Professional Documents
Culture Documents
Abstract—We consider wireless-powered amplify-and-forward have been summarised in [2]. With wireless energy harvesting,
and decode-and-forward relaying in cooperative communications, there is a choice between harvesting energy from ambient
where an energy constrained relay node first harvests energy sources or by carefully designing wireless power transfer links.
through the received radio-frequency signal from the source and
then uses the harvested energy to forward the source information For instance, a power density of around 1 mW/m2 is reported
to the destination node. We propose time-switching based energy around 50 meter distance from the base station in the GSM
harvesting (EH) and information transmission (IT) protocols with band (935 MHz–960 MHz) [4], which means that a wireless
two modes of EH at the relay. For continuous time EH, the EH time device with a typical size of around 100 cm2 can harvest power
can be any percentage of the total transmission block time. For in the range of tens of μW. Such an amount of harvested power
discrete time EH, the whole transmission block is either used for
EH or IT. The proposed protocols are attractive because they do could be sufficient for relaying nodes in sensor networks with
not require channel state information at the transmitter side and sporadic activities. For devices that need to support frequent
enable relay transmission with preset fixed transmission power. communication activities, harvesting ambient RF energy is not
We derive analytical expressions of the achievable throughput for sufficient. Instead, harvesting wireless energy from carefully
the proposed protocols. The derived expressions are verified by designed power transfer links is needed. In addition, the energy
comparison with simulations and allow the system performance
to be determined as a function of the system parameters. Finally, conversion efficiency of the wireless energy harvesting plays
we show that the proposed protocols outperform the existing fixed an important role in determining the amount of energy that can
time duration EH protocols in the literature, since they intelli- be harvested. Employing different circuit design technologies,
gently track the level of the harvested energy to switch between wireless energy harvesting with energy conversion efficiency in
EH and IT in an online fashion, allowing efficient use of resources. the range of 10%–80% has been reported over a wide range of
Index Terms—Wireless communications, amplify-and-forward, frequencies, e.g., 15 MHz–2.5 GHz [2], [8]. More specifically,
decode-and-forward, throughput, wireless energy harvesting. energy conversion efficiency of around 65% has been reported
in the ISM band (900 MHz, 2.4 GHz) with 13 nm CMOS
I. I NTRODUCTION technology [2].
A unique advantage of RF energy harvesting lies in the
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1608 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1609
between source and destination when there is no direct link 3) Protocols: We consider the communication in blocks of
between the source and the destination.1 T seconds, where in general each block can be composed of two
1) Relay Model: We make the following assumptions re- parts, (i) EH and (ii) IT which is split equally into S → R IT and
garding the energy constrained relay node: R → D IT. We introduce a parameter, αi , to denote the fraction
• The processing power required by the transmit/receive of the block time allocated for EH in the ith block. Thus,
circuitry at the relay is negligible as compared to the the time durations for EH, S → R IT and R → D IT are αi T
power used for signal transmission from the relay to seconds, (1−α2 i )T seconds and (1−α2 i )T seconds, respectively.
the destination. This assumption is justifiable in practical Due to quasi-static fading, the data packet size is assumed to be
systems when the transmission distances are not too short, very small compared to the block time such that many packets
such that the transmission energy is the dominant source can be transmitted within a block time. Also the decision to
of energy consumption [12], [17], [32]–[34]. switch between EH and IT is carried out in an online fashion
• The energy constrained relay node first harvests sufficient which depends on the amount of available harvested energy
energy from the source, which is transmitting with power and the preset value of relay transmit power Pr . We define two
Ps , before it can relay the source information to the modes of EH:
destination with a preset fixed transmission power Pr . 1) continuous time EH in which the relay only harvests that
For analytical tractability, we assume that the harvested much energy within each block that is needed for its
energy at the relay is stored in an infinite capacity battery transmission, i.e., αi ∈ (0, 1).
[19], [32], [34], [36]. 2) discrete time EH in which the whole block is used for
• The relay receiver has two circuits to perform energy either EH or IT, i.e., either αi = 1 (there is no IT and the
harvesting and information processing separately and it whole block is used for EH) or αi = 0 (there is no EH and
adopts the time-switching (TS) receiver architecture [33], the whole block is used for IT).
i.e., the relay node spends a portion of time for energy
harvesting (EH) and the remaining time for information Consequently, depending on the mode of EH (continuous
transmission (IT). Such a receiver architecture is widely or discrete) and the type of relaying protocol (both amplify-
adopted in the literature [12]–[16]. and-forward (AF) and decode-and-forward (DF) are considered
2) Channel Model: We assume that the S → R and R → D in this work), different cases can arise for the amount of
channel links are composed of large scale path loss and sta- accumulated harvested energy and the combinations of EH and
tistically independent small-scale Rayleigh fading.2 We denote IT blocks that can occur during the transmission. For a tractable
the distances between S → R and R → D by d1 and d2 , respec- analysis of these cases, we define the following terms and
tively. The S → R and R → D fading channel gains, denoted by symbols:
h and g, respectively, are modeled as quasi-static and frequency
non-selective parameters. Consequently, the complex fading • For continuous time EH, an EH-IT block is a special block
channel coefficients h and g are circular symmetric complex which contains EH for some portion of the block time and
Gaussian random variables with zero mean and unit variance. IT for the remaining portion of the block time.
We make the following assumptions regarding the channels: • For continuous time EH, an EH-IT pattern is a pattern of
blocks which either consists of a single EH-IT block or
• The fading channel gains are assumed to be constant over contains a sequence of EH blocks followed by an EH-IT
a block time of T seconds and independent and identically block.
distributed from one block to the next. The use of such • For discrete time EH, an EH-IT pattern is a pattern of
channels is motivated by prior research in this field [12], blocks which either consists of a single IT block or con-
[14], [15], [17], [28], [29], [31]–[34], [36]. tains a sequence of EH blocks followed by an IT block.
• The channel state information (CSI) is not available at • The harvested energy at the time instant t in the ith block
the transmitter side, while the CSI is obtained at the is denoted as Ei (t). This variable is used to track the
receiver side through channel estimation at the start of harvested energy within a block.
each block. Note that AF relaying does not require the • The available harvested energy at the start of the ith block
relay to estimate the S → R channel, while DF relaying is denoted as Ei (0). The available harvested energy at the
requires it for decoding purpose. start of any EH-IT pattern is denoted as Eo . Note that Eo
• The receiver side CSI is assumed to be perfect, which is has a value only at start of any EH-IT pattern, while Ei (0)
in line with the previous work in this research field [28], has a value at the start of every block.
[29], [31]–[34], [36].
In the following sections, we propose TS-based EH and IT
protocols with continuous time and discrete time EH in AF and
1 Note that when a direct link between source and destination is available then
DF relaying. We use the throughput efficiency as the figure of
there is very little benefit of deploying an energy constrained relay node. This
is because the throughput of the direct link between source and destination merit. It is defined as the fraction of the block time used for suc-
is far greater than the throughput of the two-hop link from source to energy cessful information transmission, on average, where successful
constrained relay node to destination. transmission implies the successful decoding of the source mes-
2 Note that the proposed protocols are valid for any distribution model
assumed for channel fading, however, the closed-form throughput expressions sage at the destination. Note that we use the terms throughput
are only valid for Rayleigh distributed channel gains. efficiency and throughput interchangeably in the paper. We
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1610 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
TABLE I
L IST OF I MPORTANT S YMBOLS
consider AF and DF relaying separately because the throughput The received signal at the destination, yd,i is given by
analysis and proposed protocols are different for both systems.
1
For the sake of convenience, we use the same symbolic nota- yd,i = m gi xr,i + nd,i (3a)
tion for different symbols, e.g., throughput τ , energy harvesting d2
time, α, outage probability, po , etc. in Sections III and IV for √
Pr Ps hi g i s i
AF and DF relaying, respectively. Hence, the expression for =
dm
2 Ps |hi |2 + dm 2
1 σnr
any particular variable can be found in the relevant section.
For notational convenience, the commonly used symbols in signal part
Sections III and IV are summarized in Table I.
Pr dm
1 gi nr,i
+ + nd,i , (3b)
dm
2 Ps |hi |2 + dm 2
1 σnr
III. A MPLIFY- AND -F ORWARD R ELAYING
overall noise
In this section, we first present the mathematical signal
model for wireless-powered AF relaying. Then, we propose where (3b) follows from (3a) by substituting xr,i from (2)
two protocols and analytically characterize their throughput into (3a), gi is the R → D fading channel gain, d2 is R → D
performance. distance, and nd,i is the AWGN at the destination node.
Using (3), the signal-to-noise-ratio (SNR) at the D, γd,i =
Esi {|signal part in (3b)|2 }
A. Signal Model Enr,i ,nd,i {|overall noise in (3b)|2 } , is given by
Ps Pr |hi |2 |gi |2
The received signal at the relay node, yr,i is given by 2 (Ps |hi | +d1 σnr )
dm 2 m 2
γd,i =
1 Pr |gi |2 dm 2
1 σn r
yr,i = m Ps hi si + nr,i , (1) + σn2 d
2 (Ps |hi | +d1 σnr )
dm 2 m 2
d1
Ps Pr |hi |2 |gi |2
where i is the block index, hi is the S → R fading channel gain, = , (4)
Pr |gi |2 dm 2
1 σnr + dm2 σnd Ps |hi | + d1 σnr
2 2 m 2
d1 is the source to relay distance, Ps is the source transmission
power, m is the path loss exponent, nr,i is the additive white where σn2 d is the AWGN variance at the destination node.
Gaussian noise (AWGN) at the relay node, si is the normalized The ith block will suffer from outage if SNR, γd,i , is less
information signal from the source, i.e., E{|si |2 } = 1 (which than the threshold SNR, γo . Thus, the outage indicator, Io,i is
can be realized by any phase shift keying modulation scheme), given by
where E{·} is the expectation operator and | · | is the absolute
value operator. Io,i = 1l(γd,i < γo ), (5)
The AF relay first harvests sufficient energy to be able to
transmit with preset power Pr during IT time. Thus, after EH, where 1l(·) is an indicator function which is equal to 1 if its
the AF relay amplifies the received signal and forwards it to the argument is true and 0 otherwise.
destination. The signal transmitted by the relay, xr,i is given by In the following subsections, we propose TS-based protocols
√ for EH and IT using both continuous time and discrete time EH.
Pr yr,i
xr,i = , (2)
Ps |hi |2 2
d m + σ nr
1 B. Protocol 1: TS-Based Protocol for EH and IT With
Continuous Time EH in AF Relaying
where σn2 r
is the variance of the AWGN at the relay node and
Ps |hi |2 1) Description: In this protocol, the relay only harvests that
the factor in the denominator, dm + σn2 r is the power
1 much energy within each block that is needed for its trans-
constraint factor at the relay.Note that an AF relay can obtain
mission. The continuous time EH in AF relaying guarantees
the power constraint factor, Psd|hmi | + σn2 r , from the power of
2
1
that the relay is able to harvest this required amount of energy
the received signal, yr,i , and does not necessarily require source within each block (see Remark 1 below (8)). Thus, each EH-
to relay channel estimation. IT pattern contains only one block. Within each block, EH
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1611
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1612 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
where ρ ηP dm
sT
.
1
Proof: See Appendix B.
Lemma 2: Given the value of Eo , if Eo < Pr2T , X̄ X − 1
is a Poisson random variable with parameter λp and the proba-
bility mass function (PMF) of X̄ is given by the Poisson PMF,
λ̄x̄p e−λ̄p Pr T
pX̄|Eo (x̄|Eo ) = , Eo < (15)
x̄! 2
Fig. 2. Illustration of TS-based protocol for EH and IT in AF relaying network where λp E X̄|Eo = ρ1 Pr2T −Eo and X̄ ∈ {0, 1, 2, . . .}.
with discrete time EH scheme, αi ∈ {0, 1}, for different EH-IT patterns. (a)
X = 3 EH blocks before an IT block, (b) X = 0 (a single IT block). If Eo ≥ Pr2T , X = 0, i.e., it is a constant.
Proof: X̄ = X − 1 denotes the number of EH blocks
that arrive within the energy interval Eo , Pr2T . Since the
These two types of EH-IT patterns are illustrated in Fig. 2, energy harvested per EH block, Ei0→T , is exponentially dis-
where in Fig. 2(a) the desired energy level is shown to be tributed with mean ρ (see Appendix B), the number of EH
achieved somewhere in the middle of the third EH block and the blocks required to harvest the required energy, Pr2T − Eo , fol-
EH-IT pattern contains X = 3 EH blocks before an IT block.
lows a Poisson random variable with parameter ρ1 Pr2T − Eo
Note that since the harvested energy during X EH blocks can
[39, Ch. 2]. Consequently, X̄, given Eo , is a Poisson
exceed Pr2T and IT block only consumes Pr2T energy, Eo can
random variable with the Poisson PMF defined in (15)
have a value greater than 0 in this protocol.
[39, Theorem 2.2.4].
Remark 3: In Protocol 2, the relay only needs to check its
Using Lemmas 1 and 2, we can derive the throughput result
available energy at the start of each block. This is in contrast
for Protocol 2, which is given in Theorem 2 below.
to Protocol 1, where the relay needs to continuously check its
Theorem 2: The throughput for the TS-based Protocol for
available energy during each block. In both protocols, once the
EH and IT with discrete time EH in AF relaying is given by
harvested energy is sufficient for IT, it is assumed that the relay
a+d
sends 1 bit to the source and destination nodes to indicate the e− c uK1 (u)
start of IT. In this work, for the sake of tractability, we assume τ = Egi ,h {τi } = , (16)
Pr dm
2 1 + 2ηP 1
that this control channel information is error free. s
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1613
Fig. 3. Illustration of TS-based protocol for EH and IT in DF relaying, with continuous time EH, αi ∈ [0, 1] for three different EH-IT patterns (a) single EH-IT
block (b) n = 1 EH block due to relay outage followed by an EH-IT block and (c) n = 1 EH block due to relay outage followed by an IT block. n is the random
number of successive EH blocks due to relay outage, occurring irrespective of accumulated energy, in continuous time EH (DF only).
Using (1) and (17), the SNR at the relay and destination nodes reaches the required level sometime during the EH-IT
are given by block. The whole energy is then used for transmission
such that Eo = 0 at the start of the next pattern. This is
Ps |hi |2 illustrated in Fig. 3(b) assuming n = 1.
γr,i = (18a)
dm 2
1 σnr • EH-IT pattern contains n consecutive EH blocks due to
Pr |gi |2 relay outage, before an IT block. In this case, the energy
γd,i = . (18b) is accumulated during the EH blocks and exceeds the
dm 2
2 σnd
required level for transmission. Thus the n EH blocks are
Using (18), the outage indicator is given by followed by an IT block and Eo > 0 at the start of the next
pattern. This is illustrated in Fig. 3(c) assuming n = 1.
Io,i = 1l(γd,i < γo ) = 1l(|gi |2 < b̄), (19)
2) Energy Analysis: We know that αi = 0 for an IT block
γ0 d m 2
2 σn d
and αi = 1 for an EH block. The value of αi for an EH-IT block
where b̄ . Note that the factor, 1l(γr,i < γo ), is not
Pr can be determined as follows. The harvested energy at the time
part of the outage indicator function, Io,i , in (19), because, instant, αi T , during the ith EH-IT block is given by
if the source to relay channel is in outage, i.e., γr,i < γo or
γ dm σ 2
equivalently |hi |2 < ā 0 P1 s nr , there is no IT and only EH ηPs |hi |2
Ei (αi T ) = αi T + Ei (0). (20)
is carried out for the entire block. dm1
Note that the term Ei (0) was not present in (6) for AF relay-
B. Protocol 3: TS-Based Protocol for EH and IT With ing because Ei (0) was 0. Similar to Protocol 1, the harvested
Continuous Time EH in DF Relaying energy at the time, αi T should be equal to Pr (1−α2 i )T (see (7)).
The value of αi for EH-IT block can be obtained by equating
1) Description: In this protocol, similar to Protocol 1, the
(20) to Pr (1−α2 i )T , i.e.,
relay only harvests that much energy within each block that is
1 Pr T − 2Ei (0)d1
dm
needed for its transmission. However, in the event of outage m
at the relay node (i.e., |hi |2 ≥ ā) the whole block in dedicated αi = , (21)
2ηPs |hi | T + d1 Pr T
2 m
for EH. Consequently, in this protocol three types of EH-IT
patterns are possible: Thus, αi and Ei (T ) for any general ith block are given by
⎧ dm Pr T−2Ei (0)dm
• EH-IT pattern contains only a single block. This is the ⎪ 1
⎨ 2ηPs |hi |2 T +dm
1
, |hi |2 ≥ ā Ei (0) < Pr2T
1 Pr T
same as in Protocol 1. For such blocks, Ei (0) < Pr2T and αi = 0, |hi |2 ≥ ā Ei (0) > Pr2T , (22)
⎪
⎩
the partial block time, αi T seconds, is used for EH and 1, |hi |2 < ā
the remaining block time, (1 − αi )T seconds, is used for ⎧
IT. This is illustrated in Fig. 3(a). ⎪
⎨0, 0 < αi < 1
• EH-IT pattern contains n consecutive EH blocks due to ηPs |hi |2 T
Ei (T ) = Ei (0)+ dm , αi = 1 (23)
relay outage, before an EH-IT block. In this case, the ⎪
⎩ 1
Pr T
energy is accumulated during the EH blocks and only Ei (0)− 2 , αi =0
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1614 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
Fig. 4. Illustration of TS-based protocol for EH and IT in DF relaying with discrete time EH, i.e., αi ∈ {0, 1}, for two different EH-IT patterns (a) X = 3 and
Y = 2 EH blocks before an IT block and (b) X = 0 and Y = 0 (single IT block).
Using (22), the block throughput τi for the ith block is Remark 4: The factor inside the summation in (25) decays
given by very quickly to 0 for moderate to large n (approx. n ≥ 10). This
is because the probability that n successive blocks suffer from
(1 − Io,i )(1 − αi )
τi = , (24) relay outage decays very quickly to 0 for large n. Thus, we
2 can accurately evaluate the infinite summation in (25) using
where αi and Io,i are given in (22) and (19), respectively. Note n = 10 terms only. The simulation results in Section V show
that if there is an outage at the relay node, αi is set to 1, and the that even with n = 10, the analytical throughput in (25) is an
block throughput τi will be zero. accurate lower bound on the actual throughput calculated using
3) Throughput Analysis: It does not seem tractable to find simulations.
the exact throughput for Protocol 3. However, it is possible C. Protocol 4: TS-Based Protocol for EH and IT With
to derive a lower bound on the throughput by assuming that Discrete Time EH in DF Relaying
Eo = 0. As illustrated in Fig. 3, only the EH-IT pattern in 1) Description: In this protocol, each block is dedicated
Fig. 3(c) can lead to extra harvested energy and consequently either for EH (αi = 1) or IT (αi = 0). Similar to Protocol 2,
Eo being greater than 0. However, if the relay is in outage, the relay checks its available energy at the start of each block. It
it means that the channel quality is poor and the probability continues to harvest energy until the harvested energy becomes
that the amount of energy harvested from n successive blocks greater than or equal to the desired energy level, Pr2T . Different
is greater than Pr2T is very low. Moreover, the occurrence of
from Protocol 2, after the desired energy, Pr2T , is achieved, the
successive outages is also less probable. Hence, we assume
relay executes IT only if the block does not suffer from relay
that if the EH-IT pattern in Fig. 3(c) occurs, it results in
outage. In case of a relay outage, the relay continues to perform
Eo = 0. Using this assumption, we derive a lower bound on
EH. Consequently, in this protocol the following two types of
the throughput for Protocol 3, which is given in Theorem 3
EH-IT patterns are possible:
below.
• EH-IT pattern contains X consecutive EH blocks until
Theorem 3: A lower bound on the throughput for the TS-
desired energy is achieved, followed by Y consecutive
based Protocol for EH and IT with continuous time EH in DF
EH blocks due to relay outage which prevent IT, before
relaying is given
by (25), see equation at the bottom of the page,
∞ −t an IT block. This is illustrated in Fig. 4(a) with X = 3
where E1 (x) = x e t dt is the exponential integral, ā and b̄,
dm P
and Y = 2, where the white-shaded blocks represent the
are defined below (19), q min ā, 2ηP
1 r
sn
and n denotes the EH blocks due to relay outage.
number of successive EH blocks due to relay outage. • EH-IT pattern contains a single IT block because X = 0
Proof: See Appendix D. and Y = 0. This is illustrated in Fig. 4(b).
m
∞
e−(ā+b̄) −ā
d Pr −2zηPs ((n−1)ā+q)
1
ā n−1
τ≥ e (1 − e−ā )n−1 (1 − e−q ) − e e −1
2ηP s
4ηPs n=0
dm
1 Pr + 2ηPs ā
× (2zηPs q − dm
1 Pr + (d1 Pr − 2zηPs )e ) E1
m q
(25)
2ηPs
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1615
3) Throughput Analysis: The block throughput τi for the ith V. N UMERICAL R ESULTS AND D ISCUSSION
block can be calculated using (24), where αi is given by (26).
This requires the determination of the PMF of Y , the PDF of In this section, we present numerical results to demonstrate
Eo , and the conditional PMF of X̄ X − 1, given the value of the performance of the proposed protocols as a function of
Eo . The latter is given in Lemma 2 already. The PMF of Y is the system parameters. We adopt the realistic simulation pa-
given in the lemma below. rameter values as suggested in recent survey papers on energy
Lemma 3: The PMF of Y is given by harvesting [2]–[6]. We set the source transmission power, Ps =
46 dBm, and the path loss exponent, m = 3. Since wireless
pY (y) = (1 − po,r ) pyo,r , (28) energy harvesting is practical over shorter distances, we set
−ā
where relay outage probability, po,r = 1 − e , and y = the distances, d1 = 35 and d2 = 10 meters. The state-of-the-
{0, 1, 2, . . .}. art circuit design establishes that RF signals over a wide range
Proof: After sufficient amount of energy, Pr2T , has been of frequencies can be rectified at an efficiency higher than 50%
harvested for IT, the probability of the discrete random vari- [2]. Hence, we set the energy conversion efficiency to η = 0.5.
able Y being y is the probability that successive y blocks, Unless otherwise stated, we set the threshold SNR, γo = 60 dB,
before an IT block, suffer from relay outage. Since, the ith and the noise variances at the relay and the destination nodes,
block suffers from relay outage if |hi |2 < ā, the expected relay σn2 r = −70 dBm and σn2 d = −100 dBm respectively. Note that
outage probability, po,r is obtained by finding the expectation we choose a larger value of γo and σn2 r to allow the relay outage
of the
indicator function,
1l(|hi |2 < ā), over hi , i.e., po,r = to impact the throughput results in Theorems 3 and 4. Note that
Ehi 1l(|hi | < ā) = 1 − e−ā , where ā > 0. Since, the occur-
2 later in this section, to investigate the system throughput, we
rence of the relay outage in any one block is independent from will consider a larger range of values of γo , σn2 r and σn2 d .
the other, PMF of Y is given by pY (y) = (1 − po,r ) pyo,r .
It does not seem tractable to determine the exact distribution A. Verification of Analytical Results
of Eo for this protocol. Compared to Protocol 2, in Protocol 4
we have extra harvested energy in the additional Y EH blocks In this subsection, we present simulation results to verify
due to relay outage. However, if the relay is in outage, it means the analytical results in Theorems 1-4. In the simulations, the
that the channel quality is poor and for analysis we can neglect throughput is evaluated by averaging out the block throughput
the harvested energy from Y EH blocks. Using this assumption, τi over a 100 000 blocks, while generating independent fading
the PDF of Eo is the same as given in Lemma 1. Thus, using channels, hi and gi , for each block.
Lemmas 1, 2 and 3, we can derive a lower bound on the Figs. 5 and 6 plot the analytical and simulation based
throughput, which is given in Theorem 4 below. throughput, τ versus relay power, Pr , for Protocols 1-4.4 In
Theorem 4: A lower bound on the throughput for the TS- Fig. 5, the analytical results for AF relaying are plotted by
based Protocol for EH and IT with discrete time EH in DF numerically evaluating the throughput in Theorems 1 and 2.
relaying is given by The simulation results match perfectly with the analytical re-
sults. This is to be expected since Theorems 1 and 2 are exact
ηPs e−(ā+b̄)
τ≥ −ā + 2ηP
. (29) results. In Fig. 6 the analytical lower bounds for DF relaying are
Pr dm1 e s plotted by using n = 10 summation terms in Theorem 3 and by
Proof: See Appendix E.
4 Since the energy harvesting time α is different for each block, we cannot
Remark 5: The simulation results in Section V show that the i
plot throughput versus energy harvesting time for Protocols 1-4. The tradeoff
analytical throughput in (29) is an accurate lower bound on the between the throughput τ and energy harvesting time can be found in [33],
actual throughput calculated using simulations. where the energy harvesting time is fixed.
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1616 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
and σn2 d , respectively. We can see from Figs. 7 and 8 that at very
low relay noise variance, σn2 r , or very high destination noise
variance, σn2 d , the performance of the protocols for AF and DF
relaying is the same. As the relay noise variance increases or
the destination noise variance decreases, the protocols for DF
relaying outperform AF relaying. These trend are generally in-
line with the performance of AF and DF relaying in traditional
non-energy harvesting relaying systems [40].
Figs. 7 and 8 also show that for AF relaying, continuous time
EH protocols outperform discrete time EH protocols, except
for very low relay noise variance or very low destination noise
variance. For DF relaying, the performance of the continuous
time EH and discrete time EH protocols is the same except
for very low relay noise variance or very low destination noise
2 , for
Fig. 7. Optimal throughput efficiency versus relay noise variance, σn r variance. This can be intuitively explained as follows. A lower
TS-based protocols for EH and IT in AF and DF relaying with continuous time noise variance decreases the outage probability and the discrete
and discrete time EH.
time EH protocols benefit more from this by correct IT during
the whole block time, compared to the continuous time EH
numerically evaluating the throughput in Theorem 4. We can protocols. Conversely, for higher noise variance, the outage
see that the analytical results are a tight lower bound on the probability increases. Thus, the performance of discrete time
actual throughput. Note that decreasing σn2 r further from −70 EH protocols suffers more by erroneous IT leading to a waste
dBm decreases the relay outage making the lower bound even of resources during the whole block time.
more tight (the results are not included in the figure for the sake
of clarity). This validates the results in Theorems 3-4.
It can be seen from Figs. 5 and 6 that the throughput can vary C. Comparison With Existing TS-Based Fixed Time-Duration
significantly with Pr . To achieve the maximum throughput, we EH Protocol
have to choose the optimal relay transmission power. Given Finally, we compare the performance of the proposed con-
the complexity of the expressions in Theorems 1-4, it seems tinuous and discrete time EH protocols and the fixed time-
intractable to find the closed-form expressions for the optimal duration EH protocol in [33] for AF relaying. The protocol in
relay power, Pr , which would maximize the throughput, τ . [33] considers fixed time-duration EH and does not allow relay
However, such an optimization can be done offline for the given energy accumulation.
system parameters. In the following subsections, we adopt the Fig. 9 plots the optimal throughput for Protocols 1-4 and the
maximum throughput for some optimal preset relay power Pr protocol in [33] as a function of SNR threshold γo . We can see
as the figure of merit and refer to it as the optimal throughput. from Fig. 9 that the proposed continuous time EH outperforms
fixed time-duration EH in [33] by approx. 0.2–0.5 dB for a wide
range of the threshold SNR (γo ∈ (40, 70) dBs). Similarly, the
B. Performance of the Proposed Protocols
discrete time EH outperforms fixed time-duration EH in [33]
Figs. 7 and 8 plot the optimal throughput for Protocols 1-4 as by almost 3–7 dB margin for SNR threshold γo ∈ (30, 60) dB.
a function of the relay and the destination noise variances, σn2 r This performance improvement for the proposed protocols is
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1617
VI. C ONCLUSION
In this paper, we have proposed TS-based protocols for EH
and IT with continuous time and discrete time EH in AF and DF
relaying. The proposed protocols adapt the EH time-duration
at the relay node based on the available harvested energy and
source-to-relay channel quality. We also derived the analytical
expressions for the achievable throughput for the proposed
protocols and verified them by comparisons with simulations.
Many extensions are possible for the work presented in this
paper. For example, the proposed protocols in this paper can be
extended by adapting the EH time-duration opportunistically,
i.e., the relay node can charge its battery to a level that is much
more than what is required to transmit the source packet, de-
pending on the channel conditions and then the extra harvested
Fig. 9. Optimal throughput efficiency versus detection threshold SNR, γo for energy can be utilized opportunistically.
the proposed protocols with continuous time and discrete time EH and the fixed
time-duration EH protocol in [33].
A PPENDIX A
P ROOF OF T HEOREM 1 IN (10)
due to the more efficient use of resources and can be intuitively
explained as follows. With the fixed time-duration EH in [33], This appendix derives the analytical expression for the
the harvested energy in each block is not controllable and throughput τ , in (10).
depends on the fading channel quality of the S → R link. Step 1: Using (9), the throughput τ can be written as
When the S → R link is in deep fade, the harvested energy
(1 − Io,i )(1 − αi )
for the relay transmission will be very small which results in τ = Ehi ,gi . (A.1)
outage at the destination due to insufficient relaying power, 2
Pr . When the S → R link is very strong, the harvested energy
Since, EH time, αi in (8), is independent of gi , (A.1) can be
will be very large, which although guarantees a successful
written as
relay transmission but is a waste of energy. On the other hand,
the proposed protocols allow relay energy accumulation and
Egi {1 − Io,i } (1 − αi )
adapt the EH time to meet a preset relaying power which τ = E hi . (A.2)
2
can be carefully chosen to give energy-and-throughput efficient
performance. Step 2: Let us first evaluate the inner expectation in (A.2). By
Fig. 9 shows that the optimal throughput efficiency of the substituting (4) into (5), Io,i , is given by
proposed discrete time EH protocols is around 0.35–0.4 at γo =
50 dB. From the definition of the optimal throughput efficiency, Ps Pr |hi |2 |gi |2
this implies that on average 40% of the block time is used for Io,i = 1l < γo .
Pr |gi |2 dm
1 σnr + d2 σnd Ps |hi | + d1 σnr
2 m 2 2 m 2
successful information transmission. This further implies that
(A.3)
for discrete time EH protocols, if a certain block is used for
EH, the probability that the next block will be used for IT is For notational convenience, we define a Ps dm 2 σnd γo , b
2
feasibility of the proposed energy harvesting protocols. variables in (A.3) and simplifying, we get
It must be noted that the performance improvement of the
proposed protocols comes at a marginal expense that the relay Io,i = 1l c|hi |2 − d |gi |2 < (a|hi |2 + b)
needs to alert the source and destination nodes for IT by sending ⎧
a single bit, which is negligible overhead as compared to the ⎨1l |gi |2 < a|hi |22 +b , |hi |2 > d/c
c|hi | −d
amount of data being communicated. In addition, from an = (A.4)
⎩1l |gi |2 > a|hi |22 +b = 1, |hi |2 < d/c
implementation complexity perspective, the proposed protocols c|hi | −d
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1618 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
Step 3: Next, we evaluate the outer expectation in (A.2) to Step 2: Now consider the second EH-IT pattern in the trans-
get the throughput. Using (8), (A.5), and the fact that |hi |2 is an mission. From Step 1, we know that the left over harvested
exponential random variable with unit mean and the probability energy at the end of the first EH-IT pattern is exponentially
density function (PDF) fhi (z) e−z , the throughput, τ in distributed. Hence, for the second EH-IT pattern there is avail-
(A.2), can be simplified to able harvested energy at the start of the pattern and it is
∞ exponentially distributed. We show that given this available
1 − αi − cz−d
az+b
harvested energy at the start of the pattern which is exponen-
τ= e fhi (z)dz
2 tially distributed, the left over harvested energy at the end of
d/c
∞ az+b ∞ az+b
the second EH-IT pattern is also exponentially distributed with
e−( cz−d +z) dm Pr e−( cz−d +z) parameter ρ1 . To do this we need to consider the possible cases
= dz− 1 dz. (A.6)
2 2 2ηPs z+dm 1 Pr
of the second EH-IT pattern. The second EH-IT pattern may
d/c d/c consist of either EH block(s) followed by an IT block or a single
IT block (see discussion in Section III-C-1). These two cases
Defining a new integration variable z̄ z − d/c, the through-
are considered below:
put τ can be written as
a+d ∞
e− c ad+bc 1) If the second EH-IT pattern contains EH block(s) followed
τ= e−(z̄+ c2 z̄ ) dz̄ by an IT block, we can use the same argument as in
2
0 Step 1 above to prove that the left over harvested energy
a+d ∞ −(z̄+ ad+bc )
e− c cdm
1 Pr e
c2 z̄ at the end of the second EH-IT pattern is exponentially
− dz̄ distributed with parameter ρ1 .
2 2cηPs z̄ + 2ηPs d + cdm 1 Pr
0 2) If the second EH-IT pattern consists of a single IT
− a+d block, this implies that the initial energy Eo for this
e c
= (uK1 (u) − cdm
1 Pr ν) , (A.7) second EH-IT pattern is already greater than the threshold
2
level Pr2T . Now, to prove that the left over harvested
∞ −(x+
ad+bc
)
where u 4(ad+bc)c 2 , ν e c2 x
x=0 2cηPs x+2ηPs d+cdm dx, and energy in the battery at the end of the single IT block
1 Pr
the last equality in (A.7) is obtained by using the formula, is exponentially distributed, we have to prove that PDF
∞ − β −γx √ of Eo − Pr2T , given Eo > Pr2T is exponential. To find
dx = βγ K1 ( βγ) [38, §3.324.1]. This completes
0
e 4x p Eo − Pr2T Eo > Pr2T , we use the fact that
the proof for Theorem 1.
Pr T Pr T
p Eo −
< z Eo >
A PPENDIX B 2 2
P ROOF OF L EMMA 1 IN (14)
Pr T Pr T
= p Eo < z + Eo >
This appendix proves that the available harvested energy at 2 2
the start of any EH-IT pattern, Eo , in Protocol 2 is exponentially ⎧
distributed. The harvested energy available at the start of any ⎨0, z<0
P T
EH-IT pattern is the same as the left over harvested energy in = e− P2ρ rT − 1 (z+ r ) (B.1)
⎩ −e ρ
P T
2
, z>0
the battery at the end of the previous EH-IT pattern. Hence, to − r
e 2ρ
derive the PDF of Eo we have to derive the PDF of the left over
harvested energy at the end of any EH-IT pattern. We proceed where
p(·) denotes
probability.
Using (B.1), the PDF,
as follows: p Eo − Pr2T Eo > Pr2T , can be derived as
Step 1: Consider the first EH-IT pattern at the beginning of
the transmission, consisting of certain number of EH block(s) Pr T Pr T
p Eo − Eo >
prior to an IT block. For this first EH-IT pattern, there will 2 2
no (prior) accumulated energy. During each EH block, energy
∂ Pr T Pr T
will be accumulated. Since |hi |2 is exponentially distributed = p Eo − < z Eo >
with the PDF f|hi |2 (z) e−z , the harvested energy per block ∂z 2 2
ηPs |hi |2
interval, Ei0→T = dm T in (11), is exponentially distributed 0, z<0
1 = 1 −z (B.2)
i.e., fEi0→T ( ) = ρ1 e− ρ . The left over har-
ρe , z>0
1 ρ
with parameter ρ,
vested energy at the end of the first EH-IT pattern will be
the extra harvested energy, above Pr2T level, in an EH block From (B.2), we can conclude that if the second EH-IT
preceding an IT block because the IT block will consume a pattern consists of a single IT block, the PDF of the
fixed Pr2T level of energy. Following the memoryless property left over harvested energy at the end of the IT block is
of the exponential distribution [39, Ch. 2], the extra harvested exponentially distributed with parameter ρ1 . Combining
energy, over Pr2T level, in an EH block preceding an IT block is the results for the two cases above, we can conclude that
exponentially distributed with parameter ρ1 . Consequently, the in general, the left over harvested energy at the end of
left over harvested energy at the end of the first EH-IT pattern the second EH-IT pattern is exponentially distributed with
is exponentially distributed with parameter ρ1 . parameter ρ1 .
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1619
Step 3: We can generalize from Steps 1 and 2 that the where X̄ X − 1. Using fEo ( ) and pX̄|Eo (x̄|Eo ) from (14)
left over harvested energy at the end of any EH-IT pattern, and (15), respectively, EX̄ {X} is given by
in a sequence of EH-IT patterns, is exponentially distributed.
Consequently, the harvested energy available at the start of any
EX̄ {X} = EEo EX̄|Eo {X|Eo }
EH-IT pattern,Eo , is an exponentially distributed with the PDF,
fEo ( ) = ρ1 e− ρ , where ρ ηP
dm
sT
. This completes the proof of P
r T /2 ∞
1
Lemma 1. = EX̄|Eo {X̄ + 1|Eo } fEo ( )d + 0d
=0 =Pr T /2
(C.4a)
A PPENDIX C
P ROOF OF T HEOREM 2 IN (16) r T /2
P
1 Pr T
This appendix derives the analytical expression for the = − + 1 fEo ( )d
ρ 2
throughput τ , in (16). =0
(1−Io,i )R(1−αi )
Step 1: First we have to simplify τ = Egi ,h 2 , Pr d m
1
= . (C.4b)
where Io,i and αi are given in (5) and (12), respectively. In 2ηPs λh
Protocol 2, block outage indicator, Io,i , is independent of the
EH time, αi . This is because Io,i depends on the fading chan- Step 4: Substituting (C.2), (C.3), and (4) into (C.1), we can
nels, hi and gi , of the current block. However, αi depends on the obtain the analytical throughput expression as given in (16).
accumulated harvested energy at the start of the block, Ei (0) This completes the proof for Theorem 2.
(see (12)), which in turn depends on the S − R fading channels
of the previous blocks, i.e., h \ hi = {hi−1 , hi−2 , . . .}. Thus,
throughput, τ , is given by A PPENDIX D
P ROOF OF T HEOREM 3 IN (25)
1
τ= Eh ,g {1 − Io,i } Eh\hi {1 − αi }. (C.1) This appendix derives the analytical expression for the lower
2 i i
bound throughput τ , in (25) using the assumption Eo = 0. We
Step 2: We have two expectations to evaluate. Using (A.5) use the notation (˜·) to denote a quantity which is calculated
the first expectation in (C.1), Ehi ,gi {1 − Io,i } is given by using this assumption.
Step 1: The assumption Eo = 0 implies that Ei (0) in (22)
∞ ηPs
n
|hi−k |2 T
1 − az+b
+ λz is equal to 0 if n = 0, else it is equal to k=1
dm if
Ehi ,gi {1 − Io,i } = e (cz−d)λg h dz 1
λh n = 0, where n denotes the number of successive EH blocks
d/c due to relay outage. Thus, (22) can be expressed by (D.1) (see
equation at the bottom of the page.)
− a
+ cλd
=e cλg h uK1 (u) . (C.2) Step 2: Using (24), (D.1), and Eo = 0, the general
block throughput can be expressed as (D.2) (see equa-
Step 3: The second expectation, Eh\hi {1 − αi } is the ex- tion at the bottom of the page), where || is the log-
pected value that any block is an IT block. From the general dm Pr
ical OR operator, χ0,i 1 − 2ηPs |h1i |2 +d mP and χn,i
EH-IT pattern (a), given in Fig. 2, probability of any block n
1 r
dm P −2ηP |h | 2
min 1, 1 − 1 2ηPs |hi |2 +d
r s i−k
being IT block can be written as k=1
mP for n > 0.
r 1
⎧
⎪
⎪ 1, |hi |2 < ā
⎨ dm
1 Pr
α̃i ≈ 2ηPs |hi |2 +dm , |hi |2 ≥ ā , |hi−1 |2 ≥ ā (D.1)
1 Pn
⎪
⎪
r
⎩ 1 r −2ηP |hi−k |2
m
d P
|hi | ≥ ā , |hi−k | < ā ∀ k = 1, . . . , n , |hi−(n+1) | ≥ ā
s 2 2 2
k=1
2ηPs |hi |2 +dm ,
1 Pr
⎧
⎪
⎨0, |hi |2 < ā || |gi |2 < b̄
χ0,i
τ̃i ≈ 2 , |hi |2 ≥ ā , |gi |2 ≥ b̄ , |h(t − T )|2 ≥ ā (D.2)
⎪
⎩ χn,i
2 , |hi |2 ≥ ā , |gi |2 ≥ b̄ , |hi−k |2 < ā ∀ k = 1, . . . , n , |hi−(n+1) |2 ≥ ā
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1620 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
channel gains are exponentially distributed, the throughput, τ̃ Step 4: Substituting (D.4) into (D.3) results in the lower
can be determined as follows. bound given in (25). Note that τ ≥ τ̃ because of the assumption
Eo = 0 used in the analysis. This completes the proof for
τ̃ = Ehn ,gi {τ̃i } Theorem 3.
= Ehn τ̃i |gi <b̄ p(gi < b̄) + τ̃i |gi ≥b̄ p(gi ≥ b̄)
= e−b̄ Ehn τ̃i |gi <b̄ A PPENDIX E
⎧∞ ⎫ P ROOF OF T HEOREM 4 IN (29)
⎨ ⎬
= e−b̄ Ehn \hi τ̃i |gi ≥b̄,hi ≥ā ehi dhi This appendix derives the analytical expression for the lower
⎩ ⎭
ā bound throughput τ , in (29).
∞ Step 1: In the block throughput expression, τi =
(1−Io,i )(1−αi )
= e−b̄ Ehn \hi ,hi−1 τ̃i |gi ≥b̄,hi ≥ā,hi−1 ≥ā ehi dhi p(hi−1 ≥ ā) 2 , the block outage indicator, Io,i , is independent
ā of the EH time αi . This is because Io,i , given in (19), depends
ā ∞ $ on the fading channel gi . However, αi in (26), depends on the
S − R fading channel, hi . Also, αi depends on the accumulated
+ τ̃i |gi ≥b̄,hi ≥ā,hi−1 <ā e−(hi +hi−1 ) dhi dhi−1
harvested energy Ei (0) at the start of the block (see (26)),
0
ā
which in turn depends on the S − R channel of the previous
∞
χ0,i hi blocks, i.e., {hi−1 , hi−2 , . . .}. Thus, analytical throughput, τ ,
= e−b̄ e−ā e dhi + Ehn \hi ,hi−1 ,hi−2 is given by
2
ā
ā∞ τ=
1
Eg {1 − Io,i } Eh {1 − αi }. (E.1)
−(hi +hi−1 ) 2 i
× τ̃i |gi ≥b̄,hi ≥ā,hi−1 <ā,hi−2 ≥ā e dhi dhi−1
Step 2: Using (19), the first expectation in (E.1),
0 ā χ1,i
= 2 E|gi |2 {1 − Io,i } is given by
ā ā ∞
× p(hi−2 ≥ ā) + τ̃i |gi ≥b̄,hi ≥ā,hi−1 <ā,hi−2 <ā Egi {1 − Io,i } = Egi 1l |gi |2 > b̄ = e−b̄ (E.2)
0 0 ā
$ Step 3: The second expectation in (E.1), Eh {1 − αi } is the
×e −(hi +hi−1 +hi−2 )
dhi dhi−1 dhi−2 expected value that any block is an IT block. From general EH-
IT pattern (a), given in Fig. 4, probability of any block being an
∞ ā ∞ IT block is given by
e−(ā+b̄)
= hi
χ0,i e dhi + χ1,i e−(hi +hi−1 ) dhi dhi−1 1
2 Eh {1 − αi } = , (E.3)
ā 0 ā EX̄,Y {X + Y + 1}
āā∞
+ χ2,i e −(hi +hi−1 +hi−2 )
dhi dhi−1 dhi−2 +· · · , Since the S − R channel is independent for different blocks,
X and Y are independent random variables. Thus, the denom-
0 0 ā
inator in (3) can be written as EX̄ {X} + EY {Y } + 1, where
(D.3)
EX̄ {X} is given by
ā ā ∞
EX {X} = EEo EX̄|Eo {X|Eo }
where ··· χn,i e(hi +···+hn ) dhi . . . dhi−n is given in
P
r T /2
0 0 ā
n+1 integrals = EX̄|Eo {X̄ + 1|Eo }fEo ( )d , (E.4)
(D.4), see equation at the bottom of the page and (D.3) is =0
obtained by taking the expectation over all the elements of the Pr T
set {hi , . . . , hi−n , gi }, one by one. where EX̄|Eo {X̄|Eo } = 1
ρ 2 − is defined below (15).
m
ā ā ∞ d Pr −2nηPs ((n−1)ā+q)
1
1
··· e−ā (1 − e−ā )n−1 (1 − e−q ) − e
2ηP
χn,i e(hi +···+hn ) dhi . . . dhi−n = s
2ηPs
0 0 ā
n+1 integrals
n−1 dm
1 Pr + 2ηPs ā
× eā − 1 (2nηPs q − dm
1 Pr + (d1 Pr − 2nηPs )e ) E1
m q
, (D.4)
2ηPs
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
NASIR et al.: WIRELESS-POWERED RELAYS IN COOPERATIVE COMMUNICATIONS 1621
Neglecting the harvested energy from Y successive EH [15] L. Liu, R. Zhang, and K.-C. Chua, “Wireless information transfer with
blocks due to relay outage, the pdf of Eo becomes the same opportunistic energy harvesting,” IEEE Trans. Wireless Commun., vol. 12,
no. 1, pp. 288–300, Jan. 2013.
as that given in Lemma 1. Hence, (E.4) simplifies to [16] V.-D. Nguyen, S. D. Van, and O.-S. Shin, “Opportunistic relaying with
wireless energy harvesting in a cognitive radio system,” in Proc IEEE
r T /2
P WCNC, New Orelans, LA, USA, Mar. 2015.
1 Pr T 1 − ρ Pr dm [17] B. Medepally and N. B. Mehta, “Voluntary energy harvesting relays
EX {X} ≤ − +1 e d = 1
, and selection in cooperative wireless networks,” IEEE Trans. Wireless
ρ 2 ρ 2ηPs λh
=0 Commun., vol. 9, no. 11, pp. 3543–3553, Nov. 2010.
(E.5) [18] P. Popovski, A. M. Fouladgar, and O. Simeone, “Interactive joint trans-
fer of energy and information,” IEEE Trans. Commun., vol. 61, no. 5,
where the inequality sign in (E.5) appears because for analysis pp. 2086–2097, May 2013.
[19] J. Xu and R. Zhang, “Throughput optimal policies for energy harvesting
we neglected the harvested energy from Y successive EH wireless transmitters with non-ideal circuit power,” IEEE J. Sel. Areas
blocks due to relay outage. Next, using the PMF of Y , pY (y) in Commun., vol. 32, no. 2, pp. 322–332, Feb. 2014.
(28), EY {Y } can be calculated as [20] L. Liu, R. Zhang, and K. C. Chua, “Wireless information and power
transfer: A dynamic power splitting approach,” IEEE Trans. Commun.,
∞
vol. 61, no. 9, pp. 3990–4001, Sep. 2013.
po,r [21] C. Shen, W.-C. Li, and T.-H. Chang, “Wireless information and en-
EY {Y } = y(1 − po,r )pyo,r = , (E.6)
y=0
1 − po,r ergy transfer in multi-antenna interference channel,” IEEE Trans. Signal
Process., vol. 62, no. 23, pp. 6249–6264, Dec. 2014.
[22] J. Park and B. Clerckx, “Joint wireless information and energy transfer in
∞ y o,r p a two-user MIMO interference channel,” IEEE Trans. Commun., vol. 12,
where y=0 ypo,r = (1−po,r )2 . Substituting (E.5) and (E.6)
no. 8, pp. 4210–4221, Aug. 2013.
into (E.3) and using the values of po,r and ρ from the proofs of [23] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resource allo-
Lemma 3 and Lemma 1, respectively, Eh {1−αi } is given by cation in multiuser OFDM systems with wireless information and power
transfer,” in Proc IEEE WCNC, Apr. 2013, pp. 3823–3828.
2ηPs e−ā [24] S. H. Lee, R. Zhang, and K. B. Huang, “Opportunistic wireless energy
Eh {1 − αi } ≥ −ā + 2ηP
. (E.7) harvesting in cognitive radio networks,” IEEE Trans. Wireless Commun.,
Pr dm
1 e s vol. 12, no. 9, pp. 4788–4799, Sep. 2013.
[25] Q. Shi, L. Liu, W. Xu, and R. Zhang, “Joint transmit beamforming and
Step 4: Finally substituting (E.7) and (E.2) into (E.1), we can receive power splitting for MISO SWIPT systems,” IEEE Trans. Wireless
Commun., vol. 13, no. 6, pp. 3269–3280, Jun. 2014.
find a lower bound on the throughput as given in (29). This [26] D. W. K. Ng, L. Xiang, and R. Schober, “Multi-objective beamforming for
completes the proof of Theorem 4. secure communication in systems with wireless information and power
transfer,” in Proc IEEE PIMRC, Sep. 2013, pp. 7–12.
[27] H. Ju and R. Zhang, “Throughput maximization information wireless
powered communication networks,” IEEE Trans. Wireless Commun.,
R EFERENCES vol. 13, no. 1, pp. 418–428, Jan. 2014.
[28] B. K. Chalise, Y. D. Zhang, and M. G. Amin, “Energy harvesting in an
[1] A. A. Nasir, X. Zhou, S. Durrani, and R. A. Kennedy, “Block-wise time-
OSTBC based amplify-and-forward MIMO relay system,” in Proc. IEEE
switching energy harvesting protocol for wireless-powered AF relays,” in
ICASSP, Mar. 2012, pp. 3201–3204.
Proc. IEEE ICC, London, U.K., Jun.2015.
[29] K. Ishibashi, H. Ochiai, and V. Tarokh, “Energy harvesting cooperative
[2] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with communications,” in Proc. IEEE PIMRC, Sep. 2012, pp. 1819–1823.
RF energy harvesting: A contemporary survey,” IEEE Commun. Surveys [30] A. M. Fouladgar and O. Simeone, “On the transfer of information and
Tuts., to be published. energy in multi-user systems,” IEEE Commun. Lett., vol. 16, no. 11,
[3] D. Gunduz, K. Stamatiou, N. Michelusi, and M. Zorzi, “Designing intel- pp. 1733–1737, Nov. 2012.
ligent energy harvesting communication systems,” IEEE Commun. Mag., [31] I. Krikidis, S. Timotheou, and S. Sasaki, “RF energy transfer for coopera-
vol. 52, no. 1, pp. 210–216, Jan. 2014. tive networks: Data relaying or energy harvesting?” IEEE Commun. Lett.,
[4] K. Huang and X. Zhou, “Cutting last wires for mobile communications vol. 16, no. 11, pp. 1772–1775, Nov. 2012.
by microwave power transfer,” IEEE Commun. Mag., to be published. [32] Y. Zeng and R. Zhang, “Full-duplex wireless-powered relay with
[Online]. Available: http://arxiv.org/abs/1408.3198 self-energy recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2,
[5] H. J. Visser and R. J. M. Vullers, “RF energy harvesting and transport pp. 201–204, Apr. 2015.
for wireless sensor network applications: Principles and requirements,” in [33] A. A. Nasir, X. Zhou, S. Durrani, and R. A. Kennedy, “Relaying protocols
Proc. IEEE, vol. 101, no. 6, pp. 1410–1423, Jun. 2013. for wireless energy harvesting and information processing,” IEEE Trans.
[6] H. Tabassum, E. Hossain, A. Ogundipe, and D. I. Kim, “Wireless-powered Wireless Commun., vol. 12, no. 7, pp. 3622–3636, Jul. 2013.
cellular networks: Key challenges and solution techniques,” IEEE Com- [34] Z. Chen, B. Xia, and H. Liu, “Wireless information and power trans-
mun. Mag., to be published. [Online]. Available: http://wireless.skku.edu/ fer in two-way amplify-and-forward relaying channels,” in Proc IEEE
english/UserFiles/File/final GlobalSIP, 2014, pp. 168–172.
[7] Powercast, 2015. [Online]. Available: http://www.powercastco.com/ [35] I. Krikidis, “Simultaneous information and energy transfer in large-scale
[8] N. Shinohara, Wireless Power Transfer Via Radiowaves. Hoboken, NJ, networks with/without relaying,” IEEE Trans. Commun., vol. 62, no. 3,
USA: Wiley, 2014. pp. 900–912, Mar. 2014.
[9] L. R. Varshney, “Transporting information and energy simultaneously,” [36] Z. Ding, S. M. Perlaza, I. Esnaola, and H. V. Poor, “Power allocation
in Proc. IEEE ISIT, 2008, pp. 1612–1616. strategies in energy harvesting wireless cooperative networks,” IEEE
[10] P. Grover and A. Sahai, “Shannon meets Tesla: Wireless information and Trans. Wireless Commun., vol. 13, no. 2, pp. 846–860, Feb. 2014.
power transfer,” in Proc. IEEE ISIT, Jun. 2010, pp. 2363–2367. [37] M. O. Hasna and M.-S. Alouini, “Performance analysis of two-hop re-
[11] K. Huang and E. Larsson, “Simultaneous information and power transfer layed transmissions over Rayleigh fading channels,” in Proc. IEEE VTC,
for broadband wireless systems,” IEEE Trans. Signal Process., vol. 61, 2002, vol. 4, pp. 1992–1996.
no. 23, pp. 5927–5941, Dec. 2013. [38] I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and products,
[12] X. Zhou, R. Zhang, and C. K. Ho, “Wireless information and power trans- 4 ed. New York, NY, USA: Academic, 1980.
fer: Architecture design and rate-energy tradeoff,” IEEE Trans. Commun., [39] R. G. Gallager, Discrete Stochastic Processes. Kluwer, Norwell, MA,
vol. 61, no. 11, pp. 4757–4767, Nov. 2013. USA: 1996.
[13] Z. Xiang and M. Tao, “Robust beamforming for wireless information [40] S. Shrestha and K. Chang, “Analysis of outage capacity performance for
and power transmission,” IEEE Wireless Commun. Lett., vol. 1, no. 4, cooperative DF and AF relaying in dissimilar {R}ayleigh fading chan-
pp. 372–375, Aug. 2012. nels,” in Proc IEEE ISIT, Jul. 2008, pp. 494–498.
[14] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless [41] S. Ryhove, G. E. Oien, and L. Lundheim, “An efficient design methodol-
information and power transfer,” IEEE Trans. Wireless Commun., vol. 12, ogy for constant power link adaptation schemes in short-range scenarios,”
no. 5, pp. 1989–2001, May 2013. IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2132–2144, Jul. 2008.
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.
1622 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015
Ali A. Nasir (S’09–M’13) received the B.Sc. Salman Durrani (S’00–M’05–SM’10) received the
(1st class honours) degree in electrical engineering B.Sc. (1st class honours) degree in electrical en-
from the University of Engineering and Technology gineering from the University of Engineering &
(UET), Lahore, Pakistan, in 2007. He joined the Aus- Technology, Lahore, Pakistan in 2000. He received
tralian National University (ANU), Canberra, ACT, the Ph.D. degree in electrical engineering from the
Australia, in 2009, where he received the Ph.D. in University of Queensland, Brisbane, Australia, in
electrical engineering in 2013 and currently works December 2004. He has been with the Australian
as a Research Fellow in the Research School of National University, Canberra, Australia, since 2005,
Engineering, College of Engineering & Computer where he is currently Senior Lecturer in the Re-
Science. His research interests are in the area of search School of Engineering, College of Engineer-
signal processing in wireless networks. He is an ing & Computer Science. His research interests are
Associate Editor for IEEE C ANADIAN J OURNAL OF E LECTRICAL AND in wireless communications and signal processing, including synchronization
C OMPUTER E NGINEERING. He has also served as the TPC member of major in communication systems, wireless energy harvesting systems, outage and
IEEE conferences. Dr. Nasir was awarded a University Gold Medal for out- connectivity of finite area networks and signal processing on the unit sphere.
standing performance during the final year of his undergraduate studies. He He currently serves as an Editor of the IEEE T RANSACTIONS ON C OMMUNI -
is a recipient of an ANU International Ph.D. scholarship for the duration of his CATIONS and as the Chair of the ACT Chapter of the IEEE Signal Processing
Ph.D. He was also awarded an ANU Vice Chancellor’s Higher Degree Research and Communications Societies. He is a Member of Engineers Australia and a
(HDR) travel grant in 2011. Senior Fellow of The Higher Education Academy, U.K.
Authorized licensed use limited to: Khon Kaen University provided by UniNet. Downloaded on November 09,2020 at 01:55:40 UTC from IEEE Xplore. Restrictions apply.