Professional Documents
Culture Documents
Abstract—We consider a two-phase Wireless-Powered Commu- be also present in future communication paradigms such as
nication Network under Nakagami-m fading, where a wireless the Internet of Things (IoT) [3], where powering a potentially
energy transfer process first powers a sensor node that then massive number of devices will be a major challenge.
uses such energy to transmit its data in the wireless information
transmission phase. We explore a fixed transmit rate scheme Wireless Powered Communication Networks (WPCN) is al-
designed to cope with the reliability and delay constraints of ready a well-addressed topic in the literature. Readers can find
arXiv:1909.09203v1 [cs.IT] 30 Aug 2019
the system while attaining closed-form approximations for the in [4] an overview of WPCNs including system architecture,
optimum wireless energy transfer and wireless information trans- WET techniques, and existing applications. As shown in [5]
mission blocklength. Then, a more-elaborate rate control strategy for the case of throughput maximization, WPCN can even
exploiting the readily available battery charge information is
proposed and the results evidence its outstanding performance achieve a performance comparable to that of conventional
when compared with the fixed transmit rate, for which no battery (non-WET) networks when intelligent policies are applied.
charge information is available. It even reaches an average rate Some of the main strategies that have been considered in
performance close to that of an ideal scheme requiring full the scientific literature are relay-assisted [6]–[9], Automatic
Channel State Information at transmitter side. Numerical results Repeat-reQuest (ARQ) [10], [11], and power control [3], [12]–
show the positive impact of a greater number of antennas at
the destination, and evidence that the greater the reliability [16] mechanisms. Specifically, the work in [6] deals with
constraints, the smaller the message sizes on average, and the RF energy transfer in a three-node cooperative network, and
smaller the optimum information blocklengths. Finally, we cor- focuses on the optimum switching between EH and data
roborate the appropriateness of using the asymptotic blocklength relaying, while the outage probability of a dual-hop decode-
formulation as an approximation of the non-asymptotic finite and-forward (DF) relay system utilizing the power-splitting
blocklength results.
EH protocol is investigated in [7]. Authors in [8] also consider
Index Terms—WPCN, reliability and delay constraints, rate a cooperative WPCN but this time the source and relay nodes
control, finite blocklength. have no embedded energy supply and are wirelessly powered
by an access point (AP). The performance of a large-scale
I. I NTRODUCTION WPCN with random number of transmitter-receiver pairs and
Very recently, energy harvesting (EH) has emerged as a potential relays that are randomly distributed into the network,
promising technology to achieve a sustained and low-cost is characterized in [9] by using stochastic-geometry tools. In
operation of low-power devices such as sensors or tiny ac- the latter two cases authors show the benefits of cooperation in
tuators. Apart from the conventional EH sources [1] such terms of throughput and outage probability, respectively. An
as solar, wind, kinetic, or other ambient energy source, the investigation on the usage of the time-switching protocol when
radio-frequency (RF) signals are very attractive because they hybrid ARQ schemes are used for information transmission is
can carry energy and information simultaneously [2], which presented in [10], while results demonstrate the improvement
enables energy constrained nodes to harvest energy and receive of the system performance for high Signal-to-Noise Ratio
information. Notice that RF EH, also known as Wireless En- (SNR). Additionally, a novel ARQ protocol for EH receivers
ergy Transfer (WET), is envisioned to be of utmost importance is proposed in [11] by allowing the ACK feedback to be
in scenarios where replacing or recharging the batteries may adapted based upon the receiver’s EH state. Therein, authors
be dangerous, as in a toxic environment, or even impossible, as derive optimal reception policies including the sampling, de-
in sensors implanted in human bodies. Those scenarios will coding and feedback strategies, for different ARQ protocols
and assuming several power consumption sources. Regarding
O.L.A. López, H. Alves are with the Centre for Wireless Communications power control, authors in [12] study a WPCN that employs
(CWC), University of Oulu, Finland. {onel.alcarazlopez,hirley.alves}@oulu.fi. dynamic power splitting. Under a point-to-point flat-fading
R.D. Souza is with Federal University of Santa Catarina (UFSC), Flo-
rianópolis, Brazil. {richard.demo@ufsc.br}. channel setup, they resort to the optimal power splitting rule at
S. Montejo-Sánchez is with Programa Institucional de Fomento the receiver based on the Channel State Information (CSI) to
a la I+D+i, Universidad Tecnológica Metropolitana, Santiago, Chile. optimize the rate-energy performance trade-off. Meanwhile,
{smontejo@utem.cl}.
E.M.G. Fernández is with Federal University of Paraná (UFPR), Curitiba, [13] investigates the optimal energy beamforming and time
Brazil. {evelio@ufpr.br}. assignment in WPCN for smart cities, and [14] proposes a
This work is partially supported by Academy of Finland (Aka) (Grants low-complexity solution, called fixed threshold transmission
n.303532, n.307492, n.318927 (6Genesis Flagship)), CAPES (Brazilian
Agency for Higher Education) (project PrInt CAPES-UFSC “Automation (FTT) by setting a transmit power threshold to determine
4.0”), as well as FONDECYT Postdoctoral Grant n.3170021. whether transmission takes place or not. On the other hand,
2
the energy efficiency-optimal downlink transmit power for a power control protocol for the energy accumulation scenario
massive multiple-input multiple-output (MIMO) base station is proposed in order to improve the reliability performance
(BS) using WET to charge single-antenna EH users, is derived under the given delay constraints. On the other hand, subblock
in [15]. Therein, authors use a scalable model for the devices’ energy-constrained codes are investigated in [26], and a suffi-
circuit power consumption and show that it is indeed energy cient condition on the subblock length to avoid energy outage
efficient to operate the system in the massive MIMO regime. at the receiver is provided. Meanwhile, authors in [27] propose
Finally, a time-division multiple access (TDMA)-based WPCN using concatenation of a nonlinear trellis code (NLTC) with
was shown in [16] to be more spectral-efficient than its non- an outer low-density parity-check (LDPC) code taking into
orthogonal multiple access (NOMA) counterpart after opti- account both energy transmission and error rate requirements,
mizing the transmit power and time allocation in both cases. and show that the designed codes operate at ∼ 0.8 dB away
Specifically, the scenario consists of a power beacon (PB) from the information theoretic limits. Besides, retransmission
powering wirelessly a set of devices, which in turn use such protocols, in both energy and information transmission phases,
harvested energy for feeding their circuits and transmitting are implemented in [28] to reduce the outage probability
information to a receiving AP, while all the devices are single- compared to open-loop communication. Nevertheless, none of
antenna. these works deal with rate allocation strategies for WPCNs
Aforementioned research works, and many others related, under reliability and delay constraints. Notice that in WPCNs
design and/or evaluate strategies to maximize the probability with elastic applications, in the sense that devices can transmit
of transmission, the throughput, or the energy efficiency, or data over a wide range of data rates, the transmission rate is
to minimize the transmitted power, or the outage probability. a degree of freedom that should be properly exploited.
However, as enabler of IoT paradigm, WPCNs find a natural
application in Machine-Type Communication (MTC) use cases
B. Contributions and organization of this paper
of coming 5th Generation (5G) of wireless systems, where
some stringent requirements in reliability and delay may Herein we aim at filling the above gap in the literature
be present, as is the case of ultra-reliable MTC (uMTC) by addressing the rate control problem in such WPCNs with
scenarios [17]. Critical connections for industrial automation, reliability and delay constraints. Specifically, our goal is to
smart grids, reliable wireless coordination among vehicles, maximize the instantaneous message size such that require-
and others, are some examples of uMTC scenarios [18] with ments of latency and reliability are met. For a two-phase
general delay constraints less than 10ms and error probability wireless system, where first a WET process powers a low-
requirements not greater than 10−3 . The interplay between power sensor node that uses that energy to transmit its data
reliability/delay makes physical layer design of uMTC very in the Wireless Information Transmission (WIT) phase, we
complex and challenging [19], and WPCN systems need to be propose two rate control strategies: i) fixed transmit rate (FTR)
designed properly to meet such demands. and ii) transmit rate with known state of charge (KSC). We
compare both with the ideal scheme that requires full CSI at
transmitter side (fCSI). The main contributions of this work
A. Related Works can be summarized as follows:
Some recent works [20]–[28] deal with those issues by • We show the advantages of deciding on the transmit rate
considering short packets (stringent delay constraints) and/or based on the battery charge, since it allows considerable
ultra-reliability. In [20] we analyze and optimize a single-hop rate improvements when compared to the fixed rate
wireless system with energy transfer in the downlink and infor- scheme, achieving a performance close to that of the ideal
mation transfer in the uplink, under quasi-static Nakagami-m scheme where full CSI is also available at the transmitter
fading in uMTC scenarios. The results demonstrate that there side;
is an optimum number of channel uses for both energy and • Closed-form approximations for the attainable average
information transfer for a given message length. Cooperative message size of the proposed schemes are obtained, and
WPCNs are considered in [21]–[23], where the impact of also for the optimum WET and WIT blocklength when
an amplify-and-forward (AF) [21] and DF [22] relay-assisted the fixed transmit rate scheme is used;
communication setup without direct link is evaluated, and • Results show the positive impact of a greater number
power consumption sources beyond data transmission power, of antennas at the destination, and evidence that the
as well as imperfect CSI and a direct link, are incorporated more stringent the reliability constraints, the smaller the
in [23] for the DF setup. A save-then-transmit protocol is message sizes on average, and the smaller the optimum
investigated in [24] where authors address the scenario in WIT blocklength. The inverse relation between the opti-
which one or more wireless PBs use WET to charge a node mum WIT blocklength and the reliability constraints was
over fading channels, and then it attempts to communicate with proved analytically for the fixed transmit scheme, but
another receiver over a noisy channel and using a finite number numerical results evidence that this characteristic holds
of channel uses. The system performance is characterized also for the other schemes;
using metrics, such as the energy supply probability at the • We develop the asymptotic formulation for the rate con-
transmitter, and the achievable rate at the receiver. In [25] trol problem under the proposed schemes. We show how
we study transmission strategies for scenarios with/without to depart from these expressions to attain non-asymptotic
energy accumulation between transmission rounds, where a results, while illustrating numerically the gaps of both
3
TABLE I
M AIN S YMBOLS g1 1
h ..
v, n, δ WET channel uses, WIT channel uses, δ = n + v T S . D
v ∗ , n∗ Optimum values of v and n, respectively gM M
Tc Duration of a channel use
λxy Path loss between nodes X and Y
h Normalized channel power gain of the link T → S WET WIT
v channel uses n channel uses
gi Normalized channel power gain of the link between S and
the i-th antenna of D
m1 , m2 Nakagami-m shape factor of link T → S and S → D,
respectively Fig. 1. System model.
M Number of antennas at D
g RV denoting the normalized sum of gi for i = 1, ..., M
E Energy harvested at S during the WET phase
Px Transmit power of node X
circuitry functioning as considered in [11], [13], [15], [16],
η Energy conversion efficiency [23]. However, notice that our derivations keep accurate in
k Message size in bits case that such additional consumption is small compared to
k0 Fixed minimum message size
r Transmit rate, r = k/n
the average energy harvested by S as assumed implicitly or
ǫth Maximum allowed error probability explicitly in [3], [5]–[10], [12], [20]–[22], [24], [25], [28],
σd2 Average noise power at D [31]. Otherwise, modeling and including into the analysis
γi Instantaneous SNR at the i-th antenna of D
γ Instantaneous SNR after Maximum Ratio Combining (MRC)
other power consumption sources may be strictly necessary, as
at D failing to satisfy the corresponding energy requirements could
ψ Average SNR at D normalized by M and the quotient v/n become the main cause of system failure, as shown for instance
w RV denoting the product hg
ǫ(γ, k, n) Error probability for an Additive White Gaussian Noise
in [23] when transmitting short data messages in a cooperative
(AWGN) channel scenario. Meanwhile, notice that in systems operating under
h 0 , z0 Channel thresholds for KSC and fCSI schemes, respectively stringent reliability and delay constraints, which are the focus
ǫ∗th Average error probability when operating above the channel
thresholds, e.g., above h0 for KSC or above z0 for fCSI
of this work, such energy-outage events could be critical and
difficult to predict/avoid, hence, deploying a very small battery,
but still able of supporting the basic operation of the EH
formulations. We corroborate the appropriateness of using devices, could be required. In such case the harvested energy
the asymptotic formulation as an approximation of the would support only the transmission operations, while once
non-asymptotic finite blocklength results in this scenario, again our derivations and analysis hold. On the other hand,
specially at data rates that are not low. we assume that both, energy and data transfer, utilize the same
Next, Section II presents the system model and assumptions. frequency spectrum, which guarantees small form factors, but
Sections III, IV and V discuss the rate control schemes, perhaps more important it allows saving spectrum and enables
FTR, KSC and fCSI, respectively, designed to meet the Simultaneous Wireless and Information Transfer (SWIPT) [9],
given reliability and delay constraints. Section VI presents [28] in the link T → S, e.g., for the transmission of control
the numerical results, while Section VII concludes the paper. messages from T to S. We denote by Tc the duration of a
Notation: X ∼ Γ(m, 1/m) is a normalized gamma distributed channel use, thus, the duration of an entire transmission round
random variable (RV) with shape factor m, Probability Density is δTc , where δ = v + n. Also, S and T are single antenna
Function (PDF) fX (x) = Γ(m) mm m−1 −mx
x e and Cumulative devices while D is equipped with M antennas. The path loss
between T and S, and between S and each antenna of D, is
Distribution Function (CDF) FX (x) = 1− Γ(m,mx)
Γ(m) for x ≥ 0. denoted as λts , λsd , respectively.
P[A] is the probability of event A, while Ez [ · ] denotes Nakagami-m quasi-static channels are assumed where the
expectation with respect to RV Z. Kt (·) is the modified Bessel fading is considered to be constant and independent and iden-
function of second kind and order t, E1 (·) is the exponential tically distributed over each phase. We consider normalized
integral [29], while W(·) is the main branch of the Lambert channel power gains h ∼ Γ(m1 , m11 ) and gi ∼ Γ(m2 , m12 ),
W function [30], which satisfies W(x) ≥ −1 for x ∈ R where h characterizes the link T → S, gi is the coefficient
and it is defined in − 1e ≤ x < 0. The Gaussian Q-function of the link between S and the i−th antenna of D, and
R∞ 2
is denoted as Q(x) = x √12π e−t /2 dt and sup{·} is the m1 , m2 are their corresponding Nakagami-m Line-Of-Sight
supremum operation. Table I summarizes the main symbols (LOS) factors1 . Also, the M antennas at D are sufficiently
used throughout this paper. separated such that gi , i = 1, · · · , M are independent, and
spatial diversity can be fully achieved.
II. S YSTEM M ODEL A typical application scenario could be that in which T
Consider the two-phase scenario in Fig. 1. First, T powers is a BS who powers a set of nearby low power devices
S during v channel uses in the WET phase. Then, S, which including S, while enabling their transmissions to a sink or
may be a sensor node with very limited energy supply, aggregating node D with M antennas. Notice that our analyses
uses the energy obtained in the WET phase to transmit its considering a single device S remain valid even in a multi-
information to D over n channel uses in the WIT phase. user setup if the simultaneous transmissions in the WIT phase
We do not consider other power consumption sources at S,
e.g., as sensing operations and/or receive/processing/transmit 1 Usually m1 > m2 since WET processes require greater LOS than WIT.
4
1
ǫth for k, which can only be performed numerically when
using (14). Thus, we use the approximation in (15) as follows
0.8
ǭ(k, n) ≈ P γ < 2k/n − 1
(a)
hv i
= P M ψw < 2k/n − 1 0.6
n
n∗ /δ
(b)
2k/n − 1 n
= FW , (16) 0.4
Mψ v
where (a) comes from using (8) and (b) from the definition of 0.2
the CDF. Now, the maximum message size comes from setting
ǭ(k, n) = ǫth in (16) and isolating k, which yields 0
-60 -40 -20 0 20 40 60
v v χ (dB)
−1
kFTR ≈ n log2 1+ M ψFW (ǫth ) = n log2 1+ χ , (17)
n n Fig. 2. n∗ /δ as a function of χ.
−1
where χ = M ψFW (ǫth ). In case that kFTR < k0 the FTR
scheme can not satisfy the reliability requirements at the same
Theorem 2. Taking advantage of (17), the optimum block-
time that satisfying the message size constraint, thus, the rate
length for WIT and WET phases is approximately given by
allocation is infeasible and no transmission occurs. Notice that
using (17) requires finding the inverse of (10), which is not χ
possible in closed form. Following result addresses that issue n∗ ≈ χ−1 δ, (19)
χ−1
+χ−1
for the reliability region of our concern. W e
−1 v ≈ δ − n∗ ,
∗
(20)
Theorem 1. FW (ǫth ) converges to
min(m 1M,m ) respectively, and the approximation includes taking the nearest
Γ(m2 M)Γ(m1 ) min(m2 M,m1 ) 2 1
ǫth integer.
Γ |m2 M−m1 |
−W
−
(18)
Proof. See Appendix C.
m1 m2 M
Algorithm 1 Finding k such that ǭ(k, n) = ǫth Thus, when k0 > 0 it is required that
1: Calculate k according to (17) Zh0 Z∞
2: if k ≥ k0 then
ǭ(k0 , n, h)fH (h)dh + ǫ∗th fH (h)dh = ǫth
3: Evaluate (14)
0 h0
4: if ǫ > ǫth then
5: Decrease k Zh0
6: Return to line 3 ǭ(k0 , n, h)fH (h)dh + ǫ∗th 1 − FH (h0 ) = ǫth
7: else 0
8: if k < k0 then Zh0
Infeasible rate mm
1
1
Γ(m1 , m1 h0 )
9: ǭ(k0 , n, h)hm1−1 e−m1 h dh+ǫ∗th = ǫth .
10: k=0 Γ(m1 ) Γ(m1 )
0 | {z }
11: end if | {z } z2 (h0 )
12: end if z1 (h0 )
specific h such that on average it performs with error changing variable h → (x+2 −1)h0
2k0 /n −1
. Unfortunately there
probability ǫ∗th ≤ ǫth . This allows compensating the 5 However larger data rates are provided when the feasibility condition
average error probability to meet the reliability require- holds, which is illustrated in Section VI.
ment. 6 See also Appendix D for an specific algorithm to solve (22).
8
is not a closed-form solution for the integral7 unless for the Algorithm 2 Finding k such that ǭ(k, n) = ǫth
specific case of Rayleigh fading, for which 1: Find h0 and ǫ∗
th according to (27) and (28), respectively.
2: For each round, if h ≤ h0 then k = k0 ; otherwise
Z∞
−h0
ne−h0 h0 k0
−h0 x 3: Find the maximum integer k that satisfies
k̄KSC = k0 1−e + k0 log2 2 n +x e 2k0 /n−1 dx Z ∞
2 n −1
0 ǫ(γ(h, g), k, n)fG (g)dg ≤ ǫ∗th (29)
" h0 #
k /n
k0 0
(a) −h0 e 2 0 −1 2 n h0 −h0 k0
= k0 (1−e )+n E1 k0 +e , 4: End
ln(2) 2 n −1 n
(26)
where (a) comes with the help of [29, Eq.(4.337.1)] and section, starting from k = kKSC and decreasing k at each
some algebraic manipulations. Even when attaining a closed- iteration until (29) is met.9
form expression in (26) for the average message size under In the next section we analyze the case where, in addition
Rayleigh fading, it becomes intractable finding the optimum to the battery state of charge information, S knows the CSI of
value of n under this scheme, mainly because h0 , which is the the channels in the link S → D and uses also that information
solution of (22), depends also on n. However, either evaluating for allocating its transmit rate.
numerically (25) or finding numerically n∗ in (25) or (26)
is still useful since the Monte Carlo computation alternative V. T RANSMIT RATE WITH FULL CSI AT S ( F CSI)
could be practically infeasible for some system parameter In this setup S knows all the channels h and gi , ∀i, thus
values. This is because k̄KSC depends on h0 , and using Monte it knows what would be the value of γ, and it can adjust
Carlo to find accurately h0 requires enormous computation its transmit rate to meet the required reliability. Therefore, the
resources when ǫth is very small, e.g., ǫth < 10−6 . channel is AWGN and the maximum message size comes from
Next, we analyze the procedure for attaining the non- using (12) and is given by10
asymptotic results, and explain how to depart from our above p
results to reach them. k ≈ nC(γ) − nV (γ)Q−1 (ǫ∗th ) log2 e. (30)
TABLE II
S YSTEM PARAMETERS
103
Parameter Value
k0 2 bytes (16 bits)
m1 , m2 5, 2 (similar to [20], [25])
n, v 200, 1000 channel uses (similar to [25])
ψ 0 dB ([4], [8], [9], [20], [23], [25])
Tc 3 µs [20] 102
Now, we have concluded the analytical discussions around significantly the one attained by FTR while making use only
the three rate allocation schemes and in the following section of the battery charge information, which is practically viable.
we provide some numerical performance comparisons. However, neither KSC nor fCSI expand the region for which
ǫth = 10−4 is feasible, below ψ = 5 dB, and the reasons
are highlighted in Section IV. Also, the greater the reliability
VI. N UMERICAL R ESULTS
constraints, the smaller the message sizes on average. Notice
In this section, we present numerical results to investigate that (18) is accurate, and the results coming from the finite
the performance of the proposed schemes as a function of blocklength formulation approximate the asymptotic case for
the system parameters. Unless stated otherwise, results are relatively large k̄, e.g., for k̄ > 50 bits.
obtained by using the values shown in Table II. Notice that The average message size as a function of the WIT block-
ψ = 0 dB may correspond to a system with the following length, n, is shown in Fig. 4 for fixed δ = 1200 channel uses
practical values (similar to those in [4], [8], [9], [20], [23], while setting (a) M = 1 and (b) M = 4. As shown in Fig. 3,
[25]): η = 0.3, which is feasible according to the state-of- it is not possible operating with ǫth = 10−4 when ψ = 0 dB
the-art in EH circuit design, Pt = 10W, σd2 = −90dBm, log- and M = 1, thus, Fig. 4-(a) shows only the performance for
distance path loss model with λts = κdα ts and λsd = κdsd ,
α
ǫth = 10−2 , while for M = 4 both reliability constraints are
where κ = 30dB is the average signal power attenuation at a possible to satisfy as shown in Fig. 4-(b). From both, Fig. 4-(a)
reference distance of 1 meter and accounts for other factors and (b), we can appreciate the existence of an optimal point,
such as the carrier frequency and heights and gains of the (n, v), which was analytically proved for the FTR scheme,
antennas, dts = 10m and dsd = 14m are the lengths of the and notice that arg max k̄FTR matches (19) even when using
links T → S and S → D, and α = 3 is the path loss exponent. n
the approximation in (18), thus, validating those expressions.
While by setting m1 = 5 and m2 = 2 we model both WIT and
As pointed out in Section III for the FTR scheme, n∗ is an
WET links with certain LOS as required in practical WPCN
increasing function of ǫth and that is why when M = 4 for
setups. Also, by taking into account that the typical message
ǫth = 10−4 → n∗ = 272 channel uses, while for ǫth = 10−2
size in uMTC use cases is 32 bytes [37] while the value of
the value of n∗ increases to 378 channel uses. This fact holds
k0 must be much smaller we have set k0 = 2 bytes. Finally,
also
for the KSC and fCSI schemes. Additionally, notice that
notice that the overall delay δ = v + n = 1200 channel uses11
n∗ fCSI > n∗ KSC > n∗ FTR , and KSC and fCSI seem to
corresponds to 3.6ms by assuming Tc = 3µs as in [20].
benefit more of n > v setups, which is an interesting result.
Fig. 3 shows the attainable average message size for each
Fig. 5 shows the attainable average message size for each
scheme as a function of ψ with M = 1 and ǫth ∈
scheme as a function of ǫth for M ∈ {1, 4}. Notice that k̄ has
{10−2 , 10−4 }. Obviously, an increase in ψ improves the
a near-linear behavior with respect to ǫth for all the schemes
system performance according to (7); in fact, operating with
in the log-log scale, thus, k̄ ≈ θǫβth , where θ and β depend
ǫth ≤ 10−4 is only possible when ψ ≥ 5 dB. Notice that
on the system parameter values, but as shown in the figure
the schemes KSC and fCSI, that take advantage of certain
they are strongly influenced by M , thus, also by m1 and m2 .
levels of information, allow to attain greater data rates. In that
For the FTR scheme this is expected also from (18). Stringent
sense, KSC seems attractive since its performance overcomes
reliabilities, in the order of 1 − 10−4 and greater, are available
11 Since δ must be small for short-latency transmissions, both v and n are when using four antennas. More on this is discussed in Fig. 6
small as well (strictly smaller than δ) but v has usually a stronger impact on where we show the positive impact of a greater number of
the system performance than n according to the analysis around Fig. 2, which antennas at D for ǫth = 10−4 . In fact, the system cannot
is also illustrated in [20], [25] for different setups, hence, its value should be
set larger than n. As shown in Table II we utilize n = 200, v = 1000 operate under the reliability requirement when M = 1, and
channel uses. notice that by increasing M beyond M = 2, the average
10
103
2 102
10
2 4 6 8 10 12 14 16
Eq.(17)
using 10-4
Eq.(18)
10-8
1
10
0 200 400 600 800 1000 1200 10-12
2 4 6 8 10 12 14 16
3
10 Fig. 6. Average message size (top) and probability of transmitting with k0
(bottom), as a function of M for ǫth = 10−4 , n = 200 and v = 1000
channel uses.
-5
10
-8
10
10-9
1
10
0 200 400 600 800 1000 1200
10-10
-11
10
Fig. 4. Average message size as a function of n for δ = 1200 channel uses
KSC
and (a) M = 1 (top), (b) M = 4 (bottom). 10-12 KSC with Finite Blocklength
fCSI
10-13
103 0 10 20 30 40 50 60
k0 (bits)
102
again and its significance is shown to be even greater since for
M ≥ 12 the exact inversion of FW (w) in (10) was not possible
to be performed even numerically. In Fig. 6 it is also shown the
probability of those events in which the allocated message size
is the minimum possible, e.g., probability of transmitting with
1
k0 , which is desired to be as small as possible. Since the FTR
10
10
-8
10
-7
10
-6
10
-5
10
-4
10
-3
10
-2
10
-1 scheme uses a deterministic rate, we only plot the performance
of the KSC and fCSI schemes, for which P[k = k0 ] = P[h ≤
h0 ] = FH (h0 ) and P[k = k0 ] = P[w ≤ w0 ] = FW (w0 ),
Fig. 5. Average message size as a function of ǫth for M ∈ {1, 4}, n = 200
and v = 1000 channel uses. respectively.12 As M increases, the chances of transmitting
with the minimum message size decreases, and the average
message size increases. Notice that the gap between the finite
message size increases while meeting the required reliability. blocklength and the asymptotic formulations is considerable
As M → ∞, the performance of KSC and fCSI tends to when analyzing the probability of transmitting with minimum
overlap since the resultant WIT channel behaves as an AWGN message size, specially when M increases13 , but it does not
channel and the randomness in the WIT phase disappears. It have a practical impact as shown when evaluating the average
is remarkable the performance gain that results from using
KSC and fCSI schemes with respect to FTR. For example, for 12 Notice that P[k = k ] > 0 holds always unless the channel becomes de-
0
M = 2, S transmits with k = 70 bits on average when using terministic, e.g., m1 , m2 M → ∞, for which there are only two possibilities:
FTR, while if the information of the battery state of charge either P[k = k0 ] = 0 or P[k = k0 ] = 1.
13 This is because the resultant WIT channel tends to behave as an AWGN
is used (KSC scheme), it can operate with up to k = 123 channel for which the impact of the finite blocklength is unquestionable as
bits on average. Additionally, the accuracy of (18) is verified shown in [34].
11
message size. simplifications we attain (9). Now, using (9) the CDF for
Figs. 3-6 corroborate the appropriateness of using the w ≥ 0 is attained as follows
Z w
asymptotic results as starting points when getting their finite
FW (w) = fW (u)du
blocklength counterparts. Finally, Fig. 7 shows the probability 0
that S transmits with the minimum message size as a function m2 M +m1 Z w
2(m1 m2 M ) 2 m2 M +m1
of that size, for ǫth = 10−3 and M = 4. As the minimum = × u 2 −1
0
10
A PPENDIX C
P ROOF OF T HEOREM 2
10
-2 Since δ = v + n, we can put (17) in the form of kFTR ≈
n log2 (1 + (δ − n)χ/n), and its first and second derivatives in
terms of n are given next.
10
-4
dkFTR −χδ δ−n
≈ +ln 1+ χ log2 e, (42)
dn χ(δ−n)+n n
10
-6
d2 kFTR χ2 δ 2 log2 e
≈ − 2 . (43)
dn2 n χ(δ − n) + n
10 -8 d2 k
10
-3
10
-2
10
-1
10
0 Now, kFTR is concave on n since dnFTR 2 < 0. Based on this,
10 2
and since for n = 0 and n = δ we have that kFTR = 0, we
conclude that there is an optimum 0 < n∗ < δ and it comes
dkFTR
from solving dn = 0. Using (42) we proceed as next
1
10
−χδ δ−n
+ ln 1 + χ =0
χ(δ − n) + n n
10
0 1 − χ − y(n) (a)
+ ln y(n) = 0
y(n)
(b)
10 -1 y(n) ln y(n) − 1 = χ − 1
(c) χ − 1
eln y(n)−1 ln y(n) − 1 =
-2
e
10
-3 -2 -1 0 (d)
χ − 1
10 10 10 10
ln y(n) − 1 = W
e
(e) χ−1
Fig. 8. (a) Exact and approximate expressions of FW (w) (top), (b) Relative y(n) = , (44)
Error of approximating (10) by (40) (bottom). W χ−1 e
Algorithm 3 Finding h0 in (22) where (a) comes from taking the derivative of (45) and
(0) (1) d2 z̃(h )/dh2
1: h0 = 0, h0 = ρ in (51), t = 1 computing the quotient dz̃(h00)/dh00 . Using the fact that h0 ≪ 1
(t) (t−1) (t−1)
2: while 100 × (h0 − h0 )/h0 > h△ do we know that Γ(m1 , m1 h0 ) ≈ Γ(m1 ), and if additionally
3:
(t)
if z̃(h0 )/z̃(h0
(t−1)
) > 0 then m1 > 1 then we can ignore the impact of the second summand
4: Calculate h0
(t+1)
according to (46) in (48), thus,
5: else κm2
h0 − κm2 + h0 m2 M = 0 ⇒ h0 ≈ . (49)
6: Calculate µ given in (47) 1 + m2 M
7: if µ < 1 then Notice that m1 > 1 is a usual characteristic of WPCNs where
(t+1)
8: Calculate h0 according to (46) the WET process requires a considerable LOS component.
9: else Thus, (49) holds for practical setups. For the sake of com-
(t) (t+1)
10: h0 (t + 1) = (h0 + h0 )/2 pleteness we also present the solution for m1 = 1, which
11: end if follows after (48) as shown next19
12: end if
13: t←t+1 h0 − κm2 + h0 m2 M e−h0
+ =0
14: end while h20 Γ(1, h0 )
15: End (a)
h20 + (m2 M + 1) − κm2 = 0
r
m2 M + 1 2 m2 M + 1 (b)
k/n + κm2 − = h0 , (50)
where (a) comes from using (21) with (2 ψ −1) nv = κ, while 2 2
(b) follows from using the expression of the CDF of G and tak- where (a) comes from simple algebraic manipulations after
ing the derivative. Because dz(h0 )/dh0 < 0, z(h0 ) is strictly using Γ(1, h0 ) = e−h0 , while (b) follows after solving
decreasing and therefore it will intersect with the horizontal the resulting quadratic equation and taking the positive real
line ǫth in a unique point, thus, the solution of (22) is unique solution. Combining the results in (49) and (50), the initial
and any bracketing root finding method, e.g., bisection method, guess for h0 is set to
converges to it. However, for greater convergence rates, other κm2
more evolved techniques, such as the Newton’s method, are r1+m2 M , if m1 > 1
recommended. Let’s define z̃(h0 ) = z(h0 )−ǫth while we need ρ=
m2 M+1
2 , (51)
2 +κm2 − m2 M+1 , if m1 = 1
2
to solve z̃(h0 ) = 0. Notice that dz̃(h0 )/dh0 = dz(h0 )/dh0 ,
and as shown in (45) it can be efficiently computed. Thus, Back to Algorithm 3, lines 2-13 define the iteration cycle
using the recursive relation of Newton’s method, given by that stops when the required accuracy in the solution, h△ given
(t) (t)
(t+1) (t) z̃(h0 ) in percent, is attained. If h0 evolves approaching h0 without
h0 = h0 − (t) (t)
, (46) over crossing it, then it is secure to use Newton’s iteration as
dz̃(h0 )/dh0
shown in lines 3 and 4 of the algorithm. Otherwise we have
does not require much more computational effort.17 Parameter to check the convergence property given in (47) to be sure
t indicates the iteration index, and it is known that Newton’s that the next Newton’s iteration will be closer to the solution.
method always converges if 18 If the condition holds we use (46) (line 8), otherwise it is
z̃(h )d2 z̃(h )/dh2 better to average the outputs of the two latest iterations since
0 0 0
µ= ≤K <1 (47) they are bracketing the solution (line 10), e.g., bisection rule.
dz̃(h0 )/dh0 The global convergence is ensured. In fact, it is expected that
in the searching region with K as a positive constant. Now, Algorithm 3 always uses Newton’s rule at each iteration, and
a suitable root finding method that uses a combination of the bisection rule would be required in some odd cases only.
Newton’s and bisection methods for our problem setup, is Now, for k > k0 we know that ǭ(k, n, h) = ǫ∗th =
presented in Algorithm 3. ǭ(k0 , n, h0 ), thus, based on (21) we have that
(1)
To guarantee that the initial guess of h0 , h0 , satisfies (47), k/n
(2 − 1)n
k0 /n
(2 − 1)n
we chose it such that FG = FG
ψvM h ψvM h0
d2 z̃(h0 )/dh20 k/n k0 /n
=0 2 −1 2 −1
dz̃(h0 )/dh0 = , (52)
m1 −m1 h0 m +1
h h0
m1 e h0 1
h0 − κm2 + h0 m2 M + Γ(m1 ,m1 h0 ) (a) and isolating k we attain (24).
− = 0
h20
h0 − κm2 + h0 m2 M mm 1 −m1 h0 m1 −1
1 e h0 R EFERENCES
2 + = 0, (48)
h0 Γ(m1 , m1 h0 ) [1] S. Sudevalayam and P. Kulkarni, “Energy harvesting sensor nodes:
Survey and implications,” IEEE Communications Surveys Tutorials,
17 Notice that, z̃(x) is more difficult to compute than dz̃(x)/dx, thus, vol. 13, no. 3, pp. 443–461, 2011.
compared with bracketing methods that make use of z̃(x), Newton’s method
involves almost the same computational effort in this case. 19 For setups with m < 1 we were not able of reaching an accurate
1
18 This result comes from Fixed Point Theory [39]. approximation, however, those scenarios are not of practical interest.
14
[2] A. Tandon, M. Motani, and L. R. Varshney, “Subblock-constrained [25] O. L. Alcaraz López, E. M. G. Fernández, R. D. Souza, and H. Alves,
codes for real-time simultaneous energy and information transfer,” IEEE “Wireless powered communications with finite battery and finite block-
Transactions on Information Theory, vol. 62, no. 7, pp. 4212–4227, July length,” IEEE Transactions on Communications, vol. 66, no. 4, pp.
2016. 1803–1816, April 2018.
[3] Z. Chu, F. Zhou, Z. Zhu, R. Q. Hu, and P. Xiao, “Wireless powered [26] A. Tandon, M. Motani, and L. R. Varshney, “Subblock energy-
sensor networks for Internet of Things: Maximum throughput and constrained codes for simultaneous energy and information transfer,”
optimal power allocation,” IEEE Internet of Things Journal, vol. 5, no. 1, in 2016 IEEE International Symposium on Information Theory (ISIT),
pp. 310–321, 2018. July 2016, pp. 1969–1973.
[4] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks [27] M. Dabirnia and T. M. Duman, “On code design for joint energy and
with RF energy harvesting: A contemporary survey,” IEEE Communi- information transfer,” IEEE Transactions on Communications, vol. 64,
cations Surveys Tutorials, vol. 17, no. 2, pp. 757–789, 2015. no. 6, pp. 2677–2688, 2016.
[5] H. Ju and R. Zhang, “Throughput maximization in wireless powered [28] B. Makki, T. Svensson, and M. Zorzi, “Wireless energy and information
communication networks,” IEEE Transactions on Wireless Communica- transmission using feedback: Infinite and finite block-length analysis,”
tions, vol. 13, no. 1, pp. 418–428, 2014. IEEE Transactions on Communications, vol. 64, no. 12, pp. 5304–5318,
[6] I. Krikidis, S. Timotheou, and S. Sasaki, “RF energy transfer for 2016.
cooperative networks: Data relaying or energy harvesting?” IEEE Com- [29] I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and
munications Letters, vol. 16, no. 11, pp. 1772–1775, 2012. products. Academic press, 2014.
[7] Y. Ye, Y. Li, F. Zhou, N. Al-Dhahir, and H. Zhang, “Power splitting- [30] R. M. Corless, G. H. Gonnet, D. E. Hare, D. J. Jeffrey, and D. E. Knuth,
based SWIPT with dual-hop DF relaying in the presence of a direct “On the LambertW function,” Advances in Computational mathematics,
link,” IEEE Systems Journal, vol. 13, no. 2, pp. 1316–1319, June 2019. vol. 5, no. 1, pp. 329–359, 1996.
[8] H. Chen, Y. Li, J. L. Rebelatto, B. F. Uchôa-Filho, and B. Vucetic, [31] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical
“Harvest-then-cooperate: Wireless-powered cooperative communica- non-linear energy harvesting model and resource allocation for SWIPT
tions,” IEEE Transactions on Signal Processing, vol. 63, no. 7, pp. systems,” IEEE Communications Letters, vol. 19, no. 12, pp. 2082–2085,
1700–1711, 2015. Dec 2015.
[9] I. Krikidis, “Simultaneous information and energy transfer in large-scale [32] O. L. A. López, H. Alves, R. D. Souza, and S. Montejo-Sánchez,
networks with/without relaying,” IEEE Transactions on Communica- “Statistical analysis of multiple antenna strategies for wireless energy
tions, vol. 62, no. 3, pp. 900–912, 2014. transfer,” IEEE Transactions on Communications, pp. 1–1, 2019.
[10] F. A. de Witt, R. D. Souza, and G. Brante, “On the performance of [33] Y. Chen, N. Zhao, and M. Alouini, “Wireless energy harvesting using
hybrid ARQ schemes for uplink information transmission with wireless signals from multiple fading channels,” IEEE Transactions on Commu-
power transfer in the downlink,” in 2014 IFIP Wireless Days (WD), Nov nications, vol. 65, no. 11, pp. 5027–5039, Nov 2017.
2014, pp. 1–6. [34] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the
[11] Y. Mao, J. Zhang, and K. B. Letaief, “ARQ with adaptive feedback for finite blocklength regime,” IEEE Transactions on Information Theory,
energy harvesting receivers,” in 2016 IEEE Wireless Communications vol. 56, no. 5, pp. 2307–2359, 2010.
and Networking Conference, April 2016, pp. 1–6. [35] W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-
antenna fading channels at finite blocklength,” IEEE Transactions on
[12] L. Liu, R. Zhang, and K. C. Chua, “Wireless information and power
Information Theory, vol. 60, no. 7, pp. 4232–4265, 2014.
transfer: A dynamic power splitting approach,” IEEE Transactions on
[36] P. Mary, J. M. Gorce, A. Unsal, and H. V. Poor, “Finite blocklength
Communications, vol. 61, no. 9, pp. 3990–4001, 2013.
information theory: What is the practical impact on wireless communi-
[13] J. Liu, K. Xiong, P. Fan, and Z. Zhong, “RF energy harvesting wireless
cations?” in 2016 IEEE Globecom Workshops (GC Wkshps), Dec 2016,
powered sensor networks for smart cities,” IEEE Access, vol. 5, pp.
pp. 1–6.
9348–9358, 2017.
[37] 3GPP TR 38.913 V14.1.0, “Study on scenarios and requirements for
[14] A. O. Isikman, M. Yuksel, and D. Gündüz, “A low-complexity policy for next generation access technologies,” Mar 2017.
outage probability minimization with an energy harvesting transmitter,”
[38] I. Thompson, “NIST handbook of mathematical functions,” 2011.
IEEE Communications Letters, vol. 21, no. 4, pp. 917–920, 2017.
[39] R. P. Agarwal, M. Meehan, and D. O’Regan, Fixed point theory and
[15] T. A. Khan, A. Yazdan, Y. Maguire, and R. W. Heath, “Energy efficiency applications. Cambridge university press, 2001, vol. 141.
of wireless information and power transfer with massive MIMO,” in
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), June
2017, pp. 1–5.
[16] Q. Wu, W. Chen, D. W. K. Ng, and R. Schober, “Spectral and energy-
efficient wireless powered IoT networks: NOMA or TDMA?” IEEE
Transactions on Vehicular Technology, vol. 67, no. 7, pp. 6663–6667,
July 2018.
[17] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, and
low-latency wireless communication with short packets,” Proceedings of
the IEEE, vol. 104, no. 9, pp. 1711–1726, 2016.
[18] P. Popovski, “Ultra-reliable communication in 5G wireless systems,” in
1st International Conference on 5G for Ubiquitous Connectivity, Nov
2014, pp. 146–151.
[19] H. Ji, S. Park, J. Yeo, Y. Kim, J. Lee, and B. Shim, “Ultra-reliable and
low-latency communications in 5G downlink: Physical layer aspects,”
IEEE Wireless Communications, vol. 25, no. 3, pp. 124–130, Jun 2018.
[20] O. L. A. López, H. Alves, R. D. Souza, and E. M. G. Fernández, “Ul-
trareliable short-packet communications with wireless energy transfer,”
IEEE Signal Processing Letters, vol. 24, no. 4, pp. 387–391, 2017.
[21] M. Haghifam, B. Makki, M. Nasiri-Kenari, T. Svensson, and M. Zorzi,
“Wireless-powered relaying with finite block-length codes,” arXiv
preprint arXiv:1611.05995, 2016.
[22] O. L. A. López, R. D. Souza, H. Alves, and E. M. G. Fernández,
“Ultra reliable short message relaying with wireless power transfer,” in
Communications (ICC), 2017 IEEE International Conference on. IEEE,
2017, pp. 1–6.
[23] O. L. A. López, E. M. G. Fernández, R. D. Souza, and H. Alves, “Ultra-
reliable cooperative short-packet communications with wireless energy
transfer,” IEEE Sensors Journal, vol. 18, no. 5, pp. 2161–2177, 2018.
[24] T. A. Khan, R. W. Heath, and P. Popovski, “Wirelessly powered
communication networks with short packets,” IEEE Transactions on
Communications, vol. 65, no. 12, pp. 5529–5543, 2017.