<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analytical review of schemes models for wireless multiservice networks under shared access frameworks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ekaterina V. Markova</string-name>
          <email>markova_ev@rudn.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anastasia A. Golskaia</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Faina A. Moskaleva</string-name>
          <email>moskaleva_fa@rudn.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeny V. Mokrov</string-name>
          <email>mokrov_ev@rudn.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladimir S. Melezhik</string-name>
          <email>melezhik@theor.jinr.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bogoliubov Laboratory of Theoretical Physics Joint Institute for Nuclear Research Joliot-Curie 6</institution>
          ,
          <addr-line>Dubna, Moscow region, 141980</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Applied Probability and Informatics Peoples' Friendship University of Russia (RUDN University) Miklukho-Maklaya str.</institution>
          <addr-line>6, Moscow, 117198</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>In: K. E. Samouylov, L. A. Sevastianov, D. S. Kulyabov (eds.): Selected Papers of the 12</institution>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Institute of Applied Mathematics and Communications Technology Peoples' Friendship University of Russia (RUDN University) Miklukho-Maklaya str.</institution>
          <addr-line>6, Moscow, 117198</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>51</fpage>
      <lpage>59</lpage>
      <abstract>
        <p>The modern development of infocommunication technologies is closely connected with the problem of rapid growth of the transmitted data volume in the conditions of limited radio frequency range of mobile networks. The shortage of radio resources leads to a decrease in the bit rate in mobile communication networks, and, consequently, degrades the level of quality of user service, the requirements for which are defined in the telecommunication standards. One possible solution of this problem is the use of the licensed frequency sharing system (Licensed Shared Access, LSA) proposed by the European Telecommunication Standardization Institute (ETSI). This system is an example of efective use of the frequency spectrum, taken by the mobile operator for rent from the owner, who uses this spectrum periodically. The owner has absolute priority in using this spectrum of frequencies. Setting priority is possible with the help of various scenarios, diferently influencing to the level of quality of user service. In these conditions fundamental researches in the field of development of the most efective scenarios of realization of a priority of the owner - mathematical modelling for shared use schemes of radio frequencies are actual. The second technology that solves the problem of radio resources lack is LAA - Licensed Assisted Access. LAA is a technology that allows to increase the connection bit rate and the bandwidth of the communication channel. LAA uses small cells for its work. By installing small base stations with an integrated LAA system, operators can increase the transmission rate in congested areas, for example, indoors. Researching of such systems is aimed at the development and analysis performance measures of Markov models describing wireless multiservice networks. Researches of such models and current technologies used in wireless multiservice networks are carried out by the using mathematical apparatus of the queueing theory, the teletrafic theory, and also the methods of stochastic geometry. This will make it possible to calculate and evaluate the quality of service (QoS) for users in wireless networks of future generations, as well as to plan various options for the development of networks to keep previous users and attract new ones. The paper presents an analytical review of the existing models using the considered systems and the conducted research.</p>
      </abstract>
      <kwd-group>
        <kwd>and phrases</kwd>
        <kwd>LSA</kwd>
        <kwd>LAA</kwd>
        <kwd>multiservice network</kwd>
        <kwd>radio resource management</kwd>
        <kwd>shared frequency</kwd>
        <kwd>frequency sharing technologies</kwd>
        <kwd>streaming trafic</kwd>
        <kwd>queuing system</kwd>
        <kwd>performance measures</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the modern world, portable mobile devices have become an integral part of almost
every person. Most everyone has a smartphone, tablet, laptop or other device that has
an Internet connection and uses broadband mobile services, generating more and more
trafic [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Advanced mobile devices and connections are not only getting smarter in
their computing opportunities but are also developing due to higher-generation network
connectivity (3G, 3.5G, and 4G or LTE). Such combining device opportunities with faster,
higher bandwidth and more intelligent networks leads to wide adoption of progressive
multimedia applications that contribute to increased mobile and Wi-Fi trafic. The
increase in the number of users of mobile services leads to problems related to the
shortage of radio resources necessary to support the required level of quality of service
(QoS) and quality of experience (QoE).
      </p>
      <p>Since it is expected that the amount of global trafic generated by mobile and wireless
devices will soon exceed the trafic generated by wired equipment, more eficient use of
the existing frequency spectrum is not enough to improve the situation globally. The
solution of this problem is impossible without additional frequency resources that will be
required for a number of diferent technologies sufering from a lack of frequency spectrum
from conventional mobile to device-to-device and multi-hop connections. Consequently,
there is an urgent need for searching and using additional resources.</p>
      <p>
        To solve this problem, the largest companies such as IEEE, 3GPP and Cisco Mobile
are developing systems that can attract additional resources, or that can improve
the eficiency of using existing radio resources. The solutions ofered by the companies
include, for example, the use of extremely high frequencies, the so-called millimeter waves
(mmWaves) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the temporary use of the band of licensed frequencies (Licensed Shared
Access system, LSA) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and the use system of Licensed Assisted Access (LAA) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>LSA technology is currently the most researched, so in this article we will consider a
description of the LSA system concept and a literary review of previous research about
this topic. A brief overview of LAA technology will also be ofered.</p>
      <p>2.</p>
    </sec>
    <sec id="sec-2">
      <title>Frequency resource sharing technologies</title>
      <p>The mobile sector is developing the new generation of mobile wireless communications
networks based on cellular technologies. In a limited frequency range, the purpose of
these developments is to find solutions for more eficient, economical and rational radio
resource management. Even if the trafic growth forecasting are adjusted for the benefits
provided by the new technologies, the availability of licensed radio resources spectrum
may not be suficient to satisfy the increased demand for mobile bandwidth until the
decade’s end.</p>
      <p>Simplifying the use of the spectrum of unlicensed frequencies is an attempt to satisfy
the demands of the communications services market in the context of trafic growth.
An example of using an unlicensed frequency band are ubiquitous Wi-Fi networks.
The unlicensed spectrum can be an supplement to the licensed spectrum for cellular
operators to help eliminate the explosion of trafic in some scenarios, such as hotspot
areas (physical location where people may obtain Internet access, typically using Wi-Fi
technology). Technology Licensed Assisted Access ofers an alternative to the operator to
use unlicensed spectrum using one radio network, thereby LAA ofers new opportunities
for optimizing network eficiency.</p>
      <p>An unlicensed spectrum can never replace the need for a more licensed spectrum
because of its inability to be used in macroelements that provide wide-area coverage
and its overall inability to provide highly reliable quality of service due to unmonitored
interference. The unlicensed spectrum has an unpredictable and rapidly changing
electromagnetic environment due to the free access of many users to it, which cannot
guarantee the high quality of transmissions. In addition, for this reason, special measures
are needed to reduce conflict situations. Thus, the unlicensed spectrum is better used
as a “licensed access” integrated into LTE, where it is considered as the carrier of the
secondary component in the carrier aggregation scenario.</p>
      <p>
        For the first time, LAA technology is introduced in 3GPP TR.36.889 Release 13 as
part of LTE Advanced (LTE-A) technology [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The LAA technology provides for the
aggregation of the frequency spectrum of Wi-Fi in the 5 GHz band by connecting it to
the licensed LTE spectrum. The eficiency of the Wi-Fi spectrum in busy conditions
is low, and LTE technology is able to more efectively manage resources and control
errors. The main task of LAA is to ensure eficient, uninterrupted and fair coexistence
with Wi-Fi technology. The advantage of this system is its use in any place, since
the frequency in 5 GHz is available in almost any zone. The listen-before-talk (LBT)
operating procedure, proposed 3GPP in Release 13 for LAA, is defined as a mechanism
by which an equipment makes a clear channel assessment (CCA) test before using the
channel.The CCA identifies the presence or absence of other signals on a channel in
order to determine if a channel is occupied or clear, respectively. LBT usage is one
way for fair sharing of the unlicensed spectrum and therefore it is considered to be a
key element for fair operation in the unlicensed spectrum in a single global solution
framework.
      </p>
      <p>However, it is clear that the unlicensed spectrum can never match the quality of
the licensed spectrum. Therefore, the most popular ways to solve the shortage of the
frequency range are methods that allow the maximum use of licensed frequencies. A
preliminary analysis of related papers on the subject of more eficient using of the
resource spectrum showed that one of the most studied solutions to this problem in
4th generation networks (4G) and subsequent generations is the use of the LSA-system.
Licensed Shared Access, as a new additional regulatory framework, is another measure
that can improve the efectiveness use of spectrum and thus help to ease spectrum deficit
in areas where LSA may be relevant. The LSA framework enables agreed shared access
to spectrum that would otherwise be unavailable for using by mobile connection.</p>
      <p>The LSA framework provides controlled access to the radio spectrum used by several
participants (see Fig. 1): the current owner of the resources and a limited number of
licensees (for example, cellular operators). The owner of the LSA band (shared band)
has absolute priority when deciding whether to provide access to the radio resources
of this LSA band to licensees. Licensees can access the spectrum only if the owner’s
QoS level is not disturbed. The rules governing the use of the LSA band are based on
dedicated agreement, taking into account the necessary requirements for the QoS level.
The implementation of these rules is possible using various scenarios that afect the
users QoS level served in the shared band.</p>
      <p>Since in the LSA system the owner and the LSA licensee use the same frequency
spectrum, it is necessary to take measures to control the resulting interference between
the participants, because the absence of such phenomenon as interference has a positive
efect on the levels of QoS and QoE. Studies have shown that limiting interference on
the shared band created by licensee users is typically accomplished through two basic
scenarios – limiting the base station (BS) signal power transmitting data to devices
or interrupting service (Fig. 2). Within limit power scenario, LSA band is available,
but it is used with reduced power. All the BSs of licensee are forced to reduce the
corresponding uplink power whenever instructed. In the interruption or shutdown
scenario, LSA band is fully unavailable to the licensee. All the BSs which are have a
chance to cause interference on LSA bands are "powered of". The shutdown scenario is
to limit the power of users to zero, i.e. there is a full confiscation of the LSA band for
licensee.</p>
      <p>Within each of these scenarios, various policies for the allocation of time or power
resource can be applied to improve the system eficiency using shared access (Fig. 3).
There are two types policies: simple policies that allow to distribute the frequency
spectrum to one type of resource and flexible policies (combinations of simple policies)
that allow to distribute several types of resource. The application of these policies makes
it possible to take into account the spatial position of network users, which becomes a
decisive factor in determining the system performance.</p>
      <p>In addition, the achievable bit rate is the important indicator of the connection
quality and the network as a whole, as already mentioned, so should be paying special
attention to the main parameters that afect the data transmission. Therefore notice,</p>
      <sec id="sec-2-1">
        <title>National regulator</title>
      </sec>
      <sec id="sec-2-2">
        <title>Frequency spectrum owner</title>
      </sec>
      <sec id="sec-2-3">
        <title>Financial compensation</title>
      </sec>
      <sec id="sec-2-4">
        <title>Potential LSA licensees</title>
      </sec>
      <sec id="sec-2-5">
        <title>Sharing rules and condition</title>
        <sec id="sec-2-5-1">
          <title>LSA-band LSA-band LSA-band</title>
          <p>power is available is unavailable is available</p>
          <p>Limit power scenario</p>
        </sec>
        <sec id="sec-2-5-2">
          <title>LSA-band LSA-band LSA-band</title>
          <p>power is available is unavailable is available
frequency</p>
          <p>Shutdown scenario
time
time
power</p>
          <p>Pmax
power</p>
          <p>Pmax
D1

1</p>
          <p>D
2
</p>
          <p>2
D1
 1  
2</p>
          <p>D
2</p>
          <p>D1</p>
          <p>D
2</p>
          <p>D
3
1  2  3</p>
          <p>Round Robin policy
time
time
D1

1</p>
          <p>D
2

2</p>
          <p>D
3

3</p>
          <p>D
3
frequency</p>
          <p>Full Power policy
allocated for servicing in accordance with its location relative to BS , noise power 0,
propagation exponent  and is defined, according to the Shannon formula, as follows
(1):
 (, ) =  ln 1 +
︂(
 )︂
0
(1)</p>
          <p>Repository.</p>
          <p>Depending on the selected scenario of interference limitation and radio resource allocation
policy, these parameters</p>
          <p>may vary and thus achievable bit rate can take diferent
values (can be seen in the Fig. 2, 3).</p>
          <p>For a better understanding of the LSA system functioning and the interaction of
its elements, the Fig. 4 shows an example of the technical implementation of the LSA
concept. The main components of this system are repository, controller and network
OA&amp;M (Operations, Administration and Maintenance):
– LSA-Repository:</p>
          <p>This database includes the actual information on frequency
spectrum use by the owner and information about the availability of the LSA band
and the conditions of its use by the licensee.
– LSA-Controller: The LSA-Controller determine LSA spectrum availability based
on rules LSA of use and information on the owner’s use provided by the
LSA– Network OA&amp;M: The OA&amp;M translates into radio resource management commands
the availability of frequency spectrum information received from the LSA-Controller.</p>
          <p>LSA</p>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>Repository LSA</title>
      </sec>
      <sec id="sec-2-7">
        <title>Controller</title>
      </sec>
      <sec id="sec-2-8">
        <title>Network OA&amp;M</title>
        <p>Available both
basic and
LSAspectrum</p>
        <p>User Equipment
Base Station</p>
        <p>Base Station</p>
        <p>Base Station</p>
        <p>Only the basic
spectrum is
available
User Equipment</p>
        <p>The use of the
LSA spectrum is
prohibited by the
owner
Base Station</p>
        <p>Basic Spectrum
LSA-Spectrum
Then these commands are transmitted to BSs in the LSA licensee’s network. Based
on this information, BSs enable user devices to access the LSA spectrum.
Such an implementation is not the only possible and true, but represents one of the
possible options.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Analysis of the current state of research LSA and LAA system</title>
      <p>Currently, the implementation in wireless multiservice network systems shared use of
a licensed frequency spectrum LSA is still under development, therefore this subject
attracted the attention of many researchers. The literature review showed that the
number of articles devoted to simulation modeling of the LSA system is quite large,
while the analytical side of the issue is insuficiently studied.</p>
      <p>
        For example, the paper [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] deals with various scenarios of network resource
management that will allow meeting the requirements of the services and applications being
developed. Special attention is paid to the issue of resource allocation for service devices
machine-to-machine interaction (M2M), which is expected to be one of the key drivers for
using shared network resources. The main idea of the work is that, unlike the currently
used frequency spectrum, most of the new spectra (about 80%) will become shared
spectra, and therefore either the models of sharing the licensed frequency spectrum LSA
or the models of opportunistic spectrum access (OSA) will be applicable to them. This
once again underlines the study relevance of the proposed ETSI system LSA. However,
this paper are proposed only theoretical considerations about diferent scenarios of
network resource management, but actual analytical models are not provided.
      </p>
      <p>
        The authors [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] give a detailed description of the LSA system with two separate
BS: primary and secondary. Users of the secondary BS can be served only when the
data transfer of the secondary BS does not degrade the quality of service of users of
the primary BS below a certain level, otherwise the secondary BS goes into standby
mode. To achieve this, both BS must be fully synchronized. This model provides shared
planning for only two base stations. The authors [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] propose a mechanism for the
distribution of the LSA frequency spectrum among several LSA licensees using a joint
auction with a mixed graph mechanism. This scheme provides unhindered access to the
licensed sharing spectrum for various commercial operators that are not connected to
each other, and the BS are coordinated by the management organization.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] presents a solution that uses cognitive radio technology to solve the
problem of frequency spectrum lacks providing dynamic access to the spectrum. The
model was evaluated both analytically and by means of simulation. Also in the literature,
three scenarios of limiting interference in the shared band are described in some detail:
ignoring the owner’s requests, interrupting user service [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], limiting the signal power
of the BS [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The analysis of two simple radio resource allocation policies, such as
policy of equal allocation of a temporary resource (Round Robin policy) and policy of
maximum employment of a bandwidth (Full Power policy) [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], allows to take into
account the position of users on the plane (see Fig. 5). A combined approach using
Queuing theory and stochastic geometry was used to investigate models with simple
radio resource allocation policies, but the structure of the LSA system was not taken
into account.
      </p>
      <p>
        In the study of technical documentation, as well as scientific articles on LAA
technology, it was found that most sources have only a descriptive part and propose simulation
models for this technology, but no mathematical models were considered. In article [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ],
a new theoretical structure was proposed to quantify the performance of LAA with QoS
restrictions, and various probabilistic characteristics were derived.
4.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>Currently, rapid increasing of transmitted data volume in the cellular networks is an
important moment in the development of wireless communication technology. In recent
years, the deficit of available radio frequency spectrum has become a major obstruction
in developing today’s wireless communications technology. For provision services with
a high QoS and QoE to users is necessary the large volume of frequency resources.
Accordingly, deficit of system resources leads to degraded of bit rate in mobile networks,
and consequently reduction of QoS and QoE levels. Due to this, various methods of
using the frequency range, both licensed and unlicensed, are being actively studied.</p>
      <p>Licensed Shared Access, as a new additional regulatory framework, is another measure
that can improve the efectiveness use of spectrum and thus help to ease spectrum deficit
in areas where LSA may be relevant. According to the literature analysis at the moment
there are no standardized solutions to choose the most efective scenarios for sharing
LSA band resources, flexible radio resource allocation policies, as well as the impact of
the spatial distribution of users on the system performance have not been studied at
all.The usage of unlicensed range resources has been studied much less. As the literature
review showed, research in this area is aimed at the implementation of LAA technology.
However, now there are no mathematical models that would allow to implement this
technology.As a task for further research, it is planned to compare performance measures
of mobile network models considering within LSA and LAA technologies depending
on various scenarios of limitation interference and diferent allocation policies of radio
resource.</p>
      <p>The publication has been prepared with the support of the “RUDN University
Program 5-100” and funded by RFBR according to the research projects No. 18-37-00231
and No. 19-07-00933.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <source>Cisco Visual Networking Index: Forecast and Methodology</source>
          ,
          <fpage>2016</fpage>
          -
          <lpage>2021</lpage>
          (Sep.
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ericsson</surname>
          </string-name>
          ,
          <source>Ericsson mobility report: On the pulse of the Networked Society, Tech. rep. (Jun</source>
          .
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>T. S.</given-names>
            <surname>Rappaport</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mayzus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Azar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Wong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Schulz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Samimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <article-title>Millimeter wave mobile communications for 5g cellular: It will work!</article-title>
          ,
          <source>IEEE access 1</source>
          (
          <year>2013</year>
          )
          <fpage>335</fpage>
          -
          <lpage>349lo</lpage>
          comni (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. ETSI, Tr
          <volume>103</volume>
          113:
          <article-title>Mobile broadband services in the 2300 MHz 2400 MHz band under Licensed Shared Access regime</article-title>
          ,
          <source>Tech. rep. (</source>
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          , J. Cheng, S. Falahati,
          <string-name>
            <given-names>H.</given-names>
            <surname>Koorapaty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. H.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Karaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Falconetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Larsson</surname>
          </string-name>
          ,
          <article-title>Licensed-assisted access lte: coexistence with IEEE 802.11 and the evolution toward 5G</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          <volume>54</volume>
          (
          <issue>6</issue>
          ) (
          <year>2016</year>
          )
          <fpage>50</fpage>
          -
          <lpage>57</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. 3GPP,
          <source>Tr 36.889 v13</source>
          .
          <article-title>0.0, study on licensed-assisted access to unlicensed spectrum (release 13)</article-title>
          ,
          <source>Tech. rep. (</source>
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>M. M. Kassem</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          <string-name>
            <surname>Marina</surname>
          </string-name>
          ,
          <article-title>Future wireless spectrum below 6 ghz: A UK perspective</article-title>
          ,
          <source>Proc. of International Symposium on Dynamic Spectrum Access Networks (DySPAN)</source>
          ,
          <source>IEEE (59-70)</source>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>N.</given-names>
            <surname>Taramas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Alexandropoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. B.</given-names>
            <surname>Papadias</surname>
          </string-name>
          ,
          <article-title>Opportunistic beamforming for secondary users in licensed shared access networks</article-title>
          ,
          <source>Proc. of 6th International Symposium on Communications, Control and Signal Processing (ISCCSP)</source>
          ,
          <source>IEEE</source>
          (
          <year>2014</year>
          )
          <fpage>526</fpage>
          -
          <lpage>529</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Dutkiewicz</surname>
          </string-name>
          , G. Fang,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Mueck</surname>
          </string-name>
          ,
          <article-title>Framework of joint auction and mixed graph for licensed shared access systems</article-title>
          ,
          <source>Proc. of International Symposium on Dynamic Spectrum Access Networks (DySPAN)</source>
          ,
          <source>IEEE</source>
          (
          <year>2015</year>
          )
          <fpage>154</fpage>
          -
          <lpage>163</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. H.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Dutkiewicz</surname>
            , G. Fang,
            <given-names>M. D.</given-names>
          </string-name>
          <string-name>
            <surname>Mueck</surname>
          </string-name>
          ,
          <article-title>Spectrum sharing based on truthful auction in licensed shared access systems</article-title>
          ,
          <source>Proc. of 82nd Vehicular Technology Conference (VTC Fall)</source>
          ,
          <source>IEEE</source>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. A.
          <string-name>
            <surname>Raschell'a</surname>
            , L. Militano,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Araniti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Orsino</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Iera</surname>
          </string-name>
          ,
          <article-title>Cognitive management strategies for dynamic spectrum access</article-title>
          ,
          <source>Handbook of Cognitive Radio</source>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. V. Y. Borodakiy,
          <string-name>
            <given-names>K. E.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Gudkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. Y.</given-names>
            <surname>Ostrikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Ponomarenko-Timofeev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Turlikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <article-title>Modeling unreliable lsa operation in 3gpp lte cellular networks</article-title>
          ,
          <source>Proc. of 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</source>
          ,
          <source>IEEE</source>
          (
          <year>2014</year>
          )
          <fpage>390</fpage>
          -
          <lpage>396</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. I. Gudkova,
          <string-name>
            <given-names>K.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ostrikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Mokrov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ponomarenko-Timofeev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koucheryavy</surname>
          </string-name>
          ,
          <article-title>Service failure and interruption probability analysis for licensed shared access regulatory framework</article-title>
          ,
          <source>Proc. of Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</source>
          ,
          <article-title>7th International Congress on</article-title>
          .
          <source>IEEE</source>
          (
          <year>2015</year>
          )
          <fpage>123</fpage>
          -
          <lpage>131</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmadian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Galinina</surname>
          </string-name>
          , I. Gudkova,
          <string-name>
            <given-names>S.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shorgin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <article-title>On capturing spatial diversity of joint m2m/h2h dynamic uplink transmissions in 3gpp lte cellular system</article-title>
          ,
          <source>Lecture Notes in Computer Science</source>
          <volume>9247</volume>
          (
          <year>2014</year>
          )
          <fpage>407</fpage>
          -
          <lpage>421</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>O.</given-names>
            <surname>Galinina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gerasimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koucheryavy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Himayat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-P.</given-names>
            <surname>Yeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Talwar</surname>
          </string-name>
          ,
          <article-title>Capturing spatial randomness of heterogeneous cellular/wlan deployments with dynamic trafic</article-title>
          ,
          <source>IEEE Journal on Selected Areas in Communications 32 (6)</source>
          (
          <year>2014</year>
          )
          <fpage>1083</fpage>
          -
          <lpage>1099</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>Q.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Ni</surname>
          </string-name>
          , R. Liu,
          <article-title>Efective capacity of licensed-assisted access in unlicensed spectrum for 5g: From Theory to Application</article-title>
          ,
          <source>IEEE Journal on Selected Areas in Communications 35 (8)</source>
          (
          <year>2017</year>
          )
          <fpage>1754</fpage>
          -
          <lpage>1767</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>