Date post: | 07-Apr-2018 |
Category: |
Documents |
Upload: | robert-horvitz |
View: | 215 times |
Download: | 0 times |
of 12
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
1/12
1256 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 7, SEPTEMBER 2009
Spectrum Sharing between Cellular and Mobile AdHoc Networks: Transmission-Capacity Trade-Off
Kaibin Huang, Vincent K. N. Lau, and Yan Chen
AbstractSpectrum sharing between wireless networks im-proves the efficiency of spectrum usage, and thereby alleviatesspectrum scarcity due to growing demands for wireless broad-band access. To improve the usual underutilization of the cellularuplink spectrum, this paper addresses spectrum sharing betweena cellular uplink and a mobile ad hoc networks. These networksaccess either all frequency subchannels or their disjoint subsets,called spectrum underlay and spectrum overlay, respectively. Giventhese spectrum sharing methods, the capacity trade-off betweenthe coexisting networks is analyzed based on the transmissioncapacity of a network with Poisson distributed transmitters. Thismetric is defined as the maximum density of transmitters subject
to an outage constraint for a given signal-to-interference ratio(SIR). Using tools from stochastic geometry, the transmission-capacity trade-off between the coexisting networks is analyzed,where both spectrum overlay and underlay as well as successiveinterference cancelation (SIC) are considered. In particular, forsmall target outage probability, the transmission capacities ofthe coexisting networks are proved to satisfy a linear equation,whose coefficients depend on the spectrum sharing method andwhether SIC is applied. This linear equation shows that spectrumoverlay is more efficient than spectrum underlay. Furthermore,this result also provides insight into the effects of networkparameters on transmission capacities, including link diversitygains, transmission distances, and the base station density. Inparticular, SIC is shown to increase the transmission capacities ofboth coexisting networks by a linear factor, which depends on theinterference-power threshold for qualifying canceled interferers.
Index TermsSpatial reuse; wireless networks; Poisson pro-cesses; spectrum sharing; interference cancelation
I. INTRODUCTION
DESPITE spectrum scarcity, most licensed spectrums areunderutilized according to the Federal CommunicationsCommission [1]. In particular, in existing cellular systems
based on frequency division duplex (FDD) such as FDD
UMTS [2], equal bandwidths are allocated for uplink and
downlink transmissions, even though the data traffic for down-
link is much heavier than that for uplink [3], [4]. Spectrumsharing between wireless networks improves spectrum utiliza-
tion, and will be a key solution for broadband access in next-
generation wireless networks [5]. This motivates the study in
this paper on sharing the uplink spectrum between a cellular
network and a mobile ad hoc network (MANET), called the
Manuscript received 30 August 2008; revised 31 January 2009.K. Huang is with the School of Electrical and Electronic Engineering,
Yonsei University, 262 Seongsanno, Seodaemun-gu Seoul 120-749, Korea (e-mail: [email protected]).
V. K. N. Lau is with the Department of Electronic and Computer Engi-neering, Hong Kong University of Science and Technology, Clear Water Bay,Hong Kong (e-mail: [email protected]).
Y. Chen is with Huawei Technology, Pudong, Shanghai, China (e-mail:[email protected]).
Digital Object Identifier 10.1109/JSAC.2009.090921.
coexisting networks. A basic question is what is the trade-off
between the capacities of these networks?
We provide answers to this question using the metric of
transmission capacity [6], [7]. By extending the definition
in [6], the transmission capacities of the coexisting networks
are defined as their maximum transmitter densities under an
outage probability constraint for a target signal-to-interference
ratio (SIR). We derive the transmission-capacity trade-off
between the networks for different spectrum-sharing methods.
Such results are useful for controlling the sizes of the coex-
isting networks for optimizing uplink spectrum usage.
A. Related Works and Motivation
A spectrum band can be either licensedor unlicensed, where
a licence gives a network the exclusive right of spectrum
usage. Depending on whether holding a licence, a wireless
network is referred to as the primary (e.g. cellular networks)
or secondary network (e.g. MANETs). Accessing a licensed
band, the secondary transmitters must not cause significant
interference to the primary receivers. One simple method
of sharing a licensed band is to spread the signal energy
radiated by each secondary transmitter over the whole band
using spread spectrum techniques [8], suppressing the power
spectrum density of the resultant interference to the primary
receivers. This method is called spectrum underlay [1], [5],
[9], [10].
Another method for sharing a licensed spectrum is called
spectrum overlay, where secondary transmitters access fre-
quency subchannels unused by nearby primary receivers.
Recent research on spectrum overlay has been focusing on
designing cognitive-radio algorithms for secondary transmit-
ters to opportunistically access the spectrum [5], [9]. Such
algorithms require secondary transmitters to continuously de-
tect and track transmission opportunities by spectrum sensing,
and decide on transmission based on sensing results [11], [12].
These operations are vulnerable to sensing errors, and most
important require complicated computation at the secondary
transmitters. For this reason, we consider the case where base
stations in the cellular (primary) network coordinates spectrum
sharing. Thereby ad hoc (secondary) transmitters use a simple
random access protocol rather than complicated cognitive-
radio algorithms.
In unlicensed spectrums such as the industrial, scientific
and medical (ISM) bands, all networks have equal priorities
for spectrum access. The networks using unlicensed bands
include wireless local area networks (WLANs) and wireless
personal area networks (WPANs). Due to mutual interference,
the coexistence of networks in unlicensed bands degrades the
0733-8716/09/$25.00 c 2009 IEEE
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
2/12
HUANG et al.: SPECTRUM SHARING BETWEEN CELLULAR AND MOBILE AD HOC NETWORKS: TRANSMISSION-CAPACITY TRADEOFF 1257
networks performance as shown by analysis [13], [14], sim-
ulation [15], [16], and measurement [17]. Sharing unlicensed
bands between competing networks is also studied using game
theory [18].
There exist few theoretical results on the network capacity
trade-off between the coexisting networks despite this being
a fundamental issue. In [19], the transmission capacities of
a two-tier network are analyzed, which comprises a cellularnetwork and a network of femtocell hot-spots. In [20], the
transport capacities1 of two coexisting multi-hop MANETs are
shown to follow the optimum scaling laws for asymptotically
large network sizes. In [19], [20], the network-capacity trade-
off between coexisting networks is not analyzed.
The metric of transmission capacity has been applied to de-
signing MANETs with Poisson distributed transmitters and an
ALOHA-like medium-access-control layer, addressing issues
including spatial diversity [22], opportunistic transmission [7],
bandwidth partitioning [23], successive interference cance-
lation (SIC) [24], and spatial interference cancelation [25].
Besides the transmission capacity, a new performance metriccalled capacity region is used in this paper, which is tailored
for spectrum sharing. The capacity region of the coexisting
networks is defined as the set of feasible combinations of
transmitter densities under the SIR outage constraints. By
definition, transmission capacities of the coexisting networks
give the boundary points of the capacity region. Both the
transmission capacities and capacity region of the coexisting
networks are analyzed in this paper.
B. Contributions and Organization
This paper targets a cellular uplink network and a MANET
sharing the uplink spectrum using either spectrum overlay
or underlay, where uplink users, base stations, and ad hoc
transmitters all follow Poisson distributions but with different
densities. Each transmitter modulates signals using frequency-
hopping spread spectrum over the frequency subchannels
assigned to the corresponding network [8]. This modulation
decreases the density of transmitters accessing the same sub-
channel. As a result, the inter-link interference reduces and
the transmission capacities increase.
Our main contributions are summarized as follows. First,
considering an interference-limited environment, bounds on
the SIR outage probabilities are derived for spectrum over-
lay and underlay with and without using SIC at receivers[24], [26]. Second, for small target outage probability, the
transmission-capacities of the coexisting networks are showed
to satisfy a linear equation, whose coefficients depend on the
spectrum-sharing method and whether SIC is used. Given the
above linear capacity trade-off, the capacity region of the co-
existing networks is a triangular. Third, for small target outage
probability, the capacity region for spectrum underlay is shown
to be no larger than that for spectrum overlay. The former can
be enlarged to be identical to the latter by choosing the derived
transmission-power ratio between the two networks. Finally,
we characterize the effects of different parameters on network
transmission capacities. In particular, for spectrum overlay,
1This metric introduced in [21] refers to end-to-end throughput per unitdistance of a multi-hop wireless network.
the transmission capacity C of the cellular network increaseslinearly with the base station density b, and the capacity Cof the MANET grows inversely with the decreasing distance dbetween a pair of communicating ad hoc nodes. For spectrum
underlay, C and C both increase linearly with b or otherwiseinversely with decreasing d. Moreover, C and C both growsub-linearly with spatial diversity gains. Furthermore, SIC
increases both C and C by a linear factor that is a functionof the interference-power threshold for qualifying canceled
interferers.
To distinguish our contributions from exiting results, several
new challenges addressed in the current work are emphasized.
First, the current analysis of the network outage probabilities
requires characterizing the distribution of sum interference
power from two classes of interferers from separate networks,
which differ in properties such as transmission power and
densities. This issue does not exist in prior works focusing
on stand-alone networks. Second, due to spectrum sharing, the
transmission capacities of the coexisting networks must satisfy
simultaneously two SIR outage constraints rather than onewhen a stand-alone network is considered. Consequently, the
current transmission-capacity analysis must account for new
issues including heterogeneous network architectures and sizes
as well as resource allocation cross networks. These issues
complicate the relation between the transmission capacities of
the coexisting networks. Whether a simple relation exists is
unknown from prior works. Finally, we generalize the study
of SIC in [24] for a MANET with path-loss to the coexisting
networks with both fading and path-loss.
The remainder of this paper is organized as follows. The
mathematical models are described in Section II. The back-
ground is provided in Section III. In Section IV, the bounds onoutage probabilities are derived for different spectrum sharing
methods. For small target outage probability, the transmission-
capacity trade-off is analyzed in Section V. Numerical results
are presented in Section VI, followed by concluding remarks
in Section VII.
II . MATHEMATICAL MODELS
A. Network Models
The coexisting networks are illustrated in Fig. 1. Their
models are described as follows.
Following [6], [7], [27], we make the following assumption.
Assumption 1. The transmitters in the MANET form a Pois-
son point process (PPP) on the two-dimensional plane, which
is denoted as with the density .
This Poisson assumption as well as the similar one in Assump-
tion 2 are made for mathematical tractability. However, they
are supported by experiments for networks with mobility. In
particular, network models based on similar assumptions havebeen employed by cellular service providers to successfully
predict network traffic load and blocking probabilities [28].
Next, each transmitter in the MANET is associated with a
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
3/12
1258 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 7, SEPTEMBER 2009
Base station
Uplink user
Ad hoc node
Fig. 1. The coexisting cellular and ad hoc networks
receiver located at afi
xed distanced.
2
The transmission powerof transmitters is assumed fixed and denoted as P.The cellular network is modeled based on the following
assumption
Assumption 2. The base stations and uplink mobiles form
two independent stationary PPPs denoted as and , re-spectively.
Their corresponding densities are represented by b and .Let Bn, Um, Dn,m denote the two-dimensional coordinatesof the nth base station, the mth uplink mobile, and theirdistance, respectively. Thus, Dn,m = |Bn Um|.3 To en-
hance the long-term link reliability, each mobile transmits tothe nearest base station. Consequently, the cellular network
forms a Poisson tessellation of the two-dimensional plane
and each cell is known as a Voronoi cell [29]. The mo-
biles served by the mth base station form the set Vm :={U ||U Bm| < |U B| B \{Bm} }.
A typical point of a PPP is defined as a point selected
using the procedure where every point of the PPP has the
same probability of being selected [29]. The typical points
of the PPPs , and are referred to as the typical basestation B0, the typical mobile U0, and the typical ad hoctransmitter T0, respectively. Moreover, the intended receiver
for T0 is called the typical ad hoc receiver and denoted as R0.Finally, represent the random distance between B0 and U0 asD := |B0 U0|.
B. Channel and Modulation
The uplink spectrum is divided into M frequency-flat sub-channels by using orthogonal frequency division multiplexing
(OFDM) [30]. Each of the coexisting networks uses a subset
or the full set of subchannels, depending on the spectrum
2Consideration of the randomness in d provides little new insight. It isstraightforward to extend the results in this paper to include the randomness
ind
. Specifi
cally, ifd
is random, Proposition 1-4 still apply except that theexpectation operations in Proposition 1-2 must account for the randomnessof d. Furthermore, d in Theorem 1 should be replaced with E[d].
3The operator |X| gives the Euclidean distance between X and the originifX is two-dimensional coordinates, or the cardinality of X ifX is a set.
sharing methods discussed in Section II-C. In each network, a
transmitter modulates signals using frequency-hopping spread
spectrum, where signals hop randomly over all subchannels
assigned to the affiliated network [6], [8].
Consider the link between U0 and B0. The typical subchan-nel accessed by U0 and B0 comprises path loss and a fadingfactor denoted by W such that the signal power received by B0
is P W D
, where P is the transmission power. Similarly, theinterference power from an interferer X to B0 is PXGXR
X ,
where PX {P, P}, and RX = |X B0|, and GX is thefading factor.
Similar channel models are used for the MANET. Specifi-
cally, the received signal power for T0 is PWd where Wis the fading factor; the interference power from an interferer
X to T0 is PXGXRX where RX = |X T0|.
C. Spectrum Sharing Methods
1) Spectrum Overlay: For spectrum overlay, the M sub-channels are divided into two disjoint subsets and assigned to
two coexisting networks. Let A and A denote the index setsof the subchannels assigned to the cellular network and the
MANET, respectively. Their cardinalities are represented by
K := |A| and K := |A|, where K+ K = M.Spectrum overlay requires initialization where base stations
broadcast to ad hoc nodes the indices of the available sub-
channels and the allowable transmitting node density. This
density can be controlled by distributed adjustments of nodes
transmission probability [7]. In practice, K and K can beadapted to the time-varying uplink traffic load to increase the
spectrum-usage efficiency.
2) Spectrum Underlay: For spectrum underlay, both coex-
isting networks use all M subchannels. Therefore the trans-mitters accessing the same subchannel comprises both mobiles
and ad hoc nodes. Consequently, spectrum overlaid networks
are coupled rather than decoupled as for the case of spectrum
overlay.
D. Successive Interference Cancelation
SIC decodes multiuser signals and subtracts them from the
aggregate received signal sequentially [30]. This technique is
effective for mitigating interference in the MANET given the
disparity in received power of multiuser signals due to random
node positions as well as path loss and fading [24]. The SICdecoding of a users signal treats the signals of undecoded
users as noise. Therefore, for users with equal data rates, it is
optimal to decode multiuser signals in the descending order
of their power [31]. The above decoding order implies that
canceled interferers signals are stronger than the desired one.
This motivates the current simplified SIC model based on the
following assumption.
Assumption 3. The interference power of each interferer
targeted for cancelation must exceed a threshold equal to the
desired signal power multiplied by a factor > 1.
This assumption is made for mathematical tractability. Moreaccurate SIC models must account for cancelation errors and
the decoding order [26], [30], [32]. Increasing decreases theaverage number of canceled interferers and vice versa. This
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
4/12
HUANG et al.: SPECTRUM SHARING BETWEEN CELLULAR AND MOBILE AD HOC NETWORKS: TRANSMISSION-CAPACITY TRADEOFF 1259
model is very similar to that in [24] where only path-loss is
considered and interferers within a fixed distance are canceled.
III. BACKGROUND
In this section, the shot noise process is introduced for
modeling interference in the coexisting networks. Existing
results on the shot-noise distribution are discussed, which are
useful for analysis in the sequel. Finally, the transmission
capacity and capacity region are defined.
A. Shot Noise Process
A general shot noise process refers to a functional resulting
from feeding a memoryless and linear filter with impulses
derived from a stationary PPP [33]. Such processes have been
widely applied in modeling spatial interference in wireless
networks (see e.g. [7], [34]). Consider a wireless network
where transmitters form a stationary PPP with the density and narrow-band channels comprise path-loss and fading. For
a receiver A0 located at the origin, the aggregate interferencepower I is a shot noise process given as
I =
X\{F0}P QX |X|
(1)
where F0 denotes the transmitter for A0 and {QX} arei.i.d. fading factors. It is important to note that the pro-
cess \{F0} is identically distributed as accordingly toSlyvnyaks theorem [29]. Analyzing the outage probability
for the transmission from F0 to A0 requires deriving thecomplementary cumulative density function (CCDF) of I.Unfortunately, this function has no closed-form expression [7],
[33].
The CCDF of I can be bounded using the approach in[6], [7]. This approach separates the interferers in \{F0}into strong and weak interferers. Define the process of strong
interferers as S = {X \{F0} | P QX |X| > t}, where
each interferer alone guaranteers the outage I > t. It followsthat the process of weaker interferers is cS := (\{F0})\S.Using these definitions
Pr(I > t) = Pr(S = ) P r (IcS > t) + Pr(S = ) (2)
where IcS :=
XcS
P QX |X| represents the interferencepower from weak interferers. From (2), a lower bound on the
outage probability is given as
Pr(I > t) > Pr(S = ) = 1 eS (3)
where S := E[|S |] is the average number of strong interfer-ers. The upper bound on Pr(I > t) is obtained by boundingthe term Pr (IcS > t) in (2) using Chebyshevs inequality
Pr (IcS > t) var(IcS)
(t E [IcS ])2 , t > E [I
cS ] (4)
where the right-hand-side of the first inequality is Chebychevs
upper bound. Closed-form expressions for S , var(IcS) and
E [IcS ] can be obtained using Campbells theorem [7], [29].
By substituting the resultant expressions into (3) and (4), thebounds on Pr(I > t) are obtained in [7, Theorem 2] andshown in the following lemma.
Lemma 1. The CCDF of the shot noise process in (1) is
bounded as
Pout
(t, ) < P r(I > t) < Puout
(t, )
where Pout
(a, b) = 1 exp
ab
, Puout
(a, b) = 1 (a, b)exp
ab
, and
(a, b) =
1 2 ab
1 1 ab
2+
,
1 ab < 1
0, otherwise
(5)
with := E[Q].
B. Transmission Capacity
We define two related performance metrics for the coexist-
ing networks. As in [7], the networks are assumed to be in-
terference limited and noise is neglected for simplicity. Hence
the SIR measures the reliability of received data packets. LetSIR and SIR represent the SIRs at U0 and R0, respectively.The correct decoding of received packets requires the SIRs
to exceed a threshold . To satisfy this constraint with highprobability, the following outage constraints are applied for
given 0 < 1
Pout(, ) := Pr(SIR(, ) < )
Pout(, ) := Pr(SIR(, ) < ) (6)where the functions Pout and Pout map the SIRs to the outageprobabilities. The transmission capacities C of the cellularnetwork and C of the MANET are defined as the maximum
transmitter densities under the outage constraints in (6). Thisdefinition differs slightly from that in [6], [7] by a linear factor
(1 ), which has a negligible effect on the analysis.Next, we define the capacity region R as the set comprising
all combinations (, ) that satisfy the outage constraints in(6)
R =
(, ) R2 | Pout(, ) , Pout(, )
. (7)
As mentioned earlier, transmission capacities specify the
boundary points of R.
IV. NETWORK OUTAGE PROBABILITIESIn this section, the outage probabilities for the coexisting
networks are derived for spectrum overlay and underlay with
and without SIC.
For the notation used in this section, the superscripts (a)-(d) identify four cases: (a) spectrum overlay, (b) spectrumunderlay, (c) spectrum overlay with SIC and (d) spectrumunderlay with SIC.
A. Outage Probabilities: Spectrum Overlay
For spectrum overlay, the SIRs for the coexisting networks
are obtained as follows. Let
(a)
denote the process ofmobile transmitters accessing the th subchannel. Similarly,(a)m represents the process of ad hoc nodes transmitting overthe mth subchannel. Since spectrum overlay decouples the
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
5/12
1260 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 7, SEPTEMBER 2009
networks, mobile receivers are interfered with only by unin-
tended mobile transmitters, and ad hoc receivers by unintended
ad hoc transmitters. Without loss of generality, consider the
time slot where the receivers B0 and R0 decode signalsfrom the th and the mth subchannels, respectively, where A and m A. The interference power for B0 can bewritten as I
(a) := PX(a) GXR
X and that for R0 as
I(a)m := PXe(a)m GXRX . It follows that the SIRs aregiven as
Celluar : SIR(a) = P W D
/I(a)
MANET : SIR(a)m = PWd/I(a)m . (8)Given frequency-hopping spread spectrum, multiple sub-
channels assigned to each network contributes a processing
gain for reducing the density of transmitters accessing the
same subchannel. Specifically, the densities of (a) and
(a)mare shown to be inversely proportional to K and K, respec-tively, as follows. Define the mark MX of a mobile transmitterX as the index of the subchannel X accesses in the currenttime slot. It follows from the marking theorem [35] that
(a)
is a stationary PPP with the density Pr(MX = ) = /K,
which is a thinned process generated by (a). Similarly, (a)mis a stationary PPP with the density /K.
Using the above results and (8), the bounds on the out-
age probabilities for spectrum overlay are obtained using
Lemma 1. Note that the distribution ofSIR(a) is independent
of . Thus the outage probability for the cellular network is
P(a)out
= Pr
SIR
(a) <
= E PrI() > W D1 | W, D . (9)Recognize that I
(a) is a shot noise process (see Section III-A).
Thus from Lemma 1 and (9), P(a)out
is bounded as shown in
the following proposition. Similarly, we obtain the bounds
on the outage probability P(a)out
for the MANET as given in
Proposition 1.
Proposition 1. For spectrum overlay, the outage probabilities
are bounded as
Cellular : E PloutW D
,
K P(a)out
(K, )
E
Puout
W D,
K
MANET : E
Plout
Wd, K
P(a)out
(K, ) E
Puout
Wd, K
where Pout
(, ) and Puout
(, ) are given in Lemma 1.
Recall from Section II-B that W and
W follow the same
distributions as the fading factors of data links in the cel-lular network and the MANET, respectively; G is identicallydistributed as the fading factors of the interference channels
in the coexisting networks.
Finally, the CDF ofD is obtained. Note that the event D tis equivalent to that there exists at least one base station within
a distance of t from U0. Lemma 2 follows.
Lemma 2. The CDF of D is
P r(D t) = 1 ebt2
. (10)
From (10), the CDF of D depends on the density of basestation b. Intuitively, increasing b reduces the cell sizes andthus D and vice versa.
B. Outage Probabilities: Spectrum Underlay
The SIRs for spectrum underlay are obtained as follows.
Define the transmitter processes (b) and
(b)m similarly as(a) and
(a)m in the preceding section. Again, using the mark-ing theorem,
(b) and
(b)m are shown to be stationary PPPswith the densities /M and /M, respectively. For spectrumunderlay, B0 accessing the th subchannel is interfered with
by two processes of transmitters, namely (b) \{U0} and
(b) .
Thus the interference power for B0 is given as
I(b) := P
X
(b) \{U0}
GXRX +
P Xe
(b)
GXRX . (11)
Similarly, we can write the interference power for R0 access-ing the mth subchannel as
I(b)m := P
X(b)m
GXRX + P
Xe
(b)\{T0}
GXRX . (12)
Given the above definitions, the SIRs for spectrum underlay
are readily written as
Celluar : SIR(b) = P W D/I(b)
MANET : SIR(b)m = PWd/I(b)m (13)where , m {1, 2, , M}.
We consider the combined process := (b)
(b) . Apoint in is either a mobile or ad hoc transmitter. As a result,its transmission power is a random variable with the support
set {P, P}. To analyze the shot noise process generated by ,we derive the distributions of and the transmission powerof the points in . These results are summarized below.
Lemma 3. is a stationary PPP with the density (+)/M.
Given X , the transmission power PX of X has the following distribution function
PX =
P, w.p.
+
P , w.p.
+ .
(14)
Proof: See Appendix A.
In terms of , (11) and (12) can be simplified as
I(b) :=
X\{U0}
PXGXRX
I(b)m := Xm\{T0} PXGXRX .
(15)
Using Lemma 3 and (15) and following the approach in
Section III-A, the bounds on the outage probabilities are
obtained and shown below.
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
6/12
HUANG et al.: SPECTRUM SHARING BETWEEN CELLULAR AND MOBILE AD HOC NETWORKS: TRANSMISSION-CAPACITY TRADEOFF 1261
Proposition 2. For spectrum underlay, the outage probabili-
ties are bounded as follows.
Cellular : E
Plout
W D,
+
M
Pout(, )
E
Puout
W D, +
M MANET : E
Plout
Wd, + M
Pout(, )
E
Puout
Wd, + M
where the power ratio := /, and Pl
out(, ) and Pu
out(, )
are defined in Lemma 1.
Proof: See Appendix B.
Proposition 2 shows that the outage probability for each
network depends on the transmitter densities of both net-
works. This coupling is due to spectrum underlay and theresultant mutual interference between the coexisting networks.
As shown in Section V, such coupling may result in smaller
transmission capacities for spectrum underlay than those for
spectrum overlay. Moreover, Proposition 2 also shows that
the outage probabilities for spectrum underlay depend on the
transmission power ratio . The effect of is characterized inSection V.
C. Outage Probabilities: Spectrum Overlay with SIC
As in the preceding sections, consider B0 and R0 accessing
the th and the mth subchannels, respectively. SIC effectivelyremove the strongest interferers for B0 and R0. Based onthe SIC model in Section II-D, the interferer process for B0conditioned on the link power W D is
(c) (W D
) :=
X (a) \{U0} | GXR
X W D
(16)
where (a) is defined for spectrum overlay in Section IV-A.
Similarly, the conditional interferer process for R0 is given by(c)m (Wd) := X (a) \{T0} | GXRX Wd(17)
where (a) follows from Section IV-A. Thus the conditionalinterference power for B0 and R0 can be written asI(c) (W D
) := P
X(c)(WD)
GXRX
I(c)m (Wd) := P
Xe(c)m (fWd)
GXRX .
(18)
It follows that SIRs for spectrum overlay with SIC are
Celluar : SIR(c) = P W D
/I(c) (W D
)
MANET : SIR(c)m = PWd/I(c)m (Wd). (19)The above SIR derivation shows that spectrum overlay with
and without SIC are closely related. This relation is specified
in the following proposition.
Proposition 3. For spectrum overlay with SIC, the bounds on
the outage probabilities P(c)out
and P(c)out
can be modified from
those in Proposition 1 by replacing the functions Plout
and
Puout
with Plout
and Puout
correspondingly, which are defined as
Plout
(a, b) := 1 exp
ab
(20)
Puout
(a, b) := 1 (a, b)exp
ab
(21)
where := 1 .
Proof: See Appendix C.Note that (20) and (21) differ from their counterparts in
Lemma 1 only by the factor . The factor < 1 represents theSIC advantage of reducing outage probabilities with respect
to the case of no SIC ( = 1). Moreover, decreasing the SICfactor reduces and thus outage probabilities. Nevertheless, being too small may invalidate the assumption of perfectSIC. Specifically, small implies small SIR for the processof decoding interference prior to its cancelation and potentially
results in significant residual interference after SIC [26].
D. Outage Probabilities: Spectrum Underlay with SICThe outage probabilities for spectrum underlay with SIC can
be obtained from those for spectrum underlay in Section IV-B.
The procedure is similar to that in the preceding section.
Specifically, the conditional interferer processes for B0 andR0 are defined similarly as in (16) and (17)
(d) (W D
) :=
X \{U0} | PXGXRX PWD
(d)m (Wd) := X m\{T0} | PXGXRX PWdwhere is the combined PPP defined Section IV-B, and PXis distributed as in Lemma 3. Thus the SIRs can be written as
Celluar : SIR(d) = P W D/I(d) (W D
)
MANET : SIR(d)m = PWd/I(d)m (Wd). (22)where the conditional interference power
I(d) (a) := P
X
(c)(a)
GXRX
I(d)m (a) := P
Xe(c)m (a)
GXRX .
(23)
The similar results as in Proposition 3 are obtained for
spectrum underlay with SIC and shown in the following
proposition. Its proof is similar to that for Proposition 3 and
thus omitted.
Proposition 4. For spectrum underlay with SIC, the bounds
on the outage probabilities P(d)out
and P(d)out
can be modified
from those in Proposition 2 by replacing the functions Plout
and Puout
with Plout
and Puout
defined in Proposition 3.
The remarks on Proposition 3 are also valid for Proposition 4.
V. NETWORK CAPACITY TRADEOFF: ASYMPTOTIC
ANALYSIS
Using the results obtained in the preceding section, the
trade-off between the transmission capacities C and C of thecoexisting networks is characterized in the following theorem
for small target outage probability 0.
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
7/12
1262 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 7, SEPTEMBER 2009
Theorem 1. For 0, transmission capacities of thecoexisting networks satisfy
C+ C =M
+ O
2
(24)
where the weights and are given as 4
o = E[W ]d2, o = 2E[W](b)1u = o (o), u = (o) o, (25)and depends on if SIC is used
= 1, no SIC
1 22 , SIC.
(26)
Proof: See Appendix D.
It can be observed that for spectrum overlay the numbers
of subchannels assigned to the coexisting networks, namely
K and K, do not appear in Theorem 1. The reason is that Kand K are merged into M based on the equality M = K+ K(see Appendix D). Theorem 1 shows that the trade-off between
C and C follows a linear equation. Specifically, the slope atwhich C increases with decreasing C is /, which dependson different network parameters as observed from (25). The
results in Theorem 1 are interpreted using several corollaries
in the sequel.
To facilitate discussion, define an outage limited network as
one whose transmission capacity is achieved with the outage
constraint being active. For instance, the cellular network is
outage limited if Pout(C) = . For spectrum overlay, boththe coexisting networks are outage limited. Nevertheless, for
spectrum underlay, it is likely that only one of the two
networks is outage limited as explained shortly. As implied by
the proof for Theorem 1, for spectrum underlay, both networksare outage limited only ifu = u, where u and u are givenin (25). Otherwise, u > u correspond to only the cellularnetwork being outage limited; u < u indicates that only theMANET is outage limited.
Spectrum overlay is shown to be more efficient than spec-
trum underlay as follows. By definitions, the capacity region
in (7) is the region enclosed by the capacity trade-off curve
in (24) and the positive axes of the C-C coordinates. Thisregion contains all feasible combinations of the densities
of the coexisting networks. Thus, the size of the capacity
region measures the spectrum-sharing efficiency. The capacity
regions for spectrum overlay and underlay are compared inthe following corollary.
Corollary 1. For 0, the capacity region for spectrumunderlay is no larger than that for spectrum overlay. They are
identical if and only if the transmission-power ratio is
= (o/o)1 (27)
where o and o are given in (25).
Proof: See Appendix E.
Corollary 1 shows that spectrum overlay is potentially more
efficient than spectrum underlay due to network coupling
for the latter. Specifically, the possibility that a network is
4The subscripts o and u identify spectrum overlay and underlay, respec-tively
not outage limited compromises the efficiency of spectrum
underlay, which, however, can be compensated by setting as given in (27). This optimal value of ensures that bothnetworks are outage limited for the case of spectrum underlay.
The next corollary specifies the effects of several parameters
on transmission capacities of the coexisting networks.
Corollary 2. For 0, transmission capacities vary withnetwork parameters as follows.
1) Spectrum overlay: C increases linearly with the basestation density b; C increases inversely with the ad hoctransmitter-receiver distance d.
2) Spectrum underlay: If the cellular network is outage
limited, both C and C increase linearly with the basestation density b. Otherwise, both C and C increaseinversely with the ad hoc transmitter-receiver distance
d.3) For both spectrum sharing methods, C and C increase
linearly with and the number of subchannels M, andinversely with related to SIC.
Finally, we analyze the transmission-capacity gains due to
spatial diversity gains contributed by multi-antennas [36]. To
obtain concrete results, the fading factors W and W are as-sumed to follow the chi-squared distributions with the complex
degrees of freedom L and L, respectively, which are called thediversity gains [30]. These fading distributions can result from
using spatial diversity techniques such as beamforming over
multi-antenna i.i.d. Rayleigh fading channels [37]. Thus
E[W] =(L )
(L), E[
W] =
(L )
(L). (28)
The following corollary is obtained by combining Theorem 1,(28) and the following Kershaws inequalities [38]
x +s
2
1s 1W D since > 1 and > 1.Thus, the process of weak interferers can be defined as
cS(W D) :=
(c) \S(W D
), which is observed to beidentical to the counterpart for spectrum overlay without SIC
considered in Section B. Since cS(W D) S(W D) =, cS(W D
) and S(W D) are independent processes
based on a basic property of Poisson processes [35]. From
the discussion in Section III-A, the exponential terms in (3)
and (4) depends only on S(W D), and the function (, )
only on cS(W D). Since cS(w, d) is invariant to SIC, and
cS(w, d) and S(w, d) are independent, the bounds on Pout inLemma 1 can be extended to the case of SIC by replacing the
exponential terms in (3) and (4) with exp(E [|S(w, d)|]),where E [|S(w, d)|] is obtained using Campbells theorem
E [|S
(w, d)|] =2
0 (w1dg)
1
(1w1dg) 1rf
G(g)drdg
=wd2
K
and is defined in the statement of the proposition.
D. Proof for Theorem 1
1) Spectrum Overlay: The convergence 0 implies 0 and 0. Using the series representation of the PDF of apower shot-noise process [33], the asymptotes of the outage
probabilities follow from [7, Theorem 2]
Pout = K
E WE D2 + O 2Pout =
KE
W d2 + O2 . (32)
By using Lemma 2, the term E
D2
in (32) is obtained as
E
D2
=
0
2bt3ebt
2
dt
=
0
btebtdt =
(2)
b=
2
b. (33)
Combining (6), (32), and (33) gives the desired asymptotic
capacity trade-off function for spectrum overlay.
2) Spectrum Underlay: By using the series expression of
the PDF of the power shot noise [33] as well as Proposition 1,
Pout(, )= +
ME[W ]E[D2] + O(max(2, 2))(34)
Pout(, )= +
ME[W ]d2 + O(max(2, 2)). (35)
For 0, the transmission capacities C and C satisfy theconstraints Pout(C/M, C/M) and Pout(C/M, C/M) .By combining these constraints, (34) and (35)
C+ C
Mmax
E[W]E[D2], E[W ]d2 = + O(2).
The desired result follows from the above equation.
3) Spectrum Sharing with SIC: Consider spectrum overlay
with SIC. By canceling the strongest interferers using SIC, the
PDF upper-tail of the power shot noise process is trimmed
and its series expansion is difficult to find [33]. Nevertheless,
the asymptotic transmission capacities can be characterized by
expanding the bounds on Pout in Proposition 3. Specifically
P
l
out(/K) =
KE
[W
]E
[D
2
] + O(
2
)
Puout
(/K) = 1 E
1
2 WD2
K+ O(2)
KWD2 + O(2)
=
2
2
1
E[W ]E[D2]
K+ O(2).
Thus
Pout(/K) = E[W]E[D2]
K(36)
where 1 22 . SimilarlyPout(/K) = E[W ]d2
K. (37)
The desired results for spectrum overlay with SIC are obtained
by combining (6), (36), and (37). The results for spectrum
underlay with SIC are derived following a similar procedure.
E. Proof for Corollary 1
First, the capacity region for spectrum underlay is proved to
be no larger than for spectrum overlay. It is sufficient to provethat u o and u o, which follow from (25). Next,substituting (27) into (25) results in u = o and u = o.This proves the second claim in the theorem statement.
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
11/12
1266 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 7, SEPTEMBER 2009
E[IcS(a)] =2( + )
M
Pr (PX = P)0
( ga)1
(P rg)rfG(g)drdg + Pr
PX = P 0
( ga)1
(P rg)rfG(g)drdg
=
P
1
+
M
(a1)11, (30)
var[IcS(a)] =2( + )
M
Pr (PX = P)0
( ga)1
(P rg)2rfG(g)drdg + Pr
PX = P 0
( ga)1
(P rg)2rfG(g)drdg
=
P2
2
+
M
(a1)22. (31)
REFERENCES
[1] Federal Communications Commission, Spectrum policy task force,Nov. 2002. (Rep. ET Docket no. 02-135).
[2] H. Holma and A. Toskala, WCDMA for UMTS: Radio Access for ThirdGeneration Mobile Communications. John Wiley & Sons,, 2004.
[3] P. Marques, J. Bastos, and A. Gameiro, Opportunistic use of 3Guplink licensed bands, in Proc. IEEE Intl. Conf. on Communications,pp. 35883592, May 2008.
[4] D. Kim and D. Jeong, Capacity unbalance between uplink and down-link in spectrally overlaid narrow-band and wide-band CDMA mobilesystems, IEEE Trans. Veh. Technol., vol. 49, pp. 10861093, July 2000.
[5] I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, Next gen-eration/dynamic spectrum access/cognitive radio wireless networks: asurvey, Computer Networks, vol. 50, no. 13, pp. 21272159, 2006.
[6] S. P. Weber, X. Yang, J. G. Andrews, and G. de Veciana, Transmissioncapacity of wireless ad hoc networks with outage constraints, IEEETrans. Inform. Theory, vol. 51, pp. 409102, Dec. 2005.
[7] S. P. Weber, J. G. Andrews, and N. Jindal, The effect of fading, channelinversion, and threshold scheduling on ad hoc networks, IEEE Trans. Inform. Theory, vol. 53, pp. 41274149, Nov. 2007.
[8] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. L. (Eds.), SpreadSpectrum Communications Handbook. Mc-Graw Hill, 1994.
[9] Q. Zhao and B. M. Sadler, A survey of dynamic spectrum access,IEEE Signal Processing Mag., vol. 24, pp. 7989, May 2007.
[10] R. Menon, R. M. Buehrer, and J. H. Reed, Outage probability basedcomparison of underlay and overlay spectrum sharing techniques, inProc. IEEE Intrl. Symp. on New Frontiers in Dynamic Spectrum Access
Networks, pp. 101109, Nov. 2005.
[11] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized cognitiveMAC for opportunistic spectrum access in ad hoc networks: A POMDPframework, IEEE Journal on Sel. Areas in Communications, vol. 25,pp. 589600, Apr. 2007.
[12] B. Wild and K. Ramchandran, Detecting primary receivers for cognitive
radio applications, in Proc. First IEEE Interl. Symp. on New Frontiersin Dynamic Spectrum Access Networks, pp. 124130, Nov. 2005.
[13] I. Howitt, WLAN and WPAN coexistence in UL band, IEEE Trans.Veh. Technol., vol. 50, pp. 111424, July 2001.
[14] S. Han, S. Lee, S. Lee, and Y. Kim, Outage probability analysis ofWPAN under coexistence environments in fading channels, in Proc. Intrl. Confer. on Inform. Networking, pp. 14, Jan. 2008.
[15] N. Thanthry, M. S. Ali, R. Bhagavathula, and R. Pendse, WLAN andad-hoc network coexistence, in Proc. IEEE Veh. Technol. Conf., vol. 7,pp. 50315035, Sept. 2004.
[16] N. Golmie, R. E. V. Dyck, A. Soltanian, A. Tonnerre, and O. Rbala, In-terference evaluation of bluetooth and IEEE 802.11b systems, WirelessNetworks, vol. 9, pp. 201211, May 2003.
[17] L. Angrisani, M. Bertocco, D. Fortin, and A. Sona, Experimental studyof coexistence issues between IEEE 802.11b and IEEE 802.15.4 wireless
networks, IEEE Trans. Instrum. Meas., vol. 57, pp. 15141523, Aug.2008.
[18] R. Etkin, A. Parekh, and D. Tse, Spectrum sharing for unlicensedbands, IEEE J. Select. Areas Commun., vol. 25, pp. 517528, Apr.2007.
[19] V. Chandrasekhar and J. G. Andrews, Uplink capacity and interferenceavoidance for two-tier femtocell networks, to appear in IEEE Trans.Wireless Commun..
[20] C. Yin, L. Gao, and S. Cui, Scaling laws of overlaid wireless networks:A cognitive radio network vs. a primary network, submitted to IEEETrans. Networking, May 2008.
[21] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEETrans. Inform. Theory, vol. 46, pp. 388404, Mar. 2000.
[22] A. M. Hunter, J. G. Andrews, and S. P. Weber, Transmission capacity ofad hoc networks with spatial diversity, IEEE Trans. Wireless Commun.,vol. 7, no. 12, Part 1, pp. 50585071, Dec. 2008.
[23] N. Jindal, J. G. Andrews, and S. P. Weber, Bandwidth partitioning indecentralized wireless networks, IEEE Trans. Wireless Commun. vol.7, no. 12, Part 2, pp. 54085419, Dec. 2008.
[24] S. P. Weber, J. G. Andrews, X. Yang, and G. de Veciana, Transmissioncapacity of wireless ad hoc networks with successive interferencecancelation, IEEE Trans. Inform. Theory, vol. 53, pp. 27992814, Aug.2007.
[25] K. Huang, J. G. Andrews, R. W. Heath, Jr., D. Guo, and R. A.
Berry, Spatial interference cancelation for mobile ad hoc networks,submitted to IEEE Trans. Inform. Theory, May 2008. (ArXiv:http://arxiv.org/abs/0807.1773).
[26] J. G. Andrews, Interference cancellation for cellular systems: a con-temporary overview, IEEE Wireless Commun., vol. 12, pp. 1929, Apr.2005.
[27] F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, An ALOHA protocolfor multihop mobile wireless networks, IEEE Trans. Inform. Theory,vol. 52, pp. 42136, Feb. 2006.
[28] F. Baccelli, Stochastic geometry: a tool for modeling telecommunica-tion networks (INRIA-ENS webpage), http://www.di.ens.fr/.mistral/sg/.
[29] D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Gemoetry and itsApplications. Wiley, 2nd ed., 1995.
[30] D. Tse and P. Viswanath, Fundamentals of Wireless Communication.Cambridge University Press, 2005.
[31] D. Warrier and U. Madhow, On the capacity of cellular CDMA with
successive decoding and controlled power disparities, in Proc. IEEEVeh. Technol. Conf., vol. 3, pp. 18731877, May 1998.
[32] T. M. Cover and J. A. Thomas, Elements of Information Theory. JohnWiley, 1991.
[33] S. B. Lowen and M. C. Teich, Power-law shot noise, IEEE Trans. Inform. Theory, vol. 36, pp. 130218, Nov. 1990.
[34] E. S. Sousa, Interference modeling in a direct-sequence spread-spectrum packet radio network, IEEE Trans. Commun., vol. 38,pp. 147582, Sept. 1990.
[35] J. F. C. Kingman, Poisson processes. Oxford University Press, 1993.[36] A. Goldsmith, Wireless Communications. Cambridge University Press,
2005.[37] A. Paulraj, R. Nabar, and D. Gore, Introduction to Space-Time Wireless
Communications. Cambridge University Press, 2003.[38] D. Kershaw, Some extensions of W. Gautschis inequalities for the
Gamma function, Math. of Computation, vol. 41, pp. 607611, Oct.
1983.[39] S. P. Weber and M. Kam, Computational complexity of outage prob-
ability simulations in mobile ad-hoc networks, in Proc. Conf. Inform.Sciences and Systems, Mar. 2005.
Authorized licensed use limited to: Yonsei University. Downloaded on September 21, 2009 at 05:45 from IEEE Xplore. Restrictions apply.
8/4/2019 Spectrum_Sharing Between Cellular and Mobile Ad Hoc
12/12
HUANG et al.: SPECTRUM SHARING BETWEEN CELLULAR AND MOBILE AD HOC NETWORKS: TRANSMISSION-CAPACITY TRADEOFF 1267
Kaibin Huang (S05M08) received the B.Eng.(first-class hons.) and the M.Eng. from the NationalUniversity of Singapore in 1998 and 2000, respec-tively, and the Ph.D. degree from The University ofTexas at Austin (UT Austin) in 2008, all in electricalengineering.
Since Mar. 2009, he has been an assistant pro-fessor in the School of Electrical and ElectronicEngineering at Yonsei University, Seoul, Korea.From Jun. 2008 to Feb. 2009, he was a PostdoctoralResearch Fellow in the Department of Electrical and
Computer Engineering at the Hong Kong University of Science and Technol-ogy. From Nov. 1999 to Jul. 2004, he was an Associate Scientist at the Institutefor Infocomm Research in Singapore. His research interests focus on limitedfeedback techniques for wireless networks. Dr. Huang received the MotorolaPartnerships in Research Grant, the University Continuing Fellowship at UTAustin, and the Best Student Paper award at IEEE GLOBECOM 2006.
Vincent K. N. Lau obtained B.Eng (Distinction 1stHons) from the University of Hong Kong (1989-1992) and Ph.D. from Cambridge University (1995-1997). He was with HK Telecom (PCCW) as systemengineer from 1992-1995 and Bell Labs - LucentTechnologies as member of technical staff from1997-2003. He then joined the Department of ECE,Hong Kong University of Science and Technol-ogy (HKUST) as Associate Professor. His currentresearch interests include the robust and delay-sensitive cross-layer scheduling of MIMO/OFDM
wireless systems with imperfect channel state information, cooperative andcognitive communications, dynamic spectrum access as well as stochasticapproximation and Markov Decision Process.
Yan Chen received her B.Sc degree from ChuKochen Honored College, Zhejiang University,Hangzhou, China, in 2004. She is expected to re-ceive her Ph.D degree in information and com-munication engineering from Zhejiang Universityin 2009. Since Jan 2008, She has been a visitingresearcher in the group of Prof. Vincent Lau inHKUST. Her current research interests lie in com-bined information theory and queueing theory inwireless communications, with particular emphasison exploiting communication opportunities via co-
operation and cognition.