1 Introduction

As the demands of wireless communication services increase, the utilization of radio spectrum resources becomes more important. However, most of the radio spectrums have been already allocated to licensed users, and recent studies have revealed that they are not occupied for most of the time (Spectrum policy task force 2002; Facilitating opportunities 2003; McHenry 2003). To improve the efficiency of the radio spectrum usage, the concept of Cognitive Radio (CR) has been introduced. In a CR network, there are a set of primary users (PUs) and a set of secondary users (SUs). PUs are licensed users having absolute priority to occupy their designated radio spectrums, called channels. SUs are unlicensed users who are allowed to use the temporarily unoccupied licensed radio spectrums (Haykin 2005; Mitola and Maguire 1999).

We consider a time slotted CR network with N channels and M SUs and focus on a multiple channel access policy. To utilize idle channels by SUs in CR, SUs first have to acquire the channel state information (CSI) by individually or cooperatively sensing the channels and sharing the CSI as much as possible. To investigate the impact of the multiple channel access policy on network performance, we assume that the channel sensing is perfect in this paper. After acquiring the CSI, each SU selects multiple idle channels and transmits its packets according to a pre-determined channel access policy. Here, multiple channel access can be implemented by the channel aggregation (CA) scheme with discontinuous orthogonal frequency division multiplexing (DOFDM) defined in IEEE 802.22 (Poston and Horne 2005; Park et al. 2016). With this CA scheme, an SU can aggregate multiple channels and transmit data through them. Thus, it is important to choose appropriate channel sensing and accessing policies to improve the efficiency of spectrum usage and network performance.

The design challenge in CR is to optimize the performance of SUs, and in this regard a number of channel sensing and accessing policies in CR have been recently proposed in the open literature, e.g., Ma et al. (2005), Sankaranarayanan et al. (2005), Jia et al. (2008), Cordeiro and Challapali (2007), Sabharwal et al. (2007), Hsu et al. (2007), Zhao et al. (2007), Su and Zhang (2008), Zhao et al. (2008), Li et al. (2011), Hwang and Roy (2012), Cho and Hwang (2012), Urkowitz (1967), Yucek and Arslan (2009), Gardner (1988). A good survey on the design issues and recent works in CR is provided in Cormio and Chowdhury (2009), Hossain et al. (2009), Akyildiz et al. (2006), Qing and Adler (2007). Interested readers may refer to them and the references therein.

Since the already proposed channel sensing/accessing policies are different from each other in modeling assumption, analytic techniques, and having different implementation issues, it is not an easy task to determine which one is superior to the others. However, one of good candidates for CR is the random access policy considered in this work because it is a generalization of the conventional p-persistent CSMA which is easy to implement in practice. In the conventional p-persistent CSMA, a node senses a channel for busy or idle. If the channel is idle, the node transmits a packet with probability p and does not transmit a packet with probability \(1-p\). On the other hand, if the channel is busy, the node senses it continuously until it becomes idle (Kwon et al. 2009). Note that the conventional p-persistent CSMA is already considered for CR (Hu and Mao 2009; Wang et al. 2010). In addition, as discussed in Hwang and Roy (2012) the random access policy is closely related with the IEEE 802.11 Distributed Coordination Function (DCF) which is also considered for CR. A practical example of the random channel access policy is a sensor network equipped with CR where a fixed number of sensors send out measurement data of the environment sporadically and opportunistically over empty PU channels (Wang et al. 2010). Due to the above-mentioned reasons, we focus in this work on the random access policy for SUs.

In the random access policy considered in this work, each SU stochastically decides whether to access idle channels at each slot based on the common access probabilities (APs). When an SU decides to access idle channels, it is called an active SU. To analyze the performance of the random access policy, we consider the following two extreme cases and an intermediate case which combines the two extreme cases:

  • one extreme case where all SUs have full CSI;

  • the other extreme case where all SUs have no CSI;

  • an intermediate case where all SUs have partial CSI.

In the first case where all SUs have full CSI, we assume that an active SU is allowed to access at most \(L(\ge 1)\) idle channels. That is, when the number of idle channels is k, an active SU selects \(\min (L,k)\) idle channels randomly and transmits its packets over the selected idle channels, one packet over each idle channel. We call this model the L-interface CR network with full CSI. If two or more SUs select the same idle channel, it leads to a packet collision. Obviously, it is desirable to adapt the AP value according to the information on the idle channels so as to alleviate packet collisions. More importantly, we need to find the optimal AP values which are functions of the number of idle channels, which maximize the throughput of an arbitrary SU. Note that the full CSI can be acquired by all SUs via a suitable channel sensing such as the negotiation based sensing (Su and Zhang 2008).

In the second case where all SUs have no CSI, SUs cannot adapt the AP to the number of idle channels and accordingly use a fixed AP, irrespective of the number of idle channels. We call this model the L-interface CR network with no CSI. In this case, there is still the possibility of packet collision when two or more SUs select the same idle channel. So it is also important to find the optimal unified AP that maximizes the throughput of an arbitrary SU.

In the last case where all SUs have partial CSI, SUs have full CSI on \(N_1\) channels and have no CSI on the remaining \(N_2(=N-N_1)\) channels. In this case, when the number of idle channels among \(N_1\) channels is \(k_1\), an active SU selects \(\min (N_2+k_1,L)\) idle channels randomly among the \(k_1\) idle channels with full CSI and the \(N_2\) channels with no CSI, and then, it transmits its packets over the selected channels. We call this model the L-interface CR network with partial CSI. This case is a compromise between the first and second cases and is more practical than them because the sensing may not be completed for all channels within a short time interval in practice.

In this work each SU is allowed to access multiple idle channels simultaneously at a slot. To the best of the authors’ knowledge there have been limited works on this issue. From the multiple channel access viewpoint, the most relevant works to ours include Wang et al. (2010), Xu et al. (2008). In Wang et al. (2010) consider a CR network with the conventional p-persistent CSMA and derive the optimal AP value under the assumption that no CSI is available and each SU can access two channels simultaneously, which is a special case of our work. In Xu et al. (2008) consider unslotted CR networks and derive the optimal SU throughput and the optimal value of the number of SU’s interfaces, but the analysis on the case with multiple SUs is based on an approximation.

The contributions of this work are summarized as follows.

  • We derive a closed-form expression of the optimal AP values that maximize the throughputs of an arbitrary SU in the L-interface CR network with full/no/partial CSI. Since our result is of closed-form, we can easily investigate the relation between the optimal AP values and the network parameters such as the numbers of PU channels and SUs as well as the maximum number of idle channels allowed for SUs. One interesting fact that we find from the closed-form expression is that the optimal AP value is a function of the total number of idle channels counting multiplicity that all SUs can access simultaneously. This implies that each SU behaves as if there were multiple virtual SUs accessing a single idle channel as explained in the main context.

  • In this work, we rigorously analyze three cases for the CR network with multiple channel access for SUs - having full CSI, no CSI, and partial CSI. Even though the no CSI case is the most practical due to less implementation cost, the analyses on two extreme cases are important because we can compare them to investigate the impact of the acquisition of CSI on throughput performance. In fact, we show that, when the network is not crowded, the acquisition on CSI can improve the optimal throughput performance. On the other hand, when the network is crowded, the acquisition on CSI cannot improve the optimal throughput performance in the L-interface CR network. Moreover, the analysis on the no CSI case becomes possible in this work with the help of the analytic result on the full CSI case.

  • We also show that the optimal throughput performance can be improved as we increase L only when \(LM\le N\). This provides an important insight on the design of a CR network that, when \(LM > N\), the optimal throughput performance cannot be improved any more even though we increase L.

Note that this paper is an extended version of the work by Park et al. (2016), and the extension is summarized as follows.

  • While rigorous proofs of theorems are omitted in Park et al. (2016), we provide them in this paper.

  • We also provide a mathematical analysis on the optimal access probability and the optimal throughput for the partial CSI case.

  • Our analysis on the partial CSI case is validated through numerical and simulation studies.

The rest of this paper is organized as follows. In Sect. 2, we explain the L-interface CR network and mathematically model the PU’s activity and the random access policy. In Sect. 3, we analyze the throughput of an arbitrary SU in the L-interface CR network, and derive the optimal APs that maximize the throughput of an arbitrary SU. In the analysis we consider three cases where full/no/partial CSI is available to SUs. In Sect. 4, we validate our analysis through numerical and simulation studies. In Sect. 5, we give our conclusions.

2 System model

We consider a time slotted cognitive radio (CR) network with N wireless channels. There are N primary users (PUs) and \(M (\ge 2)\) secondary users (SUs). Each primary user has its own designated channel. At time slot t, we let N(t) denote by the number of idle channels that are unoccupied by PUs. SUs are allowed to access only idle channels to transmit their packets at each time slot.

2.1 Wireless channel occupancy model

For each channel, the channel occupancy process by a PU is modeled by a 2-state Markov chain with state space \(\{0,1\}\), where 0 (1) denotes a busy (an idle) channel. Let p be the transition probability that the state of a channel is changed from busy to idle and q be the transition probability that the state of a channel is changed from idle to busy. Then the transition probability matrix Q of the channel occupancy process of a channel is given by

$$\begin{aligned} Q=\left( \begin{array}{ll} 1-p &{} p\\ q &{} 1-q\\ \end{array}\right) . \end{aligned}$$

Let \(\pi =(\pi _0, \pi _1)\) be the stationary probability vector of the matrix Q, i.e., \(\pi Q = \pi \), \(\pi _0+\pi _1=1\). Note that \(\pi _0\) is the stationary probability of being a busy channel and \(\pi _1\) is the stationary probability of being an idle channel. Then, we obtain

$$\begin{aligned} \pi _0 =\frac{q}{p+q},~~ \pi _1 =\frac{p}{p+q}. \end{aligned}$$
(1)

Note that N(t) is the number of idle channels at time slot t. We assume that the channel occupancies by PUs are independent from channel to channel. Then N(t) is a discrete time Markov Chain (DTMC) with state space \(\{0,1,\ldots ,N\}\). The steady state probability of N(t) is then given by

$$\begin{aligned} P\{N(t)=k\}=\left( {\begin{array}{c}N\\ k\end{array}}\right) \pi _1^k \pi _0^{N-k},\quad 0\le k \le N, \end{aligned}$$
(2)

where \(\pi _0\) and \(\pi _1\) are given by (1).

2.2 Random access policy

Each SU is equipped with the capability of accessing L channels simultaneously at each time slot. So each SU can transmit at most L packets, one for each idle channel, if possible, at each time slot. Clearly, \(L\le N\). We consider and analyze three cases in this paper.

2.2.1 Case 1: full CSI

SUs have perfect information on the states of all N channels at each time slot, i.e., which channels are idle and which channels are busy.

The random access policy in this case is performed as follows. Each SU decides stochastically whether to access channels with a common access probability (AP) based on the number of idle channels N(t), independent of all other SUs. When \(N(t)=k\), the AP is \(a_k\). When an SU decides to access channels at time slot t, it is called an active SU. Each active SU then randomly selects \(\min (L,N(t))\) channels among idle channels and transmits packets over the selected channels at time slot t. We call this model the L-interface CR network with full CSI. Note that, when two or more active SUs select the same idle channel at a time slot, the transmitted packets over the same channel at the time slot collide and hence are assumed lost. From this viewpoint, it is important to optimize the APs \(\{a_1, a_2, \ldots , a_N\}\) that maximize the throughput. Figure 1 demonstrates the channel access in this case.

Fig. 1
figure 1

L-interface CR network with full CSI

Fig. 2
figure 2

L-interface CR network with no CSI

2.2.2 Case 2: no CSI

SUs have no CSI in this case. Then, all SUs cannot adapt the AP according to the number of idle channels, and hence use a common unified AP, say a, to decide whether they are active or not at each time slot, independently of all other SUs. When an SU becomes active, it randomly selects L channels among the N channels. The active SU then checks at the beginning of the time slot which selected channels are idle. We assume that the channel sensing is perfect. Then, the active SU transmits only through the idle channels among the selected L channels. Obviously, there is the possibility of packet collision when two or more active SUs select the same idle channel. So, as in the previous case, the common unified AP a needs to be optimized. The benefit of this policy is that each active SU senses only L (randomly selected) channels at each time slot and does not need any information about the other channels, reducing the sensing overhead. This model is called the L-interface CR network with no CSI. Figure 2 demonstrates the channel access in this case.

2.2.3 Case 3: partial CSI

In the partial CSI case considered in this paper, wireless channels are divided into the following two groups, say \(\mathcal {N}_1\) and \(\mathcal {N}_2\): (1) group \(\mathcal {N}_1\) consists of \(N_1\) channels of which CSI is perfectly known to all SUs; and (2) group \(\mathcal {N}_2\) consists of the remaining \(N_2(=N-N_1 )\) channels of which CSI is not known to all SUs. For convenience, define \({\mathcal {N}}_1^{\mathrm{idle}}(t)\), \(N_1(t)\), \(\mathcal {N}_2^{\mathrm{idle}}(t)\) and \(N_2(t)\) as follows: \(\mathcal {N}_1^\mathrm{idle}(t)=\{\omega \in \mathcal {N}_1\,|\,\omega \text { is idle at time slot }t\}\,\hbox {with}\,N_1(t)=|\mathcal {N}_1^\mathrm{idle}(t)|; \mathcal {N}_2^\mathrm{idle}(t)=\{\omega \in \mathcal {N}_2\,|\,\omega \text { is idle at time slot }t\}\,\hbox {with}\,N_2(t)=|\mathcal {N}_2^\mathrm{idle}(t)|\) where |A| denotes the number of elements in set A. Each SU decides stochastically whether to access channels with an AP based on \(N_1(t)\). Thus, when \(N_1(t)=k\), the AP depends on the value of k, denoted by \(\alpha _k\).

Now, after an SU becomes active with AP \(\alpha _k\) when \(N_1(t)=k\), the active SU selects \(\min ({N_2+k},L)\) channels among \(\mathcal {N}_1^\mathrm{idle}(t)\cup \mathcal {N}_2\) randomly. At the beginning of the time slot, the active SU checks the selected channels in \(\mathcal {N}_2\), since there is no CSI for the channels in \(\mathcal {N}_2\). After sensing, the active SU transmits only through the idle channels among the selected channels. The benefit of this policy is that each active SU senses up to L channels at each time slot using the already known CSI for the channels in \(\mathcal {N}_1\). This is why this model is called the L-interface CR network with partial CSI. Figure 3 demonstrates the channel access in this case.

Fig. 3
figure 3

L-interface CR network with Partial CSI

3 Performance analysis

In this section, we analyze the throughput performance of an arbitrary SU in the L-interface CR network for the three cases; with full CSI, with no CSI and with partial CSI. To this end, we tag an arbitrary SU and call it the tagged SU. For analysis, we assume that all SUs are saturated, that is, all SUs always have packets to transmit. We let \(c_L (t)\) denote by the number of packets transmitted successfully by the tagged SU at time slot t. Hence, \(c_L (t)=j\) if the tagged SU successfully transmits j packets at time slot t. Obviously, \(c_L(t) \le L\).

Moreover, since each SU independently decides to access idle channels with the common APs, the probability \(P_i^{m}(x)\) that there are i active SUs among the total of m SUs when the AP is x, is given by

$$\begin{aligned} P_i^{m}(x) = \left( {\begin{array}{c}m\\ i\end{array}}\right) x^i {(1-x)}^{m-i}, \end{aligned}$$
(3)

which will be used later.

3.1 The full CSI case

Consider the L-interface CR network with full CSI. We first define the throughput performance of the tagged SU, denoted by \(T_L^\mathrm{full}\). Assuming that the network is in steady state, \(T_L^\mathrm{full}\) is defined by

$$\begin{aligned} T_L^\mathrm{full}:= & {} E[c_L(t)]\\= & {} \sum _{k=1}^N P\{N(t)=k\} E[c_L(t)|N(t)=k] \end{aligned}$$

where \(P\{N(t)=k\}\) is given by (2). We define the conditional throughput of the tagged SU in the L-interface CR network with full CSI, given that there are k idle channels, by \( T_{L,k}^\mathrm{full} = E[c_L(t) | N(t)=k], \) so that

$$\begin{aligned} T_L^\mathrm{full} = \sum _{k=1}^N P\{N(t)=k\}T_{L,k}^\mathrm{full}. \end{aligned}$$
(4)

To compute \(T_L^\mathrm{full}\), observe that the throughput of the tagged SU depends on the number of idle channels that the tagged SU selects but all active untagged SUs do not select. So, from the tagged SU’s perspective the effective channels are defined by the idle channels that the tagged SU selects but all active untagged SUs do not select. Note that the tagged SU transmits one packet successfully through each effective channel. We now need the following two lemmas.

Lemma 1

When \(N(t) = k(\ge 1)\), assume that there are \(i \,(0 \le i \le M-1)\) active untagged SUs and that the tagged SU becomes active and hence transmits its packets at time slot t. Then the probability \(G_{L,k}^i(t;j)\) that there are j effective channels at time slot t, is given by, for \(j\ge 1\),

$$\begin{aligned} G_{L,k}^i(t;j) = \left\{ \begin{array}{l} \displaystyle {1} ,\quad \text {if} ~~ i=0 \text { and } j=L_k; \\ \displaystyle { \left( {\begin{array}{c}L\\ j\end{array}}\right) \sum \nolimits _{u=0}^{L_{k}^- -j} (-1)^u \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \left( \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{ \left( {\begin{array}{c}k\\ L\end{array}}\right) }\right) ^i}, \\ \text {if} ~~ i>0,~k>L \text { and } j\le L_k^-; \\ \displaystyle {0},\quad \text {otherwise} \end{array} \right. \end{aligned}$$

where \(L_k=\min (L,k)\) and \(L_{k}^-=\min (L,k-L)\).

Proof

Note that the tagged SU always chooses \(L_k=\min (L,k)\) idle channels when \(N(t) = k\). In the proof, we consider the following cases.

Case 1 There is no active untagged SU, i.e., \(i=0\):

In this case, it is obvious that the tagged SU successfully transmits its packets through all \(L_k\) idle channels that it selects and packet collisions do not occur. This implies that \(G_{L,k}^i(t;j)=1\) if \(j=L_k\) and \(G_{L,k}^i(t;j)=0\) if \(j\ne L_k\).

Case 2 There is at least one active untagged SU, i.e., \(i>0\), and \(k\le L\):

In this case, since \(k\le L\), all k idle channels are selected by the tagged SU. However, any active untagged SU also selects all k idle channels, which implies that there are no effective channels for the tagged SU. Hence, \(G^i_{L,k}(t;j)=0\).

Case 3 There is at least one active untagged SU, i.e., \(i>0\), and \(k> L\):

In this case, for the tagged SU to have j effective channels, each active untagged SU must choose L idle channels from the \(k-j\) idle channels that do not become the effective channels. If \(L>k-j\), then any active untagged SU has to select at least one of the j effective channels, which is not possible. This implies that \(G^i_{L,k}(t;j)=0\) if \(L >k-j\) in this case.

It remains to consider the case where \(L\le k-j\), i.e., \(j\le k-L\). Since \(j\le L\), we actually consider the case where \(j\le L_{k}^-\). Note that the tagged SU can choose L idle channels in this case, so we focus on the L idle channels selected by the tagged SU. To compute the probability that there are only j effective channels among the selected L channels, suppose we select j channels among the selected L channels and consider them as the effective channels. The number of selecting such j effective channels among the selected L channels is \(\left( {\begin{array}{c}L\\ j\end{array}}\right) \). Now, we order the selected L channels in such a way that the j effective channels are numbered as channel \(1,2,\ldots ,j\) and the remaining \(L-j\) channels are numbered as channel \(j+1,j+2,\ldots ,L\).

Define \(E_l, 1\le l\le L\) by the event that channel l is not selected by any of active untagged SUs. We need to compute

$$\begin{aligned} P\{E \cap E_{j+1}^c \cap \cdots \cap E_{L}^c\} \end{aligned}$$

where \(E:= E_1 \cap E_2 \cap \cdots \cap E_j\) and \(E_l^c\) is the complement of \(E_l\). Recall that, for any sequence of events \(\{C_1,C_2,\ldots ,C_m\}\), the inclusion-exclusion formula for the sequence is given by

$$\begin{aligned}&P\{\cup _{l=1}^m C_l\} \nonumber \\&\quad = \sum _{l=1}^{m} P\{C_l\} -\sum _{1\le l_1< l_2 \le m} P\{C_{l_1}\cap C_{l_2}\} + \sum _{1\le l_1< l_2 < l_3 \le m} P\{C_{l_1}\cap C_{l_2}\cap C_{l_3}\} \nonumber \\&\qquad - \cdots + (-1)^{m+1} P\{C_1\cap C_2\cap \cdots \cap C_m\}. \end{aligned}$$
(5)

Using (5), we obtain

$$\begin{aligned}&P\{E \cap E_{j+1}^c \cap \cdots \cap E_{L}^c\} \nonumber \\&\quad = P\{E \cap \left( E_{j+1} \cup \cdots \cup E_{L}\right) ^c\} \nonumber \\&\quad = P\{E\} - P\{E\cap \left( E_{j+1} \cup \cdots \cup E_{L}\right) \} \nonumber \\&\quad = P\{E\} - P\{(E\cap E_{j+1}) \cup \cdots \cup (E\cap E_{L})\} \nonumber \\&\quad = P\{E\} - \sum _{l=1}^{L-j} P\{E\cap E_{j+l}\} +\sum _{1\le l_1< l_2 \le L-j} P\{E\cap E_{j+l_1}\cap E_{j+l_2}\} \nonumber \\&\qquad - \sum _{1\le l_1< l_2 < l_3 \le L-j} P\{E\cap E_{j+l_1}\cap E_{j+l_2}\cap E_{j+l_3}\}\nonumber \\&\qquad + \cdots + (-1)^{L-j} P\{E\cap E_{j+1} \cap E_{j+2}\cap \cdots \cap E_L\}. \end{aligned}$$
(6)

Note that, if \(u > L_k^- - j\),

$$\begin{aligned} P\{E\cap E_{j+l_1}\cap \cdots \cap E_{j+l_u}\} =0 \end{aligned}$$
(7)

because each active untagged SU selects L idle channels in this case, and hence the maximum of \(j+u\) should be \(L_k^-\). Furthermore, we see that, for \(0\le u\le L_k^- -j\),

$$\begin{aligned} P\{E\cap E_{j+l_1}\cap \cdots \cap E_{j+l_u}\} = \left( \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{ \left( {\begin{array}{c}k\\ L\end{array}}\right) }\right) ^i, \end{aligned}$$
(8)

and

$$\begin{aligned}&\left| \{(l_1,\ldots ,l_u) : 1\le l_1< l_2< \cdots < l_u \le L-j\} \right| \nonumber \\&\quad = \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \end{aligned}$$
(9)

where |C| denotes the number of elements in set C.

Combining (6), (7), (8), and (9), we finally have

$$\begin{aligned}&P\{E \cap E_{j+1}^c \cap \cdots \cap E_{L}^c\} = \sum _{u=0}^{L_{k}^- -j} (-1)^u \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \left( \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{ \left( {\begin{array}{c}k\\ L\end{array}}\right) }\right) ^i . \end{aligned}$$
(10)

Now, recall that there are \(\left( {\begin{array}{c}L\\ j\end{array}}\right) \) cases of selecting j channels (that become the effective channels) from the selected L channels by the tagged SU. Multiplying it by the probability obtained above, we finally get the probability \(G_{L,k}^i(t;j)\) in this case as follows:

$$\begin{aligned} G_{L,k}^i(t;j) = \left( {\begin{array}{c}L\\ j\end{array}}\right) \sum _{u=0}^{L_{k}^- -j} (-1)^u \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \left( \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{ \left( {\begin{array}{c}k\\ L\end{array}}\right) }\right) ^i. \end{aligned}$$

Hence, we prove our lemma. \(\square \)

Lemma 2

When \(N(t) = k\), assume that there are \(i \,(0 \le i \le M-1)\) active untagged SUs and that the tagged SU becomes active and hence transmits its packets at time slot t. Then the conditional throughput \(T_{L,k}^\mathrm{full}\) of the tagged SU, given that \(N(t) = k\), is given by

$$\begin{aligned} T_{L,k}^\mathrm{full}= & {} L_k \,a_k\left( 1-\frac{L_k}{k}\,a_k\right) ^{M-1}. \end{aligned}$$

Proof

At time slot t, let \(A_a(t)\) be the number of active untagged SUs (\(0\le A_a(t)\le M-1\)) and \(A_e(t)\) be the number of effective channels for the tagged SU (\(0\le A_e(t)\le L_k\)). We define D(t) by 1 if the tagged SU is active and by 0 otherwise at time slot t. Then the conditional throughput \(T_{L,k}^\mathrm{full}\) of the tagged SU when \(N(t) = k\), is given by

$$\begin{aligned} T_{L,k}^\mathrm{full}= & {} E[c_L(t)|N(t)=k]\nonumber \\= & {} P\{D(t)=1|N(t)=k\}\cdot E\left[ c_L(t)|N(t)=k, D(t)=1\right] \nonumber \\= & {} a_k \sum _{j=1}^{L_k} j P\{A_e(t)=j|N(t)=k,D(t)=1\}\nonumber \\= & {} a_k\sum _{j=1}^{L_k}j \sum _{i=0}^{M-1}P\{A_a(t)=i|N(t)=k,D(t)=1\}\nonumber \\&\times ~P\{A_e(t)=j|N(t)=k,D(t)=1,A_a(t)=i\} \nonumber \\= & {} a_k \sum _{i=0}^{M-1}\sum _{j=1}^{L_k} j\,\,P^{M-1}_i(a_k) G^i_{L,k}(t;j) \nonumber \\= & {} a_k \sum _{j=1}^{L_k} j\,\,P^{M-1}_i(a_k) G^i_{L,k}(t;j)\Big |_{i=0} +~ a_k \sum _{i=1}^{M-1}\sum _{j=1}^{L_k} j\,\,P^{M-1}_i(a_k) \,\,G^i_{L,k}(t;j) \nonumber \\= & {} a_k\,\, L_k \,\,(1-a_k)^{M-1}+~ a_k \sum _{i=1}^{M-1}\sum _{j=1}^{L_k} j\,\,P^{M-1}_i(a_k) \,\,G^i_{L,k}(t;j) \end{aligned}$$
(11)

where \(P^{M-1}_i\) is given by (3) and \(G^i_{L,k}(t;j)\) is given by Lemma 1.

To further simplify \(T_{L,k}^\mathrm{full}\) in (11) we consider two cases — \(k\le L\) and \(L<k\). First, when \(k\le L\), by Lemma 1, we know the second term in (11) vanishes in this case. So the conditional throughput \(T_{L,k}^\mathrm{full}\) when \(k\le L\), is given by

$$\begin{aligned} T_{L,k}^\mathrm{full}= & {} k \,\,a_k \,\,(1-a_k)^{M-1}. \end{aligned}$$
(12)

Second, when \(L<k\), again by Lemma 1, the second term in (11) is reduced as follow using binomial theorem:

$$\begin{aligned}&a_k \sum _{i=1}^{M-1}\sum _{j=1}^{L_k} j\,\,P^{M-1}_i(a_k) \,\,G^i_{L,k}(t;j) \nonumber \\&\quad = a_k \sum _{i=1}^{M-1}\sum _{j=1}^{L_k} j \left( {\begin{array}{c}M-1\\ i\end{array}}\right) a_k^i (1-a_k)^{M-1-i} \left( {\begin{array}{c}L\\ j\end{array}}\right) \sum _{u=0}^{L_k^- -j} (-1)^u \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) ^i}{\left( {\begin{array}{c}k\\ L\end{array}}\right) ^i} \nonumber \\&\quad = a_k\sum _{j=1}^{L_k} \sum _{u=0}^{L_k^- -j} (-1)^u j \left( {\begin{array}{c}L\\ j\end{array}}\right) \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \sum _{i=1}^{M-1} \left( {\begin{array}{c}M-1\\ i\end{array}}\right) \left( a_k \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{\left( {\begin{array}{c}k\\ L\end{array}}\right) } \right) ^i (1-a_k)^{M-1-i} \nonumber \\&\quad = a_k\sum _{j=1}^{L_k} \sum _{u=0}^{L_k^- -j} (-1)^u j \left( {\begin{array}{c}L\\ j\end{array}}\right) \left( {\begin{array}{c}L-j\\ u\end{array}}\right) \left[ \left( 1-a_k+ a_k \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{\left( {\begin{array}{c}k\\ L\end{array}}\right) } \right) ^{M-1} - (1-a_k)^{M-1} \right] .\nonumber \\ \end{aligned}$$
(13)

Let now F be a function of \(j+u\), defined by

$$\begin{aligned} F(j+u)= \left( 1-a_k+ a_k \frac{\left( {\begin{array}{c}k-j-u\\ L\end{array}}\right) }{\left( {\begin{array}{c}k\\ L\end{array}}\right) } \right) ^{M-1} - (1-a_k)^{M-1}. \end{aligned}$$
(14)

By replacing F in (13) and letting \(p=j+u\), the second term in (11) is given by

$$\begin{aligned}&a_k \sum _{j=1}^{L_k} \sum _{u=0}^{L_k^- -j} (-1)^u j \left( {\begin{array}{c}L\\ j\end{array}}\right) \left( {\begin{array}{c}L-j\\ u\end{array}}\right) F(j+u) \nonumber \\&\quad = a_k \sum _{p=1}^{L_k^-} \sum _{j=1}^{p} \frac{(-1)^{p-j} L!}{ (p-j)! (j-1)! (L-p)! }F(p) \nonumber \\&\quad = a_k \sum _{p=1}^{L_k^-} \frac{F(p) L!}{(L-p)!(p-1)!} \sum _{j=1}^{p} \frac{(-1)^{p-j} (p-1)!}{ (j-1)! (p-j)! } \nonumber \\&\quad = a_k \,L\,F(1) +~ a_k \sum _{p=2}^{L_k^-} \frac{F(p)L!}{(L-p)!(p-1)!} \sum _{j=1}^{p} \frac{(-1)^{p-j} (p-1)!}{ (j-1)! (p-j)! } \nonumber \\&\quad = a_k \,L\,F(1) + a_k \sum _{p=2}^{L_k^-}F(p) \frac{L!}{(L-p)!(p-1)!} \cdot 0 \nonumber \\&\quad = L \,a_k \left[ \left( 1-\frac{L}{k}a_k\right) ^{M-1}- (1-a_k)^{M-1}\right] . \end{aligned}$$
(15)

Hence, from (11) and (15) \(T_{L,k}^\mathrm{full}\) is given by

$$\begin{aligned} T_{L,k}^\mathrm{full}= & {} L \,a_k (1-a_k)^{M-1} + ~ L a_k \left[ \left( 1-\frac{L}{k}a_k\right) ^{M-1}- (1-a_k)^{M-1}\right] \nonumber \\= & {} L\,a_k \left( 1-\frac{L}{k}a_k\right) ^{M-1}, \end{aligned}$$
(16)

which is the conditional throughput for \(L<k\).

Combining the two cases, we finally get the conditional throughput performance, given that \(N(t) = k\), as follows:

$$\begin{aligned} T_{L,k}^\mathrm{full}= & {} L_k a_k(1-\frac{L_k}{k}a_k)^{M-1}. \end{aligned}$$

\(\square \)

Using Lemmas 1, 2, and (4), we obtain the throughput \(T_L^\mathrm{full}\) in the following theorem.

Theorem 1

For the L-interface CR network with full CSI, the throughput \(T_L^\mathrm{full}\) of an arbitrary SU is given by

$$\begin{aligned} T_L^\mathrm{full} = \sum _{k=1}^N P\{N(t)=k\} a_k L_k \left( 1-\frac{L_k}{k}a_k \right) ^{M-1} \end{aligned}$$

where \(L_k =\min (L,k)\).

From Theorem 1, we can obtain the optimal AP values \(\{a_1^*,a_2^*, \ldots ,a_N^* \}\) that maximize the throughput \({T_L^\mathrm{full}}\) in the L-interface CR network with full CSI as follows.

Theorem 2

For the L-interface CR network with full CSI, the optimal AP values \(\{a_1^*,a_2^*, \ldots , a_N^*\}\) that maximize the throughput of an arbitrary SU, are given by

$$\begin{aligned} ~~~~~~~~~~~~~a_k^* = \min \left( \frac{k}{L_k M},1\right) , ~~ 1 \le k \le N \end{aligned}$$

where \(L_k=\min (L,k)\).

Proof

Note that all terms on the right hand side of (4) are nonnegative. So, if we maximize the conditional throughput \(T_{L,k}^\mathrm{full}\) for each k, then the throughput \(T_L^\mathrm{full}\) is maximized. From Lemma 2, the conditional throughput \(T_{L,k}^\mathrm{full}\) is given by

$$\begin{aligned} T_{L,k}^\mathrm{full}=L_k a_k \left( 1-\frac{L_k}{k}a_k \right) ^{M-1}. \end{aligned}$$

To find the optimal AP value \(a_k\), we differentiate the above equation and solve the following equation

$$\begin{aligned} \frac{dT_{L,k}^\mathrm{full}}{da_k}=L_k \left( 1-\frac{L_k}{k} a_k \right) ^{M-2} \left( 1-\frac{L_k M}{k}a_k \right) =0. \end{aligned}$$

Since \(L_k=\min (L,k)\le k\) and \(0\le a_k \le 1\), it is easy to show that \(T_{L,k}^\mathrm{full}\) is maximized when,

$$\begin{aligned} a_k^*=\min ( \frac{k}{L_k M} ,1). \end{aligned}$$

\(\square \)

An interesting fact that we find from Theorem 2 is that the optimal AP value \(a_k^*\) is a function of the total number of idle channels counting multiplicity that all SUs can access simultaneously in the L-interface CR network with full CSI. When \(L=1\), we see from Theorem 2 that the optimal AP value is a function of M, the number of SUs. This implies that, if we allow SUs to access \(L_k\) channels simultaneously, the L-interface CR network in the optimal case can be considered as a CR network where there are \(L_k M\)virtual SUs and virtual SUs independently access one channel.

We are now ready to compute the optimal throughput, denoted by \((T_L^\mathrm{full})^*\), of an arbitrary SU when the optimal APs \(\{a_1^*,a_2^*,\ldots ,a_N^*\}\) given in Theorem 2 are used.

Theorem 3

The optimal throughput \((T_L^\mathrm{full})^*\) of an arbitrary SU in the L-interface CR network with full CSI satisfies

$$\begin{aligned} (T_L^\mathrm{full})^*= & {} \sum _{1\le k \le L M} P\{N(t)=k\} \frac{k}{M}\left( 1-\frac{1}{M}\right) ^{M-1} + \sum _{L M < k \le N} P\{N(t)=k\} L \left( 1-\frac{L}{k}\right) ^{M-1}. \end{aligned}$$

Moreover, \((T_L^\mathrm{full})^*\) is an increasing function in L.

Proof

We first need to compute the maximum conditional throughput performance \((T_{L,k}^\mathrm{full})^*\). Bearing in mind that \(a_k^* = \min (\frac{k}{L_k M},1)\), we consider two cases: \(k> L M\) and \(0\le k\le L M\).

When \(k> LM\), we see that \(k > L\). Consequently, \(L_k = \min (L,k) = L\) and \(k> LM = L_k M\). Since \(\frac{k}{L_k M} > 1\) in this case, the optimal AP for \((T_{L,k}^\mathrm{full})^*\) is given by \(a_k^*=1\). Hence, \((T_{L,k}^\mathrm{full})^*\) is given by

$$\begin{aligned} (T_{L,k}^\mathrm{full})^* = L \left( 1-\frac{L}{k}\right) ^{M-1}. \end{aligned}$$
(17)

When \(0\le k\le L M\), we further have two subcases. If \(k>L\), then \(L_k = \min (L,k) = L\) and \(k \le L M = L_k M\). If \(0\le k \le L\), then \(L_k = \min (L,k) = k\) and \(k \le k M = L_k M\). So we always have that \(0\le k\le L_k M\) in this case and \(a_k^* = \frac{k}{L_k M}\). Hence, \((T_{L,k}^\mathrm{full})^*\) is given by

$$\begin{aligned} (T_{L,k}^\mathrm{full})^* = \frac{k}{M}\left( 1-\frac{1}{M}\right) ^{M-1}. \end{aligned}$$
(18)

Combining two Eqs. (17) and (18), we finally obtain the optimal throughput \((T_L^\mathrm{full})^*\), given by

$$\begin{aligned} (T_L^\mathrm{full})^*= & {} \sum _{1\le k \le L M} P\{N(t)=k\} \frac{k}{M}\left( 1-\frac{1}{M}\right) ^{M-1} + \sum _{L M < k \le N} P\{N(t)=k\} L \left( 1-\frac{L}{k}\right) ^{M-1}. \end{aligned}$$

Now, to prove that \((T_L^\mathrm{full})^*\) is an increasing function in L, we prove that

$$\begin{aligned} (T_{L+1}^\mathrm{full})^*-(T_L^\mathrm{full})^*>0. \end{aligned}$$

Observe that

$$\begin{aligned}&(T_{L+1}^\mathrm{full})^*-(T_L^\mathrm{full})^* \\&\quad = \sum _{0\le k\le (L+1)M} P\{N(t)=k\} \frac{k}{M}\left( 1-\frac{1}{M}\right) ^{M-1} \\&\qquad + \sum _{(L+1)M< k \le N} P\{N(t)=k\} (L+1)\left( 1-\frac{L+1}{k}\right) ^{M-1} \\&\qquad - \sum _{0\le k\le LM} P\{N(t)=k\} \frac{k}{M} \left( 1-\frac{1}{M} \right) ^{M-1} - \sum _{LM< k \le N} P\{N(t)=k\} L\left( 1-\frac{L}{k}\right) ^{M-1} \\&\quad = \sum _{LM<k\le (L+1)M} P\{N(t)=k\}\times \left[ \frac{k}{M} \left( 1-\frac{1}{M}\right) ^{M-1} -L \left( 1-\frac{L}{k}\right) ^{M-1} \right] \\&\qquad + \sum _{(L+1)M<k\le N} P\{N(t)=k\} \times \left[ (L+1)\left( 1-\frac{L+1}{k} \right) ^{M-1} -L \left( 1-\frac{L}{k} \right) ^{M-1} \right] . \end{aligned}$$

Thus, it suffices to show the following two claims.

Claim 1 When \(LM<k\le (L+1)M\),

$$\begin{aligned} \frac{k}{M} \left( 1-\frac{1}{M}\right) ^{M-1} > L \left( 1-\frac{L}{k}\right) ^{M-1}, \end{aligned}$$

that is,

$$\begin{aligned} \frac{k}{LM} \left[ \frac{k(M-1)}{M(k-L)} \right] ^{M-1}>1. \end{aligned}$$

Claim 2 When \((L+1)M<k\le N\),

$$\begin{aligned} (L+1)\left( 1-\frac{L+1}{k} \right) ^{M-1} > L \left( 1-\frac{L}{k} \right) ^{M-1}, \end{aligned}$$

that is,

$$\begin{aligned} \frac{L+1}{L} \left( \frac{k-L-1}{k-L} \right) ^{M-1} = \frac{L+1}{L} \left( 1-\frac{1}{k-L} \right) ^{M-1}>1. \end{aligned}$$

For the proof of Claim 1, let f(k) be defined by

$$\begin{aligned} f(k)=\frac{k}{LM} \left[ \frac{k(M-1)}{M(k-L)} \right] ^{M-1} \end{aligned}$$

for \(k\ge LM\). We can easily show that \(f(LM)=1\). The derivative of f is given by

$$\begin{aligned} f'(k)= \frac{(k-LM) }{Lk(M-1)}\left[ \frac{k(M-1)}{M(k-L)} \right] ^M. \end{aligned}$$

It is clear that \(f'(k)>0\) for \(k>LM\), that is, f is strictly increasing for \(k>LM\). Thus, we conclude that \(f(k)>1\) for \(k>LM\), as desired.

For the proof of Claim 2, let g(k) be defined by

$$\begin{aligned} g(k)=\frac{L+1}{L} \left( 1-\frac{1}{k-L}\right) ^{M-1} \end{aligned}$$

for \(k\ge (L+1)M\). Obviously, g is strictly increasing for \(k\ge (L+1)M\). It remains to show \(g\left( (L+1)M\right) >1\) to complete the proof.

$$\begin{aligned} g\left( \left( L+1\right) M\right)= & {} \frac{L+1}{L} \left( 1-\frac{1}{LM+M-L} \right) ^{M-1} \\\ge & {} \frac{L+1}{L} \left( 1-\frac{M-1}{LM+M-L}\right) \\= & {} \frac{L+1}{L} \left( \frac{LM-L+1}{LM+M-L}\right) \\> & {} 1. \end{aligned}$$

\(\square \)

From Theorem 3, when \(LM\ge N\), the optimal throughput \((T_L^\mathrm{full})^*\) is invariant in L because the second term in the right hand side of the equation in the theorem disappears. This implies that the optimal throughput \((T_L^\mathrm{full})^*\) can be improved only when \(LM < N\). Moreover, when \(LM\ge N\), the optimal throughput \((T_L^\mathrm{full})^*\) in the theorem becomes

$$\begin{aligned} (T_L^\mathrm{full})^*= & {} \sum _{1\le k \le N} P\{N(t)=k\} \frac{k}{M}\left( 1-\frac{1}{M}\right) ^{M-1}\nonumber \\= & {} \sum _{1\le k \le N} \left( {\begin{array}{c}N\\ k\end{array}}\right) \pi _1^k \pi _0^{N-k} \frac{k}{M}\left( 1-\frac{1}{M}\right) ^{M-1}\nonumber \\= & {} \pi _1 \frac{N}{M} \left( 1-\frac{1}{M}\right) ^{M-1}. \end{aligned}$$
(19)

We will use (19) later for comparison between the optimal throughputs of the three cases.

3.2 The no CSI case

In this subsection we consider the L-interface CR network with no CSI. We first define the throughput of the tagged SU, denoted by \(T_L^\mathrm{no}\), in this case. Assuming that the network is in steady state, \(T_L^\mathrm{no}\) is defined by

$$\begin{aligned} T_L^\mathrm{no}:= & {} E[c_L(t)]\nonumber \\= & {} \sum _{k=1}^N P\{N(t)=k\} E[c_L(t)|N(t)=k] \end{aligned}$$

where \(P\{N(t)=k\}\) is given by (2). We also define the conditional throughput of the tagged SU in the L-interface CR network with no CSI, given that there are k idle channels, by

$$\begin{aligned} T_{L,k}^\mathrm{no} = E[c_L(t) | N(t)=k], \end{aligned}$$

so that

$$\begin{aligned} T_L^\mathrm{no} = \sum _{k=1}^N P\{N(t)=k\}T_{L,k}^\mathrm{no}. \end{aligned}$$
(20)

We then obtain the throughput \(T_L^\mathrm{no}\) in the following theorem.

Theorem 4

For the L-interface CR network with no CSI, the throughput \(T_L^\mathrm{no}\) of an arbitrary tagged SU is given by

$$\begin{aligned} T_L^\mathrm{no} = \pi _1 L a \left( 1-\frac{L}{N}a \right) ^{M-1}. \end{aligned}$$

Proof

For the L-interface CR network with no CSI, first observe that each active SU always randomly selects L channels and transmits packets through the idle channels among the selected L channels. This implies that, regardless of the number of idle channels (N(t)), each active SU acts almost the same as in the L-interface CR network with full CSI as if all channels were idle.

Let \(A_e^{N}(t)\) be the number of effective channels in the L-interface CR network with full CSI when all channels are idle. For each effective channel, the tagged SU transmits one packet successfully through the effective channel if it is actually idle. Hence, the throughput \(T_{L,k}^\mathrm{no}\) is computed as follows.

$$\begin{aligned} T_{L,k}^\mathrm{no}= & {} E[c_L(t) | N(t)=k] \\= & {} \sum _{l=1}^{L_N^-} E[c_L(t) | N(t)=k, A_e^{N}(t) = l]P\{A_e^{N}(t) = l| N(t)=k\} \\= & {} \sum _{l=1}^{L_N^-} E[c_L(t) | N(t)=k, A_e^{N}(t) = l] P\{A_e^{N}(t) = l\}. \end{aligned}$$

where \(L_N^- = \min (L,N-L)\). For each effective channel considered above, the probability that it is actually idle is \(\frac{k}{N}\). This implies that

$$\begin{aligned} E[c_L(t) | N(t)=k, A_e^{N}(t) = l] = \frac{l k}{N}, \end{aligned}$$

from which we get

$$\begin{aligned} T_{L,k}^\mathrm{no}= & {} \sum _{l=1}^{L_N^-} \frac{l k}{N} P\{A_e^{N}(t) = l\} \nonumber \\= & {} \frac{k}{N} \sum _{l=1}^{L_N^-} l P\{A_e^{N}(t) = l\} \nonumber \\= & {} \frac{k}{N} L a \left( 1-\frac{L}{N} a \right) ^{M-1}. \end{aligned}$$
(21)

From (20) and (21), we finally derive the throughput of the tagged SU in the L-interface CR network with no CSI as follows.

$$\begin{aligned} T_L^\mathrm{no}= & {} a \sum _{k=1}^N P\{N(t)=k\} \frac{kL}{N} \left( 1-\frac{L}{N}a \right) ^{M-1}\\= & {} \left[ \sum _{k=1}^N k P\{N(t)=k\}\right] \frac{L}{N} a \left( 1-\frac{L}{N}a \right) ^{M-1}\\= & {} N \pi _1 \frac{L}{N} a \left( 1-\frac{L}{N}a \right) ^{M-1}\\= & {} \pi _1 L a \left( 1-\frac{L}{N}a \right) ^{M-1}. \end{aligned}$$

\(\square \)

From Theorem 4, by differentiating \(T_L^\mathrm{no}\) with respect to a and solving \(\frac{d}{da} T_L^\mathrm{no} = 0\), we obtain the optimal AP \(a^*\) in the L-interface CR network with no CSI as follows.

Theorem 5

For the L-interface CR network with no CSI, the optimal AP value \(a^*\) that maximizes the throughput of an arbitrary SU, is given by

$$\begin{aligned} a^* = \min \left( \frac{N}{L M} ,1\right) . \end{aligned}$$
(22)

From Theorem 5 we finally obtain the optimal throughput \((T_L^\mathrm{no})^*\) of an arbitrary SU in the no CSI case as follows.

Theorem 6

The optimal throughput \((T_L^\mathrm{no})^*\) of an arbitrary SU in the L-interface CR network with no CSI satisfies that

$$\begin{aligned} (T_L^\mathrm{no})^* = \left\{ \begin{array}{ll} \displaystyle {\pi _1 \frac{N}{M}\left( 1-\frac{1}{M}\right) ^{M-1}} , \text {if }~ L \ge \frac{N}{M}; \\ \displaystyle { \pi _1 L \left( 1-\frac{L}{N}\right) ^{M-1}} , \text {if } L < \frac{N}{M} . \end{array} \right. \end{aligned}$$

Moreover, \((T_L^\mathrm{no})^*\) is an increasing function in L.

Proof

Using the optimal AP \(a^*\) in (22), we can easily obtain the expressions for \((T_L^\mathrm{no})^*\) in the theorem. The increasing property of \((T_L^\mathrm{no})^*\) follows from the fact that \(h(x)=x\left( 1-x/N\right) ^{M-1}\) is an increasing function in x for \(0\le x\le N/M.\)\(\square \)

From Theorem 6 we see that, when \(LM < N\), the optimal throughput \((T_L^\mathrm{no})^*\) is a function of L and proportional to L. On the other hand, when \(LM\ge N\), the optimal throughput \((T_L^\mathrm{no})^*\) is not a function of L and invariant in L. This implies that the optimal throughput \((T_L^\mathrm{no})^*\) can be improved by the increase in L only when \(LM\le N\), which is the same as in the full CSI case. Moreover, by comparing the optimal throughputs \((T_L^\mathrm{full})^*\) and \((T_L^\mathrm{no})^*\) in the two extreme cases, we find an interesting observation that, when \(LM\ge N\), the optimal throughputs of an arbitrary SU in the two extreme cases are the same. On the other hand, when \(LM<N\), we show that \((T_L^\mathrm{no})^*\) is always less than or equal to \((T_L^\mathrm{full})^*\). This implies that the acquisition of CSI is useful only when \(LM\le N\), i.e., the network is less crowded.

3.3 The partial CSI case

In this subsection, we consider the L-interface CR network with partial CSI. The throughput of the tagged SU in the partial CSI case is denoted by \(T_L^\mathrm{part}\).

Theorem 7

For the L-interface CR network with partial CSI, the throughput \(T_L^\mathrm{part}\) of an arbitrary SU is given by

$$\begin{aligned} T_L^\mathrm{part} = \sum _{k=0}^{N_1} \left[ P\{N_1(t)=k\} \alpha _k L_{N_2+k} \left( 1-\frac{L_{N_2+k}}{N_2+k}\alpha _k \right) ^{M-1} \left( \frac{\pi _1 N_2+k}{N_2+k}\right) \right] \end{aligned}$$
(23)

where \(L_{N_2+k} =\min (L,{N_2+k})\).

Proof

First recall that \(\mathcal {N}_1^\mathrm{idle}(t)=\{\omega \in \mathcal {N}_1\,|\,\omega \text { is idle at time slot }t\}\) with \(N_1(t)=|\mathcal {N}_1^\mathrm{idle}(t)|\) and \(\mathcal {N}_2^\mathrm{idle}(t)=\{\omega \in \mathcal {N}_2\,|\,\omega \text { is idle at time slot }t\}\) with \(N_2(t)=|\mathcal {N}_2^\mathrm{idle}(t)|\). For convenience, we denote \((N_1(t),N_2(t))\) by \(\varvec{N}(t)\). For the L-interface CR network with partial CSI, each active SU selects up to L channels among \(\mathcal {N}^\mathrm{idle}_1(t)\cup \mathcal {N}_2\) and transmits packets through the actually idle channels among the selected L channels. To this end, we define two conditional throughputs of the tagged SU as follows:

$$\begin{aligned} T_{L,k}^\mathrm{part}= & {} E\left[ c_L(t) | N_1(t)=k\right] ,\\ T_{L,k,k_2}^\mathrm{part}= & {} E\left[ c_L(t) | \varvec{N}(t)=(k,k_2)\right] . \end{aligned}$$

Then the throughput performance of the tagged SU is given by

$$\begin{aligned} T_L^\mathrm{part}= & {} \sum _{k=0}^{N_1} P\{N_1(t)=k\} T_{L,k}^\mathrm{part} \nonumber \\= & {} \sum _{k=0}^{N_1} P\{N_1(t)=k\} \sum _{k_2=0}^{N_2} P\{N_2(t)=k_2\} {T_{L,k,k_2}^\mathrm{part}}. \end{aligned}$$
(24)

Now suppose that \(N_1(t)=k\). In this case, we only focus on all channels in \(\mathcal {N}_2\) and k idle channels in \(\mathcal {N}_1\). So, from now on in the analysis, we assume that there are only \(N_2+k\) channels in the network. Similar to the analysis of the no CSI case, let \(A_e^{N_2+k}(t)\) be the number of effective channels in the L-interface CR network with full CSI when all channels (\(N_2+k\) channels) are idle. Note that the tagged SU transmits one packet successfully through each effective channel if it is actually idle; if the selected channel is in \(\mathcal {N}^\mathrm{idle}_1(t)\), then it is obviously idle, however, if the selected channel is in \(\mathcal {N}_2\), then it can be busy. So, the conditional throughput of the tagged SU \(T_{L,k,k_2}^\mathrm{part}\) is computed as follows:

$$\begin{aligned} T_{L,k,k_2}^\mathrm{part}= & {} E\left[ c_L(t) | \varvec{N}(t)=(k,k_2)\right] \\= & {} \sum _{l=1}^{L_{N_2+k}^-} E\left[ c_L(t) |\varvec{N}(t)=(k,k_2), A_e^{N_2+k}(t) = l\right] \\&\times P\{A_e^{N_2+k}(t) = l| \varvec{N}(t)=(k,k_2)\} \\= & {} \sum _{l=1}^{L_{N_2+k}^-} E\left[ c_L(t) | \varvec{N}(t)=(k,k_2), A_e^{N_2+k}(t) = l\right] \\&\times P\{A_e^{N_2+k}(t) = l|N_1(t)=k\}. \end{aligned}$$

where \(L_{N_2+k}^- = \min (L,N_2+k-L)\). In order to get \( T_{L,k,k_2}^\mathrm{part}\), we need to compute the probability that a selected effective channel is actually idle. For an arbitrary effective channel selected by the tagged SU, denoted by \(\check{\omega }\), we obtain

$$\begin{aligned}&P\{\check{\omega } \text { is idle}|\varvec{N}(t)=(k,k_2)\} \\&\quad = P\{\check{\omega } \text { is idle}\,|\,\check{\omega } \in \mathcal {N}^\mathrm{idle}_1(t),\varvec{N}(t)=(k,k_2)\} P\{\check{\omega } \in \mathcal {N}^\mathrm{idle}_1(t)|\varvec{N}(t)=(k,k_2)\}\\&\qquad +P\{\check{\omega } \text { is idle}\,|\,\check{\omega } \in \mathcal {N}_2,\varvec{N}(t)=(k,k_2)\} P\{\check{\omega } \in \mathcal {N}_2|\varvec{N}(t)=(k,k_2)\}\\&\quad =1\cdot \frac{k}{N_2+k} +\frac{k_2}{N_2}\cdot \frac{ N_2}{N_2+k} =\frac{k}{N_2+k} + \frac{k_2}{N_2+k} \end{aligned}$$

This implies that

$$\begin{aligned} E\left[ c_L(t) | \varvec{N}(t)=(k,k_2), A_e^{N}(t) = l\right] = l\left( \frac{k}{N_2+k} + \frac{k_2}{N_2+k}\right) , \end{aligned}$$

from which we obtain

$$\begin{aligned} T_{L,k,k_2}^\mathrm{part}= & {} \sum _{l=1}^{L_{N_2+k}^-} l \left( \frac{k}{N_2+k} + \frac{k_2}{N_2+k}\right) P\{A_e^{N_2+k}(t)=l|N_1(t)=k\} \nonumber \\= & {} \left( \frac{k}{N_2+k} + \frac{k_2}{N_2+k}\right) \sum _{l=1}^{L_{N_2+k}^-} l P\{A_e^{N_2+k}(t)=l|N_1(t)=k\} \nonumber \\= & {} \left( \frac{k}{N_2+k} + \frac{k_2}{N_2+k}\right) L_{N_2+k} \alpha _k \left( 1-\frac{L_{N_2+k}}{N_2+k} \alpha _k \right) ^{M-1}. \end{aligned}$$

Then, the conditional throughput \(T_{L,k}^\mathrm{part}\) is given by

$$\begin{aligned} T_{L,k}^\mathrm{part}= & {} \sum _{k_2=0}^{N_2} P\{N_2(t)=k_2\} \left( \frac{k}{N_2+k} + \frac{k_2}{N_2+k}\right) L_{N_2+k} \alpha _k \left( 1-\frac{L_{N_2+k}}{N_2+k} \alpha _k \right) ^{M-1}\nonumber \\= & {} L_{N_2+k} \alpha _k \left( 1-\frac{L_{N_2+k}}{N_2+k} \alpha _k \right) ^{M-1} \left( \frac{k}{N_2+k} + \frac{\sum _{k_2=0}^{N_2} P\{N_2(t)=k_2\}k_2}{N_2+k}\right) \nonumber \\= & {} \alpha _k L_{N_2+k} \left( 1-\frac{L_{N_2+k}}{N_2+k}\alpha _k \right) ^{M-1} \left( \frac{\pi _1 N_2+k}{N_2+k}\right) . \end{aligned}$$
(25)

From (24) and (25), we finally obtain the throughput of the tagged SU in the L-interface CR network with partial CSI as follows.

$$\begin{aligned}&T_L^\mathrm{part}=\sum _{k=0}^{N_1} \left[ P\{N_1(t)=k\} \alpha _k L_{N_2+k} \left( 1-\frac{L_{N_2+k}}{N_2+k}\alpha _k \right) ^{M-1} \left( \frac{\pi _1 N_2+k}{N_2+k}\right) \right] . \end{aligned}$$

\(\square \)

Theorem 8

For the L-interface CR network with partial CSI, the optimal AP values \(\alpha _k^*, 1\le k\le N_1,\) that maximize the throughput of an arbitrary SU, are given by

$$\begin{aligned} \alpha _k^* = \min \left( \frac{N_2+k}{L_{N_2+k} M} ,1\right) . \end{aligned}$$
(26)

Proof

To find the optimal AP value \(\alpha _k\), we solve the equation \(dT_{L,k}^\mathrm{part}/d\alpha _k=0\). By differentiating \(T_{L,k}^\mathrm{part}\) in (25), we get

$$\begin{aligned} \left( 1-\frac{L_{N_2+k}}{N_2+k} \alpha _k \right) ^{M-2} \left( 1-\frac{L_{N_2+k} M}{N_2+k}\alpha _k \right) =0. \end{aligned}$$

Since \(L_{N_2+k}=\min ({L,N_2-k})\le N_2-k\) and \(0\le \alpha _k \le 1\), it is clear that \(T_{L,k}^\mathrm{part}\) is maximized when

$$\begin{aligned} \alpha _k^* = \min \left( \frac{N_2+k}{L_{N_2+k} M} ,1\right) . \end{aligned}$$

\(\square \)

Theorem 9

The optimal throughput \((T_L^\mathrm{part})^*\) of an arbitrary SU in the L-interface CR network with partial CSI satisfies

$$\begin{aligned} (T_L^\mathrm{part})^*= & {} \sum _{0\le k \le L M - N_2 } \left[ P\{N_1(t)=k\} \frac{1}{M}\left( 1-\frac{1}{M}\right) ^{M-1} (\pi _1N_2+k)\right] \\&+ \sum _{L M -N_2 < k \le N_1} \left[ P\{N_1(t)=k\} L \left( 1-\frac{L}{{N_2+k}}\right) ^{M-1} \left( \frac{\pi _1 N_2+k}{N_2+k}\right) \right] . \end{aligned}$$

Moreover, \((T_L^\mathrm{part})^*\) is an increasing function in L.

Proof

It is easy to show that \(\alpha _k^*=1\) when \(k>LM-N_2\) and \(\alpha _k^*=\frac{N_2+k}{L_{N_2+k} M} \) when \(k\le LM-N_2\). Substituting it into (23), we obtain the expressions for \((T_L^\mathrm{part})^*\) in the theorem. The increasing property is shown by a similar way as given in the proof of the full CSI case. \(\square \)

From Theorem 9, similar to the full CSI case, we see that the optimal throughput \((T_L^\mathrm{part})^*\) is improved only when \(LM<N(=N_1+N_2)\). Moreover, when \(LM\ge N\), it is clear that the optimal throughput in the partial CSI case becomes

$$\begin{aligned} (T_L^\mathrm{part})^*= & {} \sum _{0\le k \le N_1 } \left[ P\{N_1(t)=k\} \frac{1}{M}\left( 1-\frac{1}{M}\right) ^{M-1} (\pi _1N_2+k)\right] \\= & {} \frac{1}{M}\left( 1-\frac{1}{M}\right) ^{M-1} \left[ \pi _1N_2\sum _{0\le k \le N_1 }P\{N_1(t)=k\}+ \sum _{0\le k \le N_1 }kP\{N_1(t)=k\} \right] \\= & {} \frac{1}{M}\left( 1-\frac{1}{M}\right) ^{M-1} (\pi _1N_2+\pi _1N_1)\\= & {} \pi _1\frac{N}{M}\left( 1-\frac{1}{M}\right) ^{M-1} \end{aligned}$$

which coincides with the optimal throughput for both full CSI case and no CSI case.

4 Numerical results

In this section, we provide numerical results to validate our analysis and investigate throughput performance behaviors in the three cases. We consider a CR network with N wireless channels and M SUs. The state transition probabilities of each wireless channel are given by \(p=0.9\) and \(q=0.1\). In this case the probability \(\pi _1\) of being an idle channel is 0.9, which is a reasonable case in CR networks where the spectrum usage is very low. To validate our analysis, we use MATLAB to simulate the random behaviors of all users in the L-interface CR network. We perform \(T_{max}=10^7\) slot times in each simulation run to obtain the simulation results. We then compare our analytical results with simulation results.

4.1 Throughput performance when \(LM \ge N\)

In this subsection, we validate and investigate that (1) the optimal AP values \(\{a_i^*\}_{1\le k\le N}\) achieve the optimal throughput in the full CSI case, (2) the optimal AP value \(a^*\) achieves the optimal throughput in the no CSI case and (3) the optimal AP value \(\{\alpha _k^*\}_{1\le k\le N}\) achieve the optimal throughput in the partial CSI case when \(LM\ge N\). In the numerical examples, we use \(M = 6, N = 24, N_1=12\) and \(L=5\) so that \(LM(=30)\ge N(=24)\).

Fig. 4
figure 4

Throughput of an arbitrary SU in the three cases versus AP values when \(LM\ge N\)

4.1.1 The full CSI case

In this case, the optimal AP values in Theorem 2 are given by

$$\begin{aligned} \quad a^*_k= \left\{ \begin{array}{ll} ~1/6, &{} {k\le 5}; \\ k/30, &{} \hbox {otherwise}. \end{array} \right. \end{aligned}$$

To validate whether our optimal AP values achieve the optimal throughput in this case, we select one AP \(a_k\) and change its value from 0 to 1 while all the other APs are set to their optimal values. Based on our observation that the AP values \(a_k\) for \(k\le 16\) do not affect the throughput significantly, we select the following APs \(\{a_8, a_{20}, a_{24}\}\) and plot the results in Fig. 4. The index k and the optimal AP values \(\{a_8^*, a_{20}^*, a_{24}^*\}\) are also given in Fig. 4. The x-axis is the value of \(a_k\) in the figure. As seen in the figure the optimal AP values achieve the optimal throughput. In addition, our analytic results are well matched with the simulation results in this case, which verifies the validity of our analysis.

4.1.2 The no CSI case

In this case, the optimal AP value in Theorem 5 is given by \(a^*=4/5\). To validate that our optimal AP value achieves the optimal throughput in this case, we change the value of AP from 0 to 1. The resulting throughput is also plotted in Fig. 4. The x-axis is the value of a in this case. From the figure we see that the optimal AP value achieves the optimal throughput. In addition, our analytic results are well matched with the simulation results in this case, which also verifies the validity of our analysis.

4.1.3 The partial CSI case

In this case, the optimal AP value in Theorem 8 is given by \(\alpha ^*_k=(12+k)/30\). To validate our analysis, we select one AP \(\alpha _k\) and change its value from 0 to 1 while the other APs are fixed to \(\{\alpha ^*_i\}_{1\le i\le 12}\). The results are plotted in 7 and it shows that the optimal AP values in Theorem 8 achieve the optimal throughput. Moreover, we see that our analytic results are well matched with the simulation results, which verifies the validity of our analysis.

Furthermore, by comparing the optimal throughput for the three cases when \(LM\ge N\), we see that the optimal throughputs in the three cases are the same, as we mentioned in our analysis. The optimal throughput is 1.45 in this example.

Fig. 5
figure 5

Throughput of an arbitrary SU in the three cases versus AP values for \(LM< N\)

4.2 Throughput performance when \(LM < N\)

In this subsection, we validate our analytic results as in Sect. 4.1 when \(LM<N\). That is, we use \(M=5\), \(N=24\) and \(L=3\) in this example, so that \(LM(=15)< N(=24)\).

4.2.1 The full CSI case

In this case, the optimal AP values in Theorem 2 are given by

$$\begin{aligned} \quad a^*_k= \left\{ \begin{array}{ll} 1/5, &{} {k\le 3}; \\ k/15, &{} {3<k \le 15};\\ ~~1, &{} \hbox {otherwise}. \end{array} \right. \end{aligned}$$

We select \(\{a_8, a_{20}, a_{24}\}\) as in Sect. 4.1, and change each AP value from 0 to 1. The throughput results are plotted in Fig. 5. We see that the optimal AP values achieve the optimal throughput.

4.2.2 The no CSI case

In this case, the optimal AP value in Theorem 5 is given by \(a^*=1.\) We change the AP value a from 0 to 1 and the resulting throughput is also plotted in Fig. 5. As we can see in the figure, the optimal AP \(a^*\) achieves the optimal throughput.

Fig. 6
figure 6

The optimal throughput of an arbitrary SU in the three cases versus L

4.2.3 The partial CSI case

In this case, the optimal AP values in Theorem 8 are given by

$$\begin{aligned} \quad \alpha ^*_k= \left\{ \begin{array}{ll} (12+k)/15, &{} {k\le 3}; \\ 1, &{} \hbox {otherwise}. \end{array} \right. \end{aligned}$$

For numerical analysis, we select \(\{\alpha _8, \alpha _{20}, \alpha _{24}\}\) and change each AP value from 0 to 1. The throughput results are plotted in Fig. 5. The figure shows that the optimal AP values achieve the optimal throughput. It also shows that the analytic and simulation results are well matched

A comparison among the throughputs in the three cases when \(LM<N\) shows that the optimal throughput for the no CSI case is less than that for the partial CSI case, and both of them are less than that for the full CSI case.

Fig. 7
figure 7

The optimal throughput of an arbitrary SU for the partial CSI case versus \(N_1\)

4.3 The optimal throughput performance

In this subsection, we investigate the optimal throughput performance behavior when \(N=30\) and \(N_1=15\). So we assume that all SUs use the optimal AP values.

4.3.1 The impact of the maximum number of idle channels for SUs

First, we investigate the optimal throughput behavior of an arbitrary SU for the three cases by changing the maximum number of idle channels for SUs when \(M=4\) and \(M=5\). The results are plotted in Fig. 6. As seen in the figure, the optimal throughputs for the three cases increase as L increases when \(L<N/M\). When \(L\ge N/M\), it is observed that the optimal throughput becomes constant, as we showed in Theorems 36 and 9. We can also observe that, only when \(LM<N\), the optimal throughput for the full CSI case is bigger than that for the partial CSI case, and that for the partial CSI case is bigger than that for the no CSI case.

4.3.2 The impact of the number in the full CSI group

The optimal throughput of an arbitrary SU for the partial CSI case is plotted in Fig. 7 when we change the number \(N_1\) in the full CSI group. Note that if \(N_1=0\), the L-interface CR network with partial CSI becomes the L-interface CR network with no CSI; if \(N_1=30\), the L-interface CR network with partial CSI becomes the L-interface CR network with full CSI. In the figure, we see that the optimal throughput linearly increases as \(N_1\) increases when \(L=4,5,6\), and 7. However, when \(L=8\), the optimal throughput does not increase as \(N_1\) increases; the reason is that \(LM>N\) in this case, as we mentioned before.

5 Conclusions

In this paper, we considered a cognitive radio network where multiple SUs contend to access wireless channels. We analyzed the L-interface cognitive radio network with a random access policy where each secondary user stochastically decides whether to access L channels simultaneously based on a given access probability.

We considered three cases in the analysis - the case of full channel state information, the case of no channel state information, and the case of partial channel state information. For each case, to obtain the optimal access probabilities we analyzed the throughput of an arbitrary SU, defined by the average number of packets transmitted successfully per time slot. We then derived the optimal APs that achieve the optimal throughput of an arbitrary SU. We also investigated the impact of the number L on the optimal throughput for the three cases. Our analytic results were verified through numerical and simulation results.