Next Article in Journal
Architecture to Embed Software Agents in Resource Constrained Internet of Things Devices
Next Article in Special Issue
Efficient Location Service for a Mobile Sink in Solar-Powered Wireless Sensor Networks
Previous Article in Journal
An Improved Channel Estimation Technique for IEEE 802.11p Standard in Vehicular Communications
Previous Article in Special Issue
Energy Harvesting Technologies for Achieving Self-Powered Wireless Sensor Networks in Machine Condition Monitoring: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Optimal Random Access Scheme for Energy Harvesting Devices in Satellite Communication Networks

1
School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Information and Electronics Technology Lab, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(1), 99; https://doi.org/10.3390/s19010099
Submission received: 13 September 2018 / Revised: 14 December 2018 / Accepted: 22 December 2018 / Published: 28 December 2018
(This article belongs to the Special Issue Energy Harvesting Sensor Systems)

Abstract

:
This paper considers satellite communication networks where each satellite terminal is equipped with energy harvesting (EH) devices to supply energy continuously, and randomly transmits bursty packets to a geostationary satellite over a shared wireless channel. Packet replicas combined with a successive iteration cancellation scheme can reduce the negative impact of packet collisions but consume more energy. Hence, appropriate energy management policies are required to mitigate the adverse effect of energy outages. Although centralized access schemes can provide better performance on the networks’ throughput, they expend extra signallings to allocate the resources, which leads to non-negligible communication latencies, especially for the satellite communication networks. In order to reduce the communication overhead and delay, a distributed random access (RA) scheme considering the energy constraints is studied. Each EH satellite terminal (EH-ST) decides whether to transmit the packet and how many replicas are transmitted according to its local energy and EH rates to maximize the average long-term network throughput. Owing to the nonconvexity of this problem, we adopted a game theoretic method to approximate the optimal solution. By forcing all the EH-STs to employ the same policy, we characterized and proved the existence and uniqueness of the symmetric Nash equilibrium (NE) of the game. Moreover, an efficient algorithm is proposed to calculate the symmetric NE by combining a policy iteration algorithm and the bisection method. The performance of the proposed RA scheme was investigated via numerous simulations. Simulation results showed that the proposed RA scheme is applicable to the EH devices in the future low-cost interactive satellite communication system.

1. Introduction

In recent years, the packet-oriented Internet protocol (IP) traffic and machine-to-machine (M2M) applications supported by satellite communication networks have received increasing attention in the research community, which is significant for complementing the terrestrial infrastructure to provide global seamless coverage [1]. For emerging applications, satellite networks need to efficiently tackle bursty traffic with a low duty cycle generated by a massive number of terminals, with constrain energy and limit computational resource. However, this presents a significant challenge for the multiple access protocols in satellite communication networks. Traditional solutions for resource allocation based on fixed assignment and demand assignment are obviously not applicable to this type of traffic [1]. Random access (RA) protocols have become a candidate multiple access scheme in interactive satellite networks, because they are insensitive to the network size and traffic characteristics, as well as easy to be implemented for satellite terminals. Specifically, RA is a kind of distributed uplink access scheme. Terminals upload their data packets directly via a shared wireless channel, and they do not need to request resources. For bursty traffic, it is inefficient for massive terminals to request resources frequently, especially for the network made up by a geosynchronous orbit (GEO) satellite. Moreover, centralized resource allocation and scheduling for massive terminals are really complicated and impractical, and the extra communication delay brought by resource allocation is intolerant. Thus, RA can be well applicable to the large network size and bursty traffic.
Aloha and slotted Aloha (S-Aloha) are the classical RA protocols, and they are widely applied in satellite communication networks [2]. However, their performance in terms of network throughput is really poor due to packet collisions. Satellite communication networks suffer from large propagation delay, especially for the geostationary satellite. Packet collisions decrease the throughput of the network and further enlarge the access delay caused by packet retransmission, which is intolerant to interactive applications. Therefore, the research for more efficient satellite RA schemes is triggered by this issue. Thanks to the evolution and implementation of a physical layer forward error correction (FEC) coding scheme and iterative signal processing [3] at the gateway station, the performance of random access is improved greatly, which is more practical for interactive satellite networks. Contention resolution diversity slotted Aloha (CRDSA) [4,5] as a candidate RA scheme for the next generation of interactive satellite systems [6] adopted the concept of time diversity and successive interference cancellation (SIC) to enhance the performance of RA, where the maximum throughput could reach up to 0.55 packets/slot. More specifically, a packet is transmitted two or more times within a frame, and each packet contains the location information of the replicas in the packet header, which is used to resolve the collisions. CRDSA promotes the research on Aloha-based RA schemes, especially for the satellite communications scenario. Indicatively, some variants of CRDSA were presented in References [7,8,9,10]. These RA schemes inherited the concept of time diversity by changing the packet repetition rate or combining with suitable coding schemes to further improve the throughput. Moreover, some RA protocols that adopted the train of thought of CRDSA but without time synchronization were researched in References [11,12,13]. The asynchronous mechanism makes the received packets probably collide partially with a specific packet. Consequently, the throughput of the network can be further boosted by adopting powerful FEC coding schemes, which are used to recover the packets with limited interference. These enhanced RA protocols exploited packet replicas to recover the collided packets, but transmitting extra replicas consumed more energy.
Recent advances in energy harvesting (EH) technologies enable the devices supplying sustained energy by collecting energy from the surrounding environment, e.g., solar, wind, heat, etc. [14]. Many systems, such as wireless sensor networks (WSNs) and satellite communication networks, can take advantages of EH technologies [15]. Satellite terminals equipped with EH devices can execute tasks such as data acquisition and data transmission autonomously over a long period of time. Therefore, energy management for the satellite terminals is one of the significant and realistic issues in the RA procedure. Moreover, due to the unpredictable and random energy harvested, the design of appropriate RA schemes considering energy management is essential to minimize the negative impact of energy outage and to optimize the long-term network overall throughput. Unfortunately, the EH process and the problem of energy efficiency of the satellite terminals were not taken into consideration in the aforementioned satellite RA schemes.
Various multiple access schemes with optimal energy management policies in terrestrial networks have been researched in the literature [16,17,18,19]. In Reference [16], authors studied the tradeoff between throughput and the delay of a sensor node with an EH source. The authors of [17] proposed a policy to determine whether the EH device should transmit the data or not, according to its current energy level, so as to maximize the utility of the networks. The authors of [18,19] characterized the stable region in the scenario of two bursty nodes with EH capability randomly accessing a common receiver. These studies are suitable for only one or two terminals, which are not realistic in the satellite networks.
The design of medium access control (MAC) protocols that can support multiple EH sensors was presented in References [20,21,22,23], focusing on time division multiple access (TDMA), framed Aloha, and dynamic framed Aloha. An EH contention tree-based access (EH-CTA) protocol was addressed in Reference [24], which exploited a tree-splitting algorithm to recover collisions and considered the energy availability. The authors of [25] put forward an EH aware reservation dynamic framed slotted Aloha (EH-RDFSA) protocol for the case of wireless M2M networks. The above works [20,21,22,23,24,25] are considered in the terrestrial EH-WSNs scenario, and the access policies are decided by a central controller according to the energy levels of each EH sensor. The centralized schemes are expected to achieve the best performance because packet collisions can be avoided by proper management at the central controller. However, this kind of centralized policies is only appropriate for relatively small scales of networks [26]. For satellite communication networks, the number of EH satellite terminals (EH-STs) is much larger than that of sensor nodes in terrestrial EH-WSNs, and the energy state information uploaded by massive EH-STs to the central controller in every slot will lead to unaffordable communication overhead. Furthermore, the resource allocation procedure will cause additional communication delay, which is unacceptable in satellite communication networks, especially for the networks made up by geosynchronous orbit (GEO) satellites.
Some studies on multiple access schemes with distributed energy management policies were presented in References [27,28,29]. In this respect, a distributed dynamic optimal policy which maximized the sum throughput by adjusting each EH node’s transmission power was introduced in Reference [27]. A decentralized access scheme was designed in Reference [28], where each EH node decided to transmit or discard a packet according to the packet’s utility and the energy level independently by a game theoretic analysis method. A distributed scheduling scheme adopting an iterative technique to find the efficient rate and power scheduling for boosting the average throughput was proposed in Reference [29].
The terrestrial RA schemes with energy management policies mentioned above are based on pure S-Aloha, where no contention resolution mechanisms are applied to improve the performance of the networks. The S-Aloha scheme suffers a high collision probability, especially for the heavy traffic load. Without contention resolution mechanisms, colliding frequently requires a large number of retransmissions, which yields very large latencies in the satellite networks. Therefore, those RA schemes based on pure S-Aloha cannot be applied to the satellite scenario directly. In addition, the population of the satellite terminals in the satellite coverage range is much larger than that in the terrestrial cell, which makes the RA schemes with centralized energy management policies unpractical. Thus, the design of RA schemes with efficient energy management policies for the interactive satellite communication networks is urgent.
Driven by these requirements, this paper introduces a distributed optimal RA scheme based on the CRDSA protocol for EH-STs in satellite communication networks. Unlike some asynchronous and spread spectrum based RA protocols, such as enhanced spread spectrum Aloha (E-SSA) [30] and minimum mean square error enhanced spread spectrum Aloha (ME-SSA) [31], CRDSA is a non-spread spectrum protocol but requires time slot synchronization. The reason for choosing CRDSA as the basic protocol is its robustness and simplicity of implementation compared with spread spectrum systems [12]. Moreover, CRDSA is a candidate RA protocol for the next generation of interactive satellite systems [6], which is interested in practice. The main contributions of this paper can be summarized as:
  • Propose a distributed optimal RA scheme in satellite communication networks with the consideration of energy management policies by extension of the CRDSA protocol towards an EH scenario. Each EH-ST determines whether to transmit the packet and how many replicas are sent according to its local energy information so as to maximize the average long-term network throughput;
  • develop an analytical model of the average long-term throughput with constraints of packet loss ratio and energy. A game theoretic method is adopted to tackle the nonconvex optimization problem. By employing the same access scheme to all EH-STs, the symmetric Nash equilibrium of this game is characterized, and its existence and uniqueness are proved;
  • exploit a policy iteration algorithm combined with a bisection method to approximate the optimal solution of the game. The performance of the proposed RA scheme by both numerical analysis and extensive simulations is investigated under different EH rates for different metrics as throughput, packet loss ratio, and data delivery probability.
The rest of this paper is organized as follows. Section 2 introduces the system model and performance metrics. Problem descriptions and formulation are presented in Section 3. Section 4 analyzes and solves the optimization problem. Simulation results are shown in Section 5. Finally, Section 6 concludes this paper and indicates future work.
Notations: Uppercase boldfaces, lowercase boldfaces and normal letters denote the matrices, vectors and scalars respectively, such as X , x and x.

2. System Model

The scenario under consideration in this paper consists of U wireless EH-STs, where EH-STs send data packets via a shared wireless channel to a GEO satellite, as shown in Figure 1. These EH-STs are placed in the outdoor field to monitor the environment and post the acquired data to the satellite [32]. The data packets received by the satellite are forwarded to the ground gateway station transparently with independent backhaul channels, which are assumed to be error free. The energy harvested by each EH-ST from the environment is stored in a rechargeable battery for the radio frequency unit and sensing apparatus. Each EH-ST is equipped with a processing unit to manage the available energy. The following parts of this section introduce the data model, MAC protocol, energy consumption, energy storage, and energy harvesting models of the system in detail.

2.1. MAC Protocol Operation and Performance Metrics

(1) MAC Protocol Operation: The adopted MAC protocol is based on the idea of CRDSA and its frame structure is shown in Figure 2 [4]. Time is slotted, and each RA frame consists of N time slots. The duration of each time slot is assumed to be equal to the packet transmission time, which is denoted as T s . Once the EH-STs have registered in the network, they will keep time synchronization via the procedures described in Reference [33] or in Reference [34]. An EH-ST can transmit only one MAC packet per RA frame. In fact, the EH-ST will transmit l replicas of the same MAC packet physically, where l Z + and l N . These replicas carry the same preamble and payload information and are randomly put in l slots of an RA frame. For a specific replica, the payload should contain the location information of other replicas within the frame. Once a packet is detected successfully at the gateway station (e.g., the first packet of user 3 in Figure 2), it will use the location information to cancel the interference caused by other replicas on other slots (e.g., the second packet of user 3 in Figure 2). Most of the packets that are collided initially can be recovered by iterating the above approach.
For packets decoded at the gateway station, it is assumed that channel information is always available, which can be acquired by the methods mentioned in References [4,10]. For every frame, the EH-STs will always have a packet to send, and all packets are with equal importance. Each EH-ST decides whether to transmit the packet independently following the policy ω , which is only related to its current energy level and EH rate. Specifically, ω indicates two parts. One is the number of packet replicas to send, which is denoted as l, and the other one is the probability of transmitting these replicas, which is denoted as η . For simplicity, this paper only considers stationary policies independent of each frame, and ω = ω 1 , ω 2 , , ω U denotes as the joint transmission policy of the network. If the packet is not transmitted at the current frame, or it fails to be transmitted successfully, it will be transmitted in the next frame.
(2) Performance Metrics: The performance of the RA scheme is measured by the packet loss ratio ( P L R ), the throughput T of the system, and data delivery probability p d , where P L R and T are related to the normalized traffic load L, number of packet replicas l, and number of time slots in a frame N [4]. Similar to the definition of throughput in Reference [10], for given l and N, which are usually predefined in the network, the relationship between P L R and T is defined as:
T L , l , N = 1 P L R L , l , N L ,
where L = M / N , and M is the number of the co-transmitted EH-STs within the duration of one frame ( M Z + ). Moreover, P L R is supposed to be a continuous increasing function with respect to (w.r.t) the traffic load L [4], and the traffic load increases with the increase of packet transmission probability.
The data delivery probability is the probability of the data of any EH-ST u to be successfully delivered and correctly received by the satellite during the kth frame when there are new packets ready to be reported at the start of the frame k. This metric, denoted as p d , measures the ability of the RA scheme to successfully transmit the packets from EH-STs to the satellite in every frame, without depleting their energy. p d is expressed as:
p d ( k ) = Pr [ u transmits successfully in frame k | u has new data in frame k ] .
Note that the successfully transmitted packets by EH-ST u in Equation (2) include both the noncollided packets from the beginning and the packets that have been resolved during its frame time. Moreover, the statistical probability (Equation (2)) is made by each EH-ST independently. Since EH technologies can provide EH-STs with potentially perpetual operation, the average long-term data delivery probability can be expressed as p d L T = lim k p d ( k ) .
Packet delay is another metric to describe the average delay of a packet that is successfully received at the gateway station. Each EH-ST transmits l packet replicas with the probability η independently. If there is not enough energy in the battery, it will wait until it has enough energy to transmit the packets. The evolution of the available energy in the battery can be modeled as a Markov chain, which is introduced in detail in Section 3. Moreover, if a packet fails to be received at the gateway station, it will be retransmitted with the same policy ω , according to the residual energy. Therefore, the packet delay D p k is measured as the number of frames that elapse from the start of one frame where the packet was transmitted for the first time, until the end of the frame where the packet was received successfully. According to the description above, the packet delay distribution can be expressed as [35]:
Pr ( D p k = f ) = e = 0 e m a x π η ( e ) η ( e ) ( 1 P L R ) , for f = 1 e = 0 e m a x { π η ( e ) η ( e ) P L R · ( π η ( e ) η ( e ) · ( 1 P L R ) ) × ( 1 π η ( e ) η ( e ) ) + P L R · π η ( e ) η ( e ) f 2 } , for f > 1 ,
where π η ( e ) is the steady-state probability of the available energy e, and the derivation of π η ( e ) is presented in the next section. η ( e ) is the packet transmission probability and e m a x is the capacity of the battery. Specifically, the term π η ( e ) η ( e ) ( 1 P L R ) represents that the packet is received successfully. For f > 1 , the term π η ( e ) η ( e ) P L R means the packet is transmitted in the first frame, but it is not received by the gateway station. Furthermore, the term ( 1 π η ( e ) η ( e ) ) + P L R · π η ( e ) η ( e ) f 2 can be explained as that the packet is still not received in the next f 2 frame periods due to the energy shortage or packet collisions. Thus, the long-term average packet delay D p k L T is given by:
D p k L T = f = 1 f · Pr ( D p k = f ) .

2.2. Energy Consumption and Storage Models

In this paper, the rechargeable battery of each EH-ST is modeled as a buffer [36], and each position in the buffer can hold one energy unit. It is assumed that packets are transmitted with equal power, which will consume one energy unit for transmitting one physical packet in a frame, and the other energy expenditures due to battery leakage or data collecting, etc. are not taken into consideration. The number of energy units that are stored in a battery of an EH-ST is denoted by E 0 , 1 , 2 , , e m a x , where e m a x represents the capacity of the battery. Denote the amount of energy units of EH-ST u at the frame k as E u , k , where k Z + , and the evolution of E u , k is formulated as follows:
E u , k + 1 = m i n E u , k l u , k · Q u , k + B u , k , e m a x ,
where Q u , k is the packet transmission action of EH-ST u. Q u , k = 1 if the EH-ST determines to transmit the current packet with l u , k replicas, which will consume l u , k energy units, otherwise the EH-ST u will remain idle for Q u , k = 0 . B u , k represents the amount of energy that the EH-ST u harvested within the duration of frame k, and the harvested energy within the duration of frame k can only be used for the next frame. Thus, if there is no energy left in the battery, then the EH-ST u will remain idle ( Q u , k = 0 ).

2.3. Energy Harvesting Model

The communication scenario under consideration in this paper is mainly applied to environmental monitoring, and each EH-ST can harvest different amounts of energy units from the ambient energy sources. For instance, for a solar source, EH-STs in the direct sunlight situation will harvest more energy than those in a cloudy situation. Therefore, we assume the energy harvester of EH-ST u acquires B u , k energy units from the environment within the duration of frame k. Based on the energy harvesting models mentioned in References [22,24,25], the energy arrival process in this paper is assumed to follow Poisson distribution during one frame transmission time with parameter b k , which represents the stochastic and intermittent nature of the ambient energy sources. Thus, the probability of B u , k energy units arrived within the duration of frame k is:
β B u , k , b k = b k B u , k e x p b k B u , k ! .
The energy arrival process of the components of B k = B 1 , k , B 2 , k , B U , k is considered to be identically and independently distributed (i.i.d) over time and all EH-STs. β ¯ denotes the average energy units harvested within a long period of time, which reflects the average long-term EH rate, and β ¯ = E B u , k .

3. Problem Descriptions and Optimization

This paper focuses on designing a distributed RA policy for EH-STs in satellite communication networks. Following this way, all the EH-STs in the networks are considered to have their own local information, i.e., the energy level at the current time and the EH rate. Therefore, EH-ST u decides whether to transmit the packet in the current frame k or keep idle based only on E u , k , independent of the energy level of other EH-STs ( E i , k , i u ). For the given E u , k , the probability of EH-ST u transmitting its current packet ( Q u , k = 1 ) with l u , k replicas is η E u , k , which is the transmission policy of our design.
Supposing there are M EH-STs transmitting packets in the same frame duration, given the initial state of energy levels E 0 = e 0 E U , the policy ω , the number of packet replicas l, and the number of time slots in a frame N, the average long-term throughput contributed by the specific EH-ST u can be denoted as follows:
T ω u e 0 = lim K 1 K k = 0 K 1 1 P L R M , l , N η u , k · U M × i u , j η i , k j u , i 1 η j , k e 0 , ω ,
where i indicates the other co-transmitted EH-STs in addition to EH-ST u, and j represents the rest of the EH-STs which keep idle. The term 1 P L R M , l , N represents the throughput contributed by EH-ST u, and the term U M i u , j η i , k j u , i 1 η j , k is a binomial operator which stands for the probability of M EH-STs transmitting packets. Specifically, the average probability of EH-ST u transmitting l u , k replicas in energy level e is denoted as:
η u e = Pr Q u , k = 1 E u , k = e .
Furthermore, the expected throughput contributed by EH-ST u in energy level e is denoted as g η u E u , k , which is given by:
g η u E u , k = E 1 P L R ( M , l , N ) E u , k = e .
g η u e is a concave function w.r.t the traffic load, which is related to the transmission probability η u e . Therefore, Equation (7) can be restated as:
T ω u e 0 = lim K 1 K k = 0 K 1 g η u E u , k η u , k · U M × i u , j η i , k j u , i 1 η j , k e 0 , ω .
Moreover, the average long-term throughput of the network is defined as the number of the packets successfully uploaded to the satellite, which can be represented as:
T ω e 0 = u = 1 M T ω u e 0 .
This paper aims to design the packets transmission policies ω to maximize the throughput of the network, i.e.,
ω * = arg max ω T ω e 0 .
However, the design of transmission policies ω for the EH-STs in the satellite communication networks needs to consider the following trade-offs:
  • More packet replica EH-STs transmitting seems to provide a better performance of packet detection [7]; nonetheless, too many replicas will cause channel saturation easily in the heavy traffic load [35] and battery depletion occurs more frequently;
  • larger transmission probability makes EH-STs transmit more often, which yields large access latencies due to packet collisions, especially for the heavy traffic load [4,28]; hence, a lower network throughput is accrued;
  • smaller transmission probability results in a lighter traffic load, which increases the packet transmission success rate; however, as Equation (1) indicated, smaller network throughput may be acquired.
Thus, the optimal transmission policy ω * reflects an optimal trade-off among energy consumption, access delay, and network overall throughput. In order to keep balance between the performance of packet detection and energy consumption, this paper assumes that each EH-ST can transmit l m a x packet replicas in one frame at most. A specifically admissible policy Ω that indicates the number of transmission packet replicas and transmission probability independent of initial energy state e 0 is defined below.
Definition 1.
A specifically admissible policy Ω is defined as:
Ω = η : η 0 = 0 , e = 0 η e 0 , 1 a n d l = e , e < l m a x η e 0 , 1 a n d l = l m a x , l m a x e e m a x .
Remark 1.
Note that the set of the specific policy Ω is made up of two parts. One is the number of transmission packet replicas l and the other one is the probability of transmitting these l packet replicas η ( e ) . In fact, l can be an arbitrary positive integer, and it is no larger than the current energy level e. However, considering the complexity of the analysis procedure and the algorithm design, we predefine a reasonable transmission policy in terms of the number of transmission packet replicas. Specifically, each EH-ST will transmit l m a x replicas with probability η ( e ) if l m a x e e m a x , or it will keep idle with probability 1 η ( e ) . If the current energy level of an EH-ST is less than l m a x , the EH-ST will transmit e replicas with probability η ( e ) . Therefore, we mainly focus on the design of the optimal transmission probability η * . Since there is a one-to-one mapping between the specific policy Ω and the transmission probability η, without loss of generality, we refer to η u as the policy of EH-ST u in the following parts of this paper.
Under the policy η Ω U , the evolution of the energy available in the battery E k can be modeled as a Markov chain. For each EH-ST, the state in the chain is defined by E k , where E k 0 , 1 , 2 , , e m a x represents the available energy units stored in frame k. The transition matrix of the Markov chain is denoted by P = [ p m n ] , where p m n is the probability of one-step transition given by:
Pr E k + 1 = e n E ( k ) = e m .
According to the energy harvesting model, energy consumption model, and the defined policy, the transition probability from state e m to state e n is formulated by:
p m n = β e n , b k , if e m = 0 and e n e m a x 1 n = 0 e m a x 1 β n , b k , if e m = 0 and e n = e m a x η ( e m ) β e n , b k , if e m 0 and e m l m a x and e m > e n η ( e m ) β e n , b k + [ 1 η ( e m ) ] β e n e m , b k , if e m 0 and e m l m a x and e m e n and e n e m a x η ( e m ) n = e m a x β ( n , b k ) + [ 1 η ( e m ) ] n = e n e m β ( n , b k ) , if e m 0 a n d e m l m a x and e m = e m a x η ( e m ) β ( e n e m + l m a x , b k ) , if e m 0 and e m > l m a x and e m > e n η ( e m ) β ( e n e m + l m a x , b k ) + [ 1 η ( e m ) ] β e n e m , b k , if e m 0 and e m > l m a x and e m e n and e n e m a x η ( e m ) n = e n e m + l m a x β ( n , b k ) + [ 1 η ( e m ) ] n = e n e m β ( n , b k ) , if e m 0 and e m > l m a x and e m = e m a x 0 , otherwise
which indicates the Markov chain is irreducible under this transmission policy. Therefore, there exists a unique steady-state probability distribution, which is denoted by π η ( e ) , e E U , and it satisfies both P I π η ( e ) = 0 and e = 0 e m a x π η e = 1 , where P and I are transition probability and identity matrices [37]. Thus, the steady-state probability π η ( e ) can be acquired by solving the linear equations. Moreover, the steady-state probability distribution is independent of the initial state e 0 , so Equation (10) can be further deduced as:
T η ( u ) = E e E U π η ( e ) g η u e u U M i u , j η i e i × j u , i 1 η j e j .
Since the packet transmission action Q u , k is based only on the current available energy unit in EH-ST u, the energy harvesting process is i.i.d for all EH-STs. Moreover, the energy level of each EH-ST is independent, so π η ( e ) can be represented as:
π η ( e ) = u π η u ( e u ) ,
where π η u ( e u ) is the steady-state probability of EH-ST u at energy level e u . Letting:
G ( η u ) = e = 1 e m a x π η u ( e u ) g η u e P ( η u ) = e = 1 e m a x π η u ( e u ) η u ( e ) ,
Equation (16) can be rewritten as:
T η ( u ) = E G ( η u ) U M i u , j P ( η i ) j u , i 1 P ( η j ) .
In Equation (19), G ( η u ) is the average long-term throughput of EH-ST u, assuming there are M EH-STs co-transmitting packets in the same frame. i u , j P ( η i ) is the steady-state probability of other M 1 . EH-STs are also transmitting packets, and j u , i 1 P ( η j ) represents the steady-state probability of the rest of the U M EH-STs being in an idle state. According to Equation (11), the network overall throughput under the packet transmission policy η becomes:
T η = E u = 1 M G ( η u ) U M i u , j P ( η i ) j u , i 1 P ( η j ) .
In order to keep the packet transmission procedure fair, this paper adopts symmetric control policies [28], i.e., all EH-STs employ the same RA policy η u = η , u . Therefore, Equation (20) can be rewritten as:
T η = E M G ( η ) U M P ( η ) M 1 1 P ( η ) U M .
The total number of EH-STs (U) registered in the network can be acquired from the satellite broadcast information. The optimization problem (Equation (12)), under the admissible symmetric policies, can be represented as:
η * = arg max η Ω E M G ( η ) U M P ( η ) M 1 1 P ( η ) U M .

4. Optimization and Analysis

The optimization problem (Equation (22)) can be separated into two parts. The term M · G ( η ) represents the expected network total throughput when there are M EH-STs co-transmitting packets in the same frame, and the term U M P ( η ) M 1 1 P ( η ) U M is the probability of M EH-STs transmitting packets concurrently in the same frame, which can be regarded as a binomial operator. Moreover, g ( η ) is concave; thus, Equation (22) is a nonconvex optimization problem. In order to determine the approximated solutions of Equation (22), this paper exploits a game theoretic method which is mentioned in Reference [36] to formulate the random access procedure. Specifically, we use a game theoretic method to model the optimization problem, where each EH-ST u acts as a player which optimizes its own transmission policy η u to maximize the network throughput (Equation (19)).
This section first analyzes the characteristics of the general Nash equilibrium (NE) of this game. The transmission policy profile is defined as η * = ( η 1 * , η 2 * , , η U * ) , which is the joint policy. According to the definition of NE, if any EH-ST u adopts the policy η u η u * , while all the other EH-STs use the policy η i * ( i u ) to achieve the NE, then a smaller network throughput is obtained. The NE condition must satisfy all the EH-STs, and no player can improve the throughput by deviating unilaterally, i.e.,
T η u * , η u * T η u , η u * , u U , η u Ω U .
By the definition of NE, if an NE (not necessarily symmetric) exists for the game, it must solve u :
η u * = arg max η u Ω T η u , η u * = arg max η u Ω E [ U M [ G ( η u ) i u , j P ( η i * ) j u , i 1 P ( η j * ) + ( 1 P ( η u ) ) ( n u , i G ( η n * ) i u , j P ( η i * ) j u , i , n 1 P ( η j * ) m u , j G ( η m * ) i u , j , m P ( η i * ) j u , i 1 P ( η j * ) ) ] ] = arg max η u Ω G ( η u ) P ( η u ) n u , i G ( η n * ) 1 P ( η j * ) m u , j G ( η m * ) P ( η i * ) .
In the last step, the optimization formula is divided by the term U M i u , j P ( η i * ) j u , i 1 P ( η j * ) , and we remove the additive term, which is independent of η u . Furthermore, we impose the symmetric policy η u * = η * , u , and obtain the symmetric NE as follows:
η * = arg max η Ω G ( η ) Γ ( η * ) P ( η ) ,
where Γ ( η ) is defined as:
Γ ( η ) = G ( η ) U M 1 P ( η ) M 1 P ( η ) .
η * in Equation (25) is the policy that is simultaneously optimal for all the EH-STs, and any single EH-ST unilaterally deviates from the equilibrium condition η * yielding a smaller network throughput. G ( η ) in Equation (25) is the throughput contributed by EH-ST u when there are M EH-STs accessing the channel simultaneously. The term Γ ( η * ) can be regarded as a Lagrange operator, which is associated to control the transmission probability of EH-ST u and further controls the number of concurrent EH-STs and packet loss rate due to packet collisions. Therefore, the overall objective of Equation (25) is to maximize the individual throughput, so as to maximize the network throughput. Meanwhile, constraints on the average transmission and number of concurrent EH-STs need to be taken into consideration. For a fixed network size U, the Lagrange operator decreases with the increase of M; however, due to the concavity of g ( η ) , larger M will increase the packet loss rate, which is negative to network throughput. Moreover, the larger the throughput or transmission probability of other EH-STs, i.e., G ( η * ) or P ( η * ) , the larger the Lagrange operator Γ ( η * ) ; thus, a stringent transmission probability is needed to reduce the packet collisions. The Lagrange operator optimally controls the transmission probability of each EH-ST. Therefore, in order to achieve the maximum throughput of the network, the average transmission probability needs to be properly designed based on the Lagrange operator.
To solve Equation (25), we simplified it to a more general optimization problem, which is represented as follows. For γ 0 :
η ( γ ) = arg max η Ω G ( η ) γ P ( η ) ,
and G ( η ) γ P ( η ) = e = 1 e m a x π η ( e ) g ( η ( e ) ) γ η ( e ) . Based on this simplified optimization problem, we can further prove the existence and uniqueness of the symmetric NE in Equation (25), thus finding the solution of Equation (25), which is locally optimal for the original optimization problem (Equation (22)).
Due to the concavity of g ( η ) [10], η ( γ ) has the following properties.
Proposition 1.
(1) η ( γ ) is uniquely defined, i.e.,
G ( η ( γ ) ) γ P ( η ( γ ) ) > G ( η ) γ P ( η ) , η η ( γ ) ;
(2) η ( γ ) is continuous in γ;
(3) 0 < P ( η ) β ( B l ) , G ( η ) G ( η P L R t h ) .
Remark 2.
The first property can be proved by the concavity of g ( x ) ; thus, x γ * = arg max x [ 0 , 1 ] g ( x ) γ x has a unique solution. Due to the continuity of g ( x ) , η ( γ ) is continuous in γ. For the third property, the transmission probability η Ω cannot be larger than the energy harvesting rate β ( B l ) , where B is number of acquired energy units and l is the number of transmitted packet replicas. Moreover, g ( η ) is a concave function which is related to P L R , and the relationship between g ( η ) and P L R is dictated in Equation (9). Since P L R increases with the traffic load increasing, P L R should be below a P L R threshold. Because a large P L R means more packets cannot be detected successfully, which will cause a large delay penalty for the satellite networks, η P L R t h is the maximum packet transmission probability that ensures the P L R of the network the being below the P L R threshold.
From Equations (25) and (27), we can obtain that η * is optimal for Equation (25) if and only if η * = η ( γ * ) , for γ * > 0 , and Γ ( η ( γ * ) ) = γ * . In order to prove the existence of the unique solution of Equation (25), we need to prove the following propositions first.
Proposition 2.
P ( η ( γ ) ) is a non-increasing function of γ, and P ( η ( 0 ) ) > 0 , P ( η ( ) ) = 0 .
Proof of Proposition 2.
See Appendix A. ☐
Proposition 3.
Γ ( η ( γ ) ) is a non-decreasing, continuous function of γ, and Γ ( η ( 0 ) ) > 0 , Γ ( η ( ) ) = g ( 0 ) .
Proof of Proposition 3.
See Appendix B. ☐
Since the proposed policy is a symmetric policy, we further analyze the characteristics of the symmetric NE condition for the game. According to the above propositions, the following theorem proves the existence and uniqueness of the symmetric NE, i.e., the solution of Equation (25).
Theorem 1.
There exists a unique solution of the optimization problem (Equation (25)), i.e., ! η * Ω , such that M G ( η * ) Γ ( η * ) P ( η * ) > M G ( η ) Γ ( η * ) P ( η ) , η η * . Additionally, the average transmission probability P ( η * ) m i n β ( B l ) , P ( η P L R t h ) .
Proof of Theorem 1.
See Appendix C. ☐
Generally, the symmetric NE may be a suboptimal solution of the original optimization problem (Equation (22)), because it is optimal only for the case that EH-ST deviates from the network unilaterally, not symmetrically. Contrarily, if all the EH-STs change the policy by the same quantity (the policy is still symmetric), then it may improve the throughput of the system. Therefore, in this situation, the obtained policy holds for the symmetric NE may not be globally or locally optimal. In the following theorem, we show that the obtained symmetric NE is a locally optimal solution of the optimization problem proposed in this paper.
Theorem 2.
The obtained symmetric NE in Equation (25) is locally optimal for the original optimization problem (Equation (22)).
Proof of Theorem 2.
See Appendix D. ☐
In this paper, we also present an algorithm to determine the optimal policy η * . From the analysis above, we need to determine the unique γ * , s.t. f ( γ * ) = 0 , where we have previously defined f ( γ ) = Γ ( η ( γ ) ) γ . Then, according to γ * , we can obtain the optimal policy η * as η * = η ( γ * ) . Since f ( γ ) is a continuous decreasing function of γ , f ( 0 ) > 0 , and f ( ) , we can use the bisection method [38] to search the unique γ * which makes f ( γ * ) = 0 . Thus, upper bounds γ u p and lower bounds γ l o w are needed to approach γ * , where γ l o w < γ * < γ u p . By computing the value of f ( γ ) for the updated γ = ( γ u p + γ l o w ) / 2 , the upper and lower bounds are updated and refined recursively until f ( γ ) satisfies the expected accuracy. In order to compute f ( γ ) , we also need to determine Γ ( η ( γ ) ) , which can be computed efficiently by a policy iteration algorithm [39]. The lower bound is initialized by γ l o w = 0 . For the upper bound, note that M U P ( η ) , and the average throughput gain G ( η ) is measured by packet/slot which is less than 1. Therefore, the upper bound is initialized by γ u p = U . The algorithm is described in detail in Algorithm 1.
The policy iteration algorithm employed in Algorithm 1 is able to determine the optimal policy η ( γ ) when δ P I A 0 . The optimality and convergence of the policy iteration algorithm is proven in Reference [39]. Particularly, in the policy improvement step of Algorithm 1, the optimization function has a unique optimal solution, since d γ ( η ( e ) ) is a concave function of η ( e ) . The optimal solution can be obtained by taking the derivative of the optimization function w.r.t η ( e ) .
Remark 3.
Algorithm 1 is combined policy iteration algorithm with a bisection method, which can be operated efficiently. For the policy iteration part, we need to calculate the Markov steady state probability distribution π η [ i ] ( e ) , which can be solved by linear programming using the transition probability (Equation (13)), and its computing complexity is O ( e m a x ) . Furthermore, in order to obtain the value function v ( e ) , we also need to solve the linear system, whose computing complexity is O ( e m a x ) . For the policy improvement step, it needs to take the derivative of the optimization function and then solve the linear function. Thus, the complexity of this step scales as O ( e m a x ) . Finally, these steps are needed to iterated N i t e r ( δ P I A ) times until it converges. Typically, N i t e r ( δ P I A ) is no larger than 10 [28]. Therefore, the overall computing complexity of policy iteration algorithm scales as O ( e m a x N i t e r ( δ P I A ) ) . For the bisection method, the maximum iterations to achieve the expected accuracy δ B M are l o g 2 ( U / δ B M ) . Thus, the overall complexity of Algorithm 1 is about O ( e m a x N i t e r ( δ P I A ) l o g 2 ( U / δ B M ) ) .
Algorithm 1 (Optimal γ * via bisection method )
(1)
Initialization: Initialize the accuracy of policy iteration algorithm δ P I A > 0 and of bisection method δ B M > 0 , γ l o w [ i ] = 0 and γ u p [ i ] = U , η [ j ] ( e ) ( 0 , m i n β ( B l ) , η P L R t h ) ; i = j = 0 ;
(2)
Policy Optimization: Let γ [ i ] = ( γ u p [ i ] + γ l o w [ i ] ) / 2 and determine η ( γ ) by the following policy iteration steps:
  • Policy Evaluation: Calculate the value function v η ( e ) for e > 0 , where v η ( e ) is the solution of the linear system v η [ j ] ( e ) ε E P η [ j ] ( ε e ) v η [ j ] ( ε ) = d γ [ i ] ( η [ j ] ( e ) ) D γ [ i ] ( η [ j ] ) , e E , where D γ ( η ) = M G ( η ) γ P ( η ) , d γ ( η ) = U η ( e ) g ( η ( e ) ) γ η ( e ) and P η [ j ] ( ε e ) is the Markov transition probability from energy level e to ε .
  • Policy Improvement: Determine the new policy by solving the following optimization problem η [ j + 1 ] ( e ) = arg max η 0 , m i n β ( B l ) , η P L R t h d γ [ i ] ( η [ j ] ( e ) ) + P η [ j ] ( ε e ) . If η [ j + 1 ] ( e ) > m i n β ( B l ) , η P L R t h , then η [ j + 1 ] ( e ) = m i n β ( B l ) , η P L R t h .
  • Termination Test for Policy Iteration Algorithm: If D γ [ i ] ( η [ j ] ) D γ [ i ] ( η [ j + 1 ] ) < δ P I A , η [ j + 1 ] is the optimal policy and η ( γ [ i ] ) = η [ j + 1 ] . Otherwise, i : = i + 1 , and repeat from the policy evaluation step.
(3)
Calculation f ( γ [ i ] ) : Calculate f ( γ [ i ] ) = Γ ( η ( γ [ i ] ) ) γ [ i ] under the policy η ( γ [ i ] ) .
(4)
Termination Test for Bisection Method:
  • If f ( γ [ i ] ) < δ B M , η * = η ( γ [ i ] ) ;
  • If f ( γ [ i ] ) < δ B M , update the bounds γ u p [ i + 1 ] : = γ [ i ] and γ l o w [ i + 1 ] : = m a x γ l o w [ i ] , Γ ( η ( γ [ i ] ) ) respectively, repeat from step (2) and update the counter i : = i + 1 ;
  • If f ( γ [ i ] ) > δ B M , update the bounds γ l o w [ i + 1 ] : = γ [ i ] and γ u p [ i + 1 ] : = m i n γ m a x [ i ] , Γ ( η ( γ [ i ] ) ) respectively, repeat from step (2) and update the counter i : = i + 1 .

5. Simulation Results

This section provides some simulation results to evaluate the proposed random access policy. It is assumed that the number of time slots in a frame N is 200 and each packet occupies one time slot. The length of each packet is 100bits and the data are modulated by QPSK. The received energy per symbol noise power spectral density ratio E s / N 0 of each packet is assumed to be equal with 10 dB. Additive white Gaussian noise (AWGN) is added before CRDSA demodulating, and the maximum decoding iteration is to set N i t e r m a x = 15 . For CRDSA, a packet is either clear (not collided with other packets) or interfered with other packets entirely [4]. For the clear packets, they can be decoded easily even without FEC, since E s / N 0 is large enough to decode the packets correctly. For the entirely collided packets, they can hardly be decoded correctly even with FEC, since the power of the overlapped packets is nearly the same [11]. Thus, we do not consider FEC in this paper. Actually, a power unbalance scenario and proper transmission power selection schemes combined with FEC can further boost the performance of the CRDSA [40], but the analytical model needs to be redesigned, which is out of the scope of this paper. This paper aims to provide a common but effective train of thought of designing a distributed RA policy for energy harvesting devices in satellite communication networks. Thus, the application of FEC is left for future research together with the power unbalance scenario and some variant CRDSA protocols. The main simulation parameters in this section are listed in Table 1.
Since CRDSA adopts the scheme of successive interference cancellation, the value of P L R is obtained by an iteration method for a specific traffic load [4,10]. Therefore, the expression of P L R ( L ) cannot be obtained directly. This paper uses the method of curve fitting to approximate the P L R function. In order to guarantee the P L R ( L ) increasing and g ( η ) concave in the range ( 0 , 1 ) , we adopt a Gaussian model with 8 terms to fit the curve, and the simulation results are shown in Figure 3. P L R value of CRDSA is computed by the method mentioned in Reference [10]. The traffic load is normalized by M / N , where M is the number of concurrent terminals. Figure 3 shows the fitted curves are well matched with CRDSA P L R curves for both 2 and 3 replicas.

5.1. Throughput and PLR

Figure 4 illustrates the network throughput of the proposed policy obtained by simulation and theoretical analysis. We plot the relationship between the normalized network throughput and the number of EH-STs in the network U, and consider different scenarios by varying the energy harvesting rate β ¯ 1 , 2 , 3 . The normalized throughput is defined as T ( L ) = ( 1 P L R ( L ) ) L , where the traffic load L is normalized by M / N . The capacity of the battery is assumed to be e m a x = 10 and the P L R threshold is set 10 3 . The simulation results indicate that the analytical network throughput in different EH rate scenarios is well matched with that simulated in the same scenario. For the lower EH rates β ¯ = 1 and β ¯ = 2 , the network throughput increases with the number of EH-STs in the network linearly, because in these scenarios, the transmission probability is constrained by the EH rate. Moreover, under a lower EH rate, although the network size increases, the average number of concurrent EH-STs is still less than what CRDSA can support, i.e., the achieved P L R does not exceed the threshold. Due to the properties of g ( η ) , the network throughput increases with the network size for the lower EH rates. As the EH rate grows, each EH-ST has more transmission opportunities. Since the CRDSA protocol has a good performance on recovering collided packets under moderate traffic load, the network will gain higher throughput under a higher EH rate. When the EH rate is high enough ( β ¯ = 3 ), the throughput of the network increases with the network size first, but afterwards it tends to be flat. This is because when the network size becomes larger, more EH-STs have enough energy to transmit the packet. For the larger network size, packet collisions become the bottleneck of the performance. The policy will control the transmission probability of each EH-ST to guarantee the P L R is under the threshold.
In addition, we also plot the upper bounds (UB) of the network throughput for different scenarios, which are represented by the black dashed line in Figure 4. Since g ( η ) is a concave function, G ( η ) g ( P ( η ) ) from Jensen’s inequality [41]. Moreover, P ( η ) m i n β ( B l ) , P ( η P L R t h ) ; thus, the upper bound of the network throughput can be obtained as:
T η arg max x 0 , m i n β ( B l ) , P ( η P L R t h ) E M g ( x ) U M x M 1 ( 1 x ) U M .
We notice that the proposed policy calculated by Algorithm 1 closely approaches the upper bound under each scenario and the performance degradation for each case is within 5 % w.r.t the upper bound. This indicates the locally optimal solution achieved by the symmetric NE is a near-global optimum.
In addition to the proposed policy, we also evaluated the performance of the following policies, which are based on the baseline mentioned in Equation (12): The energy-balanced policy (EBP), where each EH-ST transmits the packets with the probability of β ( B l ) ; the network-balanced policy (NBP), where each EH-ST transmits the packets with the probability of η P L R t h so as to maximize the throughput of the network; and the greedy policy (GP), where each EH-ST transmits the packets with the probability of 1 as long as it has enough energy. The simulation results for throughput and packet loss ratio are represented in Figure 5 and Figure 6, respectively. In addition, we also present the performance of CRDSA (without consideration of the EH process and the limitation of energy) with 2 and 3 replicas to compare with other policies.
For the lower EH rates β ¯ = 1 and β ¯ = 2 cases, the normalized throughput of the proposed policy, EBP and NBP all increase linearly with the increase of network size. The performance of EBP is nearly the same as that of the proposed policy, because in these scenarios, the transmission probability of each EH-ST is limited by the EH rate. The performance of NBP is a little worse than that of the proposed policy and EBP, because in these scenarios, η P L R t h > β ( B l ) , which means the transmission probability of each EH-ST is larger than the energy arrival rate. Therefore, more EH-STs are in the state of energy exhausted. From the perspective of P L R , all these three policies are able to control the P L R under the P L R threshold in the lower EH rate cases. Interestingly, the performance of GP seems better than the other three policies. In fact, under GP, EH-STs will always transmit packets as long as they have energy, which increases the traffic load; thus, GP can achieve a higher throughput. However, due to the low EH rate, most EH-STs have no energy to transmit packet replicas, which makes the collided packets unable to be recovered and increases the P L R . Actually, Figure 6 shows the P L R of GP is beyond the threshold even though the traffic load is light. A large P L R leads to packets retransmission frequent, which will cause unacceptable large communication latencies in the satellite networks and expand more energy units for the EH-STs.
On the other hand, when β ¯ = 3 , the performance of NBP and EBP is close to the proposed policy for the light and moderate traffic load. When the traffic load becomes heavier, the normalized throughput of NBP and the proposed policy tends to be flat at 0.6 packets/slot, while the performance of EBP drops dramatically. This is because for the lighter traffic load, β ( B l ) < η P L R t h , the performance of these three policies is still constrained by the EH rate. As the network size grows larger, packet collisions become severe. EH-STs employ NBP and the proposed policy transmitting the packets with probability of η P L R t h , but those who employ EBP transmit the packets with a probability of β ( B l ) . At this time, β ( B l ) > η P L R t h , which results in the P L R of EBP, exceeds the threshold. Thus, the performance of EBP becomes worse for the larger network size. GP seems to behave better than the other three policies in the small and medium network size scenario. However, as mentioned above, the P L R of GP exceeds the threshold even for the light traffic load. Moreover, the maximum normalized throughput of EBP and GP is similar with that of CRDSA with 3 replicas, which almost reaches 0.64 packets/slot. However, when the performance achieves the peak, the P L R is beyond the threshold. Notice that all the policies cannot perform as well as the CRDSA protocols for the small and medium network size, because conventional CRDSA does not consider the limitation of energy and the EH process. Therefore, terminals employing conventional CRDSA protocols are assumed to always have enough energy to transmit their packet replicas. In other words, if the EH rate is high enough, the proposed RA scheme can perform as well as CRDSA protocols.

5.2. Data Delivery Probability

The trade-off between the average long-term data delivery probability and the network normalized throughput is shown in Figure 7 under different EH rates β ¯ 1 , 2 , 3 . System parameters are the same with the previous simulations. We evaluated the performance of two centralized access protocols, which are time division multiple access (TDMA) and dynamic frame slotted Aloha (DFSA) [20,21], to compare with that of the proposed distributed RA scheme. TDMA and DFSA are centralized access protocols, while the proposed policy is based on a random access scheme, which is different from the other two protocols in terms of the nature of mechanisms. In fact, the centralized schemes are expected to achieve higher throughput performance than the RA schemes, because packet collisions can be avoided by proper management at the central controller. However, in the energy-constrained networks, the centralized access schemes cannot always achieve such high data delivery probability and throughput due to energy shortage. In the simulations, we compare the performance of these three schemes from the perspective of energy constraint, which seems reasonable. The packet delivery probability of all these three schemes increases with the increase of β ¯ . TDMA always outperforms DFSA and the proposed RA scheme in terms of data delivery probability. Since time slots have been preallocated to each EH-ST, it does not suffer packet collisions. Therefore, the data delivery probability of TDMA is determined by the EH rate. DSFA can adjust the length of frame dynamically according to the number of active EH-STs, and it offers retransmission opportunities for the EH-STs. For the lower EH rates, many EH-STs are in a state of energy shortage; thus, the data delivery probability of DSFA is limited by the EH rate. Moreover, a larger frame makes more EH-STs deliver their data to the satellite successfully, but causes lower throughput. Unlike DSFA, the proposed distributed RA scheme balances well for both data delivery probability and throughput. This is because the delivery probability of the proposed scheme is restricted not only by β ¯ , but also by η P L R t h . Thanks to the interference cancellation mechanism, the maximum throughput of the proposed RA scheme is higher than that of DFSA. However, transmitting more packet replicas will consume more energy. Compared with TDMA and DFSA (they only transmit one physical packet once), more EH-STs do not have enough energy to deliver the data. That is why the data delivery probability of the proposed RA schemes is only about 0.26 when β ¯ = 1 . For the lower EH rates (e.g., β ¯ = 1 and β ¯ = 2 ), the EH rate dominates the delivery probability. When EH rates become higher, almost every EH-ST has enough energy to send data. At this time, the proposed policy needs to guarantee the P L R being not beyond the P L R threshold; thus, η P L R t h determines the delivery probability. Specifically, when β ¯ = 3 , the delivery probability of the proposed scheme presents to be flat for the lower and moderate throughput but drops dramatically to control the P L R for the higher throughput.
Notice that both TDMA and DFSA are centralized access protocols, and the central controller will allocate the time slots or adjust the frame length to improve the performance. However, the proposed distributed RA scheme can achieve acceptable throughput under the higher data delivery probability, which even performs better than DFSA. In addition, the proposed distributed RA scheme does not need the procedure of resource allocation and controls the P L R strictly, which reduces the communication delays caused by resource assignment and packet retransmission. Therefore, the proposed distributed RA scheme is more suitable for the future low-cost interactive satellite communication scenario with a large network size and high EH rate.

5.3. Packet Delay Assessment

The metric of packet delay is assessed for the proposed scheme and DFSA protocol in a heavy traffic load, and the results are shown in Figure 8. For the proposed scheme, we evaluate the performance of packet delay via both simulation (solid lines) and analytical method (dash lines), and they are well matched under different energy harvesting rates. Moreover, as the energy harvesting rate increases, the performance of packet delay becomes better. For instance, the probabilities of a packet being received successfully within 2 frames are about 0.48, 0.8, and 0.85 under the EH rates β ¯ = 1 , 2 , and 3 respectively. This is because the (re)transmission probability is not only constrained by the current energy level, but also the P L R threshold, regardless of the packet being transmitted for the first time or being retransmitted. Therefore, with the constraint of P L R threshold, almost all the packets can be correctly received as long as they are transmitted, and retransmissions will not block the channel. According to the analysis in Section 5.2, for the lower EH rates (e.g., β ¯ = 1 and β ¯ = 2 ), the EH rate dominates the delivery probability, while for the higher EH rate, η P L R t h determines the delivery probability. Thus, the packet delay when β ¯ = 3 performs slightly better than when β ¯ = 2 .
Since TDMA is a collision-free protocol, no retransmissions occur in this system. Therefore, we only adopt DFSA to compare with the proposed scheme in terms of packet delay. For DFSA, packets are transmitted as long as EH-STs have energy, and no replicas are used, which will consume less energy. For different EH rates β ¯ 1 , 2 , 3 , almost every EH-ST has energy to transmit its packet; thus, their performances of packet delay are nearly the same. Since each packet is only transmitted once in a frame, EH-STs applying DFSA have more energy and chances to retransmit their data when the EH rate is low ( β ¯ = 1 ) compared with those applying the proposed scheme. Therefore, the packet delay performance of DFSA is better than that of the proposed scheme when β ¯ = 1 . However, without a packet collision resolution mechanism, EH-STs applying DFSA have to retransmit their data more times. Therefore, when the EH rate becomes higher, EH-STs applying the proposed scheme have more opportunities to transmit their data, and the packet delay performance of the proposed scheme is superior to that of DFSA.

6. Conclusions

This paper considers a satellite communication network made up by a GEO satellite and multiple EH-STs. The EH-STs transmit data packets to the satellite randomly over a shared wireless collision channel. Packet replicas and a successive interference cancellation mechanism are adopted to improve the network throughput. Considering the EH process and energy constraints of EH-STs, we have designed a distributed RA scheme aiming to maximize the average long-term network throughput. Firstly, we developed an analytical model of the average long-term throughput with constraints of packet loss ratio and energy and adopted a game theoretic method to approximate the solution of the nonconvex optimization problem. Then, we characterized the symmetric NE of the game and proved its existence and uniqueness, which indicated it is a locally optimal solution of the original optimization problem. A policy iteration algorithm combined with a bisection method was used to compute the symmetric NE. Finally, we evaluated the proposed RA scheme by simulations. Simulation results showed that the proposed RA scheme is more suitable for the large network size and high EH rate scenario, which is applicable to EH devices in the future low-cost interactive satellite communication system.
This paper provides a common but effective train of thought of designing a distributed RA policy for energy harvesting devices in satellite communication networks, but it is based on a simplified version of CRDSA. In order to further improve the policy, we will concentrate on researching the following works in the future. First, we will extent the policy to an asynchronous version, since it is more suitable to the energy constrained system (time synchronization will cost extra signalings and energy). Second, we will investigate the performance of using irregular replicas based on the analysis method in this paper. In addition to the number of packet replicas, the effect of power imbalance and transmission power selection are also important factors that need to be taken into consideration in future work.

Author Contributions

G.C. proposed the basic framework of the research scenario. P.L. was in charge of modeling the problem and researching the optimization algorithm. In addition, P.L. did the numerical simulations and wrote the paper. W.W. gave some suggestions on the mathematical model and formula derivation.

Funding

This research was supported by the National Nature Science Foundation of China (NSFC) under the Grant No. 61601045 and 61372111.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 2.
We prove this proposition by contradiction. Assume γ 1 > γ 2 , and P ( η ( γ 1 ) ) > P ( η ( γ 2 ) ) . Then, according to the first property of Proposition 1 and the hypothesis, we have:
G ( η ( γ 2 ) ) γ 2 P ( η ( γ 2 ) ) G ( η ( γ 1 ) ) γ 1 P ( η ( γ 1 ) ) + ( γ 1 γ 2 ) P ( η ( γ 1 ) ) > G ( η ( γ 1 ) ) γ 1 P ( η ( γ 1 ) ) + ( γ 1 γ 2 ) P ( η ( γ 2 ) ) G ( η ( γ 2 ) ) γ 1 P ( η ( γ 2 ) ) + ( γ 1 γ 2 ) P ( η ( γ 2 ) ) = G ( η ( γ 2 ) ) γ 2 P ( η ( γ 2 ) ) .
Hence, we obtain a contradictory result. For the second part, when γ = 0 , the policy η ( 0 ) is not an idle policy. Thus, P ( η ( 0 ) ) . When γ , in order to maximize the optimization problem (Equation (26)), P ( η ( ) ) 0 . Thus, the proposition is proved. ☐

Appendix B

Proof of Proposition 3.
The continuity of the function follows the first property of Proposition 1. When γ = 0 , we have:
Γ η ( 0 ) = G η ( 0 ) U M 1 P η ( 0 ) M 1 P η ( 0 ) 0 , 1 .
Since G ( η ) means the average throughput, 0 < G η ( 0 ) 1 . From Propositions 1 and 2, we know that 0 < P η ( 0 ) β ( B l ) and M U . Therefore, Γ η ( 0 ) is positive and bounded. On the other hand, when γ , P η ( ) 0 and G η ( ) 0 . Since the expected number of co-transmitting EH-STs M can be approximated by η ( γ ) U , Γ η ( γ ) can be simplified as G η ( γ ) / P η ( γ ) . By L’Hospital’s rule, Γ η ( ) = g ( 0 ) . Then, we prove Γ η ( γ ) is a nondecreasing function of γ , i.e., Γ η ( γ 1 ) Γ η ( γ 2 ) for γ 1 > γ 2 0 . Since Γ η ( γ ) can be simplified as G η ( γ ) / P η ( γ ) , we only need to prove G η ( γ 2 ) P η ( γ 1 ) G η ( γ 1 ) P η ( γ 2 ) 0 which can be represented as:
G ( η ( γ 2 ) ) γ 2 P ( η ( γ 2 ) ) P ( η ( γ 1 ) ) G ( η ( γ 1 ) ) γ 1 P ( η ( γ 1 ) ) × P ( η ( γ 2 ) ) + γ 2 P ( η ( γ 2 ) ) P ( η ( γ 1 ) ) γ 1 P ( η ( γ 1 ) ) P ( η ( γ 2 ) ) 0 .
According to the fact that η ( γ 2 ) is optimal for Equation (27), when γ = γ 2 . Therefore, G ( η ( γ 2 ) ) γ 2 P ( η ( γ 2 ) ) G ( η ( γ 1 ) ) γ 2 P ( η ( γ 1 ) ) . A sufficient condition that holds for Equation (A3) is that G ( η ( γ 2 ) ) γ 2 P ( η ( γ 2 ) ) P ( η ( γ 1 ) ) G ( η ( γ 2 ) ) γ 1 P ( η ( γ 2 ) ) × P ( η ( γ 2 ) ) + γ 2 P ( η ( γ 2 ) ) P ( η ( γ 1 ) ) γ 1 P ( η ( γ 1 ) ) P ( η ( γ 2 ) ) 0 , which is equivalent to G ( η ( γ 2 ) ) γ 2 P ( η ( γ 2 ) ) P ( η ( γ 1 ) ) P ( η ( γ 2 ) ) 0 . It is obviously true for P ( η ( γ 2 ) ) P ( η ( γ 1 ) ) , which has been proven in Proposition 2. Thus, this proposition is proven. ☐

Appendix C

Proof of Theorem 1.
The existence and uniqueness of the solution of Equation (25) can be proven by Proposition 3. We define f ( γ ) Γ η ( γ ) γ . Based on Proposition 3, f ( γ ) has the properties of f ( γ ) = Γ η ( 0 ) > 0 and lim γ f ( γ ) = g ( 0 ) . Since g ( η ) is concave, and g ( 0 ) is a limited positive number [10], lim γ f ( γ ) = and there exists a unique γ * ( 0 , ) satisfying f ( γ * ) = 0 , i.e., Γ η ( γ * ) = γ * , which guarantees η ( γ * ) is optimal for Equation (24).
Then, we explain the second part of the theorem that P ( η ( γ * ) ) m i n β ( B l ) , P ( η P L R t h ) . From the third property of P1, the average transmission probability should not be larger than the energy harvesting rate, i.e., P ( η ( γ * ) ) β ( B l ) . Moreover, according to the nature of the MAC protocol CRDSA, as the traffic load increases, P L R increases as well. On the other hand, the throughput of the network increases with the increase of traffic load first but decreases sharply when the traffic load is larger than a threshold value [4]. The traffic load is directly related with the transmission probability and the raffic load threshold value mentioned above corresponds to a P L R threshold value. In order to maximize the network throughput, the average transmission probability should not be larger than the transmission probability that makes the network P L R larger than the P L R threshold, i.e., P ( η ( γ * ) ) P ( η P L R t h ) , where η P L R t h is the policy that achieves the P L R threshold. Thus, the theorem is proven. ☐

Appendix D

Proof of Theorem 2.
As mentioned above, the obtained policy η * is a global optimum for Equation (25); thus, the gradient of the objective function in Equation (25) w.r.t η (denoted as Δ η ( · ) ) is zero when η = η * . Moreover, its Hessian matrix w.r.t η (denoted as H η ( · ) ) is semidefinite negative when η = η * [36]. Therefore, for the symmetric policy η * , we have:
Δ η G ( η ) Γ ( η * ) Δ η P ( η ) η = η * = 0 ,
H η G ( η ) Γ ( η * ) H η P ( η ) η = η * 0 .
The gradient of the original optimization problem (Equation (22)) is derived as:
Δ η ( R η ) = E { U M M [ P ( η ) M 1 ( 1 P ( η ) ) U M Δ η ( G ( η ) ) + ( M 1 ) G ( η ) ( 1 P ( η ) ) U M P ( η ) M 2 Δ η ( P ( η ) ) ( U M ) G ( η ) ( 1 P ( η ) ) U M 1 P ( η ) M 1 Δ η ( P ( η ) ) ] } = E U M M Δ η ( G ( η ) ) G ( η ) U M 1 P ( η ) M 1 P ( η ) Δ η ( P ( η ) ) .
When η = η * , substituting Equation (A4) in Equation (A6), we can obtain that [ Δ η ( R η ) ] η = η * = 0 . On the other hand, by further deriving Equation (A5), the Hessian matrix can be derived as Equation (A7).
H η ( R η ) = U M M [ P ( η ) M 1 ( 1 P ( η ) ) U M H η ( G ( η ) ) + ( M 1 ) P ( η ) M 2 ( 1 P ( η ) ) U M Δ η ( G ( η ) ) Δ η ( P ( η ) ) T ( U M ) P ( η ) M 1 ( 1 P ( η ) ) U M 1 Δ η ( G ( η ) ) Δ η ( P ( η ) ) T + ( M 1 ) G ( η ) P ( η ) M 2 ( 1 P ( η ) ) U M H η ( P ( η ) ) + ( M 1 ) P ( η ) M 2 ( 1 P ( η ) ) U M Δ η ( P ( η ) ) Δ η ( G ( η ) ) T + ( M 1 ) ( M 2 ) G ( η ) P ( η ) M 3 ( 1 P ( η ) ) U M Δ η ( P ( η ) ) Δ η ( P ( η ) ) T ( M 1 ) ( U M ) G ( η ) P ( η ) M 2 ( 1 P ( η ) ) U M 1 Δ η ( P ( η ) ) Δ η ( P ( η ) ) T ( U M ) G ( η ) P ( η ) M 1 ( 1 P ( η ) ) U M 1 H η ( P ( η ) ) ( U M ) P ( η ) M 1 ( 1 P ( η ) ) U M 1 Δ η ( P ( η ) ) Δ η ( G ( η ) ) T ( M 1 ) ( U M ) G ( η ) P ( η ) M 2 ( 1 P ( η ) ) U M 1 Δ η ( P ( η ) ) Δ η ( P ( η ) ) T + ( U M ) ( U M 1 ) G ( η ) P ( η ) M 1 ( 1 P ( η ) ) U M 2 Δ η ( P ( η ) ) Δ η ( P ( η ) ) T ] .
From Equation (A5), we know that H η * ( G ( η ) ) Γ ( η * ) H η * ( P ( η ) ) , and based on the fact that [ Δ η ( R η ) ] η = η * = 0 , we can get:
Δ η ( G ( η ) ) = G ( η ) U M 1 P ( η ) M 1 P ( η ) Δ η ( P ( η ) ) .
Substitute Equations (A5) and (A8) in Equation (A7), the Hessian matrix is simplified as:
[ H η ( R η ) ] η = η * G ( η * ) P ( η ) ( 1 P ( η ) ) Δ η * ( P ( η ) ) Δ η * ( P ( η ) ) T .
Since Δ η * ( P ( η ) ) Δ η * ( P ( η ) ) T is semidefinite positive, [ H η ( R η ) ] η = η * 0 . Therefore, follow the fact that [ Δ η ( R η ) ] η = η * = 0 and [ H η ( R η ) ] η = η * 0 , η * is locally optimal for the original optimization problem (Equation (22)). From Equation (A5), we know that H η * ( G ( η ) ) Γ ( η * ) H η * ( P ( η ) ) , and based on the fact that [ Δ η ( R η ) ] η = η * = 0 , we can get:
Δ η ( G ( η ) ) = G ( η ) U M 1 P ( η ) M 1 P ( η ) Δ η ( P ( η ) ) .
Substitute Equations (A5) and (A8) in Equation (A7), the Hessian matrix is simplified as:
[ H η ( R η ) ] η = η * G ( η * ) P ( η ) ( 1 P ( η ) ) Δ η * ( P ( η ) ) Δ η * ( P ( η ) ) T .
Since Δ η * ( P ( η ) ) Δ η * ( P ( η ) ) T is semidefinite positive, [ H η ( R η ) ] η = η * 0 . Therefore, follow the fact that [ Δ η ( R η ) ] η = η * = 0 and [ H η ( R η ) ] η = η * 0 , η * is locally optimal for the original optimization problem (Equation (22)). ☐

References

  1. Gaudenzi, R.D.; Herrero, O.D.R.; Gallinaro, G.; Cioni, S.; Arapoglou, P.-D.M. Random access schemes for satellite networks, from VSAT to M2M: A survey. Int. J. Satell. Commun. Netw. 2018, 36, 66–107. [Google Scholar] [CrossRef]
  2. Roberts, L.G. ALOHA packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 1975, 5, 28–42. [Google Scholar] [CrossRef]
  3. Gaudenzi, R.D.; Herrero, O.D.R. Advances in Random Access protocols for satellite networks. In Proceedings of the International Workshop on Satellite and Space Communications (IWSSC), Siena, Italy, 10–11 September 2009; pp. 331–336. [Google Scholar]
  4. Casini, E.; Gaudenzi, R.D.; Herrero, O.D.R. Contention Resolution Diversity Slotted ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks. IEEE Trans. Wirel. Commun. 2007, 6, 1408–1419. [Google Scholar] [CrossRef]
  5. Herrero, O.D.R.; Gaudenzi, R.D. A high-performance MAC protocol for consumer broadband satellite systems. In Proceedings of the 27th AIAA International Communication Satellite System Conference, Edinburgh, UK, 1–4 June 2009; pp. 512–521. [Google Scholar]
  6. Morlet, C.; Alamanac, A.B.; Gallinaro, G.; Erup, L.; Takats, P.; Ginesi, A. Introduction of Mobility Aspects for DVB-S2/RCS Broadband Systems. Space Commun. 2007, 21, 5–17. [Google Scholar]
  7. Liva, G. Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA. IEEE Trans. Commun. 2011, 59, 477–487. [Google Scholar] [CrossRef]
  8. Paolini, E.; Liva, G.; Chiani, M. High Throughput Random Access via Codes on Graphs: Coded Slotted ALOHA. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–6. [Google Scholar]
  9. Bui, H.C.; Lacan, J.; Boucheret, M.L. An enhanced multiple random access scheme for satellite communications. In Proceedings of the Wireless Telecommunications Symposium, London, UK, 18–20 April 2012; pp. 1–6. [Google Scholar]
  10. Herrero, O.D.R.; Gaudenzi, R.D. Generalized Analytical Framework for the Performance Assessment of Slotted Random Access Protocols. IEEE Trans. Wireless Commun. 2014, 13, 809–821. [Google Scholar] [CrossRef]
  11. Kissling, C. Performance Enhancements for Asynchronous Random Access Protocols over Satellite. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–6. [Google Scholar]
  12. Gaudenzi, R.D.; Herrero, O.D.R.; Acar, G.; Barrabes, E.G. Asynchronous Contention Resolution Diversity ALOHA: Making CRDSA Truly Asynchronous. IEEE Trans. Wirel. Commun. 2014, 13, 6193–6206. [Google Scholar] [CrossRef]
  13. Herrero, O.D.R.; Gaudenzi, R.D. High Efficiency Satellite Multiple Access Scheme for Machine-to-Machine Communications. IEEE Trans. Aerosp. Electron. Syst. 2012, 48, 2961–2989. [Google Scholar] [CrossRef]
  14. Renner, C.; Turau, V. CapLibrate: Self-Calibration of an Energy Harvesting Power Supply with Supercapacitors. In Proceedings of the International Conference on Architecture of Computing Systems, Como, Italy, 22–25 February 2011; pp. 349–358. [Google Scholar]
  15. Paradiso, J.; Starner, T. Energy Scavenging for Mobile and Wireless Electronics. IEEE Pervasive Comput. 2005, 4, 18–27. [Google Scholar] [CrossRef]
  16. Sharma, V.; Mukherji, U.; Joseph, V.; Gupta, S. Optimal Energy Management Policies for Energy Harvesting Sensor Nodes. IEEE Trans. Wirel. Commun. 2010, 9, 1326–1336. [Google Scholar] [CrossRef]
  17. Michelusi, N.; Stamatiou, K.; Zorzi, M. On optimal transmission policies for energy harvesting devices. In Proceedings of the 2012 International Symposium on Wireless Communication Systems, Paris, France, 28–31 August 2012; pp. 1–5. [Google Scholar]
  18. Jeon, J.; Ephremides, A. On the Stability of Random Multiple Access With Stochastic Energy Harvesting. IEEE J. Sel. Areas Commun. 2015, 33, 571–584. [Google Scholar] [CrossRef]
  19. Bedewy, A.M.; Seddik, K.G.; El-Sherif, A.A. On the stability of random access with energy harvesting and collision resolution. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 246–252. [Google Scholar]
  20. Iannello, F.; Simeone, O.; Spagnolini, U. Medium Access Control Protocols for Wireless Sensor Networks with Energy Harvesting. IEEE Trans. Commun. 2012, 60, 1381–1389. [Google Scholar] [CrossRef]
  21. Iannello, F.; Simeone, O.; Spagnolini, U. Dynamic Framed-ALOHA for Energy-Constrained Wireless Sensor Networks with Energy Harvesting. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar]
  22. Wu, S.; Chen, Y.; Chai, K.K.; Vazquez-Gallego, F.; Alonso-Zarate, J. Analysis and performance evaluation of Dynamic Frame Slotted-ALOHA in wireless Machine-to-Machine networks with energy harvesting. In Proceedings of the 2014 IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA, 8–12 December 2014; pp. 1081–1086.
  23. Liu, J.; Dai, H.; Chen, W. On Throughput Maximization of Time Division Multiple Access with Energy Harvesting Users. IEEE Trans. Veh. Technol. 2016, 65, 2457–2470. [Google Scholar] [CrossRef]
  24. Vazquez-Gallego, F.; Kalalas, C.; Alonso, L.; Alonso-Zarate, J. Contention Tree-Based Access for Wireless Machine-to-Machine Networks With Energy Harvesting. IEEE Trans. Green Commun. Netw. 2017, 1, 223–234. [Google Scholar] [CrossRef]
  25. Vazquez-Gallego, F.; Alonso-Zarate, J.; Alonso, L. Reservation Dynamic Frame Slotted-ALOHA for wireless M2M networks with energy harvesting. In Proceedings of the IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 5985–5991. [Google Scholar]
  26. Testa, D.D.; Michelusi, N.; Zorzi, M. On Optimal Transmission Policies for Energy Harvesting Devices: The case of two users. In Proceedings of the The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, 27–30 August 2013. [Google Scholar]
  27. Moradian, M.; Ashtiani, F. Sum throughput maximization in a slotted Aloha network with energy harvesting nodes. In Proceedings of the 2014 IEEE Wireless Communications and NETWORKING Conference, Istanbul, Turkey, 6–9 April 2014; pp. 1585–1590. [Google Scholar]
  28. Michelusi, N.; Zorzi, M. Optimal Adaptive Random Multiaccess in Energy Harvesting Wireless Sensor Networks. IEEE Trans. Commun. 2014, 63, 1355–1372. [Google Scholar] [CrossRef]
  29. Kapoor, S.; Pillai, S. Distributed Scheduling Schemes in Energy Harvesting Multiple Access. IEEE Wirel. Commun. Lett. 2017, 6, 54–57. [Google Scholar] [CrossRef]
  30. Reichman, A. Enhanced Spread Spectrum Aloha (E-SSA), an emerging satellite return link messaging scheme. In Proceedings of the 2014 IEEE 28th Convention of Electrical and Electronics Engineers in Israel (IEEEI), Eilat, Israel, 3–5 December 2014; pp. 1–4. [Google Scholar]
  31. Gallinaro, G.; Alagha, N.; De Gaudenzi, R.; Kansanen, K.; Müller, R.; Salvo Rossi, P. ME-SSA: An advanced random access for the satellite return channel. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 856–861. [Google Scholar]
  32. De Sanctis, M.; Cianca, E.; Araniti, G.; Bisio, I.; Prasad, R. Satellite Communications Supporting Internet of Remote Things. IEEE Internet Things J. 2016, 3, 113–123. [Google Scholar] [CrossRef]
  33. European Telecommunication Standardisation Institute (ETSI). Digital Video Broadcasting (DVB); Interaction Channel for Satellite Distribution Systems; Guidelines for the Use of EN 301 790. V1.5.1; ETSI: Sophia Antipoli, France, May 2009; Available online: https://www.etsi.org/deliver/etsi_en/301700_301799/301790/01.05.01_60/en_301790v010501p.pdf (accessed on 28 December 2018).
  34. Telecommunications Industry Association (TIA). IP Over Satellite; TIA-1008 Revision B; TIA: Arlington, VA, USA, May 2012; Available online: http://standards.tiaonline.org/all-standards/committees/tr-34 (accessed on 28 December 2018).
  35. Meloni, A.; Murroni, M. Random Access in DVB-RCS2: Design and Dynamic Control for Congestion Avoidance. IEEE Trans. Broadcast. 2014, 60, 16–28. [Google Scholar] [CrossRef]
  36. Michelusi, N.; Zorzi, M. Optimal random multiaccess in energy harvesting Wireless Sensor Networks. In Proceedings of the 2013 IEEE International Conference on Communications Workshops (ICC), Budapest, Hungary, 9–13 June 2013; pp. 463–468. [Google Scholar]
  37. White, D.J. Markov Chain and Transition Probability. In Markov Decision Processes; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  38. Burden, R.L.; Faires, J.D. Bisection Method. In Numerical Analysis; Cengage Learning: Boston, MA, USA, 2011. [Google Scholar]
  39. Bertsekas, D. Policy Iteration. In Dynamic Programming and Optimal Control; Athena Scientific: Belmont, MA, USA, 2005. [Google Scholar]
  40. Mengali, A.; De Gaudenzi, R.; Arapoglou, P.D. Enhancing the Physical Layer of Contention Resolution Diversity Slotted ALOHA. IEEE Trans. Commun. 2016, 65, 4295–4308. [Google Scholar] [CrossRef]
  41. Boyd, S.; Vandenberghe, L. Jensens Inequality. In Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
Figure 1. Satellite communication networks with energy harvesting terminals.
Figure 1. Satellite communication networks with energy harvesting terminals.
Sensors 19 00099 g001
Figure 2. Contention resolution diversity slotted Aloha (CRDSA) frame structure and interference cancellation procedure (Packet replica l = 2 ).
Figure 2. Contention resolution diversity slotted Aloha (CRDSA) frame structure and interference cancellation procedure (Packet replica l = 2 ).
Sensors 19 00099 g002
Figure 3. Packet loss ratio P L R curves comparison of the fitted curves and CRDSA with 2 and 3 replicas, number of time slots N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Figure 3. Packet loss ratio P L R curves comparison of the fitted curves and CRDSA with 2 and 3 replicas, number of time slots N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Sensors 19 00099 g003
Figure 4. Normalized network throughput for different network sizes, under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For random access (RA) schemes, number of time slots in each frame N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Figure 4. Normalized network throughput for different network sizes, under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For random access (RA) schemes, number of time slots in each frame N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Sensors 19 00099 g004
Figure 5. Normalized throughput of different policies comparison for different network sizes, under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For RA schemes, number of time slots in each frame N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Figure 5. Normalized throughput of different policies comparison for different network sizes, under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For RA schemes, number of time slots in each frame N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Sensors 19 00099 g005
Figure 6. Comparison of packet loss ratio of different policies for different network sizes, under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For RA schemes, number of time slots in each frame N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Figure 6. Comparison of packet loss ratio of different policies for different network sizes, under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For RA schemes, number of time slots in each frame N = 200 , QPSK modulation, E s / N 0 = 10 dB.
Sensors 19 00099 g006
Figure 7. Trade-off between average long-term data delivery probability and network normalized throughput under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For access schemes, number of time slots in each frame N = 200 (only for time division multiple access (TDMA) and the proposed scheme, since the frame length of dynamic frame slotted Aloha (DFSA) is dynamic), QPSK modulation, E s / N 0 = 10 dB.
Figure 7. Trade-off between average long-term data delivery probability and network normalized throughput under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For access schemes, number of time slots in each frame N = 200 (only for time division multiple access (TDMA) and the proposed scheme, since the frame length of dynamic frame slotted Aloha (DFSA) is dynamic), QPSK modulation, E s / N 0 = 10 dB.
Sensors 19 00099 g007
Figure 8. Packet delay cumulative distribution for the proposed scheme and DFSA with number of EH-STs U = 200 under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For access schemes, number of time slots in each frame N = 200 (only for the proposed scheme. For DFSA, the packet delay in frames is normalized, since the frame length of DFSA is dynamic), QPSK modulation, E s / N 0 = 10 dB.
Figure 8. Packet delay cumulative distribution for the proposed scheme and DFSA with number of EH-STs U = 200 under different EH rates β ¯ 1 , 2 , 3 , e m a x = 10 . For access schemes, number of time slots in each frame N = 200 (only for the proposed scheme. For DFSA, the packet delay in frames is normalized, since the frame length of DFSA is dynamic), QPSK modulation, E s / N 0 = 10 dB.
Sensors 19 00099 g008
Table 1. Simulation parameters. EH-ST: Energy harvesting satellite terminal.
Table 1. Simulation parameters. EH-ST: Energy harvesting satellite terminal.
ParametersSettings
Number of time slots in a frameN = 200
Length of each packet100 bits
Modulation schemeQPSK
Energy per symbol noise power spectral density ratio E s / N 0 = 10 dB
Maximum decoding iteration N i t e r m a x = 15
Number of EH-STsU = [0:20:200]
Number of replicas in CRDSA l 3
Energy harvesting rates β ¯ 1 , 2 , 3
Battery capacity e m a x = 10

Share and Cite

MDPI and ACS Style

Li, P.; Cui, G.; Wang, W. Distributed Optimal Random Access Scheme for Energy Harvesting Devices in Satellite Communication Networks. Sensors 2019, 19, 99. https://doi.org/10.3390/s19010099

AMA Style

Li P, Cui G, Wang W. Distributed Optimal Random Access Scheme for Energy Harvesting Devices in Satellite Communication Networks. Sensors. 2019; 19(1):99. https://doi.org/10.3390/s19010099

Chicago/Turabian Style

Li, Pengxu, Gaofeng Cui, and Weidong Wang. 2019. "Distributed Optimal Random Access Scheme for Energy Harvesting Devices in Satellite Communication Networks" Sensors 19, no. 1: 99. https://doi.org/10.3390/s19010099

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop