1 Throughput of a Cognitive Radio Network under Congestion Constraints: A Network-Level Study Nikolaos Pappas*, Marios Kountouris† * Department of Science and Technology, Linko¨ping University, Norrko¨ping SE-60174, Sweden † Supe´lec, Department of Telecommunications, Gif-sur-Yvette, France Email: [email protected], [email protected] 5 1 0 Abstract 2 n In this paper we analyze a cognitive radio network with one primary and one secondary transmitter, in which u the primary transmitter has bursty arrivals while the secondary node is assumed to be saturated (i.e. always has a J packetwaitingtobetransmitted).Thesecondarynodetransmitsinacognitivewaysuchthatitdoesnotimpedethe 2 performance of the primary node. We assume that the receivers have multipacket reception (MPR) capabilities and 1 that the secondary node can take advantage of the MPR capability by transmitting simultaneously with the primary under certain conditions. We obtain analytical expressions for the stationary distribution of the primary node queue ] I and we also provide conditions for its stability. Finally, we provide expressions for the aggregate throughput of the N network as well as for the throughput at the secondary node. . s c [ I. INTRODUCTION 2 Cognitive radio communication provides an efficient means of sharing radio spectrum between users v 0 having different priorities [1]. The term “Cognitive Radio” was first introduced by Mitola in the 1990s 1 to take advantage the highly under-utilized scarce wireless spectrum [2]. The high-priority transmitter, 5 usually termed as primary, is allowed to access the channel whenever it is needed, while the low-priority 7 0 node, coined as secondary, is required to make a decision on its transmission and access the channel . 1 opportunistically based on the spectrum occupancy and the primary user transmission. 0 In this paper, we consider a cognitive radio network consisting of a primary user with bursty arrivals 5 and a secondary user with saturated traffic, as shown in Fig. 1. We obtain the aggregate throughput of the 1 : network for a cognitive access protocol on the general multipacket reception (MPR) channel model. The v i MPR channel captures the effects of fading, attenuation, and interference at the physical layer in a more X efficient way than the traditional collision channel model, as in the former a transmission may succeed r a even in the presence of interference [3]–[6]. The secondary transmitter can take advantage of the MPR capability by transmitting simultaneously with the primary node under certain conditions. We slightly modify the cognitive access protocol proposed in [7]–[9], in which the secondary node not only utilizes the idle periods of the primary node, but also competes with the primary node by randomly accessing the channel when the queue size of the primary node is below a congestion limit. If the primary node queue size exceeds that limit, then the secondary node is not allowed to transmit. The congestion limit is a way to ensure that the secondary node will not harm the primary node more than a certain level. To position our contribution with respect to the literature, we provide below a brief background review. In [10], a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. That work was among the first that introduced the notion of network-level cooperation, i.e. cooperation without This work has been partially supported by the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme FP7/2007-2013/ under REA grant agreement no.[612361] – SOrBet and by the ERC Starting Grant 305123 MORE (Advanced Mathematical Tools for Complex Network Engineering). 2 any physical layer processing. In [11], the notion of partial (or probabilistic) network-level cooperation is introduced, where probabilistic cooperation means that under certain conditions in the network, the relay may accept a packet from the source. In [12], the authors study the impact, from a network-layer perspective, of having a single cognitive radio transmitter- receiver pair sharing the spectrum with multiple primary users wishing to communicate to a single receiver in a multi-access channel (MAC). In [9], an opportunistic multiple access protocol is proposed, in which the priorities among the users are observed in order to better utilize the limited energy resources. Owing to the MPR capability, the secondary node not only utilizes the idle slots, but can also take advantage of the additional reception by transmitting along with the primary node in a random access way that does not adversely affect the quality of the communication over the primary link. In this paper, we first analyze the queue characteristics of the primary transmitter. Specifically, we model the queue as a discrete time Markov Chain and we obtain its stationary distribution. Furthermore, we provide the conditions for the stability of the queue and we characterize the throughput experienced by the secondary transmitter, as well as the aggregate throughput of the network. The rest of the paper is organized as follows: in Section II, we describe the system model including the network model and the cognitive protocol. In Section III, we include the analysis for the primary node queue, and numerical results are presented in Section IV. Finally, Section V concludes our work. II. SYSTEM MODEL A. Network Model We consider a cognitive radio network of two source-destination pairs, as shown in Fig.1. The time is slotted and each packet transmission occupies one time slot. The primary source has an infinite capacity queue Q for storing the arriving packets of fixed length. The arrival process at the primary transmitter is modeled as a Bernoulli process with average rate λ packet per slot. The secondary node queue is assumed to be saturated (always backlogged), i.e. it always has a packet waiting to be transmitted. Q Primary link λ P D P S D Secondary link S Fig. 1: A cognitive network with a primary and a secondary transmitter. The primary node has bursty traffic whereas the secondary has a saturated queue. B. Physical Layer Model The MPR channel model is a generalized form of the packet erasure model. At the receiver side, a packet can be decoded correctly by the receiver if the received SINR exceeds a certain threshold. More precisely, suppose that we are given a set T of nodes transmitting during the same time slot. Let P (i,j) rx be the signal power received from node i (where i = P,S) at node j (where j = D ,D ), and let P S SINR(i,j) be the SINR determined by node j, i.e. P (i,j) rx SINR(i,j) = , (cid:80) η + P (k,j) j k∈T\{i} rx where η denotes the receiver noise power at j. We assume that a packet transmitted by node i is j successfully received by j if and only if SINR(i,j) ≥ γ , where γ is a threshold characteristic of j j 3 node j. Let P (i) be the transmit power at node i and r(i,j) be the distance between i and j. The tx power received by node j when node i transmits is P (i,j) = A(i,j)g(i,j), where A(i,j) is a random rx variable representing channel fading. We assume that the channel is subject to slow, flat fading, constant during a timeslot and independently varying from one timeslot to another. Under Rayleigh fading, it is known that A(i,j) is exponentially distributed [13]. The received power factor g(i,j) is given by g(i,j) = P (i)(r(i,j))−α where α is the pathloss exponent with α > 2. The success probability of link tx i−j when the transmitting nodes are in T is given by (cid:18) (cid:19) γ η Pj = exp − j j × i/T v(i,j)g(i,j) (cid:89) (cid:18) v(k,j)g(k,j)(cid:19)−1 × 1+γ , j v(i,j)g(i,j) k∈T\{i,j} where v(i,j) is the parameter of the Rayleigh random variable for fading. For the sake of presentation, we denote p = PDP and p = PDS when only one transmitter 1/1 P/P 2/2 S/S is active. When both transmitters are active, we have p = PDP and p = PDS . Note that 1/1,2 P/P,S 2/1,2 S/P,S p ≥ p and p ≥ p . 1/1 1/1,2 2/2 2/1,2 C. Cognitive Access Protocol In this work, we build on the cognitive protocol proposed in [7] and we slightly modify it in the following way. The primary node transmits a packet whenever is backlogged. On the other hand, the secondary node transmits a packet by accessing the channel in a way that it does not deteriorate the performance of the primary node. The secondary node monitors the status of the queue of the primary node, and when the queue is empty (thus the primary node is silent), the secondary node transmits with probability 1. When the size of the queue in the primary node is between 1 and a threshold M, the secondary node accesses the channel with probability q. The service rate for the primary node in this case is denoted µ and is given by 1 µ = qp +(1−q)p . (1) 1 1/1,2 1/1 When the queue size is larger than M then, the secondary node remains silent. In that case, the service rate of the primary node is µ and is given by 2 µ = p . (2) 2 1/1 The threshold M plays the role of a congestion limit for the primary node, meaning that when the queue reaches this size then, the secondary node does not attempt to transmit any packet. The throughput for the secondary user, T is given by s T = Pr(Q = 0)p +Pr(1 ≤ Q ≤ M)qp . (3) s 2/2 2/1,2 Thus, in order to compute T we need to analyze the queue at the primary node. The analysis is given s in the following section. III. ANALYSIS OF THE PRIMARY NODE QUEUE In order to characterize the performance in our system, we need to characterize the maximum stable throughput for the primary node and the average throughput for the secondary node. The maximum stable throughput is defined only for sources that are not backlogged, i.e. for sources with bursty arrivals, and is the rate measured in terms of packet/slot at which data is delivered from the transmitter to its intended receiver, while guaranteeing that the queue does not grow unbounded. The average throughput for the secondary node, given in (3), depends on the state of the primary node queue, hence we need to characterize Pr(Q = 0) and Pr(1 ≤ Q ≤ M). We model the queue at 4 the primary node as a discrete time Markov Chain (DTMC), which describes the queue evolution and is presented in Fig. 2. Each state is denoted by an integer and represents the queue size at the primary node. 𝜆 𝜆1−𝜇1 𝜆1−𝜇1 𝜆1−𝜇1 𝜆1−𝜇1 𝜆1−𝜇2 x 0 x1 2 … M3 M3+1 … 1−𝜆 𝜇1 1−𝜆 𝜇1 1−𝜆 𝜇1 1−𝜆 𝜇1 1−𝜆 𝜇2 1−𝜆 𝜇2 Fig. 2: The Discrete Time Markov Chain which models the queue evolution at the primary node. In order to compute the Pr(Q = 0) and Pr(1 ≤ Q ≤ M), we utilize the balance equations of the DTMC. The stationary distribution of the DTMC is denoted by π, where π(i) = Pr(Q = i) is the probability that the queue has i packets when it is in steady state. From the balance equations we obtain the following λ λπ(0) = (1−λ)µ π(1) ⇔ π(1) = π(0) 1 (1−λ)µ 1 [λ(1−µ )+(1−λ)µ ]π(1) = λπ(0)+(1−λ)µ π(2) 1 1 1 λ2(1−µ ) 1 ⇔ π(2) = π(0) (1−λ)2µ2 1 Summarizing, for 1 ≤ i ≤ M we have that λi(1−µ )i−1 1 π(i) = π(0), (1−λ)iµi 1 and for i > M we obtain λM+i(1−µ )M(1−µ )i−1 1 2 π(i) = π(0). (1−λ)M+iµMµi 1 2 The previous steady state probabilities are given as a function of π(0), however it is known that ∞ (cid:88) π(i) = 1. (4) i=0 From the previous expression, we derive the probability that the queue is empty and is given by (µ −λ)(µ −λ) 1 2 Pr(Q = 0) = . (5) (cid:104) (cid:105)M µ µ −λµ −λ λ(1−µ1) (µ −µ ) 1 2 1 (1−λ)µ1 2 1 From (4), we also obtain the condition that the series is converging when λ < µ , which is also the 2 condition that the DTMC is an aperiodic irreducible Markov Chain, implying that the queue is stable. However, since π(0) denotes a probability, we additionally have the conditions 0 ≤ π(0) ≤ 1. In order to fully characterize the previous condition in terms of λ, µ and µ , we need to solve a polynomial 1 2 equation of degree M, which will be evaluated numerically. The average throughput of the secondary transmitter also depends on Pr(1 ≤ Q ≤ M) = (cid:80)M π(i), i=1 where (cid:18) (cid:19) (cid:104) (cid:105)M λ 1− λ(1−µ1) (µ −λ) (1−λ)µ1 2 Pr(1 ≤ Q ≤ M) = . (6) (cid:104) (cid:105)M µ µ −λµ −λ λ(1−µ1) (µ −µ ) 1 2 1 (1−λ)µ1 2 1 5 Thus, the average throughout of the secondary node is given by (cid:20) (cid:18) (cid:19) (cid:21) (cid:104) (cid:105)M (µ −λ) (µ −λ)p +λ 1− λ(1−µ1) qp 2 1 2/2 (1−λ)µ1 2/1,2 T = . (7) s (cid:104) (cid:105)M µ µ −λµ −λ λ(1−µ1) (µ −µ ) 1 2 1 (1−λ)µ1 2 1 When the queue at the primary is stable then the aggregate throughput of the network in study is T = λ+T . (8) aggr s In this work, we only consider one secondary transmitter-receiver pair, and the effect of the number of the secondary transmitters on the network performance will be investigated in a longer version of this paper. IV. NUMERICAL RESULTS In this section, we present numerical results for the throughput of the secondary node given in (7) and the aggregate throughput of the network (8) for different values of M, q and λ. We consider the cases that the success probabilities between the transmitters and the receivers can be either high or low, and we consider strong and weak MPR capabilities for the receivers. In Figs. 3-4, we illustrate the aggregate and the secondary node throughput versus the transmission probability q and the arrival rate λ for various values of congestion limit M when the receivers have strong MPR capabilities. In this case, the throughput increases for q and λ increasing, otherwise it decreases. When λ is relatively low, then M does not really affect the system, since the probability that the queue is empty increases. Due to the low utilization in this case, choosing M = 1 in our protocol is beneficial. As illustrated in Fig. 3(b) and Fig. 4(b), the throughput of the secondary user decreases as λ increases, whilst the aggregate throughput increases. This means that the decrease of secondary node throughput, due to the congestion of the primary node queue as we approach the saturation of the queue, is less than the increase of the λ. Furthermore, when the channels between the transmitters and receivers have low success probabilities, then M does not really affect the throughput. 1.25 1.2 λ=p /2, M=1 1.2 1/1,2 λ=p ,M=1 1/1,2 1 1.15 λ=p /2, M=3 1/1,2 s/slot) 1.1 λ=p1/1,2,M=3 ets/slot) 0.8 + T (packets 1.015 ghput (pack 0.6 λ 0.95 hrou 0.4 Taggr,M=1 T T,M=1 0.9 s T ,M=3 0.2 aggr 0.85 T,M=3 s 0.8 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 q λ (a) Aggregate throughput vs. q (b) Aggregatethroughputandthroughputforthesecondarytransmit- ter vs. λ, q=0.9 Fig. 3: High link success probabilities and strong MPR capabilities for the receivers: p = 0.8, 1/1 p = 0.6, p = 0.9 and p = 0.7. 1/1,2 2/2 2/1,2 6 0.64 0.7 0.63 0.62 0.6 + T (packets/slot)s 0000...556.6891 ghput (packets/slot) 000...345 λ 0.57 λ=p1/1,2/2, M=1 hrou λ=p ,M=1 T 0.2 T ,M=1 1/1,2 aggr 0.56 λ=p1/1,2/2, M=3 Ts,M=1 0.55 λ=p ,M=3 0.1 Taggr,M=3 1/1,2 T,M=3 s 0.540 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 00 0.05 0.1 0.15 0.2 0.25 0.3 q λ (a) Aggregate throughput vs. q (b) Aggregatethroughputandthroughputforthesecondarytransmit- ter vs. λ, q=0.9 Fig. 4: Low link success probabilities and strong MPR capabilities for the receivers: p = 0.5, 1/1 p = 0.3, p = 0.6 and p = 0.35. 1/1,2 2/2 2/1,2 In Figs. 5-6, we depict the cases where the channels between the transmitters and the receivers are good and poor respectively, whereas the receivers have weak MPR capabilities. In that case, the throughput decreases as q increases. As λ increases, both the secondary node and the aggregate throughput decreases. The drop of the secondary node throughput is bigger than the increase of the stable throughput of the primary node. 0.9 0.88 1 0.86 0.8 ackets/slot) 00..8824 packets/slot) 0.6 T (ps put ( λ + 0.8 λ=p1/1,2/2, M=1 ough 0.4 0.78 λ=p1/1,2,M=1 Thr T ,M=1 λ=p /2, M=3 aggr 1/1,2 0.2 Ts,M=1 0.76 λ=p1/1,2,M=3 Taggr,M=3 T,M=3 s 0.740 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 00 0.05 0.1 0.15 0.2 0.25 0.3 q λ (a) Aggregate throughput vs. q (b) Aggregate throughput and throughput for the secondary transmitter vs. λ, q=0.9 Fig. 5: High link success probabilities and weak MPR capabilities for the receivers: p = 0.8, 1/1 p = 0.3, p = 0.9 and p = 0.4. 1/1,2 2/2 2/1,2 The main takeaway of our results is that if the receivers have strong MPR capabilities, the throughput increases as the transmission probability of the secondary increases, otherwise it decreases. 7 0.6 0.7 0.58 0.56 0.6 λ + T (packets/slot)s 00000....4455.56824 λλλ===ppp111///111,,,222/,/2M2,,= MM1==13 Throughput (packets/slot) 0000....2345 TTTasa,ggMggrr=,,MM1==13 0.44 λ=p1/1,2,M=3 0.1 Ts,M=3 0.42 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0 0.05 0.1 0.15 q λ (a) Aggregate throughput vs. q (b) Aggregate throughput and throughput for the secondary transmitter vs. λ, q=0.9 Fig. 6: Low link success probabilities and weak MPR capabilities for the receivers: p = 0.5, 1/1 p = 0.15, p = 0.6 and p = 0.2. 1/1,2 2/2 2/1,2 V. CONCLUSIONS In this work, we studied the performance of a cognitive network consisting of a primary and a secondary transmitter. The primary node has bursty arrivals, which are stored in its queue for a future transmission, while the secondary is assumed to be saturated. The secondary node transmits in a cognitive manner taking advantage of the emptiness of the primary node queue and in a random access when the queue is below a congestion limit M. We analyzed the performance of the primary node queue, and we obtained the stationary distribution and the stability conditions. We also derived the secondary node throughput, as well as the aggregate throughput as a function of the transmission probability of the secondary node, the arrival rate at the primary node, and the congestion limit M. Further extensions of this work will include the delay analysis for this network and the dynamic adjustment of M and q depending on the arrival rate. Furthermore, the effect of the number of the secondary transmitters on the performance will be investigated. REFERENCES [1] Q.ZhaoandB.M.Sadler,“Asurveyofdynamicspectrumaccess,”IEEESignalProcessingMagazine,vol.24,no.3,pp.79–89,May 2007. [2] J.Mitola,“CognitiveRadio-AnIntegratedAgentArchitectureforSoftwareDefinedRadio,”DTechthesis,RoyalInstituteofTechnology (KTH), Kista, Sweden, May 2000. [Online]. Available: http://web.it.kth.se/∼{}maguire/jmitola/Mitola Dissertation8 Integrated.pdf [3] S. Ghez and S. Verdu´, “Stability property of slotted aloha with multipacket reception capability,” IEEE Transactions on Automatic Control, vol. 33, no. 7, pp. 640 – 649, Jul. 1988. [4] Q.Z.L.TongandG.Mergen,“Multipacketreceptioninrandomaccesswirelessnetworks:fromsignalprocessingtooptimalmedium access control,” IEEE Commun. Magazine, vol. 39, no. 11, pp. 108–112, Nov. 2001. [5] V. Naware, G. Mergen, and L. Tong, “Stability and delay of finite-user slotted aloha with multipacket reception,” IEEE Trans. on Information Theory, vol. 51, no. 7, pp. 2636–2656, Jul. 2005. [6] N. Pappas, A. Ephremides, and A. Traganitis, “Stability and performance issues of a relay assisted multiple access scheme with mpr capabilities,” Computer Communications, vol. 42, no. 0, pp. 70 – 76, 2014. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0140366414000206 [7] B.RongandA.Ephremides,“Onopportunisticcooperationforimprovingthestabilityregionwithmultipacketreception,”Proceedings of NET-COOP, LNCS, vol. 5894, pp. 45–59, 2009. [8] S. Kompella, G. D. Nguyen, J. E. Wieselthier, and A. Ephremides, “Stable throughput tradeoffs in cognitive shared channels with cooperative relaying,” Proceedings of IEEE INFOCOM 2011. [9] N. Pappas, J. Jeon, A. Ephremides, and A. Traganitis, “Optimal utilization of a cognitive shared channel with a rechargeable primary sourcenode,”JournalofCommun.andNetworks(JCN)SpecialIssueonEnergyHarvestinginWirelessNetworks,vol.14,no.2,2012. [10] A. Sadek, K. Liu, and A. Ephremides, “Cognitive multiple access via cooperation: Protocol design and performance analysis,” IEEE Trans. on Information Theory, vol. 53, no. 10, pp. 3677 –3696, 2007. 8 [11] N. Pappas, J. Jeon, A. Ephremides, and A. Traganitis, “Wireless network-level partial relay cooperation,” in IEEE Inter. Symp. on Inform. Theory (ISIT), July 2012. [12] I.Krikidis,N.Devroye,andJ.Thompson,“Stabilityanalysisforcognitiveradiowithmulti-accessprimarytransmission,”IEEETrans. on Wireless Communications,, vol. 9, no. 1, pp. 72–77, January 2010. [13] D. Tse and P. Viswanath, Fundamentals of wireless communication. New York, NY, USA: Cambridge University Press, 2005.