To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Cognitive radio is a new paradigm of designing wireless communications systems which aims to enhance the utilization of the radio frequency (RF) spectrum. The motivation behind cognitive radio is the scarcity of the available frequency spectrum, increasing demand, caused by the emerging wireless applications for mobile users. Most of the available radio spectrum has already been allocated to existing wireless systems, however, and only small parts of it can be licensed to new wireless applications. Nonetheless, a study by the Spectrum Policy Task Force (SPTF) of the Federal Communications Commission (FCC) has showed that some frequency bands are heavily used by licensed systems in particular locations and at particular times, but that there are also many frequency bands which are only partly occupied or largely unoccupied [110]. For example, spectrum bands allocated to cellular networks in the USA [111] reach the highest utilization during working hours, but remain largely unoccupied from midnight until early morning.
The major factor that leads to inefficient use of the radio spectrum is the spectrum licensing scheme itself. In traditional spectrum allocation based on the command-and control model, where the radio spectrum allocated to licensed users is not used, it cannot be utilized by unlicensed users and applications [5]. Due to this static and inflexible allocation, legacy wireless systems have to operate only on a dedicated spectrum band, and cannot adapt the transmission band according to the changing environment. For example, if one spectrum band is heavily used, the wireless system cannot change to operate on another more lightly used band.
Wireless communications technology has become a key element in modern society. In our daily life, devices such as garage door openers, TV remote controllers, cellular phones, personal digital assistants (PDAs), and satellite TV receivers are based on wireless communications technology. Today the total number of users subscribing to cellular wireless services have surpassed the number of users subscribing to the wired telephone services. Besides cellular wireless technology, cordless phones, wireless local area networks (WLANs), and satellites are being extensively used for voice- as well as data-oriented communications applications and entertainment services.
In 1895, Guglielmo Marconi demonstrated the feasibility of wireless communications by using electromagnetic waves. In 1906, the first radio broadcast was done by Reginald Fessenden to transmit music and voice over the air. In 1907, the commercial trans-Atlantic wireless transmission was launched. In 1946, the first public mobile telephone systems were introduced in several American cities. The first analog cellular system, the Nordic Mobile Telephone System (NMT), was introduced in Europe in 1981. In 1983, the first cellular wireless technology, the advanced mobile phone system (AMPS), was deployed for commercial use. During the last two decades there has been significant research and development in wireless communications technology. In fact, today it has emerged as the most flourishing branch of development in the area of telecommunications.
The various wireless communications systems available today differ in terms of data rate of transmission, geographical coverage area, transmission power, and mobility support for users.
Learning algorithms are used to build knowledge about a cognitive radio network so that the cognitive radio users can dynamically adapt their decisions on spectrum access. Learning algorithms are useful for cognitive radio networks with either collaborative or non-collaborative behavior among the network entities. In a non-collaborative scenario, there is no exchange of information in the network and a cognitive radio user has to learn from the local observations only. This chapter deals with learning-based schemes for distributed dynamic spectrum access. Different protocols to support distributed dynamic spectrum access are also discussed. These protocols can be used to facilitate spectrum handoff, exchange the information between cognitive radio users, and synchronize the transmission between cognitive radio transmitter and receiver.
Distributed resource management in multihop cognitive radio networks
In a multihop cognitive radio network, the channel selection algorithm plays an important role in optimizing the transmission performance and avoiding interference. To achieve an optimal channel selection, information of the channel availability is required at each node. Although an information exchange mechanism can be developed for this channel selection algorithm, this can incur a significant cost in the system. This information exchange not only reduces the available resources for data transmission, but also increases the delay of data transmission. Therefore, with the constraint of available information in a multihop cognitive radio network, a distributed minimum delay routing and channel selection algorithm based on learning was proposed for delay-sensitive traffic (e.g. multimedia) [540].
In the system model, there are multiple licensed users occupying the channels. In this multihop cognitive radio network, the licensed users require an interference-free environment.
The ideas underlying game theory have appeared throughout history, in the Bible, the Talmud, the works of Descartes and Sun Tzu, and the writings of Chales Darwin. Modern game theory, however, can be considered as an outgrowth of three seminal works:
Augustin Cournot's Research into the Mathematical Principles of the Theory of Wealth in 1838 gives an intuitive explanation of what would eventually be formalized as the Nash equilibrium, as well as provides an evolutionary, or dynamic notion of best-response to the actions of others.
Francis Ysidro Edgeworth's Mathematical Psychics demonstrated the notion of competitive equilibria in a two-person (as well as two-type) economy; Emile Borel, in “Algèbre et calcul des probabilités,” Comptes Rendus Académie des Sciences, vol. 184, 1927, provided the first insight into mixed strategies that randomization may support a stable outcome.
While many other contributors hold a place in the history of game theory, it is widely accepted that modern analysis began with John von Neumann and Oskar Morgenstern's book, Theory of Games and Economic Behavior. Then building on von Neumann and Morgenstern's results John Nash developed the modern framework for methodological analysis.
Depending on the nature of the different approaches, there are different possible applications of game theory. If the information is strictly limited to local information, the non-cooperative game might be the only choice for each individual to play. However, such a game might have a very low-efficiency outcome. To overcome this problem, pricing or referee approaches have been proposed. If the users care about long-term benefits, the repeated game can be employed to enforce cooperation by the threat of future punishment from others.
To design efficient and effective dynamic spectrum access techniques for a cognitive radio network, the related technical aspects (e.g. channel allocation, power control) as well as economic aspects (e.g. pricing, spectrum auction) need to be considered. The economic issues are crucial for cognitive radio networks operating under the exclusive-use spectrum access model, since they define the incentive for licensed users to yield the right of spectrum access to the unlicensed users. Economic issues are also important for dynamic spectrum access based on the shared-use and commons-use models, because they determine the competition and cooperation between the licensed and unlicensed users.
In this chapter, we describe the different economic aspects of dynamic spectrum access in cognitive radio networks. First, the concept of spectrum trading is presented, which involves spectrum selling by single or multiple licensed users and spectrum buying by unlicensed users. A taxonomy of the spectrum trading models is presented. The pricing issue for spectrum trading as well as authentication, authorization, and accounting (AAA) issues are discussed. Then, an overview of the economic theories for spectrum trading in a dynamic spectrum access environment is given. These include utility theory, the concept of market-equilibrium, competition in an oligopoly market, and auction theory. A survey on the spectrum trading models based on the above theories is then presented.
Introduction to spectrum trading
Generally, license for spectrum access is provided to a primary user or service provider through an auction process in a primary market (Figure 11.1). When the allocated spectrum is under-utilized, the licensed user can lease the spectrum in a secondary market to an unlicensed user which temporarily demands the spectrum for a particular service.
In a wireless network (more specifically, in a cognitive wireless network), the available radio resources such as bandwidth are very limited. On the other hand, the demands for the wireless services are exponentially increasing. Not only are the number of users booming, but also more bandwidth is required for new services such as video telephony, TV on demand, wireless Internet, and wireless gaming. Finding a way to accommodate all these requirements has become an emergent research issue in wireless networking. Resource allocation and its optimization are general methods to improve network performance, but there are tradeoffs for resource usage. One of the major research goals is to present these tradeoffs so that better implementations can be put into practice.
This chapter will focus on how to formulate cognitive wireless networking problems as optimization problems from the perspective of resource allocation. Specifically, this chapter discusses what the resources, parameters, practical constraints, and optimized performances are across the different layers. In addition, it addresses how to perform resource allocation in multiuser scenarios under the presence of the primary users. The tradeoffs between the different optimization goals and different users interests are also investigated. The goal is to provide a new perspective of wireless networking and resource allocation problems from the optimization point of view.
This chapter is organized as follows: Section 4.1 discusses the basic formulation of the cognitive radio resource allocation as a constrained optimization problem. Section 4.2 studies linear programming and the simplex algorithm as its solution. Section 4.3 investigates how to define a convex optimization problem and some variations. Then the solutions are discussed.
In many scenarios such as in ad hoc cognitive radio networks, deploying a central controller may not be feasible. Therefore, distributed dynamic spectrum access would be required in such cognitive radio networks. Due to the absence of any central controller, each unlicensed user has to gather, exchange, and process the information about the wireless environment independently. Also, an unlicensed user has to make decisions autonomously based on the available information to access the spectrum, so that the unlicensed user can achieve its performance objective under interference constraints. The common behaviors of an unlicensed user in a cognitive radio network without a central controller are as follows:
• Cooperative or non-cooperative behavior: Since a central controller which controls a decision of spectrum sharing is not available, an unlicensed user can adopt either cooperative or non-cooperative behavior. An unlicensed user with cooperative behavior will make a decision on spectrum access to achieve a network-wide objective (i.e. a group objective), even though this decision may not result in the highest individual benefit for each unlicensed user. In other words, an unlicensed user is concerned more about the overall performance of the network than its individual performance. On the other hand, an unlicensed user with non-cooperative behavior will make a decision only to maximize its own benefits (i.e. an individual objective). In this case, the unlicensed user will not be aware of the effect on the overall network performance.
Cognitive radios need to have the ability to learn and adapt their wireless transmission according to the ambient radio environment. Intelligent algorithms such as those based on machine learning, genetic algorithms, and fuzzy control are therefore key to the implementation of cognitive radio technology. In general, these algorithms are used to observe the state of the wireless environment and build knowledge about the environment. This knowledge is used by a cognitive radio to adapt its decision on spectrum access. For example, a cognitive radio (i.e. an unlicensed user) can observe the transmission activity of primary (i.e. licensed) users on different channels. This enables the cognitive radio to build knowledge about the licensed users activity on each channel (e.g. how often and how long the channel will be occupied by the licensed user). This knowledge is then used by the cognitive radio to decide which channel to access so that the desired performance objectives can be achieved (e.g. throughput is maximized while the interference or collision caused to the licensed users is maintained below the target level).
Applications of different learning and intelligent algorithms to a cognitive radio system were summarized in [2] (Figure 6.1). These algorithms can be used for learning/reasoning and decision/adaptation in cognitive radio systems. In this chapter, three major categories of intelligent algorithm, namely, machine learning, genetic algorithm, and fuzzy logic based algorithms, are discussed. Machine learning can be divided into three categories: supervised learning, unsupervised learning, and reinforcement learning. The related algorithms and their applications to cognitive radio are discussed in Sections 6.1–6.3.
Dynamic spectrum access (DSA) models for cognitive radio can be categorized as exclusive-use, shared-use, and commons models. In the exclusive-use model, a licensed user can grant an unlicensed user the right to have exclusive access to the spectrum. In a shared-use model, an unlicensed user accesses the spectrum opportunistically without interrupting a licensed user. In a commons model, an unlicensed user can access the spectrum freely. DSA can be implemented in a centralized or a distributed cognitive network architecture. DSA can be optimized globally in a cognitive radio network if a central controller is available. On the other hand, when a central controller is not available, distributed algorithms would be required for dynamic spectrum access. Issues related to spectrum trading such as pricing will also need to be considered for dynamic spectrum access, especially with the exclusive-use model. For DSA-based cognitive radio networks, MAC protocols designed for traditional wireless networks have to be modified to include spectrum sensing and spectrum access, as well as spectrum trading between licensed and unlicensed users.
In this chapter, we describe the different spectrum access models and the system architectures for DSA. Then, two major components of dynamic spectrum access, namely, spectrum sensing and spectrum access, are presented. Spectrum sensing, which can be implemented in both physical and MAC layers, is used to detect the presence of a licensed user. In this case, an unlicensed user observes the target frequency band and searches for a signal from a licensed user. The spectrum sensing result is used by the unlicensed user to access the spectrum without interfering with the licensed user and colliding with other unlicensed users.
In a centralized dynamic spectrum access architecture, a central controller is deployed to gather and process information about the wireless environment. With a central controller, the decision of cognitive radio users to access the spectrum can be made such that the desired system-wide objectives are achieved.
In this chapter, we review centralized dynamic spectrum access schemes. A summary of these schemes is provided in Table 8.1. In a centralized scheme, every cognitive radio user communicates with a central controller to inform their states and objectives/requirements. The central controller then makes the decisions in terms of the action for each cognitive radio user to access the spectrum so that their requirements are satisfied under given system constraints. To implement centralized dynamic spectrum access, two approaches, namely, optimization approach and auction-based approach, can be used. With an optimization-based approach, different types of optimization problems can be formulated (e.g. convex optimization, assignment problem, linear programming, and graph theory). Standard methods in optimization theory can then be applied to obtain the optimal solution for dynamic spectrum access. Alternatively, centralized dynamic spectrum access can be designed based on auction theory which is well developed in the field of economics. In this approach, cognitive radio users submit their bids to the spectrum owner. The winning cognitive radio user is determined from the bids, and the spectrum is allocated accordingly.
Optimization-based approach
Quality of service (QoS)-constrained dynamic spectrum access
With spectrum underlay access (i.e. the shared-use model), an optimization problem was formulated by considering QoS differentiation for different unlicensed users and also interference temperature constraints [452].
Frequency spectrum is a limited resource for wireless communications and may become congested owing to a need to accommodate the diverse types of air interface used in next generation wireless networks. To meet these growing demands, the Federal Communications Commission (FCC) has expanded the use of the unlicensed spectral band. However, since traditional wireless communications systems also utilize the frequency bands allocated by the FCC in a static manner, they lack adaptability. Also, many studies show that while some frequency bands in the spectrum are heavily used, other bands are largely unoccupied most of time. These potential spectrum holes result in the under-utilization of available frequency bands.
The concepts of software-defined radio and cognitive radio have been recently introduced to enhance the efficiency of frequency spectrum usage in next generation wireless and mobile computing systems. Software radio improves the capability of a wireless transceiver by using embedded software to enable it to operate in multiple frequency bands using multiple transmission protocols. Cognitive ratio, which can be implemented through software-defined radio, is able to observe, learn, optimize, and intelligently adapt to achieve optimal frequency band usage. Through dynamic spectrum access, a cognitive wireless node is able to adaptively and dynamically transmit and receive data in a changing radio environment. Therefore, techniques for channel measurement, learning, and optimization are crucial in designing dynamic spectrum access schemes for cognitive radio under different communication requirements.
In fact, cognitive radio based on dynamic spectrum access has emerged as a new design paradigm for next generation wireless networks. Cognitive radio aims at maximizing the utilization of the limited radio bandwidth while accommodating the increasing number of services and applications in wireless networks.
In this chapter, a number of different spectrum trading models based on economic theory are presented. In the first model, dynamic competitive spectrum sharing is modeled as a Cournot competition, which is formulated as static and dynamic non-cooperative games. From this competition, given the pricing function adopted by the primary user, the optimal amount of spectrum for secondary users needs to be determined so that the utility of each of the secondary users is maximized. In the second model, competitive spectrum pricing among primary users (or service providers) is modeled as a Bertrand competition where multiple primary service providers sell the available spectrum opportunities to a secondary service provider. The third model is a cooperative pricing model for which spectrum pricing can be obtained as the solution of an optimization model solved by a central controller. Another model is the market-equilibrium pricing model in which there is neither competition nor cooperation among primary service providers. A comparison between market-equilibrium, competitive, and cooperative spectrum pricing is presented. The characteristics of these pricing schemes are qualitatively and quantitatively compared. Also, competitive spectrum pricing in the Bertrand model is formulated as a repeated game to investigate the long-term behavior of the primary service providers. In this case, if a punishment mechanism is used and the primary service providers properly weigh their profits in the future, a collusion can be maintained to achieve the highest profit for all primary service providers. To this end, a hierarchical framework for spectrum trading in IEEE 802.22 WRANs is presented. This framework consists of a double auction model, a non-cooperative game model, and an evolutionary game model.
As the title indicates, the text is intended for persons who are undertaking a study of digital communications for the first time. Though it can be used for self-study the orientation is towards the classroom for students at the fourth-year (senior) level. The text can also serve readily for a beginning-level graduate course. The basic background assumed of the reader is: (i) introductory linear circuit and systems concepts, (ii) basic signal theory and analysis, and (iii) elementary probability concepts. Though most undergraduate electrical and computer engineering students have this background by their final year, the text does include two review chapters which the reader is strongly encouraged to read.
By reading these chapters she/he will obtain a sense of the authors' pedagogical style and the notation used. The notation used is quite standard except (perhaps) in the case of random variables or events. They are denoted (faithfully and slavishly) by boldface. As importantly, because of their importance in digital communications, several topics that may or may not be covered in typical introductory courses, are explained in detail in these chapters. The primary topic is random signals which, after a treatment of random variables and probability concepts, are explained in the necessary depth in Chapter 3. Another topic of importance that typically is not touched on or is treated in only a cursory fashion in an introductory signal course is auto- and crosscorrelation and the corresponding energy and power spectral densities.