Owing to the latest advances in sensing and data transmission technologies, various monitoring services employing wireless sensor networks (WSNs) have been proposed over the years to solve problems in domains such as transportation [2], health [3], and the environment [4], culminating with the notion of digital twins (DTs) [5], [6].
Digital twins are digital representations of physical devices or systems based on data collected in real time, which continuously track physical changes in the devices/systems while forecasting possible future states of the corresponding physical components. Given that a very large number of devices may be connected to feed a DT, the corresponding data must be collected in a distributed and reliable fashion. These requirements can be satisfied by energy harvesting (EH) WSNs, well known for their self-reliance and low-maintenance characteristics.
Indeed, EH techniques have been well-studied [7]–[12] and matured enough that it can be assumed that the technology will soon become ubiquitous, equipping devices with the capability to convert energy from natural (i.e.
solar radiation, vibration, and temperature differences) or artificial sources (i.e.
wireless energy transfer) into electric power required to run sensors. In addition, networking protocols specific for EH-WSNs have also been developed [13]–[17], which contribute to the reliability of such systems.
However, a problem associated with the latter paradigm that has received comparatively less attention is the “freshness” issue or the age of information (AoI) of messages collected and distributed by EH-WSNs. Indeed, protocols for EH-WSNs have so far largely focused on energy and data arrival processes, without addressing the fact that, in practice, data collected by EH-WSNs may be outdated, which affects their suitability to DT applications. Thus, a new concept is needed to ensure the freshness of information in such time-bound data-oriented systems, as argued e.g.
in [18], [19].
As noted in [18], [19], AoI can be defined as the time elapsed from the moment the information is generated and captured by the sensor, until it is received by the destination, which, in the case of our application of interest can be considered as the FC. Interestingly, as reported in [20]–[24], the optimal strategy that minimizes AoI is different from conventional data rate maximization and delay minimization strategies, motivating the design of new WSN optimization approaches for DT applications in which freshness of information is fundamental.
However, similar to data rate and delay, AoI is also impacted by the presence of multiple users – or in the context of WSNs, multiple sensors – that compete for the same frequency and time resources, which must therefore be properly allocated or scheduled. Considering this issue, resource allocation schemes aimed at minimizing AoI in time-division multiple access (TDMA) and frequency-division multiple access (FDMA) systems have been studied in [25]–[29]. In addition, the characterization of AoI has been studied for random access networks in [30] and for carrier sense multiple access (CSMA) networks with distributed scheduling in [31]. We remark, however, that the scenarios considered in the aforementioned works are not constrained by the possibility of battery outage or random energy arrival processes, as faced by maintenance-free EH-WSNs. In turn, EH-oriented AoI minimization problems have been previously investigated in [32]–[37], but for a unidirectional communication scenario in which a single EH-sensor node (SN) continuously sends status updates to a single FC.
Considering that practical DT-WSN scenarios rely on multiple SNs communicating with a common FC, we argue that in order to address the DT case, contributions such as those of [32]–[37] need to be generalized, in particular toward the design of optimal resource allocation handling multiple SNs, aimed at minimizing the average AoI under battery-constrained conditions. To the best of our knowledge, no mechanism to minimize the AoI in DT EH-WSNs has been proposed thus far. In this study, we therefore investigate a system with N
EH-SNs that simultaneously communicates with a common FC, proposing novel resource allocation algorithms both in TDMA and FDMA modes to minimize the corresponding average aggregate AoI.
The remainder of this article is organized as follows. The system model is described in Section II, while the convexity analysis and mathematical expression for AoI in the case of sensor network systems with one SN and one FC are presented in Section III-A. In Section III-B, we consider a more general scenario where N
SNs send data to a common FC, proposing new radio resource allocation algorithms for both TDMA and FDMA scenarios. The numerical results of the proposed algorithms are shown in Section IV, and the conclusions are presented in Section V.
Notation
Vectors and scalars are denoted by bold and standard fonts, such as in \mathbf {x}
and x
, respectively. The absolute value and ceiling functions are respectively denoted by |x|
and \lceil x \rceil \triangleq \min \:\{n \in \mathbb {Z}\:|\:n \geq x\}
. Sets of natural, real, and complex numbers are respectively denoted by \mathbb {Z}
, \mathbb {R}
and \mathbb {C}
. Finally, the fact that a random variable x
follows the complex Gaussian distribution with mean \mu
and variance \sigma ^{2}
is expressed as x \sim \mathcal {C}(\mu,\sigma ^{2})
.
Consider the uplink of a WSN consisting of N
single-antenna SNs sending status updates to one common FC, as shown in Fig. 1, such that each SN is subjected to limited power harvested from environmental sources such as solar radiation, vibration, and radio frequency waves. It is assumed that the length of an uplink packet transmitted by an i
-th SN is denoted by D_{i}\:\mathrm {[bits]}
, where i\in \{1,2,\ldots,N\}
denotes the node index, and all the harvested energy (no loss) is stored in a supercapacitor embedded in each SN. For the sake of simplicity but without loss of generality, we assume that the initial amount of energy stored in each supercapacitor is 0\:\mathrm {[J]}
. Denoting the average harvested power at the i
-th SN by E_{i}\:\mathrm {[W]}
, the amount of energy available after k_{i}\in \mathbb {Z ^ {+}}
normalized unit time samples can be expressed as k_{i} E_{i}\:\mathrm {[J]}
. Furthermore, assuming that we adopt uniform power allocation over n_{i}\in \mathbb {Z ^ {+}}
transmission time slots, the transmitted power at each time slot can be described as k_{i}E_{i}/n_{i}\:\mathrm {[W]}
. In turn, the communication channel from the i
-th SN to the FC is modeled as a flat fading channel with gains h_{i}
, subjected to zero mean additive white Gaussian noise (AWGN) characterized by a noise power spectral density N_{0}\:\mathrm {[W/Hz]}
, with a total system bandwidth of B_{\mathrm {total}}\:\mathrm {[Hz]}
.
Another aspect of the system model that is fundamental to the analysis of the AoI of distributed systems is the time of origin of information, relative to the timestamp of transmitted packets. To elaborate, analyses of AoI can be found in the literature; they are based on two distinct timing conditions, namely, a distributed model in which each SN has its own time origin, as adopted e.g.
[28], and a concurrent model in which a common time origin is shared by all SNs as adopted for instance in [29], [32].
Both these models are valid as they address distinct applications. For example, the distributed model employed in [28] is better suited to applications such as the monitoring of structures (e.g.
bridges, tunnels, and towers), in which multiple sensors are installed on the same structure, so that an update indicating a status deterioration at any of the SNs indicates a deterioration of the structure itself. In turn, the concurrent model adopted e.g.
in [29], [32], which is also more commonly utilized, addresses applications such as DT, in which different pieces of information collected by different SNs contribute to composing a larger whole, e.g.
the digital twin of a given system.
Having made this remark, in this article, we focus on the latter (more prevalent) concurrent timing approach, in which the multi-access scheme employed has also a greater impact, especially in the context of EH networks, as it affects both the time SNs must wait from the moment data is collected until they can transmit in the case of TDMA schemes, as well as the time available for EH nodes to gather sufficient energy to transmit, in the case of an FDMA scheme.
SECTION III.
AoI Minimization Problem Over Multiple-Access Channels
A. Preliminary: Single SN-FC Link
For the sake of completeness and clarity of exposition, we first consider a simple scenario in which a single SN communicates with the FC, as studied in [32]. Then, the capacity of the corresponding channel for a fixed h
can be written as \begin{equation*} C \triangleq B \log_{2} \left({1+|h|^{2}\dfrac {kE}{n B N_{0}}}\right),\tag{1}\end{equation*}
View Source
\begin{equation*} C \triangleq B \log_{2} \left({1+|h|^{2}\dfrac {kE}{n B N_{0}}}\right),\tag{1}\end{equation*}
where B
is the bandwidth assigned to the SN.
We observe that the SN can successfully transfer its data D
to the FC if and only if the total information communicated at best at the rate C
over the transmission time n
, exceeds D
. In other words, the following condition must be satisfied in order for the delivery to be successful \begin{equation*} D \le nC.\tag{2}\end{equation*}
View Source
\begin{equation*} D \le nC.\tag{2}\end{equation*}
Following related literature [19], [32], the AoI P
of the node is the reward over the total elapsed time, including the harvesting time k
and the data transmission time n
, i.e.
\begin{equation*} P \triangleq \frac {1}{2}(k + n)^{2}.\tag{3}\end{equation*}
View Source
\begin{equation*} P \triangleq \frac {1}{2}(k + n)^{2}.\tag{3}\end{equation*}
Given the above, we now consider the AoI minimization problem subject to the throughput requirement given in the inequality (2), namely \begin{align*}&{\mathop {\mathrm {minimize}} \limits_{k, n}}\:\:P, \tag{4a}\\& \mathrm {subject~ to} \:\:D \le nC.\tag{4b}\end{align*}
View Source
\begin{align*}&{\mathop {\mathrm {minimize}} \limits_{k, n}}\:\:P, \tag{4a}\\& \mathrm {subject~ to} \:\:D \le nC.\tag{4b}\end{align*}
Substituting (1) into (2) and expressing the harvesting time k
that satisfies the constraint of inequality (2), we obtain \begin{equation*} k \geq \bigg \lceil \frac {n B N_{0}}{|h|^{2} E}\left ({2^{\frac {D}{n B}}-1}\right ) \bigg \rceil,\tag{5}\end{equation*}
View Source
\begin{equation*} k \geq \bigg \lceil \frac {n B N_{0}}{|h|^{2} E}\left ({2^{\frac {D}{n B}}-1}\right ) \bigg \rceil,\tag{5}\end{equation*}
such that the minimum harvesting time k
as a function of the transmission time n
can be obtained from the lower bound of the latter inequality, i.e.
, \begin{equation*} k(n) = \frac {n B N_{0}}{|h|^{2} E}\left ({2^{\frac {D}{n B}}-1}\right ). \tag{6}\end{equation*}
View Source
\begin{equation*} k(n) = \frac {n B N_{0}}{|h|^{2} E}\left ({2^{\frac {D}{n B}}-1}\right ). \tag{6}\end{equation*}
By combining equations (3) and (6), the AoI can be expressed as a function of n
, namely \begin{equation*} f(n) = \frac {1}{2}(k(n) + n)^{2}.\tag{7}\end{equation*}
View Source
\begin{equation*} f(n) = \frac {1}{2}(k(n) + n)^{2}.\tag{7}\end{equation*}
Owing to the relaxation in equation (6), the function f(n)
in equation (7) can be considered as a lower bound of the AoI P
, such that the constrained optimization problem in equation (4) is an equivalent unconstrained problem \begin{equation*} {\mathop {\mathrm{minimize}} \limits_{n}}\:\:\:f(n).\tag{8}\end{equation*}
View Source
\begin{equation*} {\mathop {\mathrm{minimize}} \limits_{n}}\:\:\:f(n).\tag{8}\end{equation*}
Although k
and n
are treated as real numbers in the above section, we shall hereafter limit these quantities to positive integer (i.e.
, natural) values to accommodate for the discrete nature of packetized TDMA networks as well as of synchronous FDMA schemes. Since the solution of equation (8) is generally not integer, the desired solution of the problem will be taken as a projection of the solution n^{*}
of (8) onto the feasible set, namely, (\lceil {n^{*}}\rceil,\:\lceil {k(n^{*})}\rceil )
.
A comparison between the average AoI achievable with continuous versus discrete times is shown in Fig. 2. To be more specific, the figure exhibits plots of \mathbb {E}[f(n)]
with f(n)
as in equation (7), respectively with n\in \mathbb {R}
and k(n)
as in equation (6) averaged over multiple realizations of h
, and with the transmission and harvesting times projected to their closest upper-bounding integers (\lceil {n^{*}}\rceil,\lceil {k(n^{*})}\rceil )
. It can be seen that a fundamental penalty is paid for the discretization of time required by synchronous access schemes such as TDMA and FDMA, which increases with the transmission time n
.
We emphasize also that such a penalty does not include the possible sub-optimality incurred by projecting the real-valued solution of the problem in equation (8) onto \mathbb {N}
, as opposed to solving the problem directly over \mathbb {N}
, which however is NP-hard.
To conclude this subsection, we address the solution of the AoI minimization problem given by equation (7), which is facilitated by the following two results.
Proposition 1:
With E>0,\;D>0,\:B>0,\:N_{0}>0,\:|h|^{2}>0
, \beta \triangleq B N_{0} / E
, and \gamma \triangleq D / B
, the AoI f(n)
given by equation (7) is convex with respect to n
.
Proposition 2:
For \gamma >0
and \beta >0
, the unique solution n^{*}
of the minimization problem described by equation (8) can be obtained by solving the implicit equation \begin{equation*} \frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta \gamma \log (2)}{|h|^{2} n}2^{\frac {\gamma }{n}} + 1 = 0. \tag{9}\end{equation*}
View Source
\begin{equation*} \frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta \gamma \log (2)}{|h|^{2} n}2^{\frac {\gamma }{n}} + 1 = 0. \tag{9}\end{equation*}
Finally, we introduce the main result of this subsection, in the form of the following Proposition.
Proposition 3:
For \gamma >0
and \beta >0
, the solution of equation (9), i.e.
, the transmission time n^{*}
that minimizes the AoI in the single SN-FC link, is bounded by \begin{equation*} n^{*}_{L}\triangleq \frac {\gamma }{\log_{2}\left ({e-1+\frac {|h|^{2}}{\beta }}\right )} \leq \underbrace {n^{*} \leq \gamma \log 2 \triangleq n^{*}_{U}}_{\forall \;|h|^{2} > \beta }, \tag{10}\end{equation*}
View Source
\begin{equation*} n^{*}_{L}\triangleq \frac {\gamma }{\log_{2}\left ({e-1+\frac {|h|^{2}}{\beta }}\right )} \leq \underbrace {n^{*} \leq \gamma \log 2 \triangleq n^{*}_{U}}_{\forall \;|h|^{2} > \beta }, \tag{10}\end{equation*}
where we emphasize that the condition |h|^{2} > \beta
is only required for the upper-bounding relation to hold.
B. Generalization: Multiple SNs-FC Links
Taking advantage of the formulation presented above, we now consider a more general scenario where N
SNs simultaneously transmit, with the help of either a TDMA or an FDMA scheme, to a common FC, proposing two corresponding resource allocation schemes optimized to minimize the mean AoI of both systems.
To this end, we first define the mean conditional AoI minimization problem associated with a scenario with N
SNs, which can be expressed as \begin{equation*} {\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}}\:\:\frac {1}{N} \sum_{i=1}^{N} f(n_{i}),\tag{11}\end{equation*}
View Source
\begin{equation*} {\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}}\:\:\frac {1}{N} \sum_{i=1}^{N} f(n_{i}),\tag{11}\end{equation*}
where \boldsymbol {n} \triangleq \{n_{1}, n_{2},\ldots,n_{N}\}
.
1) Time Division Multiple Access Systems
To avoid interference among the N
SNs, in a TDMA scheme the entire bandwidth available in the system B_{\mathrm {total}}
is assigned to a single SN during its transmission time interval n_{i}
. In other words, we have \begin{equation*} B_{i} = B,\,\forall \,. \tag{12}\end{equation*}
View Source
\begin{equation*} B_{i} = B,\,\forall \,. \tag{12}\end{equation*}
For the sake of simplicity, it shall also be assumed hereafter that all SNs are subjected to the same conditions, such that the average harvested energy E
and the amount of data to be transmitted D
are the same for all SNs.
Finally, under a TDMA scheme, only one SN is allowed to transmit during its allocated time, which can be expressed by the constraint \begin{equation*} \sum_{i=1}^{N} \mathsf{1}_{i}(t) \leq 1,\tag{13}\end{equation*}
View Source
\begin{equation*} \sum_{i=1}^{N} \mathsf{1}_{i}(t) \leq 1,\tag{13}\end{equation*}
where \mathsf{1}_{i}(t)
is an indicator function that takes the value 1 at k_{i} < t \leq (k_{i}+n_{i})
and 0 elsewhere.
Taking into account the above constraints, the resource allocation problem to minimize the average AoI in TDMA can be formulated as \begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}}\:\: \frac {1}{N} \sum_{i=1}^{N} f(n_{i}), \tag{14a}\\& \mathrm{subject~ to} \:\: \sum_{i=1}^{N} \mathsf{1}_{i}(t) \leq 1,\quad \forall \,0\leq t\leq k_{N} + n_{N}. \tag{14b}\end{align*}
View Source
\begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}}\:\: \frac {1}{N} \sum_{i=1}^{N} f(n_{i}), \tag{14a}\\& \mathrm{subject~ to} \:\: \sum_{i=1}^{N} \mathsf{1}_{i}(t) \leq 1,\quad \forall \,0\leq t\leq k_{N} + n_{N}. \tag{14b}\end{align*}
In order to gain insight on how to solve the problem described above in a general setting, we first consider a particular case with only two SNs, labeled SN1 and SN2. Following our notation, the optimal transmission times associated with these two SNs will be denoted n_{1}^{*}
and n_{2}^{*}
, respectively, with their corresponding minimum energy harvesting times, obtained from equation (6), denoted accordingly by k(n_{1}^{*})
and k(n_{2}^{*})
.
Referring to Figure 3, it is evident that in this case, the problem of minimizing the mean conditional AoI reduces to determining which of the two nodes shall transmit first, a decision which is informed by whether the time taken by the first node to complete its harvesting-and-transmission cycle is sufficient to enable the second node to harvest enough energy for its own transmission.
In other words, the optimal time allocation is fundamentally driven by the tests k(n_{2}^{*}) \gtrless k(n_{1}^{*}) + n_{1}^{*}
and k(n_{1}^{*}) \gtrless k(n_{2}^{*}) + n_{2}^{*}
, with the best strategy being given by the one in which the SN second to transmit has enough time to harvest all the required energy during the transmission of the first node, such that its transmission can start immediately after the first.
To elaborate further, following the illustration in Figure 3, there are four distinct cases to be considered, namely:\begin{align*} \bar {f}_{A}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} \big )^{2}, \tag{15a}\\ \bar {f}_{B}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} + n_{2}^{*} \big )^{2}, \\ \tag{15b}\\ \bar {f}_{C}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big)^{2}, \\ \tag{15c}\\ \bar {f}_{D}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} + n_{1}^{*} \big )^{2}, \\ {}\tag{15d}\end{align*}
View Source
\begin{align*} \bar {f}_{A}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} \big )^{2}, \tag{15a}\\ \bar {f}_{B}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} + n_{2}^{*} \big )^{2}, \\ \tag{15b}\\ \bar {f}_{C}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big)^{2}, \\ \tag{15c}\\ \bar {f}_{D}(n_{1}^{*},n_{2}^{*})=&\frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} + n_{1}^{*} \big )^{2}, \\ {}\tag{15d}\end{align*}
where \bar {f}(n_{1},n_{2})\triangleq \frac {f(n_{1})+f(n_{2})}{2}
and the indices A, B, C
and D
represent the four distinct possibilities as illustrated.
It can be seen that the cases A
and C
, with corresponding mean conditional AoI given by (15a) and (15c), respectively, are inefficient because they cause the channel to remain idle after the first to transmit SN completes its cycle, while SN second to transmit harvests the required energy for its own transmission. It follows therefore that the optimum allocation strategy in this particular setting of two SN lays in between the cases B
and D
. Furthermore, it is evident that the optimum choice between these two options is governed by the test \begin{equation*} {\bar {f}}_{B} \overset {\mathrm{SN}_{2} \to \mathrm{SN}_{1}}{\underset{\mathrm{SN}_{1} \to \mathrm{SN}_{2}}{\gtrless} } {\bar {f}}_{D},\tag{16}\end{equation*}
View Source
\begin{equation*} {\bar {f}}_{B} \overset {\mathrm{SN}_{2} \to \mathrm{SN}_{1}}{\underset{\mathrm{SN}_{1} \to \mathrm{SN}_{2}}{\gtrless} } {\bar {f}}_{D},\tag{16}\end{equation*}
which, if stated in words, signifies that the transmission order SN2 followed by SN1 is optimal if \bar {f}_{B}>\bar {f}_{D}
, whereas the order SN1 followed by SN2 is optimal if \bar {f}_{B}< \bar {f}_{D}
.
In light of the above, we consider the following results.
Proposition 4:
For \gamma >0
and \beta >0
, \begin{align*} |h_{1}|^{2} > |h_{2}|^{2}\Longrightarrow&n^{*}_{1L} < n^{*}_{2L},\tag{17a}\\ n_{1U}^{*}=&n_{2U}^{*}.\tag{17b}\end{align*}
View Source
\begin{align*} |h_{1}|^{2} > |h_{2}|^{2}\Longrightarrow&n^{*}_{1L} < n^{*}_{2L},\tag{17a}\\ n_{1U}^{*}=&n_{2U}^{*}.\tag{17b}\end{align*}
Proposition 5:
For \gamma >0
and \beta >0
, \begin{align*} |h_{1}|^{2} \!>\! |h_{2}|^{2} \;\Longrightarrow&\; k(n^{*}_{1L};h_{1}) \!< \! k(n^{*}_{2L};h_{2}),\tag{18a}\\ |h_{1}|^{2}\! >\! |h_{2}|^{2}\! >\! \beta\Longrightarrow&k(n_{1U}^{*};h_{1}) \!< \! k(n_{2U}^{*};h_{2}),\tag{18b}\end{align*}
View Source
\begin{align*} |h_{1}|^{2} \!>\! |h_{2}|^{2} \;\Longrightarrow&\; k(n^{*}_{1L};h_{1}) \!< \! k(n^{*}_{2L};h_{2}),\tag{18a}\\ |h_{1}|^{2}\! >\! |h_{2}|^{2}\! >\! \beta\Longrightarrow&k(n_{1U}^{*};h_{1}) \!< \! k(n_{2U}^{*};h_{2}),\tag{18b}\end{align*}
where the bounding quantities (n^{*}_{1L},n^{*}_{1U})
are as defined in Proposition 3 and its proof
Proposition 6:
For \gamma >0
and \beta >0
, \begin{align*} \bar {f}_{B}(n_{1L}^{*},n_{2L}^{*})< &\bar {f}_{D}(n_{1L}^{*},n_{2L}^{*}),\tag{19a}\\ \bar {f}_{B}(n_{1U}^{*},n_{2U}^{*})< &\bar {f}_{D}(n_{1U}^{*},n_{2U}^{*}).\tag{19b}\end{align*}
View Source
\begin{align*} \bar {f}_{B}(n_{1L}^{*},n_{2L}^{*})< &\bar {f}_{D}(n_{1L}^{*},n_{2L}^{*}),\tag{19a}\\ \bar {f}_{B}(n_{1U}^{*},n_{2U}^{*})< &\bar {f}_{D}(n_{1U}^{*},n_{2U}^{*}).\tag{19b}\end{align*}
We remark that setting |h_{1}|^{2} > |h_{2}|^{2}
is without loss of generality as it amounts merely to ordering the SNs. Although a closed-form expression of the optimum transmission times n_{1}^{*}
and n_{2}^{*}
cannot be obtained, Proposition 6 in fact establishes that, given knowledge of |h_{1}|^{2}
and |h_{2}|^{2}
only, the wisest TDMA allocation strategy in a system with two SNs is a “greedy” scheme in which the SN with the strongest channel gain precedes the other SN, since under such a strategy both the lower and upper bounds on the mean AoI \bar {f}_{B}(n_{1}^{*},n_{2}^{*})
are inferior to those of the alternative “Robin Hood” (the weaker SN first) strategy of allocating times the other way around.
Furthermore, the impossibility to be certain of the optimality of the greedy allocation does not detract from the overall optimality of the TDMA strategy described, because the optimality of the initial choice can be easily verified (and if necessary reverted) by solving equation (9) via a simple bisection algorithm, which is only made more efficient given the assured bounds offered in Propositions 4 and 5.
Next, we consider a more general setting, where N
SNs communicate with the FC through a TDMA scheme. In this case, referring to Figure 3, it is evident that since all SNs stay in EH mode while the greedily-selected SNs transmit, after a sufficiently large number of SNs have transmitted the order of the remaining SNs is irrelevant to optimality.
In other words, the uncertainty of the channel power-based greedy selection between any pair of SNs (i,i+1)
decreases with i
. Taking all the above into consideration, an optimal TDMA strategy to minimize the average AoI can be obtained for the general system with N
SNs, by repeating the pair-wise greedy-selection described above.
In summary, the optimal TDMA strategy is therefore:
Sort the indices SNs in descending order of channel power, such that |h_{1}|^{2} > \cdots > |h_{N}|^{2}
;
Set i=1
and solve equation (9) via bisection using the bounds in inequalities (17) only for two strongest SNs, obtaining n_{i}^{*}
and n_{i+1}^{*}
;
If and only if all remaining nodes have not harvested enough energy, and \bar {f}_{B}(n_{1}^{*},n_{2}^{*}) > \bar {f}_{D}(n_{1}^{*},n_{2}^{*})
, swap the indices n_{1}^{*}\leftrightarrow n_{2}^{*}
;
Allocate n_{i}^{*}
, and remove i
index from the list \boldsymbol {N}
;
Repeat steps 2 to 4 until there is only one SN left, which is allocated last.
The pseudocode corresponding to the TDMA allocation procedure described above that minimizes the mean AoI of an EH-WSNs with N
-SNs is shown in Algorithm 1.
Algorithm 1 Greedily-Initialized TDMA AoI Minimizer
Inputs:E>0
, D>0
, B>0
, N_{0}>0
and |h_{i}|^{2}>0
, with i\in \boldsymbol {N}\triangleq \{1,\ldots,N\}
.
Outputs:Optimal transmission time \boldsymbol {n}^{*} \in \mathbb {R}^{+}
and optimal harvested time \boldsymbol {k}^{*} \in \mathbb {R}^{+}
.
1:Set loop counter i = 1
.
2:Set initial transmission times \boldsymbol {n}\gg 1
.
3:Set initial harvesting times \boldsymbol {k}=0
.
4:Sort SN indices \boldsymbol {N}
such that |h_{1}|^{2}>\cdots >|h_{N}|^{2}
.
5:while | \boldsymbol {N}|\geq 2
do
6:Find the optimal n^{*}_{i}
and n^{*}_{i+1}
by solving (25c).
7:if \bar {f}_{B}(n_{i}^{*},n_{i+1}^{*})>\bar {f}_{D}(n_{i}^{*},n_{i+1}^{*})
then
10:if i \geq 2
and (14b) is not satisfied then
11:Update k(n_{i}) = k(n_{i-1}) + n_{i-1}
13:Update \boldsymbol {N}\leftarrow \boldsymbol {N}\, {\backslash } i
14:Append \boldsymbol {n}^{*}
with n_{i}
and \boldsymbol {k}^{*}
with k(n_{i})
15:Update i \leftarrow i + 1
.
2) Frequency Division Multiple Access Systems
In contrast to the TDMA scheme, in an FDMA system, SNs can transmit data to the FC and in an orthogonal manner, at the expense of a reduction in the bandwidth B_{i}
used by each SN, which is a fraction of the total available bandwidth B_{\mathrm {total}}
. In this case, the mean AoI minimization problem can be written as \begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n},\; \boldsymbol {B}}}\:\:\frac {1}{N} \sum_{i=1}^{N} f(n_{i}, B_{i}), \tag{20a}\\&\mathrm{subject~ to}\:\: B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} = 0,\tag{20b}\end{align*}
View Source
\begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n},\; \boldsymbol {B}}}\:\:\frac {1}{N} \sum_{i=1}^{N} f(n_{i}, B_{i}), \tag{20a}\\&\mathrm{subject~ to}\:\: B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} = 0,\tag{20b}\end{align*}
where \boldsymbol {B} \triangleq \{ B_{1}, B_{2},\ldots, B_{N} \}
.
Since the objective function given (20a) involves a coupled expression of the optimization variables \boldsymbol {n}
and \boldsymbol {B}
, as shown in (6) and (7), it is difficult to solve the above optimization analytically and globally. Therefore, we resort to an alternating optimization framework where (20) is divided into optimization problems (I) and (II) as follows.
Optimization problem for bandwidth allocation \boldsymbol {B}
\begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {B}}} \:\: \frac {1}{N} \sum_{i=1}^{N} f(B_{i}|n_{i}), \tag{21a}\\&\mathrm{subject~ to}\:\: B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} = 0.\tag{21b}\end{align*}
View Source
\begin{align*}&{\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {B}}} \:\: \frac {1}{N} \sum_{i=1}^{N} f(B_{i}|n_{i}), \tag{21a}\\&\mathrm{subject~ to}\:\: B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} = 0.\tag{21b}\end{align*}
Optimization problem for transmission time allocation \boldsymbol {n}
\begin{equation*} {\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}} \:\: \frac {1}{N} \sum_{i=1}^{N} f(n_{i}|B_{i}). \tag{22}\end{equation*}
View Source
\begin{equation*} {\mathop {\mathrm{minimize}} \limits_{ \boldsymbol {n}}} \:\: \frac {1}{N} \sum_{i=1}^{N} f(n_{i}|B_{i}). \tag{22}\end{equation*}
Next, consider the following result.
Proposition 7:
For \:E_{i}>0,\:|h_{i}|^{2}>0,\;N_{0}>0,\;D_{i}>0
and n_{i}>0
, the function f(B_{i}|n_{i})
is convex with respect to B_{i}
.
The convexity of f(B_{i}|n_{i})
established by Proposition 7 implies that problem (21) can be efficiently solved via the alternating direction method of multipliers (ADMM) [38].
More specifically, following [38], [39], convex problems of the form described in (21) can be solved by successive iterations of the following steps:\begin{align*} \boldsymbol {B}\leftarrow&{\mathop {\mathrm{argmin}} \limits_{ \boldsymbol {B}}} \: L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u), \tag{23a}\\[-1ex] \theta\leftarrow&\: \left({B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} }\right),\tag{23b}\\[-1ex] u\leftarrow&\: u + \theta, \tag{23c}\end{align*}
View Source
\begin{align*} \boldsymbol {B}\leftarrow&{\mathop {\mathrm{argmin}} \limits_{ \boldsymbol {B}}} \: L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u), \tag{23a}\\[-1ex] \theta\leftarrow&\: \left({B_{\mathrm {total}} - \sum_{i=1}^{N} B_{i} }\right),\tag{23b}\\[-1ex] u\leftarrow&\: u + \theta, \tag{23c}\end{align*}
where \theta \in \mathbb {R}
is an auxiliary variable, u
is the scaled dual variable, and L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u)
is the associated augmented Lagrangian of the problem, which, for a penalty parameter \rho >0
, is given by \begin{align*}&\hspace {-2pc}L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u) \\=&\sum_{i=1}^{N} f(B_{i}|n_{i})+\frac {\rho }{2} \left({\!B_{\mathrm {total}}\! -\! \sum_{i=1}^{N} B_{i}\! +\! u\!}\right)^{\!\!2}\!\!\! + \frac {\rho }{2} u^{2}.\tag{24}\end{align*}
View Source
\begin{align*}&\hspace {-2pc}L_{\rho }( \boldsymbol {B}, B_{\mathrm {total}}, u) \\=&\sum_{i=1}^{N} f(B_{i}|n_{i})+\frac {\rho }{2} \left({\!B_{\mathrm {total}}\! -\! \sum_{i=1}^{N} B_{i}\! +\! u\!}\right)^{\!\!2}\!\!\! + \frac {\rho }{2} u^{2}.\tag{24}\end{align*}
Similarly, the convexity of f(n_{i}|B_{i})
with respect to n_{i}
established by Proposition 1, together with the bounds on its minimizer established by Proposition 3, enables the efficient solution of problem (22) via the bisection method (BM). Altogether, using these two techniques, the optimum bandwidth and transmit time allocation problem (20) can be obtained by solving equations (21) and (22) alternately. A pseudocode summarizing the method described above is given in Algorithm 2.
Algorithm 2 ADMM - BM AoI Minimizer
Inputs:E_{i}>0
, |h_{i}|^{2}>0
, N_{0}>0
, B_{\mathrm {total}}>0
, B_{i}>0
, D_{i}>0
, n_{i}>0
, i\in \boldsymbol {N}\triangleq \{ 1,\ldots,N\}
, convergence range \varepsilon
, and number of iterations for outer and inner loops s_{\mathrm {out}}^{\mathrm {max}}
and s_{\mathrm {in}}^{\mathrm {max}}
.
Outputs:Optimal transmission times \boldsymbol {n}^{*} \in \mathbb {R}^{+}
and optimal bandwidths \boldsymbol {B}^{*} \in \mathbb {R}^{+}
.
1:Initialize outer loop counter to s_{\mathrm {out}} = 1
.
2:Set initial transmission time \boldsymbol {n}^{s_{\mathrm {out}}}\gg 1
and \theta \gg 1
.
3:while s_{\mathrm {out}} \leq s_{\mathrm {out}}^{\mathrm {max}}
and | \boldsymbol {n}^{s_{\mathrm{out}}}- \boldsymbol {n}^{s_{\mathrm{out}}-1}| > \varepsilon
do
4:Initialize the inner loop counter to s_{\mathrm {in}} = 1
.
5:while s_{\mathrm {in}} \leq s_{\mathrm {in}}^{\mathrm {max}}
and \theta > \varepsilon
. do
6:Update B_{i}^{s_{\mathrm{in}}}
, \theta ^{s_{\mathrm{in}}}
and u^{s_{\mathrm{in}}}
via equation (23).
7:Update s_{\mathrm {in}} \leftarrow s_{\mathrm {in}} + 1
.
9:Find the \boldsymbol {n}^{s_{\mathrm{out}}}
by solving (9).
10:Update s_{\mathrm {out}} \leftarrow s_{\mathrm {out}} + 1
.
12: \boldsymbol {n}^{*} = \boldsymbol {n}^{s_{\mathrm {out}}}
and \boldsymbol {B}^{*} = \boldsymbol {B}^{s_{\mathrm {in}}}
.
SECTION IV.
Numerical Results
In this section, we present numerical results that build on the analysis and algorithms developed above to reveal the impact of EH, as well as of TDMA and FDMA multiple-access strategies, on the optimized AoI of WSNs. To this end, we first evaluate the performance of the proposed optimization algorithms in terms of the average AoI values in TDMA and FDMA scenarios and over fading channels.
Following a related study [11], [40], we set the total bandwidth and noise power spectrum density of the system to B_{\mathrm {total}}\!=\!1\:\mathrm {[MHz]}
and N_{0}\! =\! 10^{-17}\:\mathrm {[mW/Hz]}
, respectively, and assume that h_{i}
follows independent and identically distributed (i.i.d.) Gaussian distributions (Rayleigh fading channel) with the SNs and the FC separated by a distance of 1 [km] and the path loss for that distance set to 100 [dB]. Finally, the volume of information transmitted is set to D_{i} = 1\:\mathrm {[Mbit]}
, and the average EH rate (i.e.
, the expected EH power) is set to E_{i} = 1.0\:\mathrm {[mW]}
for all SNs.
Fig. 4 shows the average AoI performance, as a function of the number of SNs in the system, achieved by Algorithms 1 and 2 in such a scenario with TDMA and FDMA. More specifically, Fig. 4(a) shows results for the concurrent case of e.g.
in [29], [32], when the sensed information is obtained simultaneously by all SNs and them transmitted after the SNs the required energy is harvested.
The figure shows also results obtained without the EH constraint, which can be taken as a lower bound on the average AoI, since no additional time is required to wait for the SNs to energize before transmitting.
It can be seen that in this case FDMA outperforms TDMA, although only mildly so in systems of small size. This is because, in TDMA schemes, the SNs must wait not only for their own EH cycles but also for preceding SNs complete their transmissions, before they themselves can transmit.
It is also found, however, that FDMA schemes exhibit a wider gap between the AoIs achieved with and without EH constraints, which increases as the size of the system grows. In contrast, the “EH penalty” paid by the TDMA scheme is significantly smaller and less dependent on the size of the system. To understand this result, recall that indeed in a TDMA system, the time consumed by EH cycles is only of relevance in the allocation of the first SNs to transmit, since all other SNs allocated later slots will, with great likelihood, have already harvested enough energy to carry out their transmissions by the time their allocated slots come due.
Next, Fig. 4(b) compares the average AoI obtained under a distributed sampling model such as that assumed e.g.
in [28], showing results entirely opposite to those of Fig. 4(a). In this case, it is found that TDMA is superior to FDMA, with the difference between these two access schemes becoming increasingly significant as the number of SNs grows. Indeed, we note that an FDMA scheme in a strict sense – namely, in which SNs are allocated their own dedicated bands within which to transmit – is too “static” to comport the required dynamics of varying EH and sampling times faced in a WSN operating under a distributed sampling paradigm. It is this feature that makes the FDMA approach less flexible, as observed both in Figs. 4(a) and 4(b).
The findings observed above are confirmed and made more evident in the results shown in Figure 5, in which the average AoI of the optimized TDMA and FDMA schemes, both under concurrent and distributed sampling and as functions of the EH power, are compared for systems with N=4
and N=7
SNs, with the remaining parameters identical to those of Figure 4. It is found that under the distributed sampling model TDMA maintains, compared to FDMA, a lower AoI value regardless of the amount of EH power available or the number of SNs in the system, with the gap only growing with N
, as already verified also in Figure 4.
Under a concurrent sampling model, however, it is again found that FDMA can outperform TDMA, as long as the EH power available and/or the number of SNs in the system are/is sufficiently large. All in all, the results of Fig. 5 points for a localized optimality of FDMA, that is, under certain conditions, but an overall greater robustness TDMA schemes, with respect to the sampling model, system size, and available EH power.
This conclusion is only made clearer by the results of Fig. 6, where the average AoI achieved by the optimized TDMA- and FDMA-based EH wireless sensor networks, plotted as functions of the size of data packets, with E_{i} = 1.0\:\mathrm {[mW]}
, both under concurrent and distributed sampling are compared, for systems with N=4
and N=7
SNs, with the remaining parameters identical to those of Figure 4. Noticing that an increase of the data volume D_{i}
, with the EH power kept fixed, amounts to making the EH constraint more stringent, it is non-surprising that it is found that under such conditions the FDMA approach proves increasingly inadequate as the D_{i}
grows.
It can therefore be reasonably concluded, with all relevant parameters taken into account jointly, that TDMA is a more robust multi-access scheme than FDMA for EH-WSNs, with the remark that punctually, depending on specific conditions, the FDMA might be a better choice.
However, we also reemphasize that it might be possible to extend the work carried out here to jointly optimize time and frequency allocations, building an overall robust and optimum scheme for EH-WSNs. This will be pursued in future work.
In this study, we considered the uplink of a WSN where N
SNs equipped with EH power supplies transmit their data to a common FC, aiming to create a maintenance-free wireless communication system.
Taking into account TDMA and FDMA as possible multiple-access schemes, we have reformulated the AoI minimization problems for both scenarios, analyzing their optimality conditions. Furthermore, we proposed novel resource allocation algorithms for these two schemes to solve the formulated optimization problems by leveraging the aforementioned analyses. From the simulation results and previous study in [28], it is necessary to choose TDMA or FDMA separately depending on available resources, size of the data packet, and the time of packet observation in the system.
ACKNOWLEDGMENT
This work was presented in part at CAMSAP 2019 [1].
In this appendix, we prove that equation (7) is convex with respect to the number of time slots n
assigned to a given SN by demonstrating that its second derivative is strictly positive under feasible parameter setups.
Indeed, differentiating equation f(n)
with respect to n
yields the first-order derivative as follows. \begin{equation*} \frac {\mathrm {d}}{\mathrm {d}n}f(n) = g_{1}(n) \times g_{2}(n),\tag{25a}\end{equation*}
View Source
\begin{equation*} \frac {\mathrm {d}}{\mathrm {d}n}f(n) = g_{1}(n) \times g_{2}(n),\tag{25a}\end{equation*}
with \begin{align*} g_{1}(n)\triangleq&\frac {\beta n}{|h|^{2}}\left ({2^{\frac {\gamma }{n}} -1}\right ) + n,\tag{25b}\\[-2pt] g_{2}(n)\triangleq&\frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}} + 1,\tag{25c}\end{align*}
View Source
\begin{align*} g_{1}(n)\triangleq&\frac {\beta n}{|h|^{2}}\left ({2^{\frac {\gamma }{n}} -1}\right ) + n,\tag{25b}\\[-2pt] g_{2}(n)\triangleq&\frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}} + 1,\tag{25c}\end{align*}
where the auxiliary parameters \beta \triangleq B N_{0} / E
and \gamma \triangleq D / B
were introduced in order to simplify the expressions.
Next, taking the second derivative of f(n)
yields \begin{align*}\frac {\mathrm {d^{2}}f(n)}{\mathrm {d}n^{2}} =& \frac {\mathrm {d}}{\mathrm {d}n} (g_{1}(n)\! \times \! g_{2}(n))=\overbrace {\big (g_{2}(n)\big )^{\!2}}^{\geq 0} \\ & \quad \times \left({\frac {\beta }{|h|^{2}}\left({\underbrace {2^{\frac {\gamma }{n}}-1}_{\geq 0}}\right)+1}\right)\frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\left({\log 2^{\frac {\gamma }{n}}}\right)^{2}, \tag{26}\end{align*}
View Source
\begin{align*}\frac {\mathrm {d^{2}}f(n)}{\mathrm {d}n^{2}} =& \frac {\mathrm {d}}{\mathrm {d}n} (g_{1}(n)\! \times \! g_{2}(n))=\overbrace {\big (g_{2}(n)\big )^{\!2}}^{\geq 0} \\ & \quad \times \left({\frac {\beta }{|h|^{2}}\left({\underbrace {2^{\frac {\gamma }{n}}-1}_{\geq 0}}\right)+1}\right)\frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\left({\log 2^{\frac {\gamma }{n}}}\right)^{2}, \tag{26}\end{align*}
where, since \:\beta >0,\:\gamma >0,\:|h|^{2}>0,\:n> 0
, it follows that \tfrac {\mathrm {d}^{2} f(n)}{\mathrm {d}n^{2}} > 0
, completing the proof.
Appendix B
Proof of Proposition 2
Since f(n)
is a convex function with respect to n
, it possesses a unique minimizer in n\in [0,\infty )
located at the point where its first-order derivative is equal to 0. In turn, as per equation (25), the minimizer of f(n)
must be a root of either g_{1}(n)
or g_{2}(n)
, with the other bounded at that point.
Suffice it therefore to show that only the function g_{2}(n)
has a root in n\in [0,\infty )
. To this end, let us first examine the following limits of g_{1}(n)
\begin{align*} \lim \limits_{n\to +0}g_{1}(n) =& \lim_{n\to +0} \underbrace {\frac {\beta n}{|h|^{2}}\left({2^{\frac {\gamma }{n}} -1}\right)}_{\to +\infty } + \underbrace {n}_{\to +0} = +\infty, \qquad \tag{27a}\\ \lim \limits_{n\to +\infty }g_{1}(n) = & \lim_{n\to +\infty }\underbrace {\frac {\beta n}{|h|^{2}}\left({2^{\frac {\gamma }{n}} -1}\right)}_{\to +\infty }\! +\!\! \underbrace {n}_{\!\!\to +\infty \!\!}\! = +\infty, \tag{27b}\end{align*}
View Source
\begin{align*} \lim \limits_{n\to +0}g_{1}(n) =& \lim_{n\to +0} \underbrace {\frac {\beta n}{|h|^{2}}\left({2^{\frac {\gamma }{n}} -1}\right)}_{\to +\infty } + \underbrace {n}_{\to +0} = +\infty, \qquad \tag{27a}\\ \lim \limits_{n\to +\infty }g_{1}(n) = & \lim_{n\to +\infty }\underbrace {\frac {\beta n}{|h|^{2}}\left({2^{\frac {\gamma }{n}} -1}\right)}_{\to +\infty }\! +\!\! \underbrace {n}_{\!\!\to +\infty \!\!}\! = +\infty, \tag{27b}\end{align*}
which combined with the fact that the term (2^{\gamma /n} -1)\geq 0
, implies that g_{1}(n)
is strictly positive in n \in \mathbb {R}
, and bounded within the interval limits.
Next, consider the limits of g_{2}(n)
, namely \begin{align*} \lim_{n\to +0}g_{2}(n)=&\lim_{n\to +0}\frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}} + 1 \\[-2pt]=&\lim_{n\to +0} \underbrace {\frac {\beta }{|h|^{2}} 2^{\frac {\gamma }{n}}}_{\to +\infty } \underbrace {\left ({1-\log 2^{\frac {\gamma }{n}}}\right )}_{\to -\infty } \!-\! \frac {\beta }{|h|^{2}} \!+\! 1 \!=\! -\infty, \\ {}\tag{28a}\end{align*}
View Source
\begin{align*} \lim_{n\to +0}g_{2}(n)=&\lim_{n\to +0}\frac {\beta }{|h|^{2}}\left ({2^{\frac {\gamma }{n}}-1}\right ) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}} + 1 \\[-2pt]=&\lim_{n\to +0} \underbrace {\frac {\beta }{|h|^{2}} 2^{\frac {\gamma }{n}}}_{\to +\infty } \underbrace {\left ({1-\log 2^{\frac {\gamma }{n}}}\right )}_{\to -\infty } \!-\! \frac {\beta }{|h|^{2}} \!+\! 1 \!=\! -\infty, \\ {}\tag{28a}\end{align*}
and \begin{align*} \lim_{n\to +\infty }g_{2}(n)\! =\!\! \lim_{n\to +\infty }\frac {\beta }{|h|^{2}}\underbrace {\left [{\left({2^{\frac {\gamma }{n}}\!-\!1}\right) \!-\!2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}}}\right ]}_{\to +0}\!+ 1 = 1, \\ {}\tag{28b}\end{align*}
View Source
\begin{align*} \lim_{n\to +\infty }g_{2}(n)\! =\!\! \lim_{n\to +\infty }\frac {\beta }{|h|^{2}}\underbrace {\left [{\left({2^{\frac {\gamma }{n}}\!-\!1}\right) \!-\!2^{\frac {\gamma }{n}}\log 2^{\frac {\gamma }{n}}}\right ]}_{\to +0}\!+ 1 = 1, \\ {}\tag{28b}\end{align*}
which indicate that g_{2}(n)
possesses at least one root in the interval n \in [0,\infty )
.
Finally, differentiating (25c) with respect to n
yields \begin{equation*} \frac {\mathrm {d}}{\mathrm {d}n}g_{2}(n;h) = \frac {\beta \gamma ^{2} \log ^{2}(2)}{|h|^{2} n^{3}} 2^{\frac {\gamma }{n}} > 0,\tag{29}\end{equation*}
View Source
\begin{equation*} \frac {\mathrm {d}}{\mathrm {d}n}g_{2}(n;h) = \frac {\beta \gamma ^{2} \log ^{2}(2)}{|h|^{2} n^{3}} 2^{\frac {\gamma }{n}} > 0,\tag{29}\end{equation*}
where the last inequality follows from the fact that for E>0,\:D>0,\:B>0,\;N_{0}>0
and |h|^{2}>0
, which in turn implies that \beta \triangleq B N_{0} / E >0
and \gamma \triangleq D / B >0
.
Altogether, equations (28a), (28b) and (29) imply that the function g_{2}(n;h)
is monotonically increasing function from -\infty
to 1 and therefore has a single root in n \in \mathbb {R}
, completing the proof.
Appendix C
Proof of Proposition 3
Our objective is to obtain upper and lower bounds to the solution of the equation \begin{equation*} \overbrace {1-\frac {\beta }{|h|^{2}}+\frac {\beta }{|h|^{2}}\left ({2-\log 2^{\frac {\gamma }{n}}}\right )2^{\frac {\gamma }{n}} - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}}^{g_{2}(n;h)\triangleq } = 0,\tag{30}\end{equation*}
View Source
\begin{equation*} \overbrace {1-\frac {\beta }{|h|^{2}}+\frac {\beta }{|h|^{2}}\left ({2-\log 2^{\frac {\gamma }{n}}}\right )2^{\frac {\gamma }{n}} - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}}^{g_{2}(n;h)\triangleq } = 0,\tag{30}\end{equation*}
where we have rewritten the function g_{2}(n;h)
defined in equation (25c), in a manner that will prove convenient in the sequel.
Next, consider the following bound \begin{equation*} \left({2-\log 2^{\frac {\gamma }{n}}}\right)2^{\frac {\gamma }{n}} \leq e, \tag{31}\end{equation*}
View Source
\begin{equation*} \left({2-\log 2^{\frac {\gamma }{n}}}\right)2^{\frac {\gamma }{n}} \leq e, \tag{31}\end{equation*}
which is easily proved by defining g_{3}(x)\triangleq (2-\log x)x
with x\triangleq 2^{\frac {\gamma }{n}}
and observing that \begin{align*} \frac {{ d}}{{ dx}}g_{3}(x)\Big |_{x=e}=&0, \tag{32a}\\ \frac {d^{2}}{dx^{2}} g_{3}(x)=&-\frac {1}{x} < 0,\;\forall x \geq 0,\tag{32b}\end{align*}
View Source
\begin{align*} \frac {{ d}}{{ dx}}g_{3}(x)\Big |_{x=e}=&0, \tag{32a}\\ \frac {d^{2}}{dx^{2}} g_{3}(x)=&-\frac {1}{x} < 0,\;\forall x \geq 0,\tag{32b}\end{align*}
from which it follows immediately that the maximum value of g_{3}(x)
is achieved at the point x=2^{\frac {\gamma }{n}}=e
, and given by \begin{equation*} g_{3}(e) = (2 - \log e) e = e.\tag{33}\end{equation*}
View Source
\begin{equation*} g_{3}(e) = (2 - \log e) e = e.\tag{33}\end{equation*}
Using inequality (31) in equation (30) readily yields the following functional upper bound to g_{2}(n;h)
, \begin{equation*} g_{2U}(n;h) \triangleq 1+\frac {\beta }{|h|^{2}}(e-1) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}. \tag{34}\end{equation*}
View Source
\begin{equation*} g_{2U}(n;h) \triangleq 1+\frac {\beta }{|h|^{2}}(e-1) - \frac {\beta }{|h|^{2}}2^{\frac {\gamma }{n}}. \tag{34}\end{equation*}
It is obvious that the upper-bounding function g_{2U}(n;h)
is strictly ascending monotonic on n
, such that due to the strictly ascending monotonicity of g_{2}(n;h)
itself, proved in Appendix B, it follows immediately that the root the g_{2U}(n;h)
is a lower bound on the root of g_{2}(n;h)
, that is \begin{equation*} g_{2U}(n_{L};h) \!=\! 0\;\Longrightarrow \; n^{*}_{L} \!=\! \frac {\gamma }{\log_{2}\left ({\frac {|h|^{2}}{\beta } \!+\! e-1}\right )} \leq n^{*}. \tag{35}\end{equation*}
View Source
\begin{equation*} g_{2U}(n_{L};h) \!=\! 0\;\Longrightarrow \; n^{*}_{L} \!=\! \frac {\gamma }{\log_{2}\left ({\frac {|h|^{2}}{\beta } \!+\! e-1}\right )} \leq n^{*}. \tag{35}\end{equation*}
Finally, we note that at the point 2^{\frac {\gamma }{n}} = e
, where the equality g_{2U}(n;h)=g_{2}(n;h)
holds, we have \begin{equation*} g_{2U}(n;h) = 1 - \frac {\beta }{|h|^{2}} > 0,\quad \forall \;|h|^{2} > \beta,\tag{36}\end{equation*}
View Source
\begin{equation*} g_{2U}(n;h) = 1 - \frac {\beta }{|h|^{2}} > 0,\quad \forall \;|h|^{2} > \beta,\tag{36}\end{equation*}
such that, again due to the monotonically ascending behaviors of both functions, it follows that as long as the condition |h|^{2} > \beta
is satisfied, we have \begin{equation*} g_{2U}(n_{U};h) = g_{2}(n_{U};h)\;\Longrightarrow \; n^{*}_{U} = \gamma \log 2 \geq n^{*}, \tag{37}\end{equation*}
View Source
\begin{equation*} g_{2U}(n_{U};h) = g_{2}(n_{U};h)\;\Longrightarrow \; n^{*}_{U} = \gamma \log 2 \geq n^{*}, \tag{37}\end{equation*}
which concludes the proof.
Appendix D
Proof of Proposition 4
Recall that the lower-bound n^{*}_{L}
on the optimal transmission time that minimizes the AoI of a given SN is the root of the upper-bounding function g_{2U}(n;h)
, defined in equation (34), of the function g_{2}(n;h)
, defined in equation (30).
Directly introducing the condition |h_{1}|^{2} > |h_{2}|^{2}
, and the equivalent relation |h_{2}|^{2} = |h_{1}|^{2} - \eta
, with \eta \in \mathbb {R}^{+}
, the difference between g_{2U}(n;h_{1})
and g_{2U}(n;h_{2})
yields \begin{align*} d(n;h_{1},h_{2})\triangleq&g_{2U}(n;h_{1}) - g_{2U}(n;h_{2}) \\=&\frac {\eta \beta }{|h_{1}|^{2}{|h_{2}|^{2}}} \left ({2^{\frac {\gamma }{n}} + 1 - e}\right ),\tag{38}\end{align*}
View Source
\begin{align*} d(n;h_{1},h_{2})\triangleq&g_{2U}(n;h_{1}) - g_{2U}(n;h_{2}) \\=&\frac {\eta \beta }{|h_{1}|^{2}{|h_{2}|^{2}}} \left ({2^{\frac {\gamma }{n}} + 1 - e}\right ),\tag{38}\end{align*}
which is obviously monotonically decreasing on n
.
The latter fact, together with the trivial limits \begin{align*} \lim \limits_{n\to +0} d(n;h_{1},h_{2})=&+\infty,\tag{39a}\\ \lim \limits_{n\to +\infty } d(n;h_{1},h_{2})=&+0,\tag{39b}\end{align*}
View Source
\begin{align*} \lim \limits_{n\to +0} d(n;h_{1},h_{2})=&+\infty,\tag{39a}\\ \lim \limits_{n\to +\infty } d(n;h_{1},h_{2})=&+0,\tag{39b}\end{align*}
implicates that d(n;h_{1},h_{2})>0
in n\in \mathbb {R}^{+}
, and consequently that g_{2U}(n;h_{1}) > g_{2U}(n;h_{2})
.
However, since g_{2U}(n;h_{1})
and g_{2U}(n;h_{2})
are themselves monotonically ascending functions, the above also implicates that the root n^{*}_{1L}
of g_{2U}(n;h_{1})
is smaller than the root n^{*}_{2L}
of g_{2U}(n;h_{2})
, which proves inequality (17a).
Finally, we can observe from inequality (37) that the upper-bounding transmission time n^{*}_{U}
is independent of |h|^{2}
, such that equation (17b) follows trivially, concluding the proof.
Appendix E
Proof of Proposition 5
Substituting the expression for the lower bound n^{*}_{L}
given in inequality (35) into equation (6) we have \begin{equation*} k(n^{*}_{L};h) = \frac {\gamma }{|h|^{2}} \frac {|h|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h|^{2}}{\beta }+e-1}\right )}.\tag{40}\end{equation*}
View Source
\begin{equation*} k(n^{*}_{L};h) = \frac {\gamma }{|h|^{2}} \frac {|h|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h|^{2}}{\beta }+e-1}\right )}.\tag{40}\end{equation*}
In order to prove implication (18a), it is sufficing to verify that for |h_{1}|^{2} > |h_{2}|^{2}>\beta
\begin{align*}&\hspace {-1.2pc}k(n^{*}_{2L};h_{2})- k(n^{*}_{1L};h_{1}) \\=&\frac {\gamma }{|h_{2}|^{2}} \frac {|h_{2}|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )} -\frac {\gamma }{|h_{1}|^{2}} \frac {|h_{1}|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right )} \\=&\underbrace {\frac {\gamma \log_{2}\left ({\frac {|h_{1}|^{2}+\beta (e-1)}{|h_{2}|^{2}+\beta (e-1)}}\right )} {\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right ) \log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}}_{\geq 0} + \frac {\beta \gamma (e-2)}{|h_{1}|^{2}|h_{2}|^{2}} \\&\times \underbrace {\frac {\left |{h_{1}}\right |^{2} \log \left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right )-\left |{h_{2}}\right |^{2} \log \left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}{\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right ) \log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}}_{\geq 0} \geq 0. \\ {}\tag{41}\end{align*}
View Source
\begin{align*}&\hspace {-1.2pc}k(n^{*}_{2L};h_{2})- k(n^{*}_{1L};h_{1}) \\=&\frac {\gamma }{|h_{2}|^{2}} \frac {|h_{2}|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )} -\frac {\gamma }{|h_{1}|^{2}} \frac {|h_{1}|^{2}+\beta (e-2)}{\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right )} \\=&\underbrace {\frac {\gamma \log_{2}\left ({\frac {|h_{1}|^{2}+\beta (e-1)}{|h_{2}|^{2}+\beta (e-1)}}\right )} {\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right ) \log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}}_{\geq 0} + \frac {\beta \gamma (e-2)}{|h_{1}|^{2}|h_{2}|^{2}} \\&\times \underbrace {\frac {\left |{h_{1}}\right |^{2} \log \left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right )-\left |{h_{2}}\right |^{2} \log \left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}{\log_{2}\left ({\frac {|h_{1}|^{2}}{\beta }\!+\!e\!-\!1}\right ) \log_{2}\left ({\frac {|h_{2}|^{2}}{\beta }\!+\!e\!-\!1}\right )}}_{\geq 0} \geq 0. \\ {}\tag{41}\end{align*}
In turn, substituting the expression for the upper bound n^{*}_{U}
given in inequality (37) into equation (6) yields \begin{equation*} k(n^{*}_{U};h) = \frac {\beta \gamma }{|h|^{2}}(e-1),\tag{42}\end{equation*}
View Source
\begin{equation*} k(n^{*}_{U};h) = \frac {\beta \gamma }{|h|^{2}}(e-1),\tag{42}\end{equation*}
from what it follows trivially that k(n^{*}_{1U};h_{1})< k(n^{*}_{2L};h_{2})
for |h_{1}|^{2} > |h_{2}|^{2}
, which completes the proof.
Appendix F
Proof of Proposition 6
For convenience, let us first reproduce equations (15b) and (15d), namely \begin{align*} \bar {f}_{B}(n_{1}^{*},n_{2}^{*}) &= \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} + n_{2}^{*} \big )^{2}, \\ \tag{43a}\\ \bar {f}_{D}(n_{1}^{*},n_{2}^{*}) &= \frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} + n_{1}^{*} \big )^{2}, \\ {}\tag{43b}\end{align*}
View Source
\begin{align*} \bar {f}_{B}(n_{1}^{*},n_{2}^{*}) &= \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} \big )^{2} + \frac {1}{2}\left ({k \big (n_{1}^{*}}\right ) + n_{1}^{*} + n_{2}^{*} \big )^{2}, \\ \tag{43a}\\ \bar {f}_{D}(n_{1}^{*},n_{2}^{*}) &= \frac {1}{2}\left ({k(n_{2}^{*}) + n_{2}^{*} }\right )^{2} + \frac {1}{2}\left ({k \big (n_{2}^{*}}\right ) + n_{2}^{*} + n_{1}^{*} \big )^{2}, \\ {}\tag{43b}\end{align*}
First, with respect to inequality (19a), it is readily found from these equations that \begin{align*}&\hspace {-1.2pc}\bar {f}_{D}(n_{1L}^{*},n_{2L}^{*}) - \bar {f}_{B}(n_{1L}^{*},n_{2L}^{*}) \\=&\frac {1}{2}\left \{{k(n_{2L}^{*}) + n_{2L}^{*} }\right \}^{2} + \frac {1}{2}\left \{{k(n_{2L}^{*}) + n_{2L}^{*} + n_{1L}^{*} }\right \}^{2} \\&-\, \frac {1}{2}\left \{{k(n_{1L}^{*}) + n_{1L}^{*} }\right \}^{2} - \frac {1}{2}\left \{{k(n_{1L}^{*}) + n_{1L}^{*} + n_{2L}^{*} }\right \}^{2} \geq 0, \\ {}\tag{44}\end{align*}
View Source
\begin{align*}&\hspace {-1.2pc}\bar {f}_{D}(n_{1L}^{*},n_{2L}^{*}) - \bar {f}_{B}(n_{1L}^{*},n_{2L}^{*}) \\=&\frac {1}{2}\left \{{k(n_{2L}^{*}) + n_{2L}^{*} }\right \}^{2} + \frac {1}{2}\left \{{k(n_{2L}^{*}) + n_{2L}^{*} + n_{1L}^{*} }\right \}^{2} \\&-\, \frac {1}{2}\left \{{k(n_{1L}^{*}) + n_{1L}^{*} }\right \}^{2} - \frac {1}{2}\left \{{k(n_{1L}^{*}) + n_{1L}^{*} + n_{2L}^{*} }\right \}^{2} \geq 0, \\ {}\tag{44}\end{align*}
where the last inequality follows directly from inequality (17a) in Proposition 4 and inequality (18a) in Proposition 5.
As for inequality (19b), we again observe that \begin{align*}&\hspace {-1.2pc}\bar {f}_{D}(n_{1U}^{*},n_{2U}^{*}) - \bar {f}_{B}(n_{1U}^{*},n_{2U}^{*}) \\=&\frac {1}{2}\left \{{k(n_{2U}^{*}) + n_{2U}^{*} }\right \}^{2} + \frac {1}{2}\left \{{k(n_{2U}^{*}) + n_{2U}^{*} + n_{1U}^{*} }\right \}^{2} \\&-\, \frac {1}{2}\left \{{k(n_{1U}^{*}) + n_{1U}^{*} }\right \}^{2} - \frac {1}{2}\left \{{k(n_{1U}^{*}) + n_{1U}^{*} + n_{2U}^{*} }\right \}^{2} \geq 0, \\ {}\tag{45}\end{align*}
View Source
\begin{align*}&\hspace {-1.2pc}\bar {f}_{D}(n_{1U}^{*},n_{2U}^{*}) - \bar {f}_{B}(n_{1U}^{*},n_{2U}^{*}) \\=&\frac {1}{2}\left \{{k(n_{2U}^{*}) + n_{2U}^{*} }\right \}^{2} + \frac {1}{2}\left \{{k(n_{2U}^{*}) + n_{2U}^{*} + n_{1U}^{*} }\right \}^{2} \\&-\, \frac {1}{2}\left \{{k(n_{1U}^{*}) + n_{1U}^{*} }\right \}^{2} - \frac {1}{2}\left \{{k(n_{1U}^{*}) + n_{1U}^{*} + n_{2U}^{*} }\right \}^{2} \geq 0, \\ {}\tag{45}\end{align*}
where the last inequality follows from equality (17b) in Proposition 4 and inequality (18b) in Proposition 5, concluding the proof.
Appendix G
Proof of Proposition 7
Differentiating f(B_{i}|n_{i})
, we obtain \begin{align*} \frac {\mathrm {d}}{\mathrm {d}B_{i}}f(B_{i}|n_{i})=&\left ({\alpha_{i} B_{i} n_{i} \left ({2^{\frac {D_{i}}{B_{i} n_{i}}} - 1}\right )+ n_{i}}\right ) \\&\times \left ({\alpha_{i} n_{i}\left ({2^{\frac {D_{i}}{B_{i} n_{i}}} - 1}\right ) - \alpha_{i} 2^{\frac {D_{i}}{B_{i} n_{i}}}\log 2^{\frac {D_{i}}{B_{i}}}}\right ), \\ {}\tag{46}\end{align*}
View Source
\begin{align*} \frac {\mathrm {d}}{\mathrm {d}B_{i}}f(B_{i}|n_{i})=&\left ({\alpha_{i} B_{i} n_{i} \left ({2^{\frac {D_{i}}{B_{i} n_{i}}} - 1}\right )+ n_{i}}\right ) \\&\times \left ({\alpha_{i} n_{i}\left ({2^{\frac {D_{i}}{B_{i} n_{i}}} - 1}\right ) - \alpha_{i} 2^{\frac {D_{i}}{B_{i} n_{i}}}\log 2^{\frac {D_{i}}{B_{i}}}}\right ), \\ {}\tag{46}\end{align*}
where we have implicitly defined \alpha_{i}\triangleq N_{0}/ |h_{i}|^{2} E_{i}
.
In turn, the second derivative of f(B_{i}|n_{i})
is \begin{align*}\frac {\mathrm {d^{2}}}{\mathrm {d}B_{i}^{2}}f(B_{i}|n_{i}) =&\left ({\alpha_{i}2^{\frac {D_{i}}{Bn_{i}}}\left ({n_{i} - \log 2^{\frac {D_{i}}{Bn_{i}}}}\right ) + \alpha_{i} n_{i} + 1}\right )^{2} \\& \qquad {\times \alpha_{i} 2^{\frac {D_{i}}{B_{i}n_{i}}}\log 2^{\frac {D_{i}}{B_{i}}}\left ({\frac {2 n_{i}}{B_{i}} + \log 2^{\frac {D_{i}}{B_{i}}}}\right )}\tag{47}\end{align*}
View Source
\begin{align*}\frac {\mathrm {d^{2}}}{\mathrm {d}B_{i}^{2}}f(B_{i}|n_{i}) =&\left ({\alpha_{i}2^{\frac {D_{i}}{Bn_{i}}}\left ({n_{i} - \log 2^{\frac {D_{i}}{Bn_{i}}}}\right ) + \alpha_{i} n_{i} + 1}\right )^{2} \\& \qquad {\times \alpha_{i} 2^{\frac {D_{i}}{B_{i}n_{i}}}\log 2^{\frac {D_{i}}{B_{i}}}\left ({\frac {2 n_{i}}{B_{i}} + \log 2^{\frac {D_{i}}{B_{i}}}}\right )}\tag{47}\end{align*}
From the latter equation, it is evident that for \:\alpha_{i}>0,\;D_{i}>0,\:n_{i}>0,\:n_{i}> 0
, we have {\mathrm {d}^{2}f(B_{i}|n_{i})}/{\mathrm {d}B_{i}^{2}} > 0
, which indicates that f(B_{i}|n_{i})
is strictly convex with respect to B_{i}
concluding the proof.