Protocol design and performance analysis for cognitive cooperative networks with multiple antennas

In this article, we deal with a novel access protocol design for cognitive cooperative networks with multiple antennas. According to the principles of cognitive radio, the secondary user (SU) can exploit the primary user (PU) burstiness to access the licensed spectrum in the proposed access protocol. To get more access opportunities to the licensed spectrum, the SU simultaneously relays the PU’s packets and transmits its own packets based on the superposition coding. Furthermore, to concurrent transmission of the PU’s packets and SU’s packets based on the superposition coding such that they are received without the interference at the primary receiver and secondary receiver respectively, two weight vectors at the SU equipped with multiple antennas are designed based on zero-forcing algorithm. Specifically, from a networking perspective, we analyze the performance of the proposed access protocol in terms of the maximum stable throughput and the average end-to-end delay for both the PU and SU based on the principles of queueing theory. In addition, to protect the PU’s performance and exhibit the advantage of adopting multiple antenna technology, we jointly optimize the parameter of superposition coding and the number of antennas, and define the maximum stable throughput cooperative gain compared to the non-cooperative access scheme. More importantly, the impact of imperfect channel state information (CSI) at the SU on the maximum stable throughput and the average end-to-end delay performance is evaluated in the simulations from a practical point of view. Analysis and simulation results demonstrate that the proposed access protocol achieves significant performance gains for both the PU and the SU, outperforms the existing cooperative access protocol based on the dirty-paper coding, and keeps robust against to the imperfect CSI.


Introduction
Cognitive radio has been proposed as a promising technology to solve the contradiction between the inefficient utilization of spectrum and the limitation of spectrum resources in recent years [1]. In cognitive radio networks, the secondary user (SU) is allowed to share the licensed spectrum when the performance of the primary user (PU) is not affected. Currently, the SU can access the licensed spectrum through three schemes: interweaved spectrum sharing, underlay spectrum sharing and overlay spectrum sharing [2]. In the interweaved spectrum sharing scheme, http://jwcn.eurasipjournals.com/content/2013/1/70 cognitive radio networks. Most of the existing works on the combined topic focus on solving the problems in the physical layer [4][5][6][7][8][9][10], such as the enhancement of the sensing ability for the SU and the improvement of the outage and error performances for both the PU and SU. When delay-sensitive applications are considered, other performance metrics about the maximum stable throughput and the average end-to-end delay become critical. Nowadays, various access protocols for cognitive cooperative networks were proposed where the SU cooperatively relayed the PU's packets in exchange for more access opportunities [11][12][13][14]. Simeone et al. [11] analyzed the maximum stable throughput for both the primary system and the secondary system with and without relaying capability in the basic four nodes with single antenna configuration. Sadek et al. [12] investigated the stability and the delay of a cognitive multiple access relay channel, where the cognitive user acted as a cooperative node for relaying PU's packets without having its own packets. Krikidis et al. [13] proposed various protocol designs for a single antenna cognitive cooperative system with a cluster of SUs by using dirty-paper coding (DPC) and opportunistic relay selection. However, the system model considered in [13] was not practical which required the information to be perfectly exchanged with the inner of the cluster and rigorous synchronization for each user. In addition, there was the interference at the primary receiver (PR) and the secondary receiver (SR) in the proposed access protocol based on the complicated DPC [13], which resulted in the poor performances of PU and SU. Bao et al. [14] studied the performance of a single antenna cognitive cooperative system with coexisting multiple PUs and one SU in terms of the maximum stable throughput and the average end-to-end delay.
While these prior works have improved our understanding on the protocol design and performance analysis for cognitive cooperative systems, the key limitation of these works is that they all assume a single antenna system. With the fact that the multiple antenna technique will be adopted as one of the key enabling technologies for the next generation wireless communication systems, the importance of understanding the fundamental performance of cognitive multiple antenna networks becomes increasingly evident [15][16][17][18]. Therefore, we are interested in the scenario where a SU equipped with multiple antennas and making a comprehensive analysis of the proposed protocol design for cognitive cooperative networks in this article. To the best of our knowledge, the evaluation of the application of multiple antenna technique to cognitive cooperative networks has not been reported in the literature from a networking point of view. Hence, the goal of the work is to evaluate the stable throughput for PU and SU and the end-to-end delay performance for the PU by using the principle of queuing theory. To get more access opportunities, we make the SU as a relay for the PU and allow the SU to simultaneously transmit the PU's packets and its own packets based on the superposition coding in the cognitive cooperative networks. Furthermore, to avoid the interference to each other, two weight vectors are designed at the SU for the PR and the SR based on zero-forcing algorithm, respectively. More importantly, the impact of imperfect channel state information (CSI) on the performance of the proposed access protocol is also considered in the simulations. Results demonstrate that the designed protocol is robust against to the imperfect CSI and achieves significant performance gains for the PU and the SU, respectively.
The rest of this article is organized as follows. In Section 2, a system model is described. Section 3 designs the cognitive cooperative protocol and analyzes the maximum stable throughput of the proposed access protocol for both the PU and the SU, respectively. In Section 4, we define the cooperative gain of the proposed cooperative protocol and jointly optimize the parameter of the superposition coding and the number of antennas. In Section 5, the average end-to-end delay performance for the PU is analyzed. Finally, conclusions are drawn in Section 6.

System model
As illustrated in Figure 1, we consider a cognitive cooperative system which consists of a PU, a PR, a SU equipped with M antennas and a SR. a We make an assumption that both the PU and SU have an infinite buffer to store the incoming packets as in [11][12][13][14]. The channel is slotted in time and the transmission time of each packet equals to a slot duration. The packets' arrival at the PU and the SU are Bernoulli random process, independently and stationary from slot to slot with mean λ p and λ s (packets per slot), respectively. Due to the effect of the fading channel, a packet can be successfully or unsuccessfully received by the intended receiver, which requires the feedback acknowledgment (ACK) and negative acknowledgment (NACK), b respectively.

Physical layer model
We assume that all channels experience independent stationary Rayleigh flat-fading with channel coefficients being denoted as in Figure 1, which are circularly symmetric complex Gaussian random variable with zero-mean and unit-variance. Thus we have where α (2 ≤ α ≤ 5) denotes the path-loss exponent and d ij , i ∈ {PU, SU} , j ∈ {PR, SR} represents the distance between the respective transmitter and receiver. Throughout the article, we assume that the CSI about g 0 , f 0 and f 1 is known at the SU. c The transmit powers at the PU and the SU are denoted by P p and P s , respectively. n k ∼ CN 0, σ 2 , ∀k ∈ {PR, SR} is complex additive white Gaussian noise (AWGN) at the PR and SR. n SU ∼ CN M,1 0 M , σ 2 I M is the AWGN vector at the SU. Accordingly, the signal x p received at the SU and the PR from the PU at time t can be respectively expressed as ( 1 ) where the index t is dropped without loss of generality.
In this article, we consider that the success or failure of packet reception for each link i → j is characterized by outage events and outage probabilities. The outage event O ij is defined as the instantaneous achievable rate C falls below a given rate R with an outage probability Pr O ij = Pr {C < R}. In order to overcome the impact of the fading channel and decrease the outage probability between the PU and the SU, we apply a 1×M weight vector w r to the received signal y SU at the SU, then the resultant scalar signal at the SU is given by where (·) † denotes the conjugate transpose operation and w r = g 0 g 0 as stated in [19,20].
From (2) and (3), the received signal-to-noise ratio (SNR) of the primary signal at the PR and the SU can be respectively derived as SNR PR = P p σ 2 |h 0 | 2 and SNR SU = Correspondingly, the outage probability for a given target rate R p between the PU and the PR is represented as where γ 0 = P p d α PU,PR σ 2 and 0 = 2 R p − 1.
Similarly, the outage probability between the PU and the SU is given by where γ 1 = P p d α PU,SU σ 2 , γ (·, ·) and (·) denote the lower incomplete gamma function and gamma function [21], respectively.

Queueing stability
In a communication network, the stability of the queue is a fundamental performance metric. Stability is defined as the state where all the queues in the network are stable. According to Rao and Ephremides [22], a queue is stable if and only if there exists a positive probability for the queue being empty, i.e., where Q i (t) denotes the size of the ith queue at time t.
For a more rigorous definition of stability, we can refer to [22,23]. If the arrival and departure rates of a queueing system are stationary, the stability can be checked by using Loynes' theorem [24]. The theorem states that the queue is strictly stationary which requires the average arrival rate less than the average departure rate of the queue, i.e., the service rate. Otherwise, the queue is unstable.

Cognitive cooperative protocol design with multiple antennas
In this section, we investigate a novel cognitive cooperative access protocol which can efficiently combine the principles of cognitive radio with multiple antenna technology. From higher network layer viewpoint, we focus on analyzing the maximum stable throughput for both the PU and SU by using the queuing theory. Furthermore, we assume that the SU has perfect spectral sensing ability and mainly analyze the impact of multiple antennas on the cooperative access protocol for the PU and the SU in the article. The impact of imperfect spectral sensing problems is beyond the scope of our consideration.

Non-cooperative access scheme
In order to evaluate the gains obtained from the cooperative access scheme, the non-cooperative access scheme is analyzed as a baseline scenario, in which the PU transmits its data through the primary link directly without getting any assistance from the SU. The queue size of the PU or SU at time t, denoted by Q i (t), i ∈ {p, s}, evolves as follows: where X i (t) represents the number of packet arrivals at time t and is a Bernoulli stationary process with finite http://jwcn.eurasipjournals.com/content/2013/1/70 In the non-cooperative access scheme, the service process of the PU can be modeled as From the definition of the service process, the average service process of the PU is given by Due to assuming perfect spectral sensing at the SU, the PU's queue and the SU's queue are not interacting. Therefore, according to Loynes' theorem, the average service process is also defined as the maximum stable throughput of the corresponding queue. Hence, the stability of the PU's queue, under the non-cooperative access scheme, should satisfy According to the principles of cognitive radio, the SU is allowed to access the licensed spectrum without producing the interference to the PR. Therefore, the SU can access the licensed spectrum when the PU does not have any packet in its queue. We can model the service process of the SU as [13,14] where Q p (t) = 0 represents the event that the PU's queue is empty at time t. According to Little's theorem [24], it has probability Pr Q p (t) = 0 = 1 − λ p μ max PN . Hence, the average service process of the SU is given by Correspondingly, the stability of the SU's queue, under the non-cooperative access scheme, requires

Cooperative access scheme
In this section, we investigate a cognitive cooperative access scheme, in which the SU acts as a relay to deliver the PU's packets unsuccessfully received by the PR through the primary link directly. Therefore, in contrast to the non-cooperative access scheme, the PU's packet is removed from its queue whenever it is correctly received by the PR or the SU. Moreover, the conventional noncooperative ACK/NACK mechanism should be revised and the SU is allowed to send an ACK to notify the PU for successful decoding the packet [11][12][13]. To get more access opportunities, the SU simultaneously relays the PU's packets and transmits its own packets based on the superposition coding in the cooperative access scheme. Further, to concurrent relay the PU's packets and transmit its own packets based on the superposition coding such that they are received without interference at the PR and SR respectively, we design two M × 1 weight vectors at the SU to the PU's signal and the SU's signal, i.e., w p and w s , respectively. Thus, the received signal at the PR and SR can be represented as where β (0 ≤ β ≤ 1) denotes the power allocation factor, i.e., the parameter of the superposition coding. In order to eliminate the interference signal and maximize the desired signal at the PR and SR, we adopt the zero-forcing algorithm to design the weight vectors for simplicity. Then, two weight vectors w p and w s can be obtained by the following optimization problems [15,25] w p = arg max It seems difficult to solve the two optimization problems to get the zero-forcing beamforming weight vectors w p and w s . In fact, we can use projection matrix theory [26] to get the optimum weight vectors as follows: where V ⊥ PR and V ⊥ SR are the projection matrices for the PR and SR and given, respectively, by (18) http://jwcn.eurasipjournals.com/content/2013/1/70 To this end, the received SNR at the PR and the SR can be calculated from (14)- (17), after some algebraic manipulations, as To derive the maximum stable throughput for the primary system and the secondary system under the cognitive cooperative access scheme, we first present the following theorem [15,25].
degrees of freedom, and its probability density function is given as In what follows, we analyze the maximum stable throughput of the cognitive cooperative access scheme and compare with that of the non-cooperative access scheme.

PU stability
In contrast to the non-cooperative access scheme, the SU has two queues in the cognitive cooperative access scheme, i.e., one queue Q s storing its own packets and one queue Q sp containing the packets from the PU which are not successfully received by the PR. Hence, the packets in the queue Q p will be removed in the cooperative access scheme whenever the packets are successfully received by the PR or the SU, which means that the maximum stable throughput of the PU depends on both the stability of the queue Q p and Q sp . Hence, the service process of the PU can be modeled as Then, the average of the service process of the PU in the cognitive cooperative access scheme can be derived as In what follows, we analyze the stability of the queue Q sp . The evolution of the queue Q sp can also be modeled as where Y sp (t) = 1 Q p (t) = 0 ∩ O t S,P (β) denotes the number of packet departures from the queue Q sp and R is the number of packet arrivals of the queue Q sp at time t, respectively. It is worth noting from (23) that only the queue Q p is empty, the SU will access the channel to transmit its own packets and the packets in the queue Q sp based on the superposition coding to get more access opportunities.
Correspondingly, the average packet arrival rate and departure rate for the queue Q sp , at time t, can be respectively computed as where γ 3 = P s β d α SU,PR σ 2 . To this end, according to Loynes' theorem [23], the stability condition of the PU's queue in the proposed cooperative access scheme can be derived from (22)-(25) as

SU stability
According to the cognitive cooperative access scheme, the service process of the SU can be modeled as where Q sp (t) = 0 denotes the event that the queue Q sp is empty at time t and the probability of the empty of the queue Q sp based on Little's theorem [24] is given by For the empty of the queue Q sp condition, the SU only establishes a communication between itself and the SR. From (27), the average service rate of the SU can be derived as where γ 4 = P s (1−β) d α SU,SR σ 2 . Using Loynes' theorem [23], the stability condition of the SU's queue in the cognitive cooperative access scheme requires

Cooperative gains
In this section, we first analyze the cooperative gains for the PU and the SU in the cognitive cooperative access scheme, respectively. In what follows, we define the maximum stable throughput cooperative gains for the PU and the SU as From (26) and (33), the maximum stable throughput of the PU with cooperation can be derived as Since the maximum stable throughput of the PU without cooperation is independent of M, it keeps constant when M grows asymptotically large. To this end, the cooperative gain bound of the PU can be derived as (32).
By following the similar proof for that of the PU, the cooperative gain bound of the SU can be obtained after some simple mathematical manipulations.

Parameters optimization
Due to the fact that the parameter of superposition coding, i.e., the power allocation factor β, introduces an interesting tradeoff between the maximum stable throughput of the PU and the SU. Hence, we optimize the appropriate power allocation factor β to maximize the stable throughput of the SU while supporting the pre-selected PU's stable throughput λ p0 (λ p0 < μ max PN ) in this section. The optimization problem can be formulated as It is worth pointing out that the solution of the optimization problem should satisfy the inequality λ p (M, β) ≥ λ p0 . Since it is difficult to obtain a closed form expression for β opt , we numerically evaluate β opt by Monte Carlo simulations. As shown in Figure 2, the stable throughput of the SU decreases with the power allocation factor β whereas the stable throughput of the PU presents the flat behavior when the power allocation factor β exceeds a certain value. Hence, the optimal power allocation factor β opt can always be found for all practical SNR values under different antenna configurations through simulations. Besides, note that the use of β opt and M opt based on (35), will simultaneously (i) achieve a significant performance improvement for the stable throughput at both the PU and the SU, and (ii) guarantee that the PU's stable throughput of the cooperative access scheme will equal to or outperform the PU's stable throughput of the non-cooperative scheme.

Numerical results for stable throughput performance
In this section, we make extensive numerical results to evaluate the performance of the proposed cooperative access scheme. To present the advantage of the proposed cooperative access scheme, the existing cooperative access scheme based on DPC in [13] is provided for comparison in the simulations. Throughout the article, a system topology where the PU, SU, and PR are collinear is considered. Unless otherwise specify, the simulation parameters http://jwcn.eurasipjournals.com/content/2013/1/ are set as follows: Figure 3 compares the maximum stable throughput of cooperative and non-cooperative access schemes as a function of the PU's arrival rate λ p using the fixed power allocation factor β = 0.5. We label the proposed cooperative access scheme based on zero-forcing algorithm as ZF-cooperation. It is noted from the figure that the proposed cooperative access scheme outperforms its noncooperative counterpart. Further, as can be expected in any conventional multiple antennas system since the extra number of antennas provides additional space diversity gain, the maximum stable throughput of the SU is significantly improved in the proposed cooperative access scheme. However, in contrast to the cooperative access scheme, increasing the number of antennas at the SU does not provide any diversity gain in the non-cooperative access scheme due to the restriction of access opportunities for the SU. Hence, increasing the number of antennas only provides the additional coding gain for the SU in the non-cooperative access scheme.
In Figure 4, we compare the proposed cooperative access scheme, i.e., ZF-cooperation, with the conventional cooperative access scheme by using DPC in [13] (labeled as DPC-cooperation). We adopt the selection algorithm for the parameter of superposition coding in [13], in which the power allocation factor β is selected from the PU's point of view. Hence, we select β 0 = 0.6 and β 1 = 0.7 for the ZF-cooperation scheme and the DPC-cooperation scheme, respectively. To a fair comparison between the two schemes, we assume that for ZF-cooperation scheme the PU and SU transmit with power P p and P s , respectively, while for the DPC-cooperation scheme the PT and SU transmit with power P p and P s 2 , respectively. This is due to the fact that two SUs are selected to transmit its own packets and relay the PU's packets in the DPC-cooperation scheme. As can be observed in the figure, the proposed ZF-cooperation scheme significantly outperforms the DPC-cooperation scheme for both primary and secondary stable throughput. Furthermore, the non-cooperative access scheme achieves better performance than that of the DPC-cooperation scheme under low SNR regime. This is can be explained by the fact that the DPC-cooperation scheme introduces a severe interference to the primary transmission in the low SNR regime, which results in a lower gain throughput for the SU. However, different from the DPC-cooperation scheme, there exists no interference at the PU and SU in all SNR region in the proposed ZF-cooperation scheme. Figure 5 illustrates the impact of the number of antennas M on the maximum PU's stable throughput performance when P s = 5 and P p = 1, 3, 5 dB, respectively. As can be expected, when the transmit power of the PU increases, the maximum PU's stable throughput is significantly improved. It is also observed that the maximum PU's stable throughput of the proposed ZF-cooperation scheme is improved as the number of antennas M increases due to the fact that a higher diversity gain can be obtained by increasing the number of antenna. However, the maximum PU's stable throughput almost keeps constant when M ≥ 6 under different transmit powers of the PU, which implies that an adequate number of antennas can be selected for the design of the system to reduce the complexity of our scheme. Figure 6 plots the cooperative gain of the PU versus the transmit power P s when P p = 1 dB and 3 dB, respectively. It is noted from this figure that more cooperative gain of the PU can be obtained when the quality of PU's link is poor. In addition, we can observe that the cooperative gain can be gradually improved by increasing the transmit power P s of the SU and the number of antennas M. Specifically, when the number of antennas increases to a certain value, the full cooperative gain can be achieved in the proposed cooperative access scheme, which verifies our analysis in Section 4. Figure 7 shows the impact of imperfect CSI on the PU and the SU performances of the proposed ZF-cooperation scheme. In previous analysis, we assume that perfect CSI about the links can be obtained at the SU. Such an assumption, however, does not hold in practical systems. The reason is that channel knowledge is always outdated due to the effect of delay and time-varying of the wireless link, which implies that we need to consider the impact of imperfect CSI. Since we are more interested in studying the impact of imperfect CSI on the designed weight vectors at the SU, we only consider the imperfect CSI about the channel f 0 between the SU and the SR and the channel f 1 between the SU and the PR in the simulation. The imperfect CSI can be described, using the correlation model [27][28][29], as follows: where f 0 denotes the outdated CSI between the SU and the SR, and f 1 is the outdated CSI between the SU and the PR. n 0 and n 1 are independent CSCG random vectors with each element having zero mean and unit variance, and δ 2 (0 ≤ δ 2 ≤ 1) represents the variance of the outdated CSI. As shown in Figure 7, the stable throughput for the PU and the SU decreases for higher δ 2 . The result can be expected since increases of δ 2 represent that the channel information about f 0 and f 1 becomes more inaccuracy at the SU. On the other hand, while the stable throughput of the PU decreases when the variance of the outdated CSI δ 2 becomes larger, the proposed ZF-cooperation scheme still outperforms the non-cooperative access scheme, which means that the proposed ZF-cooperation scheme keeps robust against the imperfect CSI. Figure 8 shows how the distance d PU,SU affects the maximum stable throughput for the PU and SU when M = 3 and P p = P s = 1 dB. From the figure, we see that the proposed cooperative access scheme achieves a better stable throughput performance than the noncooperative access scheme for the PU over all values of d PU,SU . In addition, as we can observe, there exists an optimal d PU,SU to the maximum stable throughput of the PU and the SU, respectively. For the proposed cooperative access scheme, we note that the PU's stable throughput improves for increasing d PU,SU when 0.1 ≤ d PU,SU < 0.7, but gets worse when 0.7 ≤ d PU,SU ≤ 0.9. This is due to the fact that the PU's performance for the proposed cooperative access scheme is dominated by the worst link as the conventional relay networks. For 0.1 ≤ d PU,SU < 0.7, the SU-PR link is the worst link compared to the PU-SU link, it has a lower SNR due to the longer distance. While for 0.7 ≤ d PU,SU ≤ 0.9, the longer distance results in the poor link between the PU and the SU.

Delay analysis
In this section, we analyze the average end-to-end delay of the PU in the proposed cooperative access scheme. Before delving into the details, we first give the definition of the end-to-end delay for a packet, which is described as the time from the packet arrives at the queue Q i till it is correctly received by the respective receiver.

Non-cooperative access scheme
According to Little's theorem, the average end-to-end delay of a packet in the queue Q p can be modeled as where E Q p denotes the average queue size. packet is successfully transmitted from the PU to the PR through the primary link directly. The probability of the event A is given by To this end, the average end-to-end delay for the packet of the queue Q p in the proposed cooperative scheme is given by The closed-form expressions for the average delay of T P and T SP can be derived by following the similar process in the non-cooperative access scheme. This completes the proof of Theorem 4.

Results and discussions
Here we compare the average end-to-end PU's queue delay of the proposed ZF-cooperation scheme with that of the non-cooperation scheme. We now consider the following two cases of interest in the simulations. Case 1: SU owning perfect CSI and Case 2: SU owning imperfect CSI. Figures 9 and 10 illustrate that the delay performance of the proposed cooperative access scheme versus the PU's arrival rate λ p under perfect CSI and imperfect CSI cases, respectively. As shown in Figure 9, the average end-toend delay performance of the proposed ZF-cooperation scheme outperforms that of the non-cooperation scheme. Moreover, the packet of the PU's queue suffers severe delay with the increasing of the PU's arrival rate. However, increasing the number of antennas can significantly improve the average end-to-end delay performance of the proposed ZF-cooperation scheme due to more diversity gain. In Figure 10, we investigate the impact of the imperfect CSI on the average end-to-end delay performance for the PU with different antenna configurations. It is observed that the average delay of the PU is almost not affected by the imperfect CSI at low arrival rate and can be improved by increasing the number of antennas. In addition, the proposed cooperative access scheme still outperforms the non-cooperative access scheme under the imperfect CSI, which demonstrates that the proposed cooperative access scheme keeps robust against the imperfect CSI at the SU.

Conclusions
In this article, we have dealt with the protocol design in cognitive cooperative networks with multiple antennas. To simultaneously transmit the PU's data and its own data based on the superposition coding such that they were received without interference at the PR and SR respectively, two weight vectors were designed at the SU based on zero-forcing algorithm. Specifically, we analyzed the maximum stable throughput and the average end-to-end delay performance of the proposed cooperative access scheme based on zero-forcing algorithm and compared with that of the existing cooperative access scheme based on the DPC. Simulation results demonstrated that the proposed cooperative access scheme achieved a better performance than the existing cooperative access scheme by using the DPC. In addition, the cooperative stable throughput gains for the PU and the SU were defined to study the effect of antennas on the performance of cognitive cooperative networks, and the upper bounds for the PU and the SU were also derived, respectively. Through analysis and simulations, we found that the upper bound of cooperative gain could be obtained by increasing the transmit power of the SU or the number of antennas. Furthermore, the impact of imperfect CSI on the performance of the proposed cooperative access scheme was investigated from the practical view and simulation results showed that the proposed cooperative access scheme kept robust against the imperfect CSI at the SU. Endnotes a The system model, corresponding to a practical scenario in which a secondary base station is serving one SU, is also considered in [15]. b Assuming that the packet ACK or NACK feedback is no error due to the fact that the short length of ACK/NACK packets can be coded at very low rate in the feedback channel [11][12][13]. c In practice, the CSI between the SU and the SR can be obtained through the classic channel estimation and feedback mechanisms as in [30]. While the CSI about g 0 and f 1 can be obtained at the SU by direct estimating pilot signals from the primary system or by using the band manager which can exchange the channel information between the PU and the SU [31].