Loading [MathJax]/extensions/TeX/boldsymbol.js
Minimizing Age of Information in Energy Harvesting Wireless Sensor Networks | IEEE Journals & Magazine | IEEE Xplore

Minimizing Age of Information in Energy Harvesting Wireless Sensor Networks


Uplink transmission of single-antenna sensors powered by energy harvesting (EH) to a common fusion center (FC) with the aim of cooperatively minimizing the overall averag...

Abstract:

We consider the uplink of an energy harvesting (EH) wireless sensor network (WSN) where N single-antenna sensors communicate with a common fusion center (FC) with the aim...Show More

Abstract:

We consider the uplink of an energy harvesting (EH) wireless sensor network (WSN) where N single-antenna sensors communicate with a common fusion center (FC) with the aim of cooperatively minimizing the overall average age of information (AoI). Specifically, we propose new resource allocation algorithms to minimize the average AoI in an EH-WSNs employing common multiple-access schemes, in particular time-division multiple access (TDMA) and frequency-division multiple access (FDMA). To this end, we take advantage of the convexity of the derived AoI, enabling an optimal resource block assignment, implemented as a greedy algorithm for TDMA systems and in the form of an alternating direction method of multipliers (ADMM) scheme for FDMA systems. The optimality of the greedy resource allocation scheme derived for the TDMA case is obtained by design, whereas that of the ADMM-based method derived for the FDMA case is demonstrated numerically. Simulation results indicate that the choice between TDMA or FDMA depends on the available resources, size of the data packet, and the time of packet observation in the system.
Uplink transmission of single-antenna sensors powered by energy harvesting (EH) to a common fusion center (FC) with the aim of cooperatively minimizing the overall averag...
Published in: IEEE Access ( Volume: 8)
Page(s): 219934 - 219945
Date of Publication: 18 November 2020
Electronic ISSN: 2169-3536

Funding Agency:


CCBY - IEEE is not the copyright holder of this material. Please follow the instructions via https://creativecommons.org/licenses/by/4.0/ to obtain full-text articles and stipulations in the API documentation.
SECTION I.

Introduction

Owing to the latest advances in sensing and data transmission technologies, various monitoring services employing wireless sensor networks (WSNs) have been proposed over the years to solve problems in domains such as transportation [2], health [3], and the environment [4], culminating with the notion of digital twins (DTs) [5], [6].

Digital twins are digital representations of physical devices or systems based on data collected in real time, which continuously track physical changes in the devices/systems while forecasting possible future states of the corresponding physical components. Given that a very large number of devices may be connected to feed a DT, the corresponding data must be collected in a distributed and reliable fashion. These requirements can be satisfied by energy harvesting (EH) WSNs, well known for their self-reliance and low-maintenance characteristics.

Indeed, EH techniques have been well-studied [7]–​[12] and matured enough that it can be assumed that the technology will soon become ubiquitous, equipping devices with the capability to convert energy from natural (i.e. solar radiation, vibration, and temperature differences) or artificial sources (i.e. wireless energy transfer) into electric power required to run sensors. In addition, networking protocols specific for EH-WSNs have also been developed [13]–​[17], which contribute to the reliability of such systems.

However, a problem associated with the latter paradigm that has received comparatively less attention is the “freshness” issue or the age of information (AoI) of messages collected and distributed by EH-WSNs. Indeed, protocols for EH-WSNs have so far largely focused on energy and data arrival processes, without addressing the fact that, in practice, data collected by EH-WSNs may be outdated, which affects their suitability to DT applications. Thus, a new concept is needed to ensure the freshness of information in such time-bound data-oriented systems, as argued e.g. in [18], [19].

As noted in [18], [19], AoI can be defined as the time elapsed from the moment the information is generated and captured by the sensor, until it is received by the destination, which, in the case of our application of interest can be considered as the FC. Interestingly, as reported in [20]–​[24], the optimal strategy that minimizes AoI is different from conventional data rate maximization and delay minimization strategies, motivating the design of new WSN optimization approaches for DT applications in which freshness of information is fundamental.

However, similar to data rate and delay, AoI is also impacted by the presence of multiple users – or in the context of WSNs, multiple sensors – that compete for the same frequency and time resources, which must therefore be properly allocated or scheduled. Considering this issue, resource allocation schemes aimed at minimizing AoI in time-division multiple access (TDMA) and frequency-division multiple access (FDMA) systems have been studied in [25]–​[29]. In addition, the characterization of AoI has been studied for random access networks in [30] and for carrier sense multiple access (CSMA) networks with distributed scheduling in [31]. We remark, however, that the scenarios considered in the aforementioned works are not constrained by the possibility of battery outage or random energy arrival processes, as faced by maintenance-free EH-WSNs. In turn, EH-oriented AoI minimization problems have been previously investigated in [32]–​[37], but for a unidirectional communication scenario in which a single EH-sensor node (SN) continuously sends status updates to a single FC.

Considering that practical DT-WSN scenarios rely on multiple SNs communicating with a common FC, we argue that in order to address the DT case, contributions such as those of [32]–​[37] need to be generalized, in particular toward the design of optimal resource allocation handling multiple SNs, aimed at minimizing the average AoI under battery-constrained conditions. To the best of our knowledge, no mechanism to minimize the AoI in DT EH-WSNs has been proposed thus far. In this study, we therefore investigate a system with N EH-SNs that simultaneously communicates with a common FC, proposing novel resource allocation algorithms both in TDMA and FDMA modes to minimize the corresponding average aggregate AoI.

The remainder of this article is organized as follows. The system model is described in Section II, while the convexity analysis and mathematical expression for AoI in the case of sensor network systems with one SN and one FC are presented in Section III-A. In Section III-B, we consider a more general scenario where N SNs send data to a common FC, proposing new radio resource allocation algorithms for both TDMA and FDMA scenarios. The numerical results of the proposed algorithms are shown in Section IV, and the conclusions are presented in Section V.

Notation

Vectors and scalars are denoted by bold and standard fonts, such as in \mathbf {x} and x , respectively. The absolute value and ceiling functions are respectively denoted by |x| and \lceil x \rceil \triangleq \min \:\{n \in \mathbb {Z}\:|\:n \geq x\} . Sets of natural, real, and complex numbers are respectively denoted by \mathbb {Z} , \mathbb {R} and \mathbb {C} . Finally, the fact that a random variable x follows the complex Gaussian distribution with mean \mu and variance \sigma ^{2} is expressed as x \sim \mathcal {C}(\mu,\sigma ^{2}) .

SECTION II.

System Model

Consider the uplink of a WSN consisting of N single-antenna SNs sending status updates to one common FC, as shown in Fig. 1, such that each SN is subjected to limited power harvested from environmental sources such as solar radiation, vibration, and radio frequency waves. It is assumed that the length of an uplink packet transmitted by an i -th SN is denoted by D_{i}\:\mathrm {[bits]} , where i\in \{1,2,\ldots,N\} denotes the node index, and all the harvested energy (no loss) is stored in a supercapacitor embedded in each SN. For the sake of simplicity but without loss of generality, we assume that the initial amount of energy stored in each supercapacitor is 0\:\mathrm {[J]} . Denoting the average harvested power at the i -th SN by E_{i}\:\mathrm {[W]} , the amount of energy available after k_{i}\in \mathbb {Z ^ {+}} normalized unit time samples can be expressed as k_{i} E_{i}\:\mathrm {[J]} . Furthermore, assuming that we adopt uniform power allocation over n_{i}\in \mathbb {Z ^ {+}} transmission time slots, the transmitted power at each time slot can be described as k_{i}E_{i}/n_{i}\:\mathrm {[W]} . In turn, the communication channel from the i -th SN to the FC is modeled as a flat fading channel with gains h_{i} , subjected to zero mean additive white Gaussian noise (AWGN) characterized by a noise power spectral density N_{0}\:\mathrm {[W/Hz]} , with a total system bandwidth of B_{\mathrm {total}}\:\mathrm {[Hz]} .

FIGURE 1. - EH-WSNs model with 
$N$
 single-antenna sensor nodes (SNs) transmitting status update information to a common fusion center (FC). Each SN is equipped with an EH power source and aims to cooperatively minimize the overall average AoI.
FIGURE 1.

EH-WSNs model with N single-antenna sensor nodes (SNs) transmitting status update information to a common fusion center (FC). Each SN is equipped with an EH power source and aims to cooperatively minimize the overall average AoI.

Another aspect of the system model that is fundamental to the analysis of the AoI of distributed systems is the time of origin of information, relative to the timestamp of transmitted packets. To elaborate, analyses of AoI can be found in the literature; they are based on two distinct timing conditions, namely, a distributed model in which each SN has its own time origin, as adopted e.g. [28], and a concurrent model in which a common time origin is shared by all SNs as adopted for instance in [29], [32].

Both these models are valid as they address distinct applications. For example, the distributed model employed in [28] is better suited to applications such as the monitoring of structures (e.g. bridges, tunnels, and towers), in which multiple sensors are installed on the same structure, so that an update indicating a status deterioration at any of the SNs indicates a deterioration of the structure itself. In turn, the concurrent model adopted e.g. in [29], [32], which is also more commonly utilized, addresses applications such as DT, in which different pieces of information collected by different SNs contribute to composing a larger whole, e.g. the digital twin of a given system.

Having made this remark, in this article, we focus on the latter (more prevalent) concurrent timing approach, in which the multi-access scheme employed has also a greater impact, especially in the context of EH networks, as it affects both the time SNs must wait from the moment data is collected until they can transmit in the case of TDMA schemes, as well as the time available for EH nodes to gather sufficient energy to transmit, in the case of an FDMA scheme.

SECTION III.

AoI Minimization Problem Over Multiple-Access Channels

A. Preliminary: Single SN-FC Link

For the sake of completeness and clarity of exposition, we first consider a simple scenario in which a single SN communicates with the FC, as studied in [32]. Then, the capacity of the corresponding channel for a fixed h can be written as \begin{equation*} C \triangleq B \log_{2} \left({1+|h|^{2}\dfrac {kE}{n B N_{0}}}\right),\tag{1}\end{equation*} View SourceRight-click on figure for MathML and additional features. where B is the bandwidth assigned to the SN.

We observe that the SN can successfully transfer its data D to the FC if and only if the total information communicated at best at the rate C over the transmission time n , exceeds D . In other words, the following condition must be satisfied in order for the delivery to be successful \begin{equation*} D \le nC.\tag{2}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Following related literature [19], [32], the AoI P of the node is the reward over the total elapsed time, including the harvesting time k and the data transmission time n , i.e. \begin{equation*} P \triangleq \frac {1}{2}(k + n)^{2}.\tag{3}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Given the above, we now consider the AoI minimization problem subject to the throughput requirement given in the inequality (2), namely \begin{align*}&{\mathop {\mathrm {minimize}} \limits_{k, n}}\:\:P, \tag{4a}\\& \mathrm {subject~ to} \:\:D \le nC.\tag{4b}\end{align*} View SourceRight-click on figure for MathML and additional features.

Substituting (1) into (2) and expressing the harvesting time k that satisfies the constraint of inequality (2), we obtain \begin{equation*} k \geq \bigg \lceil \frac {n B N_{0}}{|h|^{2} E}\left ({2^{\frac {D}{n B}}-1}\right ) \bigg \rceil,\tag{5}\end{equation*} View SourceRight-click on figure for MathML and additional features. such that the minimum harvesting time k as a function of the transmission time n can be obtained from the lower bound of the latter inequality, i.e. , \begin{equation*} k(n) = \frac {n B N_{0}}{|h|^{2} E}\left ({2^{\frac {D}{n B}}-1}\right ). \tag{6}\end{equation*} View SourceRight-click on figure for MathML and additional features.

By combining equations (3) and (6), the AoI can be expressed as a function of n , namely \begin{equation*} f(n) = \frac {1}{2}(k(n) + n)^{2}.\tag{7}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Owing to the relaxation in equation (6), the function f(n) in equation (7) can be considered as a lower bound of the AoI P , such that the constrained optimization problem in equation (4) is an equivalent unconstrained problem \begin{equation*} {\mathop {\mathrm{minimize}} \limits_{n}}\:\:\:f(n).\tag{8}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Although k and n are treated as real numbers in the above section, we shall hereafter limit these quantities to positive integer (i.e. , natural) values to accommodate for the discrete nature of packetized TDMA networks as well as of synchronous FDMA schemes. Since the solution of equation (8) is generally not integer, the desired solution of the problem will be taken as a projection of the solution n^{*} of (8) onto the feasible set, namely, (\lceil {n^{*}}\rceil,\:\lceil {k(n^{*})}\rceil ) .

A comparison between the average AoI achievable with continuous versus discrete times is shown in Fig. 2. To be more specific, the figure exhibits plots of \mathbb {E}[f(n)] with f(n) as in equation (7), respectively with n\in \mathbb {R} and k(n) as in equation (6) averaged over multiple realizations of h , and with the transmission and harvesting times projected to their closest upper-bounding integers (\lceil {n^{*}}\rceil,\lceil {k(n^{*})}\rceil ) . It can be seen that a fundamental penalty is paid for the discretization of time required by synchronous access schemes such as TDMA and FDMA, which increases with the transmission time n .

FIGURE 2. - Average AoI with continuous and discrete transmission and harvesting times, for a single-SN system with 
$D=1$
 [Mbit], 
$E=1.0$
 [mW], and base SNR 
$\triangleq\frac{\mathbb{E}[|h|^{2}]}{BN_{0}} = 30$
 [dB].
FIGURE 2.

Average AoI with continuous and discrete transmission and harvesting times, for a single-SN system with D=1 [Mbit], E=1.0 [mW], and base SNR \triangleq\frac{\mathbb{E}[|h|^{2}]}{BN_{0}} = 30 [dB].

We emphasize also that such a penalty does not include the possible sub-optimality incurred by projecting the real-valued solution of the problem in equation (8) onto \mathbb {N} , as opposed to solving the problem directly over \mathbb {N} , which however is NP-hard.

To conclude this subsection, we address the solution of the AoI minimization problem given by equation (7), which is facilitated by the following two results.

Proposition 1:

With E>0,\;D>0,\:B>0,\:N_{0}>0,\:|h|^{2}>0 , \beta \triangleq B N_{0} / E , and \gamma \triangleq D / B , the AoI f(n) given by equation (7) is convex with respect to n .

Proof:

See Appendix A.

Proposition 2:

For \gamma >0 and \beta >0 , the unique solution n^{*} of the minimization problem described by equation (8) can be obtained by solving the implicit equation \begin{equation*} \frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta \gamma \log (2)}{|h|^{2} n}2^{\frac {\gamma }{n}} + 1 = 0. \tag{9}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Proof:

See Appendix B.

Finally, we introduce the main result of this subsection, in the form of the following Proposition.

Proposition 3:

For \gamma >0 and \beta >0 , the solution of equation (9), i.e. , the transmission time n^{*} that minimizes the AoI in the single SN-FC link, is bounded by \begin{equation*} n^{*}_{L}\triangleq \frac {\gamma }{\log_{2}\left ({e-1+\frac {|h|^{2}}{\beta }}\right )} \leq \underbrace {n^{*} \leq \gamma \log 2 \triangleq n^{*}_{U}}_{\forall \;|h|^{2} > \beta }, \tag{10}\end{equation*} View SourceRight-click on figure for MathML and additional features. where we emphasize that the condition |h|^{2} > \beta is only required for the upper-bounding relation to hold.

Proof:

See Appendix C.

B. Generalization: Multiple SNs-FC Links

Taking advantage of the formulation presented above, we now consider a more general scenario where N SNs simultaneously transmit, with the help of either a TDMA or an FDMA scheme, to a common FC, proposing two corresponding resource allocation schemes optimized to minimize the mean AoI of both systems.

To this end, we first define the mean conditional1 AoI minimization problem associated with a scenario with N SNs, which can be expressed as \begin{equation*} {\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}}\:\:\frac {1}{N} \sum_{i=1}^{N} f(n_{i}),\tag{11}\end{equation*} View SourceRight-click on figure for MathML and additional features. where \boldsymbol {n} \triangleq \{n_{1}, n_{2},\ldots,n_{N}\} .

1) Time Division Multiple Access Systems

To avoid interference among the N SNs, in a TDMA scheme the entire bandwidth available in the system B_{\mathrm {total}} is assigned to a single SN during its transmission time interval n_{i} . In other words, we have \begin{equation*} B_{i} = B,\,\forall \,. \tag{12}\end{equation*} View SourceRight-click on figure for MathML and additional features.

For the sake of simplicity, it shall also be assumed hereafter that all SNs are subjected to the same conditions, such that the average harvested energy E and the amount of data to be transmitted D are the same for all SNs.

Finally, under a TDMA scheme, only one SN is allowed to transmit during its allocated time, which can be expressed by the constraint \begin{equation*} \sum_{i=1}^{N} \mathsf{1}_{i}(t) \leq 1,\tag{13}\end{equation*} View SourceRight-click on figure for MathML and additional features. where \mathsf{1}_{i}(t) is an indicator function that takes the value 1 at k_{i} < t \leq (k_{i}+n_{i}) and 0 elsewhere.

Taking into account the above constraints, the resource allocation problem to minimize the average AoI in TDMA can be formulated as \begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}}\:\: \frac {1}{N} \sum_{i=1}^{N} f(n_{i}), \tag{14a}\\& \mathrm{subject~ to} \:\: \sum_{i=1}^{N} \mathsf{1}_{i}(t) \leq 1,\quad \forall \,0\leq t\leq k_{N} + n_{N}. \tag{14b}\end{align*} View SourceRight-click on figure for MathML and additional features.

In order to gain insight on how to solve the problem described above in a general setting, we first consider a particular case with only two SNs, labeled SN1 and SN2. Following our notation, the optimal transmission times associated with these two SNs will be denoted n_{1}^{*} and n_{2}^{*} , respectively, with their corresponding minimum energy harvesting times, obtained from equation (6), denoted accordingly by k(n_{1}^{*}) and k(n_{2}^{*}) .

Referring to Figure 3, it is evident that in this case, the problem of minimizing the mean conditional AoI reduces to determining which of the two nodes shall transmit first, a decision which is informed by whether the time taken by the first node to complete its harvesting-and-transmission cycle is sufficient to enable the second node to harvest enough energy for its own transmission.

FIGURE 3. - Illustration of the four allocation arrangements in a TDMA-based EH-WSN with two SNs and one FC.
FIGURE 3.

Illustration of the four allocation arrangements in a TDMA-based EH-WSN with two SNs and one FC.

In other words, the optimal time allocation is fundamentally driven by the tests k(n_{2}^{*}) \gtrless k(n_{1}^{*}) + n_{1}^{*} and k(n_{1}^{*}) \gtrless k(n_{2}^{*}) + n_{2}^{*} , with the best strategy being given by the one in which the SN second to transmit has enough time to harvest all the required energy during the transmission of the first node, such that its transmission can start immediately after the first.

To elaborate further, following the illustration in Figure 3, there are four distinct cases to be considered, namely:\begin{align*} \bar {f}_{A}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} \big )^{2}, \tag{15a}\\ \bar {f}_{B}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} + n_{2}^{*} \big )^{2}, \\ \tag{15b}\\ \bar {f}_{C}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big)^{2}, \\ \tag{15c}\\ \bar {f}_{D}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} + n_{1}^{*} \big )^{2}, \\ {}\tag{15d}\end{align*} View SourceRight-click on figure for MathML and additional features. where \bar {f}(n_{1},n_{2})\triangleq \frac {f(n_{1})+f(n_{2})}{2} and the indices A, B, C and D represent the four distinct possibilities as illustrated.

It can be seen that the cases A and C , with corresponding mean conditional AoI given by (15a) and (15c), respectively, are inefficient because they cause the channel to remain idle after the first to transmit SN completes its cycle, while SN second to transmit harvests the required energy for its own transmission. It follows therefore that the optimum allocation strategy in this particular setting of two SN lays in between the cases B and D . Furthermore, it is evident that the optimum choice between these two options is governed by the test \begin{equation*} {\bar {f}}_{B} \overset {\mathrm{SN}_{2} \to \mathrm{SN}_{1}}{\underset{\mathrm{SN}_{1} \to \mathrm{SN}_{2}}{\gtrless} } {\bar {f}}_{D},\tag{16}\end{equation*} View SourceRight-click on figure for MathML and additional features. which, if stated in words, signifies that the transmission order SN2 followed by SN1 is optimal if \bar {f}_{B}>\bar {f}_{D} , whereas the order SN1 followed by SN2 is optimal if \bar {f}_{B}< \bar {f}_{D} .

In light of the above, we consider the following results.

Proposition 4:

For \gamma >0 and \beta >0 , \begin{align*} |h_{1}|^{2} > |h_{2}|^{2}\Longrightarrow&n^{*}_{1L} < n^{*}_{2L},\tag{17a}\\ n_{1U}^{*}=&n_{2U}^{*}.\tag{17b}\end{align*} View SourceRight-click on figure for MathML and additional features.

Proof:

See Appendix D.

Proposition 5:

For \gamma >0 and \beta >0 , \begin{align*} |h_{1}|^{2} \!>\! |h_{2}|^{2} \;\Longrightarrow&\; k(n^{*}_{1L};h_{1}) \!< \! k(n^{*}_{2L};h_{2}),\tag{18a}\\ |h_{1}|^{2}\! >\! |h_{2}|^{2}\! >\! \beta\Longrightarrow&k(n_{1U}^{*};h_{1}) \!< \! k(n_{2U}^{*};h_{2}),\tag{18b}\end{align*} View SourceRight-click on figure for MathML and additional features. where the bounding quantities (n^{*}_{1L},n^{*}_{1U}) are as defined in Proposition 3 and its proof

Proof:

See Appendix E.

Proposition 6:

For \gamma >0 and \beta >0 , \begin{align*} \bar {f}_{B}(n_{1L}^{*},n_{2L}^{*})< &\bar {f}_{D}(n_{1L}^{*},n_{2L}^{*}),\tag{19a}\\ \bar {f}_{B}(n_{1U}^{*},n_{2U}^{*})< &\bar {f}_{D}(n_{1U}^{*},n_{2U}^{*}).\tag{19b}\end{align*} View SourceRight-click on figure for MathML and additional features.

Proof:

See Appendix F.

We remark that setting |h_{1}|^{2} > |h_{2}|^{2} is without loss of generality as it amounts merely to ordering the SNs. Although a closed-form expression of the optimum transmission times n_{1}^{*} and n_{2}^{*} cannot be obtained, Proposition 6 in fact establishes that, given knowledge of |h_{1}|^{2} and |h_{2}|^{2} only, the wisest TDMA allocation strategy in a system with two SNs is a “greedy” scheme in which the SN with the strongest channel gain precedes the other SN, since under such a strategy both the lower and upper bounds on the mean AoI \bar {f}_{B}(n_{1}^{*},n_{2}^{*}) are inferior to those of the alternative “Robin Hood” (the weaker SN first) strategy of allocating times the other way around.

Furthermore, the impossibility to be certain of the optimality of the greedy allocation does not detract from the overall optimality of the TDMA strategy described, because the optimality of the initial choice can be easily verified (and if necessary reverted) by solving equation (9) via a simple bisection algorithm, which is only made more efficient given the assured bounds offered in Propositions 4 and 5.

Next, we consider a more general setting, where N SNs communicate with the FC through a TDMA scheme. In this case, referring to Figure 3, it is evident that since all SNs stay in EH mode while the greedily-selected SNs transmit, after a sufficiently large number of SNs have transmitted the order of the remaining SNs is irrelevant to optimality.

In other words, the uncertainty of the channel power-based greedy selection between any pair of SNs (i,i+1) decreases with i . Taking all the above into consideration, an optimal TDMA strategy to minimize the average AoI can be obtained for the general system with N SNs, by repeating the pair-wise greedy-selection described above.

In summary, the optimal TDMA strategy is therefore:

  1. Sort the indices SNs in descending order of channel power, such that |h_{1}|^{2} > \cdots > |h_{N}|^{2} ;

  2. Set i=1 and solve equation (9) via bisection using the bounds in inequalities (17) only for two strongest SNs, obtaining n_{i}^{*} and n_{i+1}^{*} ;

  3. If and only if all remaining nodes have not harvested enough energy, and \bar {f}_{B}(n_{1}^{*},n_{2}^{*}) > \bar {f}_{D}(n_{1}^{*},n_{2}^{*}) , swap the indices n_{1}^{*}\leftrightarrow n_{2}^{*} ;

  4. Allocate n_{i}^{*} , and remove i index from the list \boldsymbol {N} ;

  5. Repeat steps 2 to 4 until there is only one SN left, which is allocated last.

The pseudocode corresponding to the TDMA allocation procedure described above that minimizes the mean AoI of an EH-WSNs with N -SNs is shown in Algorithm 1.

Algorithm 1 Greedily-Initialized TDMA AoI Minimizer

Inputs:

E>0 , D>0 , B>0 , N_{0}>0 and |h_{i}|^{2}>0 , with i\in \boldsymbol {N}\triangleq \{1,\ldots,N\} .

Outputs:

Optimal transmission time \boldsymbol {n}^{*} \in \mathbb {R}^{+} and optimal harvested time \boldsymbol {k}^{*} \in \mathbb {R}^{+} .

Initialization:

1:

Set loop counter i = 1 .

2:

Set initial transmission times \boldsymbol {n}\gg 1 .

3:

Set initial harvesting times \boldsymbol {k}=0 .

4:

Sort SN indices \boldsymbol {N} such that |h_{1}|^{2}>\cdots >|h_{N}|^{2} .

Core Procedure:

5:

while | \boldsymbol {N}|\geq 2 do

6:

Find the optimal n^{*}_{i} and n^{*}_{i+1} by solving (25c).

7:

if \bar {f}_{B}(n_{i}^{*},n_{i+1}^{*})>\bar {f}_{D}(n_{i}^{*},n_{i+1}^{*}) then

8:

Swap indices i and i+1

9:

end if

10:

if i \geq 2 and (14b) is not satisfied then

11:

Update k(n_{i}) = k(n_{i-1}) + n_{i-1}

12:

end if

13:

Update \boldsymbol {N}\leftarrow \boldsymbol {N}\, {\backslash } i

14:

Append \boldsymbol {n}^{*} with n_{i} and \boldsymbol {k}^{*} with k(n_{i})

15:

Update i \leftarrow i + 1 .

16:

end while

2) Frequency Division Multiple Access Systems

In contrast to the TDMA scheme, in an FDMA system, SNs can transmit data to the FC and in an orthogonal manner, at the expense of a reduction in the bandwidth B_{i} used by each SN, which is a fraction of the total available bandwidth B_{\mathrm {total}} . In this case, the mean AoI minimization problem can be written as \begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n},\; \boldsymbol {B}}}\:\:\frac {1}{N} \sum_{i=1}^{N} f(n_{i}, B_{i}), \tag{20a}\\&\mathrm{subject~ to}\:\: B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} = 0,\tag{20b}\end{align*} View SourceRight-click on figure for MathML and additional features. where \boldsymbol {B} \triangleq \{ B_{1}, B_{2},\ldots, B_{N} \} .

Since the objective function given (20a) involves a coupled expression of the optimization variables \boldsymbol {n} and \boldsymbol {B} , as shown in (6) and (7), it is difficult to solve the above optimization analytically and globally. Therefore, we resort to an alternating optimization framework where (20) is divided into optimization problems (I) and (II) as follows.

  1. Optimization problem for bandwidth allocation \boldsymbol {B} \begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {B}}} \:\: \frac {1}{N} \sum_{i=1}^{N} f(B_{i}|n_{i}), \tag{21a}\\&\mathrm{subject~ to}\:\: B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} = 0.\tag{21b}\end{align*} View SourceRight-click on figure for MathML and additional features.

  2. Optimization problem for transmission time allocation \boldsymbol {n} \begin{equation*} {\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}} \:\: \frac {1}{N} \sum_{i=1}^{N} f(n_{i}|B_{i}). \tag{22}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Next, consider the following result.

Proposition 7:

For \:E_{i}>0,\:|h_{i}|^{2}>0,\;N_{0}>0,\;D_{i}>0 and n_{i}>0 , the function f(B_{i}|n_{i}) is convex with respect to B_{i} .

Proof:

Please see Appendix G.

The convexity of f(B_{i}|n_{i}) established by Proposition 7 implies that problem (21) can be efficiently solved via the alternating direction method of multipliers (ADMM) [38].

More specifically, following [38], [39], convex problems of the form described in (21) can be solved by successive iterations of the following steps:\begin{align*} \boldsymbol {B}\leftarrow&{\mathop {\mathrm{argmin}} \limits_{ \boldsymbol {B}}} \: L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u), \tag{23a}\\[-1ex] \theta\leftarrow&\: \left({B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} }\right),\tag{23b}\\[-1ex] u\leftarrow&\: u + \theta, \tag{23c}\end{align*} View SourceRight-click on figure for MathML and additional features. where \theta \in \mathbb {R} is an auxiliary variable, u is the scaled dual variable, and L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u) is the associated augmented Lagrangian of the problem, which, for a penalty parameter \rho >0 , is given by \begin{align*}&\hspace {-2pc}L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u) \\=&\sum_{i=1}^{N} f(B_{i}|n_{i})+\frac {\rho }{2} \left({\!B_{\mathrm {total}}\! -\! \sum_{i=1}^{N} B_{i}\! +\! u\!}\right)^{\!\!2}\!\!\! + \frac {\rho }{2} u^{2}.\tag{24}\end{align*} View SourceRight-click on figure for MathML and additional features.

Similarly, the convexity of f(n_{i}|B_{i}) with respect to n_{i} established by Proposition 1, together with the bounds on its minimizer established by Proposition 3, enables the efficient solution of problem (22) via the bisection method (BM). Altogether, using these two techniques, the optimum bandwidth and transmit time allocation problem (20) can be obtained by solving equations (21) and (22) alternately. A pseudocode summarizing the method described above is given in Algorithm 2.

Algorithm 2 ADMM - BM AoI Minimizer

Inputs:

E_{i}>0 , |h_{i}|^{2}>0 , N_{0}>0 , B_{\mathrm {total}}>0 , B_{i}>0 , D_{i}>0 , n_{i}>0 , i\in \boldsymbol {N}\triangleq \{ 1,\ldots,N\} , convergence range \varepsilon , and number of iterations for outer and inner loops s_{\mathrm {out}}^{\mathrm {max}} and s_{\mathrm {in}}^{\mathrm {max}} .

Outputs:

Optimal transmission times \boldsymbol {n}^{*} \in \mathbb {R}^{+} and optimal bandwidths \boldsymbol {B}^{*} \in \mathbb {R}^{+} .

1:

Initialize outer loop counter to s_{\mathrm {out}} = 1 .

2:

Set initial transmission time \boldsymbol {n}^{s_{\mathrm {out}}}\gg 1 and \theta \gg 1 .

3:

while s_{\mathrm {out}} \leq s_{\mathrm {out}}^{\mathrm {max}} and | \boldsymbol {n}^{s_{\mathrm{out}}}- \boldsymbol {n}^{s_{\mathrm{out}}-1}| > \varepsilon do

4:

Initialize the inner loop counter to s_{\mathrm {in}} = 1 .

5:

while s_{\mathrm {in}} \leq s_{\mathrm {in}}^{\mathrm {max}} and \theta > \varepsilon . do

6:

Update B_{i}^{s_{\mathrm{in}}} , \theta ^{s_{\mathrm{in}}} and u^{s_{\mathrm{in}}} via equation (23).

7:

Update s_{\mathrm {in}} \leftarrow s_{\mathrm {in}} + 1 .

8:

end while

9:

Find the \boldsymbol {n}^{s_{\mathrm{out}}} by solving (9).

10:

Update s_{\mathrm {out}} \leftarrow s_{\mathrm {out}} + 1 .

11:

end while

12:

\boldsymbol {n}^{*} = \boldsymbol {n}^{s_{\mathrm {out}}} and \boldsymbol {B}^{*} = \boldsymbol {B}^{s_{\mathrm {in}}} .

SECTION IV.

Numerical Results

In this section, we present numerical results that build on the analysis and algorithms developed above to reveal the impact of EH, as well as of TDMA and FDMA multiple-access strategies, on the optimized AoI of WSNs. To this end, we first evaluate the performance of the proposed optimization algorithms in terms of the average AoI values in TDMA and FDMA scenarios and over fading channels.

Following a related study [11], [40], we set the total bandwidth and noise power spectrum density of the system to B_{\mathrm {total}}\!=\!1\:\mathrm {[MHz]} and N_{0}\! =\! 10^{-17}\:\mathrm {[mW/Hz]} , respectively, and assume that h_{i} follows independent and identically distributed (i.i.d.) Gaussian distributions (Rayleigh fading channel) with the SNs and the FC separated by a distance of 1 [km] and the path loss for that distance set to 100 [dB]. Finally, the volume of information transmitted is set to D_{i} = 1\:\mathrm {[Mbit]} , and the average EH rate (i.e. , the expected EH power) is set to E_{i} = 1.0\:\mathrm {[mW]} for all SNs.

Fig. 4 shows the average AoI performance, as a function of the number of SNs in the system, achieved by Algorithms 1 and 2 in such a scenario with TDMA and FDMA. More specifically, Fig. 4(a) shows results for the concurrent case of e.g. in [29], [32], when the sensed information is obtained simultaneously by all SNs and them transmitted after the SNs the required energy is harvested.

FIGURE 4. - Average AoI as a function of the number of SNs in TDMA and FDMA with i.i.d. Rayleigh channels.
FIGURE 4.

Average AoI as a function of the number of SNs in TDMA and FDMA with i.i.d. Rayleigh channels.

The figure shows also results obtained without the EH constraint, which can be taken as a lower bound on the average AoI, since no additional time is required to wait for the SNs to energize before transmitting.

It can be seen that in this case FDMA outperforms TDMA, although only mildly so in systems of small size. This is because, in TDMA schemes, the SNs must wait not only for their own EH cycles but also for preceding SNs complete their transmissions, before they themselves can transmit.

It is also found, however, that FDMA schemes exhibit a wider gap between the AoIs achieved with and without EH constraints, which increases as the size of the system grows. In contrast, the “EH penalty” paid by the TDMA scheme is significantly smaller and less dependent on the size of the system. To understand this result, recall that indeed in a TDMA system, the time consumed by EH cycles is only of relevance in the allocation of the first SNs to transmit, since all other SNs allocated later slots will, with great likelihood, have already harvested enough energy to carry out their transmissions by the time their allocated slots come due.

Next, Fig. 4(b) compares the average AoI obtained under a distributed sampling model such as that assumed e.g. in [28], showing results entirely opposite to those of Fig. 4(a). In this case, it is found that TDMA is superior to FDMA, with the difference between these two access schemes becoming increasingly significant as the number of SNs grows. Indeed, we note that an FDMA scheme in a strict sense – namely, in which SNs are allocated their own dedicated bands within which to transmit – is too “static” to comport the required dynamics of varying EH and sampling times faced in a WSN operating under a distributed sampling paradigm. It is this feature that makes the FDMA approach less flexible,2 as observed both in Figs. 4(a) and 4(b).

The findings observed above are confirmed and made more evident in the results shown in Figure 5, in which the average AoI of the optimized TDMA and FDMA schemes, both under concurrent and distributed sampling and as functions of the EH power, are compared for systems with N=4 and N=7 SNs, with the remaining parameters identical to those of Figure 4. It is found that under the distributed sampling model TDMA maintains, compared to FDMA, a lower AoI value regardless of the amount of EH power available or the number of SNs in the system, with the gap only growing with N , as already verified also in Figure 4.

FIGURE 5. - Average AoI as a function of EH power in TDMA and FDMA systems.
FIGURE 5.

Average AoI as a function of EH power in TDMA and FDMA systems.

Under a concurrent sampling model, however, it is again found that FDMA can outperform TDMA, as long as the EH power available and/or the number of SNs in the system are/is sufficiently large. All in all, the results of Fig. 5 points for a localized optimality of FDMA, that is, under certain conditions, but an overall greater robustness TDMA schemes, with respect to the sampling model, system size, and available EH power.

This conclusion is only made clearer by the results of Fig. 6, where the average AoI achieved by the optimized TDMA- and FDMA-based EH wireless sensor networks, plotted as functions of the size of data packets, with E_{i} = 1.0\:\mathrm {[mW]} , both under concurrent and distributed sampling are compared, for systems with N=4 and N=7 SNs, with the remaining parameters identical to those of Figure 4. Noticing that an increase of the data volume D_{i} , with the EH power kept fixed, amounts to making the EH constraint more stringent, it is non-surprising that it is found that under such conditions the FDMA approach proves increasingly inadequate as the D_{i} grows.

FIGURE 6. - Average AoI as a function of the size of data packets in TDMA and FDMA systems.
FIGURE 6.

Average AoI as a function of the size of data packets in TDMA and FDMA systems.

It can therefore be reasonably concluded, with all relevant parameters taken into account jointly, that TDMA is a more robust multi-access scheme than FDMA for EH-WSNs, with the remark that punctually, depending on specific conditions, the FDMA might be a better choice.

However, we also reemphasize that it might be possible to extend the work carried out here to jointly optimize time and frequency allocations, building an overall robust and optimum scheme for EH-WSNs. This will be pursued in future work.

SECTION V.

Conclusion

In this study, we considered the uplink of a WSN where N SNs equipped with EH power supplies transmit their data to a common FC, aiming to create a maintenance-free wireless communication system.

Taking into account TDMA and FDMA as possible multiple-access schemes, we have reformulated the AoI minimization problems for both scenarios, analyzing their optimality conditions. Furthermore, we proposed novel resource allocation algorithms for these two schemes to solve the formulated optimization problems by leveraging the aforementioned analyses. From the simulation results and previous study in [28], it is necessary to choose TDMA or FDMA separately depending on available resources, size of the data packet, and the time of packet observation in the system.

ACKNOWLEDGMENT

This work was presented in part at CAMSAP 2019 [1].

Appendix A

Proof of Proposition 1

In this appendix, we prove that equation (7) is convex with respect to the number of time slots n assigned to a given SN by demonstrating that its second derivative is strictly positive under feasible parameter setups.

Indeed, differentiating equation f(n) with respect to n yields the first-order derivative as follows. \begin{equation*} \frac {\mathrm {d}}{\mathrm {d}n}f(n) = g_{1}(n) \times g_{2}(n),\tag{25a}\end{equation*} View SourceRight-click on figure for MathML and additional features. with \begin{align*} g_{1}(n)\triangleq&\frac {\beta n}{|h|^{2}}\left ({2^{\frac {\gamma }{n}} -1}\right ) + n,\tag{25b}\\[-2pt] g_{2}(n)\triangleq&\frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}} + 1,\tag{25c}\end{align*} View SourceRight-click on figure for MathML and additional features. where the auxiliary parameters \beta \triangleq B N_{0} / E and \gamma \triangleq D / B were introduced in order to simplify the expressions.

Next, taking the second derivative of f(n) yields \begin{align*}\frac {\mathrm {d^{2}}f(n)}{\mathrm {d}n^{2}} =& \frac {\mathrm {d}}{\mathrm {d}n} (g_{1}(n)\! \times \! g_{2}(n))=\overbrace {\big (g_{2}(n)\big )^{\!2}}^{\geq 0} \\ & \quad \times \left({\frac {\beta }{|h|^{2}}\left({\underbrace {2^{\frac {\gamma }{n}}-1}_{\geq 0}}\right)+1}\right)\frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\left({\log 2^{\frac {\gamma }{n}}}\right)^{2}, \tag{26}\end{align*} View SourceRight-click on figure for MathML and additional features. where, since \:\beta >0,\:\gamma >0,\:|h|^{2}>0,\:n> 0 , it follows that \tfrac {\mathrm {d}^{2} f(n)}{\mathrm {d}n^{2}} > 0 , completing the proof.

Appendix B

Proof of Proposition 2

Since f(n) is a convex function with respect to n , it possesses a unique minimizer in n\in [0,\infty ) located at the point where its first-order derivative is equal to 0. In turn, as per equation (25), the minimizer of f(n) must be a root of either g_{1}(n) or g_{2}(n) , with the other bounded at that point.

Suffice it therefore to show that only the function g_{2}(n) has a root in n\in [0,\infty ) . To this end, let us first examine the following limits of g_{1}(n) \begin{align*} \lim \limits_{n\to +0}g_{1}(n) =& \lim_{n\to +0} \underbrace {\frac {\beta n}{|h|^{2}}\left({2^{\frac {\gamma }{n}} -1}\right)}_{\to +\infty } + \underbrace {n}_{\to +0} = +\infty, \qquad \tag{27a}\\ \lim \limits_{n\to +\infty }g_{1}(n) = & \lim_{n\to +\infty }\underbrace {\frac {\beta n}{|h|^{2}}\left({2^{\frac {\gamma }{n}} -1}\right)}_{\to +\infty }\! +\!\! \underbrace {n}_{\!\!\to +\infty \!\!}\! = +\infty, \tag{27b}\end{align*} View SourceRight-click on figure for MathML and additional features. which combined with the fact that the term (2^{\gamma /n} -1)\geq 0 , implies that g_{1}(n) is strictly positive in n \in \mathbb {R} , and bounded within the interval limits.

Next, consider the limits of g_{2}(n) , namely \begin{align*} \lim_{n\to +0}g_{2}(n)=&\lim_{n\to +0}\frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}} + 1 \\[-2pt]=&\lim_{n\to +0} \underbrace {\frac {\beta }{|h|^{2}} 2^{\frac {\gamma }{n}}}_{\to +\infty } \underbrace {\left ({1-\log 2^{\frac {\gamma }{n}}}\right )}_{\to -\infty } \!-\! \frac {\beta }{|h|^{2}} \!+\! 1 \!=\! -\infty, \\ {}\tag{28a}\end{align*} View SourceRight-click on figure for MathML and additional features.and \begin{align*} \lim_{n\to +\infty }g_{2}(n)\! =\!\! \lim_{n\to +\infty }\frac {\beta }{|h|^{2}}\underbrace {\left [{\left({2^{\frac {\gamma }{n}}\!-\!1}\right) \!-\!2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}}}\right ]}_{\to +0}\!+ 1 = 1, \\ {}\tag{28b}\end{align*} View SourceRight-click on figure for MathML and additional features. which indicate that g_{2}(n) possesses at least one root in the interval n \in [0,\infty ) .

Finally, differentiating (25c) with respect to n yields \begin{equation*} \frac {\mathrm {d}}{\mathrm {d}n}g_{2}(n;h) = \frac {\beta \gamma ^{2} \log ^{2}(2)}{|h|^{2} n^{3}} 2^{\frac {\gamma }{n}} > 0,\tag{29}\end{equation*} View SourceRight-click on figure for MathML and additional features. where the last inequality follows from the fact that for E>0,\:D>0,\:B>0,\;N_{0}>0 and |h|^{2}>0 , which in turn implies that \beta \triangleq B N_{0} / E >0 and \gamma \triangleq D / B >0 .

Altogether, equations (28a), (28b) and (29) imply that the function g_{2}(n;h) is monotonically increasing function from -\infty to 1 and therefore has a single root in n \in \mathbb {R} , completing the proof.

Appendix C

Proof of Proposition 3

Our objective is to obtain upper and lower bounds to the solution of the equation \begin{equation*} \overbrace {1-\frac {\beta }{|h|^{2}}+\frac {\beta }{|h|^{2}}\left ({2-\log 2^{\frac {\gamma }{n}}}\right )2^{\frac {\gamma }{n}} - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}}^{g_{2}(n;h)\triangleq } = 0,\tag{30}\end{equation*} View SourceRight-click on figure for MathML and additional features. where we have rewritten the function g_{2}(n;h) defined in equation (25c), in a manner that will prove convenient in the sequel.

Next, consider the following bound \begin{equation*} \left({2-\log 2^{\frac {\gamma }{n}}}\right)2^{\frac {\gamma }{n}} \leq e, \tag{31}\end{equation*} View SourceRight-click on figure for MathML and additional features. which is easily proved by defining g_{3}(x)\triangleq (2-\log x)x with x\triangleq 2^{\frac {\gamma }{n}} and observing that \begin{align*} \frac {{ d}}{{ dx}}g_{3}(x)\Big |_{x=e}=&0, \tag{32a}\\ \frac {d^{2}}{dx^{2}} g_{3}(x)=&-\frac {1}{x} < 0,\;\forall x \geq 0,\tag{32b}\end{align*} View SourceRight-click on figure for MathML and additional features. from which it follows immediately that the maximum value of g_{3}(x) is achieved at the point x=2^{\frac {\gamma }{n}}=e , and given by \begin{equation*} g_{3}(e) = (2 - \log e) e = e.\tag{33}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Using inequality (31) in equation (30) readily yields the following functional upper bound to g_{2}(n;h) , \begin{equation*} g_{2U}(n;h) \triangleq 1+\frac {\beta }{|h|^{2}}(e-1) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}. \tag{34}\end{equation*} View SourceRight-click on figure for MathML and additional features.

It is obvious that the upper-bounding function g_{2U}(n;h) is strictly ascending monotonic on n , such that due to the strictly ascending monotonicity of g_{2}(n;h) itself, proved in Appendix B, it follows immediately that the root the g_{2U}(n;h) is a lower bound on the root of g_{2}(n;h) , that is \begin{equation*} g_{2U}(n_{L};h) \!=\! 0\;\Longrightarrow \; n^{*}_{L} \!=\! \frac {\gamma }{\log_{2}\left ({\frac {|h|^{2}}{\beta } \!+\! e-1}\right )} \leq n^{*}. \tag{35}\end{equation*} View SourceRight-click on figure for MathML and additional features.

Finally, we note that at the point 2^{\frac {\gamma }{n}} = e , where the equality g_{2U}(n;h)=g_{2}(n;h) holds, we have \begin{equation*} g_{2U}(n;h) = 1 - \frac {\beta }{|h|^{2}} > 0,\quad \forall \;|h|^{2} > \beta,\tag{36}\end{equation*} View SourceRight-click on figure for MathML and additional features. such that, again due to the monotonically ascending behaviors of both functions, it follows that as long as the condition |h|^{2} > \beta is satisfied, we have \begin{equation*} g_{2U}(n_{U};h) = g_{2}(n_{U};h)\;\Longrightarrow \; n^{*}_{U} = \gamma \log 2 \geq n^{*}, \tag{37}\end{equation*} View SourceRight-click on figure for MathML and additional features. which concludes the proof.

Appendix D

Proof of Proposition 4

Recall that the lower-bound n^{*}_{L} on the optimal transmission time that minimizes the AoI of a given SN is the root of the upper-bounding function g_{2U}(n;h) , defined in equation (34), of the function g_{2}(n;h) , defined in equation (30).

Directly introducing the condition |h_{1}|^{2} > |h_{2}|^{2} , and the equivalent relation |h_{2}|^{2} = |h_{1}|^{2} - \eta , with \eta \in \mathbb {R}^{+} , the difference between g_{2U}(n;h_{1}) and g_{2U}(n;h_{2}) yields \begin{align*} d(n;h_{1},h_{2})\triangleq&g_{2U}(n;h_{1}) - g_{2U}(n;h_{2}) \\=&\frac {\eta \beta }{|h_{1}|^{2}{|h_{2}|^{2}}} \left ({2^{\frac {\gamma }{n}} + 1 - e}\right ),\tag{38}\end{align*} View SourceRight-click on figure for MathML and additional features. which is obviously monotonically decreasing on n .

The latter fact, together with the trivial limits \begin{align*} \lim \limits_{n\to +0} d(n;h_{1},h_{2})=&+\infty,\tag{39a}\\ \lim \limits_{n\to +\infty } d(n;h_{1},h_{2})=&+0,\tag{39b}\end{align*} View SourceRight-click on figure for MathML and additional features. implicates that d(n;h_{1},h_{2})>0 in n\in \mathbb {R}^{+} , and consequently that g_{2U}(n;h_{1}) > g_{2U}(n;h_{2}) .

However, since g_{2U}(n;h_{1}) and g_{2U}(n;h_{2}) are themselves monotonically ascending functions, the above also implicates that the root n^{*}_{1L} of g_{2U}(n;h_{1}) is smaller than the root n^{*}_{2L} of g_{2U}(n;h_{2}) , which proves inequality (17a).

Finally, we can observe from inequality (37) that the upper-bounding transmission time n^{*}_{U} is independent of |h|^{2} , such that equation (17b) follows trivially, concluding the proof.

Appendix E

Proof of Proposition 5

Substituting the expression for the lower bound n^{*}_{L} given in inequality (35) into equation (6) we have \begin{equation*} k(n^{*}_{L};h) = \frac {\gamma }{|h|^{2}} \frac {|h|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h|^{2}}{\beta }+e-1}\right )}.\tag{40}\end{equation*} View SourceRight-click on figure for MathML and additional features.

In order to prove implication (18a), it is sufficing to verify that for |h_{1}|^{2} > |h_{2}|^{2}>\beta \begin{align*}&\hspace {-1.2pc}k(n^{*}_{2L};h_{2})- k(n^{*}_{1L};h_{1}) \\=&\frac {\gamma }{|h_{2}|^{2}} \frac {|h_{2}|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )} -\frac {\gamma }{|h_{1}|^{2}} \frac {|h_{1}|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right )} \\=&\underbrace {\frac {\gamma \log_{2}\left ({\frac {|h_{1}|^{2}+\beta (e-1)}{|h_{2}|^{2}+\beta (e-1)}}\right )} {\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right ) \log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}}_{\geq 0} + \frac {\beta \gamma (e-2)}{|h_{1}|^{2}|h_{2}|^{2}} \\&\times \underbrace {\frac {\left |{h_{1}}\right |^{2} \log \left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right )-\left |{h_{2}}\right |^{2} \log \left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}{\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right ) \log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}}_{\geq 0} \geq 0. \\ {}\tag{41}\end{align*} View SourceRight-click on figure for MathML and additional features.

In turn, substituting the expression for the upper bound n^{*}_{U} given in inequality (37) into equation (6) yields \begin{equation*} k(n^{*}_{U};h) = \frac {\beta \gamma }{|h|^{2}}(e-1),\tag{42}\end{equation*} View SourceRight-click on figure for MathML and additional features. from what it follows trivially that k(n^{*}_{1U};h_{1})< k(n^{*}_{2L};h_{2}) for |h_{1}|^{2} > |h_{2}|^{2} , which completes the proof.

Appendix F

Proof of Proposition 6

For convenience, let us first reproduce equations (15b) and (15d), namely \begin{align*} \bar {f}_{B}(n_{1}^{*},n_{2}^{*}) &= \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} + n_{2}^{*} \big )^{2}, \\ \tag{43a}\\ \bar {f}_{D}(n_{1}^{*},n_{2}^{*}) &= \frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} + n_{1}^{*} \big )^{2}, \\ {}\tag{43b}\end{align*} View SourceRight-click on figure for MathML and additional features.

First, with respect to inequality (19a), it is readily found from these equations that \begin{align*}&\hspace {-1.2pc}\bar {f}_{D}(n_{1L}^{*},n_{2L}^{*}) - \bar {f}_{B}(n_{1L}^{*},n_{2L}^{*}) \\=&\frac {1}{2}\left \{{k(n_{2L}^{*}) + n_{2L}^{*} }\right \}^{2} + \frac {1}{2}\left \{{k(n_{2L}^{*}) + n_{2L}^{*} + n_{1L}^{*} }\right \}^{2} \\&-\, \frac {1}{2}\left \{{k(n_{1L}^{*}) + n_{1L}^{*} }\right \}^{2} - \frac {1}{2}\left \{{k(n_{1L}^{*}) + n_{1L}^{*} + n_{2L}^{*} }\right \}^{2} \geq 0, \\ {}\tag{44}\end{align*} View SourceRight-click on figure for MathML and additional features. where the last inequality follows directly from inequality (17a) in Proposition 4 and inequality (18a) in Proposition 5.

As for inequality (19b), we again observe that \begin{align*}&\hspace {-1.2pc}\bar {f}_{D}(n_{1U}^{*},n_{2U}^{*}) - \bar {f}_{B}(n_{1U}^{*},n_{2U}^{*}) \\=&\frac {1}{2}\left \{{k(n_{2U}^{*}) + n_{2U}^{*} }\right \}^{2} + \frac {1}{2}\left \{{k(n_{2U}^{*}) + n_{2U}^{*} + n_{1U}^{*} }\right \}^{2} \\&-\, \frac {1}{2}\left \{{k(n_{1U}^{*}) + n_{1U}^{*} }\right \}^{2} - \frac {1}{2}\left \{{k(n_{1U}^{*}) + n_{1U}^{*} + n_{2U}^{*} }\right \}^{2} \geq 0, \\ {}\tag{45}\end{align*} View SourceRight-click on figure for MathML and additional features. where the last inequality follows from equality (17b) in Proposition 4 and inequality (18b) in Proposition 5, concluding the proof.

Appendix G

Proof of Proposition 7

Differentiating f(B_{i}|n_{i}) , we obtain \begin{align*} \frac {\mathrm {d}}{\mathrm {d}B_{i}}f(B_{i}|n_{i})=&\left ({\alpha_{i} B_{i} n_{i} \left ({2^{\frac {D_{i}}{B_{i} n_{i}}} - 1}\right )+ n_{i}}\right ) \\&\times \left ({\alpha_{i} n_{i}\left ({2^{\frac {D_{i}}{B_{i} n_{i}}} - 1}\right ) - \alpha_{i} 2^{\frac {D_{i}}{B_{i} n_{i}}}\log 2^{\frac {D_{i}}{B_{i}}}}\right ), \\ {}\tag{46}\end{align*} View SourceRight-click on figure for MathML and additional features. where we have implicitly defined \alpha_{i}\triangleq N_{0}/ |h_{i}|^{2} E_{i} .

In turn, the second derivative of f(B_{i}|n_{i}) is \begin{align*}\frac {\mathrm {d^{2}}}{\mathrm {d}B_{i}^{2}}f(B_{i}|n_{i}) =&\left ({\alpha_{i}2^{\frac {D_{i}}{Bn_{i}}}\left ({n_{i} - \log 2^{\frac {D_{i}}{Bn_{i}}}}\right ) + \alpha_{i} n_{i} + 1}\right )^{2} \\& \qquad {\times \alpha_{i} 2^{\frac {D_{i}}{B_{i}n_{i}}}\log 2^{\frac {D_{i}}{B_{i}}}\left ({\frac {2 n_{i}}{B_{i}} + \log 2^{\frac {D_{i}}{B_{i}}}}\right )}\tag{47}\end{align*} View SourceRight-click on figure for MathML and additional features.

From the latter equation, it is evident that for \:\alpha_{i}>0,\;D_{i}>0,\:n_{i}>0,\:n_{i}> 0 , we have {\mathrm {d}^{2}f(B_{i}|n_{i})}/{\mathrm {d}B_{i}^{2}} > 0 , which indicates that f(B_{i}|n_{i}) is strictly convex with respect to B_{i} concluding the proof.

References

References is not available for this document.