solve the transformed convex optimization problem by a probabilistic power allocation technique [10, 11]. Our optimal power control solutions can be adapted to any arbitrary power control employed by the primary network.

2.
We derive asymptotic scaling laws (also known as multiuser diversity gains) for the SBS ergodic sum capacity as the number of SUs, M, becomes large when SBS employs the optimal power allocation policy, assuming all channels undergo independent Rayleigh fading. In this part, we additionally presume that the delaysensitive PU uses a truncated channel inversion (TCI) policy. The significance of choosing TCI policy is that it minimizes the primary outage probability in the absence of the secondary network (see [12]). Under either longterm or shortterm power constraint at the SBS, we show that the SBS ESC scales according to ε _{ p } log(logM) with a prelog factor ε _{ p }, where ε _{ p } is the maximum allowable outage probability at the primary receiver in the presence of the SU network.
It is worth mentioning that the current paper is different from [13] in three aspects. First, we assume that the delaysensitive primary user employs an optimal power control policy for minimizing outage probability, i.e. truncated channel inversion power control policy. Second, we derive the optimal power control policy at the SBS under two different scenarios, i.e. SBS employs (i) a longterm power control policy or (ii) a shortterm power control policy. Third, for each scenario, we study throughput scaling behaviour of the secondary network under the optimal power allocation policy at the SBS. Also, our throughput scaling results differ from [13] in a prelog factor. This prelog factor captures the effect of the optimal power control policy at the primary side on the throughput scaling behaviour of the secondary network.

3.
We also propose a suboptimal transmission scheme, namely, a 1bit primary feedback scheme, which substantially decreases the cooperation between the primary and the secondary networks compared to the optimal power allocation scheme. More specifically, we show that the secondary network just needs 1bit feedback from the primary receiver to guarantee the QoS in the primary, while the multiuser diversity gain of the suboptimal scheme remains the same as the optimal one.
1.2 Outline of the paper
The remainder of this paper is organized as follows. Related previous works are discussed in Section 2. The description of our system model is presented in Section 3. Under the assumption of full channel side information at SBS and PU’s power strategy being known to SBS, the optimal power control policies for ESC maximizing problem with POC and either longterm transmit power constraint (LTPC) or shortterm transmit power constraint (STPC) are presented in Section 4. In Section 5, we derive the optimal throughput scaling law of ε_{ p } log(logM) under additional assumptions that all channels involved in the problem undergo independent and identically distributed (iid) Rayleigh fading and the PU employs a TCI power control policy. A suboptimal transmission scheme for primary feedback reduction and the associated throughput scaling law are rigorously derived in Section 6. Numerical results are presented in Section 7 followed by some concluding remarks in Section 8.
1.3 Notations
Here is a list of important notations used in this paper. E[.] denotes the statistical expectation. Pr {.} represents probability. The cumulative density function (CDF) of a random variable Z is given by F_{ Z }(z) whereas F_{ Z }(zY) expresses the conditional CDF of Z given Y. Let X_{ w } be a Bernoulli random variable such that X_{ w }=1 with probability w and X_{ w }=0 with probability 1−w. π(i) denotes a permutation function from {1,2,…,M} to {1,2,…,M}. ℜ_{+} represents the set of positive real numbers. \frac{\mathrm{\partial y}}{\partial {x}^{\ast}} denotes the partial derivative of y with respect to x, evaluated at x=x^{∗}. min(a,b)=a if a≤b. p^{T} represents the transpose of vector p. {\mathcal{S}}^{c} represents the complement of the set . We also use the notation f(x)=O(g(x)) to imply that lim\underset{x\to \infty}{sup}\mid \frac{f\left(x\right)}{g\left(x\right)}\mid <\infty, f(x)=o(g(x)) to imply that \underset{x\to \infty}{lim}\mid \frac{f\left(x\right)}{g\left(x\right)}\mid =0 and f(x)=Θ(g(x)) as x→∞ to imply that there exist positive constants K_{1} and K_{2} such that {K}_{1}<\mid \frac{f\left(x\right)}{g\left(x\right)}\mid <{K}_{2}.
2 Related works
For a singleuser SISO cognitive underlay paradigm, POC was introduced in an ergodic capacity maximization problem [14], assuming that the delaysensitive PU uses a constant power control (which is not energyefficient from the primary user’s perspective). However, this result cannot be generalized to downlink channels due to nonconvexity in the expression of ESC for a CBC.
Information theoretic capacity notions for noncognitive SISO fading broadcast channels were investigated in, e.g. [5, 7]. In [7], the authors showed that the base station allocates a given time slot (over which the fading channel remains invariant) to the user with the strongest reception only so as to maximize the total throughput, implying that an opportunistic scheduling or the socalled dynamic timedivisionmultipleaccess (DTDMA) is optimal. The amount of transmission power is allocated according to a waterfilling policy. Using the duality result from [8], the authors of [9] investigated the optimal power control for ESC maximization in the SISO fading CBC under both average/peak transmit power constraints and PIPC/AIPC, proving that opportunistic scheduling is the optimal scheme for achieving the ESC in CBC. However, the optimal power allocation policy under POC (which is a more suitable metric to assure the quality of service for a delaysensitive PU) has not been addressed so far in the existing literature.
Opportunistic user selection strategies have also motivated researchers to analyze how the ESC scales as the number of users M increases. The analysis for throughput scaling in noncognitive multipleinput multipleoutput (MIMO) BC is provided in [15]. For underlay cognitive radio networks, there are a number of works studying multiuser diversity. For example, in [16], the authors studied the cognitive multipleaccess (CMAC) system under a peak transmit power constraint at each secondary transmitter and a peak interference power constraint at the primary receiver and analyzed capacity scaling as the ratio of the transmit power to the interference power approaches infinity. In [17], secondary capacity gains in CMAC are investigated with the user selection criterion based on the strongest secondary direct channel and the weakest interference channel under a peak interference constraint. Later in [18], the multiuser interference diversity is examined for three types of cognitive networks, including CMAC, CBC, and cognitive parallel access channel (CPAC), under peak transmit power and peak interference power constraints. Later in [19], the authors investigated ergodic sum capacity scaling in SISO CMAC under a hybrid scheduling policy, i.e. by first selecting a set of eligible secondary transmitters which do not violate the interference quota and then choosing secondary transmitters that can be active. The same authors generalized the result in [19] to multiuser multiantenna cognitive networks [20] with peak transmit power constraint at the secondary network, and peak interference power constraint at the primary receivers for both uplink and downlink channels was examined.
In order to make asymptotic analyses more tractable, the multiuser diversity has been studied mainly under suboptimal power allocation schemes, e.g. in [15, 19–21]. Note that these results under suboptimal power allocation schemes simply provide lower bounds and do not necessarily reflect the optimal throughput scaling of the network. To establish a benchmark for justifying the efficiency of any suboptimal scheme, such as those based on partial CSI, it is crucial to derive throughput scaling under the optimal transmission power allocation scheme. Recently, the multiuser diversity gain under optimal power control in CMAC under average transmit and average interference power constraints with various types of fading channels was investigated in [22].
3 System model
We consider a CBC with a secondary base station transmitting data to M secondary receivers (SRs), sharing the same spectrum as a primary transmitterprimary receiver (PTPR) pair. All terminals involved are equipped with a single antenna. Let h_{ i }, g, α_{ i }, and β denote the channel power gains from SBS to the i th SR, PT to PR, PT to the i th SR, and SBS to PR, respectively, as illustrated in Figure 1. Let χ represent the joint channel state vector, i.e. χ={g,β,h_{1},…,h_{ M },α_{1},…,α_{ M }}. All channel gains involved in this cognitive radio network are assumed to be mutually independent blockfading additive white Gaussian noise (BFAWGN) channels with continuous CDFs [12]. Indeed, the BFAWGN channel model has a long history of being used for both noncognitive and cognitive radio networks. In particular, blockfading models have been used successfully in [23] for nonscalable video coding and data partitioning using H.264/AVC encoder in conversational applications, and a multiresolution video/image data transmission system using hierarchical constellation was investigated in [24] under blockfading channel model. Authors in [25] analyzed the performance of multiuser multiaccess wireless video communication in blockfading channel by using H.264/AVC encoder. In cognitive radio literatures, there is a great deal of literature assuming blockfading model [11, 14, 26–29]. In [29], the authors used the blockfading model for both primary and secondary channels. Typically, a primary transmitter disregards the existence of secondary networks and therefore adapts its transmission power based on a predefined power allocation policy which is not a function of the interference from the secondary networks (e.g. [11, 14]). Hence, we assume that the PU allocates its transmission power based only on the direct gain g between PT and PR, regardless of the interference from the secondary downlink channels [11]. The PU and the SBS are presumed to use random Gaussian codebook [11, 14, 30, 31]. We also assume that a frequency division duplexing (FDD) scheme is implemented in both primary and secondary networks, i.e. CSI of primary and secondary direct channels is available at the corresponding transmitters via receiver feedback. In the first instance, SBS is assumed to have knowledge of perfect CSI on χ and primary user’s power policy so that it also knows the primary user’s power allocation policy for every realization of χ.
Remark
1 . Clearly, the knowledge of full CSI at SBS of the channels involving the primary terminals is not easy to achieve. In recent literature, some practical schemes have been suggested for obtaining such information at the ST in [32]. For STPR channels in FDD, it is suggested that the CSI at the PR is fed back to the SBS from the primary base station (PBS) (which is in communication with its PR) through an errorfree backhaul link of negligible delay. Indeed, just as base station cooperation has become a reality via coordinated multipoint (CoMP) technology in the longterm evolution (LTE) systems, it is not unimaginable that the cooperation between SBS and PBS will become common, especially because it assists both the PUs and SUs in their interference management endeavour. It is also envisaged that some financial incentives may be used to encourage the primary service provider to facilitate such information exchange with the secondary service provider [33]. For PTPR channels, various suggestions have been made including that of eavesdropping on PR feedback to PT [34] and receiving feedback from a cooperative SU node employed near the PR [35], while information about PTSR and STSR channels can be obtained via classical channel feedback and training schemes based on pilot signals from the PT and ST, respectively. Finally, note that the analysis of throughput scaling in Section 5 based on full CSI serves the important purpose of a benchmark for any schemes based on imperfect CSI, such as the one with a 1bit primary feedback scheme proposed in Section 6.
In this work, we assume that the QoS guarantee of the delaysensitive PU with a target rate {r}_{p}^{0} allows a maximum primary outage probability of ε_{ p }. In a typical wireless fading environment, even in the absence of interference from the secondary network, the PU may not be able to avoid an outage event when the PTPR channel is in deep fade. For example, with an average or peak transmit power constraint, the PU cannot meet the target rate for a Rayleigh fading channel if it falls below a certain threshold [12]. We further presume that the PU’s power policy is designed to allow for a maximum PU outage probability of {\epsilon}_{p}^{0}\le {\epsilon}_{p} in the absence of the secondary interference. Thus, the secondary network is allowed to cause an additional outage with probability {\epsilon}_{p}{\epsilon}_{p}^{0}. Furthermore, let P_{ p }(g) define the transmission power policy at the PU. (As mentioned earlier, it is typical to assume that transmission power allocation policy at the PU is based on the direct gain g only.).
Let P(χ)=[P_{1}(χ),…,P_{ M }(χ)]^{T} be the mapping from {\Re}_{+}^{2M+2} to {\Re}_{+}^{M}, where P_{ i }(χ) denote the SBS’s transmit power allocated for the i th SR. The PU’s instantaneous rate expression can be written as
The delaysensitive primary network has an POC with a target rate {r}_{p}^{0} and a maximum outage probability threshold ε_{ p }, such that
The power budget at the SBS can be either LTPC or STPC as shown in (3) and (4), respectively.
In this paper, we focus on solving the ergodic sum capacity maximizing problem in the secondary downlink subject to (2) and either (3) or (4). The maximum ergodic sum capacity achieved by the secondary network in this problem can be written as follows:
where is the space of all mappings from {\Re}_{+}^{2M+2} to {\Re}_{+}^{M}. At each joint channel state χ, the instantaneous sum capacity of secondary broadcast channels, {r}_{s}^{\text{BC}}(\chi ,\mathbf{P}(\chi \left)\right), is given by
where π(.) is the permutation that specifies the optimal decoding order, i.e. z_{π(M)}>z_{π(M−1)}>⋯>z_{π(1)} and {z}_{i}=\frac{{h}_{i}}{\alpha {P}_{p}\left(g\right)+{N}_{0}}. In other words, z_{ i } represents the signaltointerferenceplusnoise ratio (SINR) of the i th user whereas z_{π(i)} is the SINR of the π(i)th user based on the optimal decoding order π(i). Note that the sumcapacity expression can be obtained by successive decoding with interference cancellation [8, 36]. Also, note that we drop the constant \frac{1}{2} in the instantaneous rate expressions in (6) and use natural logarithm for simplicity. We also assume that the AWGN variance in each SR is given by N_{0}. Obviously, {r}_{s}^{\text{BC}}(\chi ,\mathbf{P}(\chi \left)\right) is not concave over P(χ). In the next section, we first establish the optimality of an opportunistic scheduling structure in our setup which allows us to reformulate (5) as a convex optimization problem.
4 Optimal power strategies
In this section, we focus on the optimal power allocation strategy in the secondary network which maximizes ESC under POC at the primary link with a limited power budget at the SBS. The transmission power resource is confined by either LTPC (average transmit power constraint) or STPC (peak transmit power constraint). First, we look at the ESC maximizing problem subject to POC when the transmission power at the SBS is limited by LTPC in Section 4.1. Later, the ESC maximizing problem under POC and STPC will be considered in Section 4.2.
4.1 Optimal power policy for LTPC
The secondary ergodic sum capacity maximization problem under POC and LTPC is defined as follows:
The optimal power policy solving (7) is given by Theorem 1.
Theorem 1.
The optimal power control solution for (7) is{\mathbf{P}}^{\ast}\left(\chi \right)={X}_{{w}^{\ast}}\left(\chi \right){\mathbf{p}}_{1}^{\ast}\left(\chi \right)+(1{X}_{{w}^{\ast}}(\chi \left)\right){\mathbf{p}}_{2}^{\ast}\left(\chi \right), {\mathbf{p}}_{1}^{\ast}\left(\chi \right), {\mathbf{p}}_{2}^{\ast}\left(\chi \right)and w^{∗}(χ) are defined as follows:
where {i}^{\ast}=arg\underset{m\in \mathcal{I}}{max}\phantom{\rule{2.83795pt}{0ex}}{z}_{m}, {p}_{\mathit{\text{WF}}}^{\ast}\left(\chi \right)={(\frac{1}{{\Lambda}^{\ast}}\frac{1}{max{z}_{m}})}^{+}, {p}_{\mathit{\text{RP}}}^{\ast}\left(\chi \right)=\frac{1}{\beta}{\left(\frac{g{P}_{p}\left(g\right)}{exp\left(\underset{p}{\overset{0}{r}}\right)1}{N}_{0}\right)}^{+}, {\mathcal{B}}_{1,\chi}^{B}={r}_{s}^{\mathit{\text{BC}}}(\chi ,{\mathbf{p}}_{1}^{\ast}(\chi \left)\right){\Lambda}^{\ast}{\mathbf{1}}^{T}{\mathbf{p}}_{1}^{\ast}\left(\chi \right)+{S}^{\ast} and {\mathcal{B}}_{2,\chi}^{B}={r}_{s}^{\mathit{\text{BC}}}(\chi ,{\mathbf{p}}_{2}^{\ast}(\chi \left)\right){\Lambda}^{\ast}{\mathbf{1}}^{T}{\mathbf{p}}_{2}^{\ast}\left(\chi \right).
The Lagrange multipliers Λ^{∗} and S^{∗} are the solutions to E\left[\sum _{i=1}^{M}{P}_{i}^{\ast}\left(\chi \right)\right]={P}_{\text{av}} and E[w^{∗}(χ)]≥1−ε_{ p }. ■
Proof.
The proof relies on the optimality of an opportunistic scheduling structure as first proved in Appendix 1: opportunistic scheduling structure of the optimal power policy (see Lemmas 1 and 2). Based on this result, the proof of the optimal power control policy as presented by Theorem 1 above is given in Appendix 2
Theorem 1 implies that the optimal power control policy of the problem (7) possesses an opportunistic scheduling structure in each joint channel state χ, i.e. the SBS allocates nonnegative power, say \stackrel{\u0306}{P}\left(\chi \right), to only the i th SR with i=arg\underset{m\in \mathcal{I}}{\mathrm{max}}\phantom{\rule{2.77626pt}{0ex}}{z}_{m} and zero power to other remaining SRs. Although \stackrel{\u0306}{P}\left(\chi \right) does not explicitly depend on the index of each i th secondary receiver, it intrinsically represents the power allocated to the scheduled user in each specific joint channel state χ. For simplicity, define {z}_{max}=\underset{m}{max}\phantom{\rule{2.77626pt}{0ex}}{z}_{m}. By the opportunistic scheduling structure, the original nonconvex problem in (7) can be converted to (11) as follows:
where {r}_{s}(\chi ,\stackrel{\u0306}{P}(\chi \left)\right)=log(1+\stackrel{\u0306}{P}(\chi \left){z}_{max}\right) represents the instantaneous sumcapacity expression of the secondary broadcast channels by using the opportunistic scheduling structure, and the objective function in (11) is concave over \stackrel{\u0306}{P}\left(\chi \right).
Theorem 1 also reveals that the optimal power policy of the problem (7) can be constructed by utilizing two deterministic power allocation schemes with opportunistic scheduling structure, i.e. {\mathbf{P}}^{\ast}\left(\chi \right)={\mathbf{p}}_{1}^{\ast}\left(\chi \right) in (8) if w^{∗}(χ)=1 and {\mathbf{p}}_{2}^{\ast}\left(\chi \right) in (9) if w^{∗}(χ)=0. The intuitive explanation of the optimal power control policy is that for a given joint channel state χ, the SBS can design the power control policy under only two options, i.e. by either putting the PU in outage or not putting the PU not in outage. The deterministic power policy {\mathbf{p}}_{2}^{\ast}\left(\chi \right) in (9) represents the optimal power policy which the PU is in outage, i.e. the SBS allocates power {p}_{2,i}^{\ast}\left(\chi \right)={p}_{\text{WF}}^{\ast}\left(\chi \right) for the i th SR with i=arg\underset{m\in \mathcal{I}}{\text{max}}\phantom{\rule{2.77626pt}{0ex}}{z}_{m} according to the wellknown waterfilling power policy and zero power to the other remaining SRs. Note that the solution is similar to the optimal power policy of the sum capacity maximizing problem in noncognitive broadcast channels [7] since the SBS decides to put the PU in outage. On the other hand, {\mathbf{p}}_{1}^{\ast}\left(\chi \right) denotes the optimal power policy when the SBS ensures the service quality in the primary link. In this case, the SBS still allocates a transmission power with waterfilling power policy to the scheduled user as long as {p}_{\text{WF}}^{\ast}\left(\chi \right)\le {p}_{\text{RP}}^{\ast}\left(\chi \right)=. However, if {p}_{\text{WF}}^{\ast}\left(\chi \right)>{p}_{\text{RP}}^{\ast}\left(\chi \right), the transmission power is {p}_{\text{RP}}^{\ast}\left(\chi \right) since {p}_{\text{RP}}^{\ast}\left(\chi \right) is the maximum transmission power from the SBS that can ensure that the PU is not in outage, i.e. the primary rate equals the primary target rate. Therefore, the waterfilling power policy is capped by {p}_{\text{RP}}^{\ast}\left(\chi \right). Between these two deterministic power policies, the SBS utilizes the policy which returns the highest benefit, i.e. if the benefit function {\mathcal{B}}_{1,\chi}^{B} of the power policy {\mathbf{p}}_{1}^{\ast}\left(\chi \right) is greater than the benefit function {\mathcal{B}}_{2,\chi}^{B} of the power policy {\mathbf{p}}_{2}^{\ast}\left(\chi \right), then w^{∗}(χ)=1. If {\mathcal{B}}_{1,\chi}^{B}<{\mathcal{B}}_{2,\chi}^{B}, w^{∗}(χ)=0, implying that the SBS uses the power policy {\mathbf{p}}_{2}^{\ast}\left(\chi \right).
4.2 Optimal power policy for STPC
The secondary ergodic sum capacity maximization problem under POC and STPC is defined as follows:
The optimal power policy solving (12) is given by Theorem 2. See Appendix 3: optimal solution of for STPC for a detailed proof.
Theorem 2.
The optimal power control solution for (12) is{\mathbf{P}}^{\ast ,\mathit{\text{st}}}\left(\chi \right)={X}_{{w}_{1}^{\ast ,\mathit{\text{st}}}}\left(\chi \right){\mathbf{p}}_{1}^{\ast ,\mathit{\text{st}}}\left(\chi \right)+(1{X}_{{w}_{1}^{\ast ,\mathit{\text{st}}}}(\chi \left)\right){\mathbf{p}}_{2}^{\ast ,\mathit{\text{st}}}\left(\chi \right), where{\mathbf{p}}_{1}^{\ast ,\mathit{\text{st}}}\left(\chi \right), {\mathbf{p}}_{2}^{\ast ,\mathit{\text{st}}}\left(\chi \right)and w^{∗,st}(χ) are defined as follows:
where ‘st’ in the superscript stands for ‘shortterm’ and {i}^{\ast}=arg\underset{m\in \mathcal{I}}{max}\phantom{\rule{2.83795pt}{0ex}}{z}_{m}. Also, {\mathcal{B}}_{1,\chi}^{B,\mathit{\text{st}}}={r}_{s}(\chi ,{\mathbf{p}}_{1}^{\ast ,\mathit{\text{st}}}(\chi \left)\right){\Lambda}^{\ast ,\mathit{\text{st}}}\left(\chi \right){\mathbf{1}}^{T}{\mathbf{p}}_{1}^{\ast ,\mathit{\text{st}}}\left(\chi \right)+{S}^{\ast ,\mathit{\text{st}}} and {\mathcal{B}}_{2,\chi}^{B,\mathit{\text{st}}}={r}_{s}(\chi ,{\mathbf{p}}_{2}^{\ast ,\mathit{\text{st}}}(\chi \left)\right){\Lambda}^{\ast ,\mathit{\text{st}}}\left(\chi \right){\mathbf{1}}^{T}{\mathbf{p}}_{2}^{\ast ,\mathit{\text{st}}}\left(\chi \right). Lagrange multipliers Λ^{∗,st}(χ) and S^{∗,st} are the solutions to \sum _{i=1}^{M}{P}_{i}^{\ast ,\mathit{\text{st}}}\left(\chi \right)\le {P}_{O} and E[w^{∗,st}(χ)]≥1−ε_{ p }. ■
Similar to Theorem 1 in LTPC case, Theorem 2 implies that an opportunistic scheduling structure is optimal in each joint channel state χ for which the SBS schedules the SR with the maximum z_{ i } only. Thus, the original nonconvex problem in (12) can be converted to (16) as follows:
Similar to Section 4.1, it can be shown that the objective function in (16) is concave over {\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right).
For the STPC, Theorem 2 reveals that the SBS also chooses one of the two deterministic power allocation policies, i.e. the SBS can either decide to ensure the QoS in the primary link by using the power policy {\mathbf{p}}_{1}^{\ast ,\text{st}}\left(\chi \right) in (14) or ignore the PU’s QoS requirement by using the power policy {\mathbf{p}}_{2}^{\ast ,\text{st}}\left(\chi \right) in (14). This decision relies on w^{∗,st}(χ) in (15). However, the SBS allocates transmission power based on the constant power control with peak power P_{ O } to the scheduled SR in the STPC case instead of using the waterfilling power policy in the LTPC case.
Remark 2.
As opposed to the result in [14] where the PU utilizes a constant power policy, the optimal power allocation strategies in Theorems 1 and 2 are applicable to any arbitrary PU power allocation policy as long as the primary user is oblivious to the secondary network, i.e. the PU’s power allocation policy is not a function of the SBS’s transmission power allocation function.
5 Throughput scaling with truncated channel inversion policy at PU
In this section, we derive asymptotic scaling laws of the SBS ergodic sum capacity when the number of SUs grows large, under the assumption that all channel power gains are independent and identically distributed and they are also presumed to be exponentially distributed with unity mean. Also, we focus on the case where the PU uses the TCI policy. The motivation behind the assumption of a TCI power policy at the PU is that TCI is the optimal power allocation policy for minimizing the information outage probability under a long/short transmit power constraint for a delaysensitive user. More specifically, the TCI power control policy employed at the PU in this paper can be described as follows: PU’s transmit power adapts according to the direct channel gain g when the PU is ON with transmission power {P}_{p}\left(g\right)=\frac{({e}^{{r}_{p}^{0}}1){N}_{0}}{g} when g≥g_{ T } and P_{ p }(g)=0 otherwise. Note also that g_{ T } is chosen such that for \text{Pr}(g<{g}_{T})={\epsilon}_{p}^{0}.
Given that the PU employs a TCI power policy, in Section 5.1, we present the optimal channel partitioning structures dictated by the optimal power allocation strategies in Theorem 1 for LTPC and in Theorem 2 for STPC. We show that the space of joint channel states \chi \in {\Re}_{+}^{2M+2} can be separated into three regions for the ESC maximizing problem subject to POC and either LTPC or STPC. Aided by these results in Section 5.1, the optimal throughput scaling laws of the SBS ergodic sum capacity under POC and LTPC will be derived in Section 5.2. Finally, Section 5.3 will present the optimal throughput scaling laws of the SBS ergodic sum capacity under POC and STPC.
5.1 Optimal channel state partitioning structure
Assuming a TCI policy at the PU, the space of joint channel states \chi \in {\Re}_{+}^{2M+2} can be divided into three regions when the SBS employs the optimal power allocation policy. First, we summarize the details of the three channel state regions for LTPC in Table 1 together with the power allocation policy, outage status at the PU, and the probability of each channel state region.
Table 1 reveals the intuitive explanation of the transmission mechanism at the SBS for the LTPC case. In region 1, the PU stops transmitting as g<g_{ T } and faces an outage even if there is no interference from the secondary network. In this case, the SBS will allocate power based on waterfilling power policy to the scheduled SR. Also note that there is no interference from the primary transmitter to the secondary network as the PU turns off in this case. When g≥g_{ T }, the PU is ON with {P}_{p}\left(g\right)=\frac{{k}_{1}}{g} where {k}_{1}=\left({e}^{{r}_{p}^{0}}1\right){N}_{0} and thus, any positive transmission power from the SBS can put the PU in outage. Therefore, the SBS must switch OFF if the SBS decides to protect the service quality in the primary link. In region 2, the SBS still decides to transmit because the power policy that puts PU in outage ({\mathbf{p}}_{2}^{\ast}) returns a higher profit than the power policy that protects the primary transmission ({\mathbf{p}}_{1}^{\ast}), i.e. {\mathcal{B}}_{1,\chi}^{B}\le {\mathcal{B}}_{2,\chi}^{B}. The SBS then allocates power {p}_{\text{WF}}^{\ast} to the scheduled SR. In region 3, the SBS knows that it is more profitable to stop its data transmission and ensure the service quality in the PU’s link, i.e. {\mathcal{B}}_{1,\chi}^{B}>{\mathcal{B}}_{2,\chi}^{B}.
In the ESC maximizing problem subject to POC and STPC, the optimal power control strategy according to Theorem 2 can be utilized to separate the space of joint channel states \chi \in {\Re}_{+}^{2M+2} into three distinct channel state regions as summarized in Table 2. Also note that the interpretation from Table 2 is quite similar to Table 1, except for using a constant power control at the peak power P_{ O } rather than the waterfilling power policy.
Remark 3.
Note that if S^{∗}=0 in the LTPC case (or S^{∗,st}=0 in the STPC case), the SBS can transmit with {p}_{\text{WF}}^{\ast} (waterfilling) in the LTPC case or P_{ O } in the STPC case without making the POC active, as if the primary network never existed. This scenario then simplifies to a noncognitive broadcast channel, and it has been shown in [15] that in this case the ergodic sum rate scales according to log(logM) as M becomes large. In this paper, we will analyze the throughput scaling laws only for the case when S^{∗}>0 for LTPC and S^{∗,st}>0 for STPC.
5.2 Throughput scaling for the LTPC case
In this section, we focus on the derivation of throughput scaling when the SBS employs the optimal power allocation policy according to Theorem 1 (LTPC case). The main result of this section is summarized in Theorem 3, a detailed proof of which is provided in Appendix 4: proof of Theorem 3.
Theorem 3.
When PU uses TCI power control policy, the asymptotic scaling law of the SBS ergodic sum capacity under a POC and a LTPC with optimal power control is given by
The intuitive explanation for Theorem 3 is that when PU uses a TCI power control, the SBS is forced to turn off for the channel fading states in which the PU link QoS can be compromised since the SBS transmission results in the violation of POC. Since the primary outage probability threshold is ε_{ p }, the SBS is allowed to transmit with probability ε_{ p } which leads to the prelog factor term.
5.3 Throughput scaling for the STPC case
In this section, we will derive the throughput scaling result due to the optimal power allocation in Theorem 2 (STPC). The main result of this section can be summarized in Theorem 4, a detailed proof of which is provided in Appendix 5: proof of Theorem 4.
Theorem 4.
When PU uses the TCI power control policy, the asymptotic scaling law of the SBS ergodic sum capacity under a POC and a STPC with optimal power control is given by
The intuitive reason for the appearance of the prelog factor ε_{ p } is similar to the LTPC case with TCI power control at PU.
6 Suboptimal transmission scheme with feedback reduction
In the optimal power policy, the SBS requires the information of the entire channel state χ which includes g and β in order to schedule the SR as well as compute the optimal outage region of the PU and the optimal transmission power. As mentioned earlier, the SBS can obtain the perfect CSI of the interference gain β between the SBS and the primary receiver by measuring the received power of signals transmitted by the PR. For PTPR channels, it is suggested that the SBS can eavesdrop on PR feedback to PT [34] or receive the feedback from a cooperative SU node employed near the PR [35]. Both STPR and PTPR link information can also be obtained via backhaul links from a cooperative PBS possibly via pricing [33]. In this section, we propose a new suboptimal scheme which can further reduce the cooperation between the primary receiver and the secondary network by receiving just only 1bit feedback from the PR, or if the SBS can feedback from PR, no cooperation is required. In this scheme, the PU predefines the PU outage region (suboptimal) based on the direct gain g only, so the outage/nonoutage status of the PU can be realized at the SBS by using just 1bit feedback from the PR. The corresponding opportunistic scheduling and power allocation policy for either LTPC or STPC are also proposed. It is important to note that by using this scheme, the SBS ESC still scales like ε_{ p } log(logM) as M grows large (asymptotically optimal). The details of the suboptimal scheme are as follows:

Initially, the channel state for the direct channel gain g between the PT and the PR is divided into two regions: the nonoutage region g\in [\phantom{\rule{0.3em}{0ex}}{g}_{T},{\stackrel{~}{g}}_{T}], where the secondary network must not transmit in order to guarantee the primary link’s service quality, and the outage region, g\in {G}_{\text{outage}}=\phantom{\rule{2.77626pt}{0ex}}[\phantom{\rule{0.3em}{0ex}}0,{g}_{T}]\bigcup \left[{\stackrel{~}{g}}_{T},\right.\left(\right)close=")">\n \n \u221e\n \n, where the secondary network can transmit. The value {\stackrel{~}{g}}_{T} is chosen such that {\epsilon}_{p}{\epsilon}_{p}^{0}=1{F}_{G}\left({\stackrel{~}{g}}_{T}\right), so that the outage probability in the primary link is ensured to be less than ε_{ p }. Further note that g_{ T } and {\stackrel{~}{g}}_{T} depend on the distribution of the channel gain g rather than their instantaneous values.

Feedback policy The primary receiver sends a feedback of ‘0’ to its transmitter (and the SBS if cooperating) if g\notin {G}_{\text{outage}} to halt the transmission activity in the secondary network, whereas it sends a feedback of ‘1’ if the SBS is allowed to transmit when g\in {G}_{\text{outage}}.

Opportunistic scheduling policy In the perfect CSI case, the SBS will schedule the SR with maximum \frac{{h}_{m}}{{\alpha}_{m}{P}_{p}\left(g\right)+{N}_{0}} which requires the knowledge of P_{ p }(g). However, in the new scheme, we can assume that the SBS is pessimistic by always assuming that {P}_{p}\left(g\right)={P}_{p}\left({\stackrel{~}{g}}_{T}\right), i.e. the PU transmits the maximum power of the range g\in {G}_{\text{outage}}. Therefore, the SBS will schedule the SR with maximum {\stackrel{~}{\rho}}_{m}=\frac{{h}_{m}}{{\alpha}_{m}{P}_{p}\left({\stackrel{~}{g}}_{T}\right)+{N}_{0}} and the ergodic sum rate can be expressed as
\begin{array}{l}{C}_{\text{Partial}}^{\text{BC}}\phantom{\rule{0.3em}{0ex}}=\phantom{\rule{0.3em}{0ex}}\mathit{\text{Pr}}\phantom{\rule{0.3em}{0ex}}\left\{{G}_{\text{outage}}\right\}\phantom{\rule{0.3em}{0ex}}E\left[log(1\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}{P}_{\text{Partial}}(\chi \left){\stackrel{~}{\rho}}_{max}\right)\right\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\left(\right)close="]">{G}_{\text{outage}}\end{array}\n(17) 
where {\stackrel{~}{\rho}}_{max}=\underset{m}{max}\phantom{\rule{2.77626pt}{0ex}}{\stackrel{~}{\rho}}_{m} and P_{Partial}(χ) is the SBS’s transmission power allocated to the SR with maximum {\stackrel{~}{\rho}}_{max}. Note that the statistical behaviour of {\stackrel{~}{\rho}}_{m} is independent of g.

Power allocation policies and throughput scaling results For STPC, the power allocation policy at the SBS is straightforward. The SBS transmits with the maximum power P_{ O } when g\in {G}_{\text{outage}}. The ergodic sum rate for STPC becomes
\begin{array}{ll}{C}_{\text{Partial}}^{\text{BC, STPC}}& =\text{Pr}\left\{{G}_{\text{outage}}\right\}E\left[log(1+{P}_{O}{\stackrel{~}{\rho}}_{max})\right\left(\right)close="]">{G}_{\text{outage}}\end{array}\n \n \n =\n \n \n \epsilon \n \n \n p\n \n \n E\n \n \n log\n (\n 1\n +\n \n \n P\n \n \n O\n \n \n \n \n \n \n \rho \n \n ~\n \n \n \n max\n \n \n )\n \n \n \n \n(18) 
For LTPC, we have to solve the following optimization problem:
\begin{array}{l}\underset{{P}_{\text{Partial}}\left(\chi \right)}{max}\phantom{\rule{2.77626pt}{0ex}}\phantom{\rule{0.3em}{0ex}}\text{Pr}\phantom{\rule{0.3em}{0ex}}\left\{{G}_{\text{outage}}\right\}\phantom{\rule{0.3em}{0ex}}\xb7\phantom{\rule{0.3em}{0ex}}E\left[log(1\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}{P}_{\text{Partial}}(\chi \left){\stackrel{~}{\rho}}_{max}\right)\right\left(\right)close="]">\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}{G}_{\text{outage}}\end{array}\n \n \n \n s.t.\n Pr\n \n \n \n \n G\n \n \n outage\n \n \n \n \n E\n \n \n \n \n P\n \n \n Partial\n \n \n (\n \chi \n )\n \n \n close="]">\n \n \n \n G\n \n \n outage\n \n \n \n \n \u2264\n \n \n P\n \n \n av\n \n \n .\n \n(19) 
It is easy to show that the solution to the optimization problem in (19) is still waterfilling, i.e. {P}_{\text{Partial}}\left(\chi \right)={\left(\frac{1}{{\Lambda}_{\text{Partial}}}\frac{1}{{\stackrel{~}{\rho}}_{max}}\right)}^{+} for g\in {G}_{\text{outage}} and P_{Partial}(χ)=0 for otherwise. Note that Λ_{Partial} satisfies LTPC with equality.

Therefore, the ergodic sum rate for LTPC becomes
\phantom{\rule{17.0pt}{0ex}}\begin{array}{ll}{C}_{\text{Partial}}^{\text{BC, LTPC}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}& \phantom{\rule{0.3em}{0ex}}=\phantom{\rule{0.3em}{0ex}}\text{Pr}\phantom{\rule{0.3em}{0ex}}\left\{{G}_{\text{outage}}\phantom{\rule{0.3em}{0ex}}\right\}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\xb7\phantom{\rule{0.3em}{0ex}}E\left[log\left(\frac{{\stackrel{~}{\rho}}_{max}}{{\Lambda}_{\text{Partial}}}\right){1}_{\left\{{\Lambda}_{\ge \text{Partial}}{\stackrel{~}{\rho}}_{max}\right\}}\phantom{\rule{0.3em}{0ex}}\right\left(\right)close="]">\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}{G}_{\text{outage}}\end{array}\n \n \n =\n \n \n \epsilon \n \n \n p\n \n \n E\n \n \n log\n (\n \n \n \n \n \n \n \rho \n \n ~\n \n \n \n max\n \n \n \n \n \n \n \Lambda \n \n \n Partial\n \n \n \n \n )\n \n \n \n 1\n \n \n \n \n \n \n \n \n \n \rho \n \n ~\n \n \n \n max\n \n \n \u2265\n \n \n \Lambda \n \n \n Partial\n \n \n \n \n \n \n \n \n \n \n(20) 
It is easy to show that both E\left[log(1+{P}_{O}{\stackrel{~}{\rho}}_{max})\right] in the STPC case and E\left[log\left(\frac{{\stackrel{~}{\rho}}_{max}}{{\Lambda}_{\text{Partial}}}\right){1}_{\left\{{\stackrel{~}{\rho}}_{max}\ge {\Lambda}_{\text{Partial}}\right\}}\right] in the LTPC case scale according to log(logM). Therefore, the ergodic sum capacity scales according to ε_{ p } log logM for LTPC as well as STPC under this suboptimal scheme.
7 Numerical results
In this section, we present some numerical results on the performance of the proposed optimal power policies for the capacity maximization problem with POC and LTPC or STPC. All channel gains involved are assumed to be Rayleigh fading, and the corresponding channel power gains are taken to be exponentially distributed with unit mean. Noises at PR and all SRs are presumed to be equal and AWGN with unit variance, i.e. N_{0}=1. Note that this allows the transmit power at the primary and secondary transmitters to be interpreted as signaltonoise ratio at the transmitter side. Unless specified otherwise, PU’s target rate is {r}_{p}^{0}=1.25 nat/channel use and the primary outage probability threshold ε_{ p }=0.1. For the primary TCI power policy, we set {\epsilon}_{p}^{0}=0.05. For convenience, we further assume that all secondary receivers are identical. The simulation results are based on a Monte Carlo method averaged over 10^{5} channel realizations.
7.1 The effect of POC on the ergodic sum capacity of CBC
In this section, we observe the effect of POC on the SBS downlink sum capacity when PU uses a TCI power policy through Figure 2 in both LTPC and STPC cases. For a fixed number of secondary receivers M=4, Figure 2 shows that with a decreasing PU’s outage probability threshold for a fixed target rate, SBS downlink sum capacity decreases for both LTPC and STPC when PU applies the TCI power strategy, as expected. The same feature is also noticed when PU’s outage probability threshold is fixed with an increasing rate. The results are due to the fact that the POC becomes stricter when the PU’s outage probability threshold is reduced or the target rate is increased.
7.2 Throughput scaling results with TCI power policy at the PU
In this part, we will discuss how the SBS ergodic sum capacity behaves as the number of secondary receivers grows under the optimal power policy in Theorem 2 for STPC. In this problem, there are also a number of parameters which affect the SBS sum ergodic capacity from the optimal power policy in Theorem 2 for STPC, including {\epsilon}_{p}^{0}, the PU’s target rate {r}_{p}^{0}, PU’s outage probability constraint ε_{ p }, and the secondary network’s power budget (P_{ O } for STPC). The results for the LTPC case are similar and excluded to save space. From Figure 3, a decrease in the secondary power budget significantly reduces the SBS sum throughput i.e. when P_{ O } is decreased, the throughput scaling is shifted downwards. Next, a decrease in {\epsilon}_{p}^{0} makes the sum throughput drop because the truncated threshold {g}_{T}=log(1\underset{p}{\overset{0}{\epsilon}}) (for the Rayleigh fading model) is also reduced. Although the additional outage caused by the secondary network is increased, SBS stops transmitting if it decides to protect the PU when the PU is active in the TCI case. Further, suppose that {\epsilon}_{p,1}^{0}>{\epsilon}_{p,2}^{0}, then g_{T,1}>g_{T,2}. With {\epsilon}_{p}^{0}={\epsilon}_{p,2}^{0}, SBS can transmit when g∈[g_{T,2}, g_{T,1}]. However, the interference from primary transmitter to the secondary receivers is high in this additional range as the PU transmits with power \frac{({e}^{{r}_{p}^{0}}1){N}_{0}}{g}. This implies that the range g∈[g_{T,2}, g_{T,1}] does not help enhance the SBS sum throughput, resulting in a decline in the sum throughput as {\epsilon}_{p}^{0} is reduced. Finally, {r}_{p}^{0} affects the throughput scaling via the POC as shown in Figure 3. As {r}_{p}^{0} is increased to 4.00 nat/channel use, the POC becomes stricter, thereby resulting in a decline in the SBS sum throughput.
Next, we present the results for the normalized throughput \frac{{C}_{s}^{\text{BC*}}}{log(logM)} as a function of the number of secondary receivers M for both LTPC and STPC, when the PU employs the TCI power policy. These simulations illustrate the throughput scaling results of Theorems 3 and 4. Also, the normalized throughput results due to the proposed suboptimal transmission scheme with feedback reduction are illustrated. For these simulations, P_{av} for the LTPC case and P_{ O } for the STPC case are set to 1 dB. The results in Figure 4 clearly illustrate that the normalized throughput converges to ε_{ p } as M becomes larger and larger. The results in Figure 4 also confirm that 1bit feedback from the PU is effective enough to ensure that the normalized throughput of the proposed scheme asymptotically converges to ε_{ p } as M becomes large.
8 Conclusions
In this paper, we have investigated the information theoretic results of the ergodic sum capacity in fading cognitive broadcast channels, sharing the same frequency band as a delay sensitive PU. Under an outage probability constraint at the primary receiver, we have derived optimal power allocation strategies to maximize the SBS ergodic sum capacity, under an average (longterm) transmit power constraint or a peak (shortterm) transmit power constraint. As the duality result is not directly applicable, we established a new approach to show that the opportunistic scheduling structure is also optimal under the primary outage probability constraint. This result allowed us to reformulate the ergodic sum capacity expression as a concave function, and the corresponding optimal power policies were derived by using a probabilistic power allocation technique. Under these opportunistic optimal power allocation schemes, we have also analyzed how the SBS sum throughput scales as the number of secondary receivers goes to infinity when all relevant channels undergo independent Rayleigh fading. These asymptotic capacity scaling laws are derived under the assumption that the PU uses a truncated channel inversion policy. Rigorous theoretical analyses show that the SBS sum throughput scales like ε_{ p } log(logM). Further, an asymptotically optimal reduced feedback scheme is proposed. With only a 1bit feedback from the primary receiver, we have shown that the SBS sum throughput for this suboptimal scheme retains like ε_{ p } log(logM) scaling property of the optimal schemes.
Appendix 1: opportunistic scheduling structure of the optimal power policy
Prior to proving that the optimal power policy has an opportunistic scheduling structure, the following Lemma is required.
Lemma 1.
For a nonnegative vector x=[x_{1},x_{2}, …,x_{ M }]^{T}and a nonnegative vector γ= [ γ_{1},γ_{2},…,γ_{ M }]^{T}where γ_{1}<γ_{2}<…<γ_{ M }, we have
Proof.
We will prove (21) by using induction. For M=2, log\left(1+\frac{{\gamma}_{1}{x}_{1}}{1+{\gamma}_{1}{x}_{2}}\right)+\phantom{\rule{2.77626pt}{0ex}}log(1+{\gamma}_{2}{x}_{2})=log\left(1+{\gamma}_{1}\sum _{i=1}^{2}{x}_{i}\right)+log\left(\frac{1+{\gamma}_{2}{x}_{2}}{1+{\gamma}_{1}{x}_{2}}\right). Since log\left(\frac{1+{\gamma}_{2}{x}_{2}}{1+{\gamma}_{1}{x}_{2}}\right) is increasing in x_{2} as γ_{2}>γ_{1}, we have log\left(\frac{1+{\gamma}_{2}{x}_{2}}{1+{\gamma}_{1}{x}_{2}}\right)<log\left(\frac{1+{\gamma}_{2}\sum _{i=1}^{2}{x}_{i}}{1+{\gamma}_{1}\sum _{i=1}^{2}{x}_{i}}\right). Hence, we have log\left(1+\frac{{\gamma}_{1}{x}_{1}}{1+{\gamma}_{1}{x}_{2}}\right)+log(1+{\gamma}_{2}{x}_{2})<log\left(1+{\gamma}_{2}\sum _{i=1}^{2}{x}_{i}\right).
Thus, (21) is true for M=2. Now suppose that (21) is true for M=K, we have to show that (21) is also true for M=K+1:
where {\gamma}_{i}^{\prime}=\frac{{\gamma}_{i}}{1+{\gamma}_{i}{x}_{K+1}}. For a fixed x_{K+1}, {\gamma}_{i}^{\prime} is an increasing function of γ_{ i }, so we have {\gamma}_{i+1}^{\prime}>{\gamma}_{i}^{\prime}. Then, apply (21) for M=K, we obtain
Again, the last inequality is due to the fact that log\left(\frac{1+{\gamma}_{K+1}{x}_{K+1}}{1+{\gamma}_{K}{x}_{K+1}}\right) is increasing in x_{K+1}. Hence, it follows that (21) is also true for M=K+1, thus completing the proof.
Lemma 2.
Let\stackrel{~}{\mathbf{P}}\left(\chi \right)be the optimal power policy of the problem (5). Then,\stackrel{~}{\mathbf{P}}\left(\chi \right)has an opportunistic scheduling structure; i.e. for each channel state χ, the SBS allocates power only to the user with maximum z_{ i }and zero power to other remaining users.
Proof.
We will prove Lemma 2 by using contradiction. Let i^{∗}= arg maxz_{ i }. Suppose that the optimal power policy \stackrel{~}{\mathbf{P}}\left(\chi \right) does not possess an opportunistic scheduling structure, i.e. the SBS allocates power to more than one users. Then, we construct another power policy with an opportunistic scheduling structure {\stackrel{~}{\mathbf{P}}}^{\prime}\left(\chi \right) such that {\stackrel{~}{P}}_{{i}^{\ast}}^{\prime}\left(\chi \right)=\sum _{i=1}^{M}{\stackrel{~}{P}}_{i}\left(\chi \right) and {\stackrel{~}{P}}_{i}^{\prime}\left(\chi \right)=0 for i≠i^{∗}. It is worth noting that \sum _{i=1}^{M}{\stackrel{~}{P}}_{\pi \left(i\right)}^{\prime}\left(\chi \right)=\sum _{i=1}^{M}{\stackrel{~}{P}}_{\pi \left(i\right)}\left(\chi \right). Therefore, the new power policy {\stackrel{~}{\mathbf{P}}}^{\prime}\left(\chi \right) does not affect the power consumption at the SBS and the outage/nonoutage status in the primary link.
The instantaneous sumrate from both power policies \stackrel{~}{\mathbf{P}}\left(\chi \right) and {\stackrel{~}{\mathbf{P}}}^{\prime}\left(\chi \right) are represented by {r}_{s}^{\text{BC}}(\chi ,\stackrel{~}{\mathbf{P}}(\chi \left)\right) and {r}_{s}^{\text{BC}}(\chi ,{\stackrel{~}{\mathbf{P}}}^{\prime}(\chi \left)\right). By using Lemma 1, we have
which contradicts the optimality of \stackrel{~}{\mathbf{P}}\left(\chi \right). Thus, it implies that the following opportunistic scheduling structure is optimal:
(25) suggests that the SBS allocates the transmit power, \stackrel{\u0306}{P}\left(\chi \right), to the SR with the maximum z _{ m }, where ties can be broken arbitrarily.
Appendix 2: optimal solution of {\stackrel{\u0306}{P}}^{\ast}\left(\chi \right) for LTPC
By the opportunistic scheduling structure shown in Appendix 1: opportunistic scheduling structure of the optimal power policy, the original nonconvex problem in (7) can be converted to convex problem as shown in (11). However, there is no closedform expression of the primary outage probability function in POC. Hence, the convex optimization technique is not directly applicable. By using the same technique as in [10, 11], the following result in Lemma 3 is required.
Lemma 3.
The optimal solution of the problem (11) can be expressed by{\stackrel{\u0306}{P}}^{\ast}\left(\chi \right)=w\left(\chi \right){\stackrel{\u0306}{p}}_{1}\left(\chi \right)+(1w(\chi \left)\right){\stackrel{\u0306}{p}}_{2}\left(\chi \right), where E[w(χ)]≥1−ε_{ p }, E\left[{\stackrel{\u0306}{P}}^{\ast}\left(\chi \right)\right]\le {P}_{\mathit{\text{av}}}and{r}_{p}(\chi ,{\stackrel{\u0306}{p}}_{1}(\chi \left)\right)\ge {r}_{p}^{0} for all χ. ■
Proof.
Following a similar procedure to that in [11], we will show that an optimal power control for (11) can be constructed by randomizing between two deterministic power allocation schemes, i.e. {\stackrel{\u0306}{p}}_{1}\left(\chi \right)=E\left[\stackrel{\u0306}{P}\left(\chi \right)\left\right.{r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)\ge {r}_{p}^{0}\right] and {\stackrel{\u0306}{p}}_{2}\left(\chi \right)=E\left[\stackrel{\u0306}{P}\left(\chi \right)\left\right.{r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)<{r}_{p}^{0}\right]. The probability of using the power policy {\stackrel{\u0306}{p}}_{1}\left(\chi \right) is indicated by the weighting function w(χ), which can be expressed as w\left(\chi \right)=\mathit{\text{Pr}}\left\{{r}_{p}(\chi ,\stackrel{\u0306}{P}(\chi \left)\right)\ge {r}_{p}^{0}\left\right.\chi \right\} and therefore the probability of using the power policy {\stackrel{\u0306}{p}}_{2}\left(\chi \right) equals 1−w(χ).
We first show that given an arbitrary feasible probabilistic power scheme \stackrel{\u0306}{P}\left(\chi \right), we can always construct another feasible scheme {\stackrel{\u0306}{P}}^{\prime}\left(\chi \right) which is randomized among deterministic power schemes {\stackrel{\u0306}{p}}_{k}\left(\chi \right),\phantom{\rule{2.77626pt}{0ex}}k=1,2 with a timesharing factor w(χ) and performs equally well or better than \stackrel{\u0306}{P}\left(\chi \right). Since \stackrel{\u0306}{P}\left(\chi \right) is feasible, \stackrel{\u0306}{P}\left(\chi \right) satisfies all the constraints, i.e. E\left[\stackrel{\u0306}{P}\right(\chi \left)\right]\le {P}_{\text{av}} and \text{Pr}\left\{log(1+\frac{g{P}_{p}\left(g\right)}{{N}_{0}+\beta \stackrel{\u0306}{P}\left(\chi \right)})<\underset{p}{\overset{0}{r}}\right\}\le {\epsilon}_{p}. Note that when {r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)\ge {r}_{p}^{0}, it implies that \stackrel{\u0306}{p}\left(\chi \right)\le \frac{1}{\beta}{\left(\frac{g{P}_{p}\left(g\right)}{exp\left(\underset{p}{\overset{0}{r}}\right)1}{N}_{0}\right)}^{+} i.e. the possible solution lies in a halfspace. Therefore, {\stackrel{\u0306}{p}}_{1}\left(\chi \right)=E\left[\stackrel{\u0306}{P}\left(\chi \right)\left\right.{r}_{p}(\chi ,\stackrel{\u0306}{p}(\chi \left)\right)\ge {r}_{p}^{0}\right]\le \frac{1}{\beta}{\left(\frac{g{P}_{p}\left(g\right)}{exp\left(\underset{p}{\overset{0}{r}}\right)1}{N}_{0}\right)}^{+}, i.e. a convex combination of the possible solutions in that halfspace weighted by the probability that each solution can happen also lies in that halfspace. So, log(1+\frac{g{P}_{p}\left(g\right)}{{N}_{0}+\beta {\stackrel{\u0306}{p}}_{1}\left(\chi \right)})\ge \underset{p}{\overset{0}{r}}.
Thus, {\stackrel{\u0306}{P}}^{\prime}\left(\chi \right) satisfies POC since \text{Pr}\left\{{\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)={\stackrel{\u0306}{p}}_{1}\left(\chi \right)\right.\phantom{\rule{1em}{0ex}}\phantom{\rule{1em}{0ex}}\left(\right)close="}">\n \n close="">\n \chi \n and then it can be shown that E\left[\text{Pr}\left\{log(1+\frac{g{P}_{p}\left(g\right)}{{N}_{0}+\beta {\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)})\ge \underset{p}{\overset{0}{r}}\left(\right)close="">\chi \right\}\right]\n.
Next, we can show that {\stackrel{\u0306}{P}}^{\prime}\left(\chi \right) also satisfies LTPC since E\left[{\stackrel{\u0306}{P}}^{\prime}\right(\chi \left)\right]=E\left[w\right(\chi \left){\stackrel{\u0306}{p}}_{1}\right(\chi )+(1w\left(\chi \right)\left){\stackrel{\u0306}{p}}_{2}\right(\chi \left)\right]=E\left[\stackrel{\u0306}{P}\right(\chi \left)\right]\le {P}_{\text{av}}.
Due to concavity of {r}_{s}(\chi ,\stackrel{\u0306}{P}(\chi \left)\right) in (11), we can apply Jensen’s inequality to arrive at the final result that E\left[{r}_{s}\right(\chi ,{\stackrel{\u0306}{P}}^{\prime}\left(\chi \right)\left)\right]\ge E\left[{r}_{s}\right(\chi ,\stackrel{\u0306}{P}\left(\chi \right)\left)\right], i.e. {\stackrel{\u0306}{P}}^{\prime}\left(\chi \right) achieves higher ergodic sum rate than \stackrel{\u0306}{P}\left(\chi \right).
Reformulating (11) by using Lemma 3, we obtain the following optimization problem:
Using a similar variable transformation technique as in [10] and [11], the objective function can be proved to be concave while the other constraints are linear. Hence, the problem (26a) can be solved by the necessary and sufficient KarushKuhnTucker (KKT) optimality conditions. Applying the KKT conditions and the fact that channel state is continuous, the optimal solutions of {\stackrel{\u0306}{p}}_{1}^{\ast}\left(\chi \right), {\stackrel{\u0306}{p}}_{2}^{\ast}\left(\chi \right), and w^{∗}(χ) are expressed as follows:
where {p}_{\text{WF}}^{\ast}\left(\chi \right)={(\frac{1}{{\Lambda}^{\ast}}\frac{1}{{z}_{max}})}^{+}. Finally, by applying the opportunistic scheduling structure shown in (25), we have the result in Theorem 1.
Appendix 3: optimal solution of {\stackrel{\u0306}{P}}^{\ast ,\text{st}}\left(\chi \right) for STPC
Similar to Section 4.1, the objective function in (11) is concave over {\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right). To apply the same technique as in Appendix 3: optimal solution of {\stackrel{\u0306}{P}}^{\ast ,\text{st}}\left(\chi \right) for STPC, the following result in Lemma 4 is required.
Lemma 4.
The optimal solution of the problem (16) can be expressed by{\stackrel{\u0306}{P}}^{\ast ,\mathit{\text{st}}}\left(\chi \right)={w}^{\mathit{\text{st}}}\left(\chi \right){\stackrel{\u0306}{p}}_{1}^{\mathit{\text{st}}}\left(\chi \right)+(1{w}^{\mathit{\text{st}}}(\chi \left)\right){\stackrel{\u0306}{p}}_{2}^{\mathit{\text{st}}}\left(\chi \right), where E[w^{st}(χ)]≥1−ε_{ p }, {\stackrel{\u0306}{P}}^{\ast ,\mathit{\text{st}}}\left(\chi \right)\le {P}_{O}and{r}_{p}(\chi ,{\stackrel{\u0306}{p}}_{1}^{\mathit{\text{st}}}(\chi \left)\right)\ge {r}_{p}^{0}for all χ. ■
Proof.
Following a similar procedure to the proof of Lemma 3, we can prove that an optimal power control for (16) can be constructed by randomizing between two deterministic power allocation schemes, i.e. {\stackrel{\u0306}{p}}_{1}^{\text{st}}\left(\chi \right)=E\left[{\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right)\left\right.{r}_{p}(\chi ,{\stackrel{\u0306}{p}}^{\text{st}}(\chi \left)\right)\ge {r}_{p}^{0}\right] and {\stackrel{\u0306}{p}}_{2}^{\text{st}}\left(\chi \right)=E\left[{\stackrel{\u0306}{P}}^{\text{st}}\left(\chi \right)\left\right.{r}_{p}(\chi ,{\stackrel{\u0306}{p}}^{\text{st}}(\chi \left)\right)<{r}_{p}^{0}\right]. The probability of using the power policy {\stackrel{\u0306}{p}}_{1}^{\text{st}}\left(\chi \right) is indicated by the weighting function w^{st}(χ), which can be expressed as {w}^{\text{st}}\left(\chi \right)=\text{Pr}\left\{{r}_{p}(\chi ,{\stackrel{\u0306}{P}}^{\text{st}}(\chi \left)\right)\ge {r}_{p}^{0}\left\right.\chi \right\}, and therefore the probability of using the power policy {\stackrel{\u0306}{p}}_{2}^{\text{st}}\left(\chi \right) equals 1−w^{st}(χ).
By Lemma 4, we can get the reformulated version of (16). Following the same procedure as in the LTPC case in Appendix 2: optimal solution of {\stackrel{\u0306}{P}}^{\ast}\left(\chi \right) for LTPC, we can apply the necessary and sufficient KKT conditions and the fact that the fading channel state is continuous, use the opportunistic scheduling structure in (25) and arrive at the optimal power policy summarized in Theorem 2.
Appendix 4: proof of Theorem 3
Here the channel state partitioning result from Table 1 will be used first to derive some properties related to the Lagrange multipliers Λ^{∗} and S^{∗} as the M grows large. As discussed before, we assume that S^{∗}>0. From Table 1, we can separate the regions representing fading channel sets 2 and 3 by setting {\mathcal{B}}_{1,\chi}^{B}={\mathcal{B}}_{2,\chi}^{B}, where {\mathcal{B}}_{1,\chi}^{B}={S}^{\ast}, {\mathcal{B}}_{2,\chi}^{B}=log(1+{z}_{max}{p}_{\text{WF}}^{\ast}){\Lambda}^{\ast}{p}_{\text{WF}}^{\ast}, and {p}_{\text{WF}}^{\ast}={\left(\frac{1}{{\Lambda}^{\ast}}\frac{1}{{z}_{max}}\right)}^{+}. Thus, the boundary between channel sets given by cases 2 and 3 is given by
where \Omega =\frac{{\Lambda}^{\ast}}{{z}_{max}} and 0≤Ω≤1. It is easy to show that t(Ω) is a nonincreasing function in Ω when 0<Ω≤1. Thus, the channel sets for cases 1, 2, 3 in Table 1 can also be expressed as follows:
where t^{−1}(.) represents the inverse function of t.
Lemma 5.
and Λ^{∗} is bounded away from 0 for all M.
Proof.
First, we investigate the upper bound of Λ^{∗}. As the average power constraint is always met, we have
Now suppose that \underset{M\to \infty}{lim}{\Lambda}_{M}^{\ast}=0. Then, for an arbitrarily small ε>0, there exists M_{ o } such that for M≥M_{ o }, {\Lambda}_{M}^{\ast}\le \epsilon. Therefore, {(\frac{1}{{\Lambda}_{M}^{\ast}}\frac{1}{{z}_{max}})}^{+}\ge {(\frac{1}{\epsilon}\frac{1}{{z}_{max}})}^{+}. For an M sufficiently large, \frac{1}{{z}_{max}} converges to 0 in probability, implying that {(\frac{1}{\epsilon}\frac{1}{{z}_{max}})}^{+} converges to \frac{1}{\epsilon} in probability. Hence, {(\frac{1}{{\Lambda}_{M}^{\ast}}\frac{1}{{z}_{max}})}^{+}\ge \frac{1}{\epsilon} with high probability. So, with an arbitrary small ε, SU will violate the power constraint with high probability if \underset{M\to \infty}{lim}{\Lambda}_{M}^{\ast}=0. Consequently, \underset{M\to \infty}{lim}{\Lambda}_{M}^{\ast}>0.
Next, we will show that when M is large enough, {\Lambda}_{M}^{\ast} is lowerbounded by \frac{{\epsilon}_{p}^{0}}{{P}_{\text{av}}}.
Also,
Note that the last equality from (33) is because of \underset{{z}_{max}={\Lambda}_{M}^{\ast}}{\overset{\infty}{\int}}\frac{1}{{z}_{max}}d{F}_{Z}^{M}\left({z}_{max}\left\right.{\mathcal{S}}_{1}\right) and {F}_{Z}^{M}\left({\Lambda}_{M}^{\ast}\left\right.{\mathcal{S}}_{1}\right) approach zero as M→∞.
Lemma 6.
For{\epsilon}_{p}>{\epsilon}_{p}^{0}, \frac{1}{{t}^{1}\left({S}^{\ast}\right)}=\Theta (logM).
Proof.
First, notice that the SBS will allocate transmission power only to the user with z_{max} and max\frac{{h}_{i}}{\frac{{k}_{1}}{{g}_{T}}{\alpha}_{i}+{N}_{0}}\le {z}_{max}\le max\frac{{h}_{i}}{{N}_{0}} regardless the value of g. This fact allows us to study how the upper and lower bounds of z_{max} scales as M grows large. By using the results from [22, 37], we can show that z_{max} is upperandlowerbounded by logM as M→∞. Hence, z_{max} also scales as logM when M tends to infinity.
Now we assume that \frac{1}{{t}^{1}\left({S}^{\ast}\right)} grows faster than logM as M→∞. This implies that for a large enough M, \text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{2}}\right) converges to 0, which contradicts the fact that \text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{2}}\right)={\epsilon}_{p}{\epsilon}_{p}^{0}>0 for all M. Next, assume that \frac{1}{{t}^{1}\left({S}^{\ast}\right)} grows slower than logM. This implies that when M is large enough, \text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{3}}\right) converges to 0, which contradicts the fact that \text{Pr}\left(\stackrel{~}{{\mathcal{S}}_{3}}\right)=1{\epsilon}_{p}>0 for all M. Thus, \frac{1}{{t}^{1}\left({S}^{\ast}\right)}=\Theta (logM).
Observe that the SBS gains no throughput from the region 3. We will show that the asymptotic throughput achieved by the secondary network scales as ε_{ p } log(logM), where the optimal power control policy in the region 1 contributes {\epsilon}_{p}^{0}log(logM) of the optimal throughput scaling, while the remaining ({\epsilon}_{p}{\epsilon}_{p}^{0})log(logM) is obtained from the optimal power control policy in the region 2. In order to do so, the results derived above will facilitate us to arrive at the result in Theorem 3 for both (1) when {\epsilon}_{p}={\epsilon}_{p}^{0} (additional outage probability is not allowed) and (2) when {\epsilon}_{p}>{\epsilon}_{p}^{0} (the delaysensitive PU’s link can tolerate an additional outage).
When{\epsilon}_{p}={\epsilon}_{p}^{0}
In this case, region 2 shrinks to an empty set, i.e. \text{Pr}\left({\stackrel{~}{\mathcal{S}}}_{2}\right)={\epsilon}_{p}{\epsilon}_{p}^{0}=0, and the overall optimal throughput scaling is due to transmission power in region 1.
Clearly, as M becomes large, the optimal throughput scaling is due to the effect of the scaling result of z_{max}=h_{max} with the number of SRs in {\stackrel{~}{\mathcal{S}}}_{1}. Moreover, we know that {\Lambda}^{\ast}\le \frac{{\epsilon}_{p}}{{P}_{\text{av}}} and Λ^{∗} is bounded away from 0 for all M (see Lemma 5.) Then, the SBS ergodic sum capacity under optimal power allocation is expressed as {C}_{s}^{\mathit{\text{BC}}\ast}=E\left[log\left(\frac{{z}_{max}}{{\Lambda}^{\ast}}\right){1}_{\left\{{z}_{max}\ge {\Lambda}^{\ast},\phantom{\rule{2.22144pt}{0ex}}{\stackrel{~}{\mathcal{S}}}_{1}\right\}}\right]={\epsilon}_{p}^{0}E\left[log\left(\frac{{h}_{max}}{{\Lambda}^{\ast}}\right)\right]={\epsilon}_{p}E\left[log\left(\frac{{h}_{max}}{{\Lambda}^{\ast}}\right)\right]. As the maximum of M independent and identically distributed exponentially distributed random variables, \frac{{h}_{max}}{logM} converges in probability to 1. (see Example 10.5.1 of [37]). Using this result and the rigorous techniques used in [22] to show convergence in mean from convergence in probability, we can conclude that \underset{M\to \infty}{lim}\frac{{C}_{s}^{\mathit{\text{BC}}\ast}}{log(logM)}={\epsilon}_{p}.
When{\epsilon}_{p}>{\epsilon}_{p}^{0}
Note that the throughput {C}_{s}^{\text{BC*}} can be written as
Note that in the previous subsection, we showed that E\left[log\frac{{z}_{max}}{{\Lambda}^{\ast}}{1}_{\left\{g<{g}_{T},\phantom{\rule{2.22144pt}{0ex}}{z}_{max}\ge {\Lambda}^{\ast}\right\}}\right] scales according to {\epsilon}_{p}^{0}log(logM) when M→∞. Now, we show that
E\left[log\frac{{z}_{max}}{{\Lambda}^{\ast}}{1}_{\left\{g\ge {g}_{T},\phantom{\rule{2.22144pt}{0ex}}{z}_{max}\ge \frac{{\Lambda}^{\ast}}{{t}^{1}\left({S}^{\ast}\right)}\right\}}\right] scales according to ({\epsilon}_{p}{\epsilon}_{p}^{0})log(logM).Upper bound An upper bound on E\left[log\frac{{z}_{max}}{{\Lambda}^{\ast}}\right.\left(\right)close="]">\n \n \n \n \n 1\n \n \n \n \n \n g\n \u2265\n \n \n g\n \n \n T\n \n \n ,\n \n \n \n z\n \n \n max\n \n \n \u2265\n \n \n \n \n \Lambda \n \n \n \u2217\n \n \n \n \n \n \n t\n \n \n \u2212\n 1\n \n \n (\n \n \n S\n \n \n \u2217\n \n \n )\n \n \n \n \n \n \n \n can be obtained as shown in (36).
The inequality (a) is from the fact that
For (b), we use the result in [38] (see proof of Theorem 1 in [38]), i.e. \text{Pr}({z}_{max}\ge ilogM)\le O\left(\frac{{e}^{O\left(i\right)}}{{M}^{i}O\left(i\right)}\right) because z_{max} grows as logM when M→∞. In [38], it is also shown that \sum _{i=1}^{\infty}log\left(\frac{(i+1)logM}{{\Lambda}^{\ast}}\right)O\left(\frac{{e}^{O\left(i\right)}}{{M}^{i}O\left(i\right)}\right) is finite, leading to the result in (c). Thus, we have
Lower bound We use (38) to find a lower bound on E\left[log\frac{{z}_{max}}{{\Lambda}^{\ast}}{1}_{\left\{g\ge {g}_{T},\phantom{\rule{2.22144pt}{0ex}}{z}_{max}\ge \frac{{\Lambda}^{\ast}}{{t}^{1}\left({S}^{\ast}\right)}\right\}}\right] as follows:
Then, we have
Note that the last equality in (39) follows from Lemma 6. Thus, it follows that \underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC*}}}{log(logM)}\ge {\epsilon}_{p}.
Combining the upper and lower bounds, we have the desired asymptotic throughput scaling result that \underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC*}}}{log(logM)}={\epsilon}_{p}.
Appendix 5: proof of Theorem 4
As discussed before, we assume that S^{∗,st}>0. From Table 2, we find the boundary between regions 2 and 3 by setting {\mathcal{B}}_{1,\chi}^{B,\text{st}}={\mathcal{B}}_{2,\chi}^{B,\text{st}}, where {\mathcal{B}}_{1,\chi}^{\mathit{\text{zB}},\text{st}}={S}^{\ast ,\text{st}} and {\mathcal{B}}_{2,\chi}^{B,\text{st}}=log(1+{z}_{max}{P}_{O}){\Lambda}^{\ast ,\text{st}}\left(\chi \right){P}_{O}. Note that for STPC, {\Lambda}^{\ast ,\text{st}}\left(\chi \right)=\frac{{z}_{max}}{1+{z}_{max}{P}_{O}} if the power policy P_{ O } is applied. This results in the following expression for the boundary between regions corresponding to the fading channel states representing regions 2 and 3:
where \omega =\frac{1}{1+{z}_{max}{P}_{O}} and 0≤ω≤1. Further note that t(ω) is a nonincreasing function in ω for 0<ω≤1. Thus, the regions corresponding to the various sets of the channel fading state in Table 2 can also be expressed as follows:
For STPC, the optimal throughput scaling is also contributed by regions 1 and 2 because transmission in secondary network is halted in region 3. In what follows, we show that {\epsilon}_{p}^{0} fraction of the total optimal throughput scaling is from the optimal power policy in region 1, whereas the remaining ({\epsilon}_{p}{\epsilon}_{p}^{0}) fraction is due to data transmission in region 2. We also use the result that z_{max} scales like logM as M tends to infinity. The rest of the proof is divided into two parts: (i) {\epsilon}_{p}={\epsilon}_{p}^{0} and (ii) {\epsilon}_{p}>{\epsilon}_{p}^{0}.
When {\epsilon}_{p}={\epsilon}_{p}^{0}
In this case, we have \text{Pr}\left({\stackrel{~}{\mathcal{S}}}_{2}\right)={\epsilon}_{p}{\epsilon}_{p}^{0}=0 and z_{max}=h_{max} in {\stackrel{~}{\mathcal{S}}}_{1}. Then, the throughput from the SBS is expressed as {C}_{s}^{\text{BC}\ast}=E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{{\stackrel{~}{\mathcal{S}}}_{1}\right\}}\right]={\epsilon}_{p}^{0}E\left[log(1+{z}_{max}{P}_{O})\right]. By using the fact that z_{max} scales as logM as M becomes large, we can conclude that \underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC}\ast}}{log(logM)}={\epsilon}_{p}.
When {\epsilon}_{p}>{\epsilon}_{p}^{0}
In this case, we also require the property that t^{−1}(S^{∗}) scales as logM when M grows large (see Lemma 6). By using the fact that both z_{max} and t^{−1}(S^{∗}) scale as logM, we can show that the upper and lower bounds of the optimal throughput in the secondary downlink network scale like ε_{ p } log(logM). Note that the SBS ESC with optimal power allocation {C}_{s}^{\text{BC}\ast} can be expressed as
As shown previously, E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{g<{g}_{T}\right\}}\right] scales as {\epsilon}_{p}^{0}log(logM). Now, we will show that E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{g\ge {g}_{T},\phantom{\rule{2.22144pt}{0ex}}1+{z}_{max}{P}_{O}\ge \frac{1}{{t}^{1}\left({S}^{\ast}\right)}\right\}}\right] scales as ({\epsilon}_{p}{\epsilon}_{p}^{0})log(logM).
Upper bound An upper bound on E[log(1+z_{max}P_{ O })·\left(\right)close="]">\n \n \n \n \n 1\n \n \n \n \n \n g\n \u2265\n \n \n g\n \n \n T\n \n \n ,\n \n 1\n +\n \n \n z\n \n \n max\n \n \n \n \n P\n \n \n O\n \n \n \u2265\n \n \n 1\n \n \n \n \n t\n \n \n \u2212\n 1\n \n \n (\n \n \n S\n \n \n \u2217\n \n \n )\n \n \n \n \n \n \n \n is shown in (43):
In (43), (a) follows the from the fact that \text{Pr}({z}_{max}\ge ilogM)\le O\left(\frac{{e}^{O\left(i\right)}}{{M}^{i}O\left(i\right)}\right) because z_{max} grows like logM, while (b) is from the fact that \sum _{i=1}^{\infty}log(1+{P}_{O}(i+1)logM)O\left(\frac{{e}^{O\left(i\right)}}{{M}^{i}O\left(i\right)}\right) is finite [38].
Lower bound A lower bound can be computed in a similar fashion to (38) to yield
We then apply Lemma 6, the results from (43) and (44), and the fact that E\left[log(1+{z}_{max}{P}_{O}){1}_{\left\{g<{g}_{T}\right\}}\right] scales as {\epsilon}_{p}^{0}log(logM) to show that \underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC}\ast}}{log(logM)} is upperbounded and lowerbounded by ε_{ p }, i.e. \underset{M\to \infty}{lim}\frac{{C}_{s}^{\text{BC}\ast}}{log(logM)}={\epsilon}_{p}.
References
Federal Communications Commission (FCC): Spectrum policy task force. Technical report, Federal Communications Commission (FCC). Rep. ET Docket no. 02–135, Nov 2002
Mitola J: Cognitive radio: an integrated agent architecture for software defined radio. PhD thesis. Stockholm, Sweden: KTH; 2000.
Goldsmith A, Jafar SA, Marić I, Srinivasa S: Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE 2009, 97(5):894914.
Zhang L, Liang YC, Cui S: Dynamic resource allocation in cognitive radio networks. IEEE Signal Process. Mag 2010, 27(3):102114.
Li L, Goldsmith A: Capacity and optimal resource allocation for fading broadcast channels  part I: ergodic capacity. IEEE Trans. Inf. Theory 2001, 47(3):10831101. 10.1109/18.915665
Li L, Goldsmith A: Capacity and optimal resource allocation for fading broadcast channels  part II: outage capacity. IEEE Trans. Inf. Theory 2001, 47(3):11031127. 10.1109/18.915667
Tse DNC: Optimal power allocation over parallel Gaussian broadcast channels. In IEEE International Symposium on Information Theory (ISIT). Ulm; July 1997.
Jindal N, Vishwanath S, Goldsmith A: On the duality of Gaussian multipleaccess and broadcast channels. IEEE Trans. Inf. Theory 2004, 50(5):768783. 10.1109/TIT.2004.826646
Zhang R, Cui S, Liang YC: On ergodic sum capacity of fading cognitive multipleaccess and broadcast channels. IEEE Trans. Inf. Theory 2009, 55(11):51615178.
Luo J, Yates R, Spasojevic P: Service outage based power rate allocation for parallel fading channels. IEEE Trans. Inf. Theory 2005, 51(7):25942611. 10.1109/TIT.2005.850099
Limmanee A, Dey S, Evans JS: Serviceoutage capacity maximization in cognitive radio for parallel fading channels. IEEE Trans. Commun 2013, 61(2):507520.
Caire G, Taricco G, Biglieri E: Optimum power control over fading channels. IEEE Trans. Inf. Theory 1999, 45(5):14681489. 10.1109/18.771147
Limmanee A, Dey S: Optimal power policy and throughput analysis in cognitive broadcast networks under primary’s outage constraint. In The 8th International Workshop on Resource Allocation and Cooperation in Wireless Networks (RAWNET2012). Paderborn, Germany; May 2012. ,pp. 391 – 397
Kang X, Zhang R, Liang YC, Garg HK: Optimal power allocation strategies for fading cognitive radio channels with primary user outage constraint. IEEE J. Selected Areas Commun 2011, 29(2):374383.
Sharif M, Hassibi B: On the capacity of MIMO broadcast channels with partial side information. IEEE Trans. Inf. Theory 2005, 51(2):506522. 10.1109/TIT.2004.840897
Ban TW, Choi W, Jung BC, Sung DK: Multiuser diversity in a spectrum sharing system. IEEE Trans. Wireless Commun 2009, 8(1):102106.
Wang H, Lee J, Kim S, Hong D: Capacity of secondary users exploiting multispectrum and multiuser diversity in spectrumsharing environments. IEEE Trans. Vehicular Technol 2010, 59(2):10301036.
Zhang R, Liang YC: Investigation on multiuser diversity in spectrum sharing based cognitive radio networks. IEEE Commun. Lett 2010, 14(2):133135.
Li Y, Nosratinia A: Hybrid opportunistic scheduling in cognitive radio networks. IEEE Trans. Wireless Commun 2012, 11(1):328337.
Li Y, Nosratinia A: Capacity limits of multiuser multiantenna cognitive networks. IEEE Trans. Inf. Theory 2012, 58(7):44934508.
Huang K, Heath RW, Andrews JG: Uplink SDMA with limited feedback: throughput scaling. EURASIP J. Adv. Signal Process 2008, 2008: 75.
Nekouei E, Inaltekin H, Dey S: Throughput scaling in cognitive multiple access with power and interference constraints. IEEE Trans. Signal Process 2011, 60(2):927946.
Stockhammer T, Bystrom M: H.264/AVC data partitioning for mobile video communication. In International Conference on Image Processing. Singapore; October 2004:545548.
Hossain MJ, Alouini MS, Bhargava VK: Hierarchical constellation for multiresolution data transmission over block fading channels. IEEE Trans. Wireless Commun 2006, 5(4):849857.
Shen C, van der Schaar M: Optimal resource allocation for multimedia applications over multiaccess fading channels. IEEE Trans. Wireless Commun 2008, 7(9):3546.
Kang X, Liang YC, Nallanathan A, Garg HK, Zhang R: Optimal power allocation for fading channels in cognitive radio networks: ergodic capacity and outage capacity. IEEE Trans. Wireless Commun 2009, 8(2):940950.
Kang X, Garg HK, Liang YC, Zhang R: Optimal power allocation for OFDMbased cognitive radio with new primary transmission protection criteria. IEEE Trans. Wireless Commun 2010, 9(6):20662075.
Zhang L, Xin Y, Liang YC, Poor HV: Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization. IEEE Trans. Commun 2009, 57(9):27542762.
Kim JB, Kim D: Outage probability achievable diversity order of opportunistic relaying in cognitive secondary radio networks. IEEE Trans. Commun 2012, 60(9):24562466.
Etkin R, Parekh A, Tse D: Spectrum sharing for unlicensed bands. IEEE J. Selected Areas Commun 2007, 25(3):517528.
Lee J, Wang H, Andrews JG: Outage probability of cognitive relay networks with interference constraints. IEEE Trans. Wireless Commun 2011, 10(2):390395.
Zhang R: Optimal power control over fading cognitive radio channels by exploiting primary user CSI. In Proceedings of IEEE GLOBECOM 2008. New Orleans, USA; December 2008:15.
He YY, Dey S: Power allocation in spectrum sharing cognitive radio networks with quantized channel information. IEEE Trans. Commun 2011, 59(6):16441656.
Eswaran K, Gastpar M, Ramchandran K: Bits through ARQs: spectrum sharing with a primary packet system. In IEEE International Symposium on Information Theory. Nice, France; June 2007:21712175.
Ganesan G, Li Y: Cooperative Spectrum sensing in cognitive radio networks,. November 2005.
Cover T, Thomas J: Elements of Information Theory. Hoboken: Wiley; 2006.
David HA, Nagaraja HN: Order Statistics. Hoboken: Wiley; 2003.
Nekouei E, Inaltekin H, Dey S: Throughput scaling in cognitive multiple access networks with power and interference constraints. In IEEE International Conference on Communications. Kyoto, Japan; June 2011:16.