Next Article in Journal
Effects of Offset Pixel Aperture Width on the Performances of Monochrome CMOS Image Sensors for Depth Extraction
Next Article in Special Issue
Radio Resource Allocation with The Fairness Metric for Low Density Signature OFDM in Underlay Cognitive Radio Networks
Previous Article in Journal
Hidden Markov Model-Based Smart Annotation for Benchmark Cyclic Activity Recognition Database Using Wearables
Previous Article in Special Issue
A Wavelet Scattering Feature Extraction Approach for Deep Neural Network Based Indoor Fingerprinting Localization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization †

Department of Applied Computer Engineering, Dankook University, Yongin 31116, Korea
This paper is an extended version of our paper published in Choi, C.W. Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization. In Proceedings of the TENCON 2018, Jeju Island, Korea, 28–31 October 2018.
Sensors 2019, 19(8), 1822; https://doi.org/10.3390/s19081822
Submission received: 26 February 2019 / Revised: 4 April 2019 / Accepted: 15 April 2019 / Published: 16 April 2019
(This article belongs to the Special Issue Selected Papers from TENCON 2018)

Abstract

:
Traditionally, how to reduce energy consumption has been an issue of utmost importance in wireless sensor networks. Recently, radio frequency (RF) energy harvesting technologies, which scavenge the ambient RF waves, provided us with a new paradigm for such networks. Without replacement or recharge of batteries, an RF energy harvesting wireless sensor network may live an eternal life. Against theoretical expectations, however, energy is scarce in practice and, consequently, structural naiveté has to be within a MAC scheme that supports a sensor node to deliver its data to a sink node. Our practical choice for the MAC scheme is a basic one, rooted in ALOHA, in which a sensor node simply repeats harvesting energy, backing off for a while and transmitting a packet. The basic medium access control (MAC) scheme is not able to perfectly prevent a collision of packets, which in turn deteriorates the throughput. Thus, we derive an exact expression of the throughput that the basic MAC scheme can attain. In various case studies, we then look for a way to enhance the throughput. Using the throughput formula, we reveal that an optimal back-off time, which maximizes the total throughput, is not characterized by the distribution but only by the mean value when the harvest times are deterministic. Also, we confirm that taking proper back-off times is able to improve the throughput even when the harvest times are random. Furthermore, we show that shaping the back-off time so that its variance is increased while its mean remains unchanged can help ameliorate the throughput that the basic MAC scheme is able to achieve.

1. Introduction

A wireless sensor network consists of sink nodes and sensor nodes [1]. In the network, a sensor node gathers information in the vicinity and delivers it to a sink node. To carry out such a mission, a sensor node is typically equipped with a battery that powers the sensor node itself. A wireless sensor network is often deployed in a harsh environment, where batteries are hardly recharged or replaced. Consequently, issues on energy consumption have arisen in designing a wireless sensor network. Then, many efforts have been made to solve the energy problems in a wireless sensor network, most of which were focused on devising efficient communication schemes to reduce energy consumption and ultimately to extend the lifetime of the network [2,3,4,5].
Recently, radio frequency (RF) energy harvesting technologies provided us with a new paradigm for wireless sensor networks [6,7,8]. These technologies are mainly divided into two categories: a category of technologies which enable sensor nodes to harvest energy by scavenging ambient RF waves and the other category of technologies which designate external RF sources to supply energy to sensor nodes by radiating RF waves. In [9], the capacitor leakage problem was taken into account when sensor nodes harvest ambient RF energy. In [10,11], it was assumed that a sensor node is able to extract information and harvest energy as well from the signal transmitted by another node. In [12], cooperation of licensed and unlicensed users was investigated in a cognitive network where unlicensed users harvest ambient energy to charge their batteries. In [13], a cognitive network was considered in which a sensor node senses the spectrum and harvests energy in the spectral band used by access points. By harvesting RF energy, a wireless sensor network can overcome the battery constraint and is, at least theoretically, able to live eternally. However, harvested energy is not enough to directly power a sensor node but merely capable of charging an internal capacitor, especially, when a sensor node harvests energy by scavenging ambient RF waves. Moreover, it takes quite a long time to charge the capacitor compared to the time for which the sensor node actually participates in communicating with a sink node [14,15]. As a result, energy is still scarce in practice and a sensor node should repeat the transition between the long harvesting state and the short communicating state. For example, it was reported that the harvesting state has to last roughly 20 times longer than the communicating state in [16].
A medium access control (MAC) scheme is needed for a sensor node to deliver information to a sink node, especially, in a wireless sensor network where several sensor nodes attempt to send their data to a common sink node. In an RF energy harvesting wireless sensor network, which suffers from a scarcity of energy, signaling is not easily provided between sink and sensor nodes. Furthermore, a sensor node is hardly able to exchange information with another sensor node. Thus, a sophisticated MAC scheme of scheduling-type is not suitable for supporting a sensor node to deliver data to a sink node. Structural simplicity has to be within the MAC scheme in an RF energy harvesting wireless sensor network. In the literature, a set of MAC schemes have been reported for energy harvesting wireless sensor networks [17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32]. In [17], a polling-based MAC scheme was introduced in which the sink node gives a chance of transmitting data with a certain probability to a sensor node. Then, the proposed scheme was evaluated under the assumption that sensor nodes harvest solar or thermal energy. As MAC schemes for energy harvesting wireless sensor networks, time division multiple access (TDMA) and framed and slotted ALOHA were considered in [18]. To maintain slotted time structure, such schemes were also complemented by periodic signaling of the sink node destined to sensor nodes. In [19,29], MAC schemes based on carrier sense multiple access with collision avoidance (CSMA/CA) were proposed. These schemes were designed to assign an external RF source to supply RF energy to a sensor node. In [20], a MAC scheme based on CSMA/CA was addressed. To behave according to the scheme, a sensor node was assumed to continuously harvest energy from surrounding environments. In [21,26], TDMA and slotted CSMA/CA were respectively used for sensor nodes to send their data to the sink node, where the sink node was assumed to be able to receive data from sensor nodes and send RF energy to sensor nodes simultaneously. In [22], a MAC scheme using two different polling methods was suggested for supporting two priority classes in a wireless body area network. In this work, sensor nodes were assumed to harvest energy in human body. Also, a simulation method was employed to evaluate the suggested MAC scheme. In [23], relays were deployed at a wireless body area network. Then, a MAC scheme was proposed for cooperative communications. In this work, relays were assumed to harvest thermal or biochemical energy in human body. Also, the proposed MAC scheme was evaluated by use of a simulation method. In [27], duty cycles were investigated in energy harvesting wireless sensor networks where sensor nodes harvest photovoltaic energy. In [28], a MAC scheme which is compatible with IEEE 802.15.4 standard was proposed for RF energy harvesting wireless sensor networks. To use the scheme, the authors assumed that an external RF source supply energy to sensor nodes by radiating RF waves. In [30], a MAC scheme based on distributed coordination function in IEEE 802.11 was proposed for sensor nodes to send data to an access point. In this MAC scheme, access points were assumed to supply RF energy to sensor nodes. In [31], a MAC scheme was introduced to meet the quality-of-service (QoS) requirement per priority class. The scheme was then evaluated under the assumption that sensor nodes harvest solar energy. In [32], a MAC scheme based on slotted ALOHA was reported for energy harvesting wireless sensor network, where the sink node was assumed to be able to receive data from sensor nodes and send RF energy to sensor nodes simultaneously. Considerable effort has been made to device MAC schemes for wireless sensor networks in which sensor nodes harvest solar energy or receive RF energy from external RF sources. On the other hand, a limited number of MAC schemes have been reported for wireless sensor networks where sensor nodes harvest RF energy only by scavenging ambient RF waves. Some of the MAC schemes were designed to let sensor nodes to often make a transit between transmitter and receiver modes. Unfortunately, such schemes may be rather complicated to follow in case sensor nodes can only harvest weak RF energy, e.g., −20 dBm [15], from ambient RF waves so that sensor nodes are not able to operate with being directly powered by harvested energy but also need long time, e.g., 3 h [15], to charge its capacitor. Some other MAC schemes were devised based on the technologies which enable a sink node to receive data from sensor nodes and send RF energy to sensor nodes simultaneously. These technologies have not yet fully matured to be hired in various wireless environments [33,34]. Also, they are not applicable to a wireless sensor network in which sensor nodes scavenge ambient RF waves to harvest energy. In previous studies, simulation methods were often used to evaluate proposed MAC schemes. Compared with deriving mathematical expressions for performance measures, simulation methods are advantageous in the sense that they are able to embrace complex practical models for energy harvesting wireless sensor networks. On the other hand, deriving exact, or alternatively approximate, expressions provides a handy tool for optimization, which typically requires vast simulation results. In wireless sensor networks where sensor nodes harvest energy by scavenging ambient RF waves; However, there have been reported few results about exact expressions of performance measures, e.g., throughput, for evaluating as well as optimizing a MAC scheme.
In this paper, we consider an RF energy harvesting wireless sensor network in which sensor nodes harvest RF energy by scavenging ambient RF waves. Upon perception of such difficulties in an RF energy harvesting wireless sensor network, our practical choice for the MAC scheme is a basic contending-type MAC scheme based on pure ALOHA [35]. In the basic MAC scheme, a sensor node harvests energy from ambient RF waves, charges a capacitor, senses the environment, generates a packet, takes a back-off time, and transmits the packet. Then, the sensor node simply repeats the procedures above. (Please note that the basic MAC scheme is not identical to pure ALOHA but only employs some features of pure ALOHA including back-off times.) If two or more sensor nodes may simultaneously send their packets to a sink node, a collision of the packets takes place and the sink node may not able to identify any packet. However, the basic MAC scheme is not able to perfectly prevent such a collision of packets since it belongs to ALOHA clan. As a result, the throughput that the basic MAC scheme can attain is deteriorated by a collision of packets. Using the renewal theory, we thus derive an exact expression of the throughput that the basic MAC scheme can achieve. In various case studies, we then look for a way to enhance the throughput by use of the throughput formula. Specifically, we seek answers to the fundamental questions; what is an optimal distribution for the back-off time which maximizes the total throughput?”, “Is it possible to effectively increase the total throughput by taking back-off times?” and “how to shape the distribution for the back-off time as to improve the total throughput?” There have been classical studies on back-off methods. In [36], several back-off methods, which adjust the back-off times as retransmissions go on, were considered in networks governed by slotted ALOHA. Then, these methods are evaluated comparatively. In [37], an exponential back-off method was suggested for slotted ALOHA systems. Then, a simulation method was used to evaluate the proposed back-off method. In [38], back-off methods, which dynamically control the back-off time according to the result of packet delivery, were investigated in slotted ALOHA networks. In [39], a back-off method, which can be adopted at CSMA/CA was proposed for IEEE 802.15.4 networks. In [40], an adaptive back-off method was explored to be used, in IEEE 802.11 wireless local area networks. In the basic MAC scheme, a sensor node is not acknowledged about its attempt to deliver a packet to the sink node. However, most of the previous studies have focused on adaptive back-off methods that rely on the result of packet delivery. The basic MAC scheme is based on pure ALOHA which works on a continuous time structure. On the other hand, many previous works have assumed MAC schemes operating on discrete time structures, e.g., slotted ALOHA. As far as we know, there has been no intensive study on back-off methods which will be employed in a contending-type MAC scheme, rooted in pure ALOHA, for RF energy harvesting wireless sensor networks.
In Section 2, we describe a basic MAC scheme for supporting sensor nodes to deliver their data to a sink node in a wireless sensor network where sensor nodes harvest RF energy by scavenging ambient RF waves. In Section 3, using the renewal theory, we derive an exact expression of the throughput that the basic MAC scheme is able to achieve. Also, we exactly present the throughput in a closed form when harvest times, back-off times and transmission times are exponentially distributed. Section 4 is devoted to case studies for seeking strategies to improve the throughput by controlling back-off times. First, we find an optimal distribution for the back-off time when harvest times are deterministic. Secondly, we examine the impact of taking back-off times on the throughput when harvest times are random. Thirdly, we investigate the effect of variance of back-off time on the throughput when the sum of harvest and back-off times are governed by an Erlang distribution.

2. Basic MAC Scheme

Consider an RF energy harvesting wireless sensor network which consists of a single sink node and many sensor nodes. The sink node is laid at the center of the network and sensor nodes are scattered around the sink node. An exemplary configuration of the RF energy harvesting wireless sensor network is illustrated in Figure 1. In the network, a sensor node harvests energy by scavenging ambient RF waves. By consuming the harvested energy, the sensor node gathers information in its vicinity and then sends the collected data to the sink node. For such delivery of data, we consider a contending-type MAC scheme, rooted in ALOHA, as follows:
At each sensor node, time is divided into frames and a frame is partitioned into harvest period, back-off period and transmission period. (See Figure 2.) When a frame starts at a sensor node, a harvest period of the sensor node also begins. During the harvest period, the sensor node harvests RF energy and charges the internal capacitor. Please note that the harvest period lasts until the sensor node accumulates as much energy as it can transmit a packet. As the harvest period ends, the sensor node senses the environment, collects information and encapsulates the information into a packet. Then, a back-off period of the sensor node starts. The sensor node intentionally waits for the back-off period in the expectation for reducing the possibility of packet collision. When the back-off period is over, a transmission period of the sensor node begins and the sensor node finally transmits the packet to the sink node. As the transmission period ends, the next frame starts. Figure 3 summarizes the behavior of the basic MAC scheme considered in the paper.
According to the basic MAC scheme, two or more transmission periods of different sensor nodes may overlap. Then, the packets which are sent during these transmission periods collide and the sink node may not be able to identify any packet. Please note that the sink node returns no acknowledgement message even if it receives and identifies a packet. Thus, as a sensor node finishes transmitting a packet, the sensor node immediately discards the packet and never retransmits it. Consequently, a sensor node may lose a packet if the packet is involved in a collision.

3. Throughput Analysis

In the basic MAC scheme, each sensor node independently transmits a packet as stated in Section 2. Inevitably, a packet may collide with others and the sink node may identify none of the packets involved in the collision. Moreover, a collision of packets ultimately leads to a loss of them since a sensor node never retransmits a packet. In this section, reflecting the effect of packet collision on the throughput, we derive an exact expression of the throughput that the basic MAC scheme is able to attain. Then, we present an expression of the throughput in a closed form when harvest times, back-off times and transmission times are exponentially distributed.

3.1. Exact Expression of Throughput

Consider a wireless sensor network which consists of a single sink node and M 2 , 3 , sensor nodes, denoted by s 1 , , s M . At sensor node s m , time is divided into frames and a frame is again partitioned into harvest period, back-off period and transmission period as stated in Section 2. For k , let H k m , B k m and T k m , respectively, denote the harvest time, back-off time and transmission time (i.e., the lengths of harvest period, back-off period and transmission period) in the k th frame at sensor node s m . Set
S k m H k m + B k m + T k m
for k . Assume that the time for sensing the environment, gathering information and generating a packet is negligible. Then, S k m represents the length of the k th frame at sensor node s m . Also, set A 0 m = 0 almost surely and define
A n m k = 1 n S k m
for n . Then, A n m indicates the time that the n th frame starts. Please note that { A n m , n = 0 , 1 , } forms a point process [41]. Figure 4 illustrates harvest times, back-off times and transmission times.
Suppose that a sensor node needs a fixed amount of energy, denoted by ε , to transmit a packet. Recall that a sensor node keeps harvesting energy until it accumulates a necessary amount of energy for transmitting a packet. Let J t m represent the amount of energy that sensor node s m is able to harvest in 0 , t for t 0 , . Then, the harvest time H k m can be expressed by
H k m = min { u 0 , : J A k m + u m J A k m m ε }
for k . To characterize the harvest times, we need to model the amount of harvested energy J t m . In the literature, some models have been introduced on the amount of harvested energy [42]. Since we aim to derive an exact expression of the throughput, we employ a tractable model of { J t m , t 0 } as follows. Set J 0 m = 0 almost surely and assume that { J t m , t 0 } is a non-decreasing Lévy process, i.e., a subordinator [43]. Then, the harvest times H 1 m , H 2 m , are mutually independent and identically distributed. Let H m denote a random variable such that H m = H k m in distribution. Let F H m denote the distribution function of H m , i.e.,
F H m x = P ( H m x )
for x . At sensor node s m , suppose that the back-off times B 1 m , B 2 m , are mutually independent and identically distributed. Let B m denote a random variable such that B m = B k m in distribution and F B m be the distribution function of B m , i.e.,
F B m x = P ( B m x )
for x . In addition, assume that the transmission times T 1 m , T 2 m , are mutually independent and identically distributed as a random variable T m . Let F T m denote the distribution function of T m , i.e.,
F T m x = P ( T m x )
for x . Under the assumption that { H k m , k = 1 , 2 , } , { B k m , k = 1 , 2 , } and { T k m , k = 1 , 2 , } are independent and identically distributed sequences, the lengths of frames S 1 m , S 2 m , are also mutually independent and identically distributed. Thus, { A n m , n = 0 , 1 , } becomes a renewal point process [41]. Let S m denote a random variable such that S m = S k m in distribution for all k . Also, let F S m represent the distribution function of S m , i.e.,
F S m x = P ( S m x )
for x .
For t 0 , , define a random variable Q t m as follows:
Q t m = min { n : A n m > t } .
Also, let V t m denote the time elapsed from t until the next frame starts. Then, V t m , which is called the forward recurrence time [44] associated with the renewal point process { A n m , n = 0 , 1 , } , can be expressed by
V t m = A Q t m m t
for t 0 , . Recall that T k m is the time needed by sensor node s m to transmit a packet in the k th frame. Define
W t m V t m T Q t m m if   V t m > T Q t m m 0 otherwise  
for t 0 , . Then, W t m represents the time elapsed from t until sensor node s m begins to transmit a packet in the current frame. (If sensor node s m already started transmitting a packet before t , W t m is set to be 0 almost surely.) Apparently, { W t m , t 0 } is a regenerative process [44] associated with the renewal point process { A n m , n = 0 , 1 , } . Thus, W t m satisfies the renewal equation [44] as follows.
P ( W t m > y ) = θ m t + 0 t P ( W t s m > y ) d F S m s
for t 0 , , where
θ m t = P ( W t m > y , A 1 m > t )
for t 0 , . Since θ m t is bounded, the renewal equation in (11) has a unique solution. For all t 0 , , set R 1 m t = F S m t and define
R k + 1 m t = 0 t R k m t s d F S m s
for k . Then, the renewal function [44], denoted by R m , is defined by
R m t = k = 1 R k m t
for t 0 , . Using the renewal function in (14), the unique solution of the renewal equation is expressed by
P ( W t m > y ) = θ m t + 0 t θ m t s d R m s
for t 0 , . Suppose that S m is not arithmetic [44]. Please note that
θ m t = P ( H 1 m + B 1 m > t + y ) = P ( H m + B m > t + y )
for t 0 , and y 0 , . Since harvest time H m and back-off time B m are properly distributed, θ m is a non-negative non-increasing function of t 0 , . In addition, 0 θ m t   d t < . Thus, from the key renewal theorem [44], we have
P ( W t m > y ) 1 E S m 0 θ m t d t
as t . Please note that
1 E S m 0 θ m t d t = 1 E S m 0 1 F H m * F G m t + y d t
from (16), where
F H m * F G m x = 0 x F H m x z d F G m z
for x 0 , . Figure 5 illustrates the relation of V t m and W t m .
Suppose that sensor node s m ˜ starts transmitting a packet at time t . Assume that the propagation delay from a sensor node to the sink node is negligible. Then, the packet sent by sensor node s m ˜ arrives at the sink node at time t . The packet of sensor node s m ˜ will not collide with a packet of sensor node s m if and only if sensor node s m starts transmitting no packet in the vulnerable period ( t T m ˜ , t + T m ˜ ] . Please note that the necessary and sufficient condition for avoiding a collision with a packet of sensor node s m is equivalent to the condition that
W t m > T m ˜
where W t m is defined in (10). Set
ϕ m lim t P ( W t m > T m ˜ )
for m 1 , , M m ˜ . Then, ϕ m represents the probability that a packet of sensor node s m ˜ does not collide with a packet of sensor node s m at steady state. By use of (18), an exact expression of the pairwise non-collision probability ϕ m is derived as follows:
ϕ m = 1 E S m 0 0 1 F H m * F B m t + x d t d F T m ˜ x .
Let ψ m ˜ denote the probability that a packet of sensor node s m ˜ never collides with any other packet at steady state. Then, from (22), the non-collision probability ψ m ˜ can be expressed by
ψ m ˜ = m 1 , , M m ˜ ϕ m
for m ˜ 1 , , M . Let η m ˜ denote the nodal throughput that sensor node s m ˜ can attain. Since sensor node s m ˜ transmits a packet only once in a frame and succeeds in delivering the packet to the sink node with probability ψ m ˜ , we have
η m ˜ = ψ m ˜ E S m ˜
for m ˜ 1 , , M . From (7), (22), (23), and (24), we have an exact expression of the nodal throughput that a sensor node can achieve.

3.2. Exemplary Expression of Throughput

For example, suppose that harvest times H 1 , , H M have an exponential distribution with mean α identically. Let H denote a random variable such that H = H m in distribution for all m 1 , , M and F H be the distribution function of H . Then,
F H x = 1 e x α if x > 0   0 if x 0.
Also, assume that back-off times B 1 , , B M are identically governed by an exponential distribution with mean β . Let B denote a random variable such that B = B m in distribution for all m 1 , , M . Then, B has the following distribution function.
F B x = 1 e x β if x > 0   0 if x 0.
In addition, assume that transmission times T 1 , , T M are identically distributed with an exponential distribution with mean γ . Let T denote a random variable such that T = T m in distribution for all m 1 , , M . Then, T has the following distribution function.
F T x = 1 e x γ if x > 0   0 if x 0.
Under the assumption that harvest time, back-off times and transmission times are exponentially distributed, the probability θ m t in (16) is calculated by
θ m t = P ( H + B > t + y ) = α α β e t + y α β α β e t + y β
for all m 1 , , M . Please note that E ( S m ) = α + β + γ since S m = H + B + T in distribution for all m 1 , , M . Thus, we have
P ( W t m > y ) α 2 α β α + β + γ e y α β 2 α β α + β + γ e y β
as t for all m 1 , , M . For sensor node s m ˜ , the pairwise non-collision probability ϕ m is derived by
ϕ m = α β α + β + γ α 2 + α β + β 2 α + γ β + γ α + β + γ
for all m 1 , , M m ˜ and the non-collision probability ψ m ˜ is also expressed by
ψ m ˜ = [ α β α + β + γ α 2 + α β + β 2 α + γ β + γ α + β + γ ] M 1 .
Finally, the nodal throughput that sensor node s m ˜ can attain is yielded by
η m ˜ = [ α β α + β + γ α 2 + α β + β 2 ] M 1 α + γ β + γ ] M 1 α + β + γ ] M
for m ˜ 1 , , M . Let η denote the total throughput which can be achieved in the RF energy harvesting wireless sensor network. Then, we also have
η = M η m ˜ = M [ α β α + β + γ α 2 + α β + β 2 ] M 1 α + γ β + γ ] M 1 α + β + γ ] M
since nodal throughputs are identical.
Figure 6 shows the total throughput with respect to the expected back-off time. In this figure, the harvest times are assumed to have the exponential distribution with mean of 20 unit times while the transmission times are set to have the exponential distribution with mean of 1 unit time [16]. In addition, the back-off times are set to be exponentially distributed in an identical fashion. Figure 6 indicates that there can exist an optimal expected back-off time which maximizes the total throughput. Also, such an optimal expected back-off time is shown to increase as the number of sensor nodes increases. The existence of an optimal value is explained by the fact that the probability of packet collision decreases as the expected back-off time increases while the fraction of time that no sensor node uses for transmitting a packet increases.

4. Some Studies on Back-Off Time

The back-off time is a crucial factor in designing the basic MAC scheme. In this section, we consider three cases and then look for a way to improve the throughput by controlling the back-off times in each case. In the first case in which harvest times are deterministic, we find an optimal distribution for the back-off time which maximizes the total throughput. In the second case, where the harvest times are exponentially distributed, we confirm that taking proper back-off times is able to effectively enhance the total throughput. Finally, we show that shaping the distribution for the back-off time as to have high variance helps improve the total throughput.

4.1. Optimal Distribution for Back-Off Time

Suppose that harvest times and transmission times are deterministic. Then, once several packets collide, their collision will be definitely repeated forever unless the sensor nodes involved in the collision take back-off times. In this section, we focus on a case in which the harvest times and the transmission times are degenerated into some constants. Then, we obtain an optimal distribution for the back-off time which maximizes the total throughput.
Suppose that the harvest time H m and the transmission time T m are degenerated into positive numbers α and γ respectively, i.e.,
H m = α T m = γ
almost surely for all m 1 , , M . In addition, assume that the back-off times B 1 , , B M are strictly positive random variables which are governed by a same proper distribution with mean β . Let B denote a random variable such that B = B m in distribution for all m 1 , , M and F B represent the distribution function of B . Then, the probability θ m t in (16) is expressed by
θ m t = 1 F B t + y α
for y 0 , . From (17) and (35), we also have
P ( W t m > y ) 1 α + β + γ y α 1 F B x d x
as t for all m 1 , , M . Thus, the pairwise non-collision probability ϕ m , i.e., the probability that a packet of sensor node s m ˜ does not collide with any packet of sensor node s m at steady state is yielded by
ϕ m = α + β γ α + β + γ if α γ 1 α + β + γ γ α 1 F B x d x if α < γ
for all m 1 , , M m ˜ . Since the probability ϕ m is identical for all m 1 , , M m ˜ , the non-collision probability ψ m ˜ , which represents the probability that a packet of sensor node m ˜ does not collide with any other packet at steady state, is obtained by
ψ m ˜ = ( α + β γ α + β + γ ) M 1 if α γ   1 ( α + β + γ ) M 1 [ γ α 1 F B x d x ] M 1 if α < γ . .  
Therefore, the nodal throughput that sensor node s m ˜ can achieve s m ˜ is expressed by
η m ˜ = ( α + β γ ) M 1 ( α + β + γ ) M if α γ   1 ( α + β + γ ) M [ γ α 1 F B x d x ] M 1 if α < γ .
Moreover, the total throughput is obtained by
η = M ( α + β γ ) M 1 ( α + β + γ ) M if α γ M ( α + β + γ ) M [ γ α 1 F B x d x ] M 1 if α < γ
since nodal throughputs are identical.
First, consider the case that α γ . Please note that it is a practically feasible case since the harvest time is typically much longer than the transmission time in practice. By differentiating the total throughput η with respect to the expected back-off time β and then equating it to zero, we obtain a critical point, denoted by β ^ as follows.
β ^ = 2 M 1 γ α .
Please note that β ^ is also a global maximum point. However, as far as α < 2 M 1 γ , β ^ is the optimal expected back-off time since the expected back-off time β should be strictly positive. Otherwise, there exists no optimal expected back-off time. Please note that no specific distribution for the back-off time has been assumed until the optimal expected back-off time in (31) is derived. Thus, an optimal back-off time is proved not to be characterized by the distribution but only by the expected value. Suppose that γ α < 2 M 1 γ . Let η * denote the maximum total throughput. Then, we have
η * = 1 2 γ ( 1 1 M ) M 1
when γ α < 2 M 1 γ . On the other hand,
η M ( α γ ) M 1 ( α + γ ) M
as β 0 when α > 2 M 1 γ .
Secondly, consider the case that 0 < α < γ . Since
0 0 γ α 1 F B x d x γ α ,
the total throughput η is bounded as follows.
M · max { 0 , α + β γ } M 1 ( α + β + γ ) M η M β M 1 ( α + β + γ ) M .
In (45), the upper bound on the total throughput has a critical point, denoted by β ˇ , as follows.
β ˇ = M 1 α + γ .
Please note that β ˇ is also a global maximum point. Replacing β with β ^ in the lower bound as well as β with β ˇ in the upper bound shown in (45), we obtain upper and lower bounds on the maximum total throughput, denoted by η * , as follows.
1 2 γ ( 1 1 M ) M 1 η * 1 α + γ ( 1 1 M ) M 1 .
Figure 7 shows the total throughput with respect to the expected back-off time. In this figure, the harvest times are fixed to 20 unit times while the transmission times are set to be 1 unit time [16]. In addition, the back-off times are set to have an exponential distribution. In Figure 7, we observe that there exists an optimal expected back-off time, which maximizes the total throughput, when the number of sensor nodes is 20 or 30. On the other hand, there is no optimal value in case 10 sensor nodes reside in the network. Such a dichotomy of the expected values of back-off time corresponds to the one which results in (42) and (43), respectively. In addition, we notice that the optimal expected back-off time increases as the number of sensor nodes increases.
Figure 8 shows the total throughput with respect to the expected back-off time. In this figure, the harvest times are assumed to be fixed to 0.5 unit times while the transmission times are set to be 1 unit time. Also, the back-off times are set to have an exponential distribution. In figure 8, we observe that the total throughput is well bounded by the upper and lower bounds given in (45). In particular, we notice that the lower bound is highly tighter than the upper bound. Moreover, the optimal expected back-off time is fairly close to the value of expected back-off time which maximizes the lower bound.

4.2. Effectiveness of Taking Back-Off Time

Suppose that the harvest times are not deterministic. Then, due to the random fluctuations in harvest times, a collision of packets may be never repeated even if the sensor nodes, which are involved in the collision, take no back-off time at all. Furthermore, without taking back-off times, a sensor node is able to attempt to deliver packets more frequently. In this section, we consider two cases; sensor nodes take exponentially distributed back-off times in a case and sensor nodes take no back-off time in the other case. Then, we investigate whether taking positive back-off times can help enhance the throughput or not.
First, consider the case in which sensor nodes take positive back-off times. Suppose that the harvest times H 1 , , H M are governed by a same exponential distribution with mean α . Let H denote a random variable such that H = H m for all m 1 , , M . The distribution function of H , denoted by F H , is given in (17). In this case, the back-off times B 1 , , B M are set to identically have an exponential distribution with mean β . Let B denote a random variable such that B = B m in distribution for all m 1 , , M . The distribution function of B , denoted by F B , is given in (18). In addition, the transmission times T 1 , , T M are set to be degenerated into a positive number γ , i.e., T m = γ almost surely for all m 1 , , M .
In the case that sensor nodes take positive back-off times, the probability θ m t in (16) is calculated by
θ m t   = α α β e 1 α t + y β α β e 1 β t + y
for y 0 , . Thus, for sensor node s m ˜ , the pairwise non-collision probability ϕ m in (22) is yielded by
ϕ m = 1 α + β + γ [ α 2 α β e γ α β 2 α β e γ β ]
for all m 1 , , M m ˜ and the non-collision probability ψ m ˜ in (23) is also yielded by
ψ m ˜   = 1 [ α + β + γ ] M 1 [ α 2 α β e γ α β 2 α β e γ β ] M 1
for all m ˜ 1 , , M . Therefore, the nodal throughput that sensor node s m ˜ can attain is obtained by
η m ˜ = 1 ( α + β + γ ) M [ α 2 α β e γ α β 2 α β e γ β ] M 1
for all m ˜ 1 , , M and the total throughput is also expressed by
η = M ( α + β + γ ) M [ α 2 α β e γ α β 2 α β e γ β ] M 1 .
Secondly, consider the case in which sensor nodes take no back-off times. Suppose that the harvest times H 1 , , H M are governed by a same exponential distribution with mean α . In this case, the back-off times B 1 , , B M are set to be degenerated into 0 , i.e., B m = 0 almost surely for all m 1 , , M . Also, the transmission times T 1 , , T M are set to be degenerated into a positive number γ .
In the case that sensor nodes take no back-off time, the probability θ m t given in (16) is calculated by
θ m t   = e 1 α t + y
for y 0 , . Thus, for sensor node s m ˜ , the pairwise non-collision probability ϕ m in (22) is yielded by
ϕ m = α α + γ e γ α
for all m 1 , , M m ˜ and the non-collision probability ψ m ˜ in (23) is also yielded by
ψ m ˜ = ( α α + γ ) M 1 e M 1 γ α
for all m ˜ 1 , , M . Therefore, the nodal throughput that sensor node s m ˜ can attain is obtained by
η m ˜ = α M 1 ( α + γ ) M e M 1 γ α
for all m ˜ 1 , , M and the total throughput is also obtained by
η = M α M 1 ( α + γ ) M e M 1 γ α .
Figure 9 compares the total throughputs which are, respectively, achieved with and without taking back-off times. In this figure, the harvest times are assumed to have the exponential distribution with mean of 20 unit times while the transmission times are set to be almost surely equal to 1 unit time [16]. In addition, the back-off times are set to be governed by an exponential distribution in case sensor nodes take positive back-off times. In this figure, we observe that taking no back-off time is always able to achieve higher total throughput than taking exponentially distributed back-off times when the number of sensor nodes is 11. However, in the network consisting of 13 or 15 sensor nodes, we notice that taking proper back-off times can effectively improve the total throughput.

4.3. Shaping Distribution for Back-Off Time

Apparently, the shape of the distribution for the back-off time affects the throughput that the basic MAC scheme is able to attain. Please note that the variance of a distribution is a key parameter which determines the shape of the distribution. In this section, we assume a situation in which the sum of harvest and back-off times is governed by an Erlang distribution. Then, we examine the dominant tendency that the total throughput shows as the variance of back-off time changes.
First, suppose that the harvest times H 1 , , H M are identically distributed with mean α . Let H denote a random variable such that H = H m in distribution for all m 1 , , M . Also, let F H denote the distribution function of H and Φ H be the Laplace-Stieltjes transform of F H , i.e.,
Φ H s = 0 e s x d F H x
for complex number s . Secondly, suppose that the back-off times B 1 , , B M are governed by a same distribution with mean β . Let B denote a random variable such that B = B m in distribution for all m 1 , , M and F B be the distribution function of H . Then, the random variable H + B is set to have the Erlang distribution with shape parameter ν and rate parameter λ , i.e.,
F H * F B x = 1 k = 0 ν 1 e λ x ( λ x ) k k !
for x 0 , . The Laplace-Stieltjes transform of F H * F B is calculated by
Φ H + B s = [ λ s + λ ] ν .
Please note that F B is equal to the inverse Laplace-Stieltjes transform of Φ H + B s / Φ H s . Thirdly, suppose that the transmission times T 1 , , T M are degenerated into a positive number γ , i.e.,
T m = γ
almost surely for all m 1 , , M .
In case the sum of harvest and back-off times has an Erlang distribution, the probability θ m t in (16) is obtained by
θ m t = k = 0 ν 1 e λ t + y [ λ t + y ] k k !
for y 0 , . Then,
P ( W t m > y ) 1 α + β + γ λ k = 0 ν 1 n = 0 k e λ y ( λ y ) k n !
as t . From (63), the pairwise non-collision probability ϕ m is yielded by
ϕ m = 1 α + β + γ λ k = 0 ν 1 n = 0 k e λ γ ( λ γ ) n n !
for all m 1 , , M m ˜ and the non-collision probability ψ m ˜ is also yielded by
ψ m ˜ = 1 ( α + β + γ ) M 1 λ M 1 [ k = 0 ν 1 n = 0 k e λ γ ( λ γ ) n n ! ] M 1
for all m ˜ 1 , , M . From (65), the nodal throughput η m ˜ is expressed by
η m ˜ = 1 ( α + β + γ ) M λ M 1 [ k = 0 ν 1 n = 0 k e λ γ ( λ γ ) n n ! ] M 1
for all m ˜ 1 , , M and the total throughput η is also obtained by
η = M ( α + β + γ ) M λ M 1 [ k = 0 ν 1 n = 0 k e λ γ ( λ γ ) n n ! ] M 1 .
Figure 10 shows the total throughput with respect to the shape parameter of Erlang distribution. In this figure, a specific distribution is not assumed for the harvest times. Given distribution for the harvest times, however, the back-off times are set to have a certain distribution so that the sum of harvest and back-off times are governed by an Erlang distribution with mean of 30 unit times. In addition, the transmission times are set to be 1 unit time almost surely. In Figure 10, we observe that the total throughput is reduced as the shape parameter is increased. First, note that the mean of the sum of harvest and back-off times is set to be unchanged with respect to the shape parameter. Thus, the mean of the back-off time is fixed in this figure. Secondly, note that the mean and variance of the Erlang distribution with shape parameter ν and rate parameter λ are equal to ν / λ and ν / λ 2 , respectively. Thus, as the shape parameter increases, the variance of the sum of harvest and back-off times decreases and hence the variance of the back-off time decreases. (Figure 10 illustrates the standard deviation which decreases as the shape parameter increases.) The two arguments above corroborate the conclusion that shaping the back-off time so that its variance is increased while its mean is not changed contributes to the throughput enhancement. Please note that all of the expected harvest time, expected back-off time and expected transmission time are fixed regardless of the shape parameter in Figure 10. Thus, the phenomenon stated in the conclusion above takes place since the probability of packet collision decreases as the shape parameter increases while the fraction of time that no sensor node uses for transmitting a packet is unchanged.

5. Conclusions

RF energy harvesting technologies provided us with a new paradigm for wireless sensor networks; a wireless sensor network is able to live an eternal life without replacement or recharge of batteries. Against theoretical expectations; however, an RF energy harvesting wireless sensor network suffers from a scarcity of energy in practice and, consequently, naïveté has to be within a MAC scheme that supports sensor nodes to deliver their packets to a sink node. Upon perception of the difficulties in RF energy harvesting wireless sensor networks, our practical choice was a basic contending-type MAC scheme rooted in ALOHA. In the basic MAC scheme, each sensor node simply repeats harvesting energy, backing off for a while and transmitting a packet. Since the basic MAC scheme belongs to ALOHA clan; however, it may bring about a collision among some packets. In turn, such a collision leads to the loss of involving packets and hence deteriorates the throughput. Using the renewal theory, we thus derived an exact expression of the throughput that the basic MAC scheme is able to attain. Then, by use of the throughput formula, we sought strategies of controlling back-off times as to improve the throughput. In case studies, we first revealed that an optimal back-off time, which maximizes the total throughput, is not characterized by the distribution but only by the mean value when the harvest times are deterministic. Secondly, we confirmed that taking proper back-off times is able to effectively improve the throughput even when the harvest times are random. Thirdly, we showed that shaping the back-off time so that its variance is increased while its mean is not changed can help ameliorate the throughput that the basic MAC scheme is able to achieve.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless Sensor Networks: A Survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  2. Ye, W.; Heidermann, J.; Estrin, D. An Energy-efficient MAC Protocol for Wireless Sensor Networks. In Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), New York, NY, USA, 23–27 June 2002; pp. 1567–1576. [Google Scholar] [CrossRef]
  3. Halkes, G.; van Dam, T.; Langendoen, K. Comparing Energy-saving MAC Protocols for Wireless Sensor Networks. Mob. Netw. Appl. 2005, 10, 783–791. [Google Scholar] [CrossRef]
  4. Yahya, B.; Ben-Othman, J. Towards a Classification of Energy Aware MAC Protocols for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2009, 9, 1572–1607. [Google Scholar] [CrossRef]
  5. Bachir, A.; Dohler, M.; Watteyne, T.; Leung, K. MAC Essentials for Wireless Sensor Networks. IEIE Commun. Surv. Tutor. 2010, 12, 222–248. [Google Scholar] [CrossRef]
  6. Shaikh, F.; Zeadally, S. Energy Harvesting in Wireless Sensor Networks: A Comprehensive Review. Renew. Sustain. Energy Rev. 2016, 55, 1041–1054. [Google Scholar] [CrossRef]
  7. Park, J.; Seo, H.; Choi, C. Simple Contending-type MAC Scheme for Wireless Passive Sensor Networks. IEEE Trans. Smart Process. Comput. 2017, 6, 299–304. [Google Scholar] [CrossRef]
  8. Choi, C. Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization. In Proceedings of the 2018 IEEE Region 10 Conference (TENCON 2018), Jeju, Korea, 28–31 October 2018; pp. 1317–1321. [Google Scholar]
  9. Shigeta, R.; Sasaki, T.; Quan, D.; Kawahara, Y.; Vyas, R.; Tentzeris, M. Ambient RF Energy Harvesting Sensor Device with Capacitor-Leakage-Aware Duty Cycle Control. IEEE Sens. J. 2013, 13, 2973–2983. [Google Scholar] [CrossRef]
  10. Jain, N.; Bohara, V. Energy Harvesting and Spectrum Sharing Protocol for Wireless Sensor Networks. IEEE Wirel. Commun. Lett. 2015, 4, 697–700. [Google Scholar] [CrossRef]
  11. Mekkis, P.; Antonopoulos, A.; Kartsakli, E.; Lalos, A.; Alonso, L.; Verikoukis, C. Information Exchange in Randomly Deployed Dense WSNs with Wireless Energy Harvesting Capabilities. IEEE Trans. Wirel. Commun. 2016, 15, 3008–3018. [Google Scholar] [CrossRef]
  12. Sami, M.; Noordin, N.; Khabazian, M. A TDMA-Based Cooperative MAC Protocol for Cognitive Networks with Opportunistic Energy Harvesting. IEEE Commun. Lett. 2016, 20, 808–811. [Google Scholar] [CrossRef]
  13. Ashraf, M.; Shahid, A.; Jang, J.; Lee, K. Optimization of the Overall Success Probability of the Energy Harvesting Cognitive Wireless Sensor Networks. IEEE Access 2016, 5, 283–294. [Google Scholar] [CrossRef]
  14. Bouchouicha, D.; Dupont, F.; Latrach, M.; Ventura, L. Ambient RF Energy Harvesting. In Proceedings of the International Conference on Renewable Energies and Power Quality 2010 (ICREQP 2010), Granada, Spain, 23–25 March 2010. [Google Scholar]
  15. Mikeka, C.; Arai, H. Design Issues in Radio Frequency Energy Harvesting System. In A Sustainable Energy Harvesting Technologies—Past, Present, Future; InTech: Rijeka, Croatia, 2011; pp. 235–256. [Google Scholar]
  16. Seo, H.; Ha, J.; Park, J.; Choi, C. Method for Approximately Calculating Charging and Acting Times in Wireless Passive Sensor Networks. In Proceedings of the 2015 IEIE Fall Conference, Wonju, Korea, 27–28 November 2015; pp. 863–865. [Google Scholar]
  17. Eu, Z.; Tan, H.; Seah, K. Design and Performance Analysis of MAC Schemes for Wireless Sensor Networks Powered by Ambient Energy Harvesting. Ad Hoc Netw. 2011, 9, 300–323. [Google Scholar] [CrossRef]
  18. Iannello, F.; Simeone, O.; Spagnolini, U. Medium Access Control Protocols for Wireless Sensor Networks with Energy Harvesting. IEEE Trans. Commun. 2012, 60, 1381–1389. [Google Scholar] [CrossRef]
  19. Naderi, M.; Nintanavonga, P.; Chowdhury, K. RF-MAC: A Medium Access Control Protocol for Re-Chargeable Sensor Networks Powered by Wireless Energy Harvesting. IEEE Trans. Wirel. Commun. 2014, 13, 3926–3937. [Google Scholar] [CrossRef]
  20. Nguyen, K.; Nguyen, V.; Le, D.; Ji, Y.; Duong, D.; Yamada, S. ERI-MAC: An Energy-Harvested Receiver-Initiated MAC Protocol for Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2014, 2014, 1–8. [Google Scholar] [CrossRef]
  21. Ju, H.; Zhang, R. Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network. IEEE Trans. Commun. 2014, 62, 3528–3540. [Google Scholar] [CrossRef]
  22. Ibarra, E.; Antonopoulos, A.; Kartsakli, E.; Verikoukis, C. HEC-BMAC: Hybrid Polling MAC Protocol for WBANs Operated by Human Energy Harvesting. Telecommun. Syst. 2015, 58, 111–124. [Google Scholar] [CrossRef]
  23. Esteves, V.; Antonopoulos, A.; Kartsakli, E.; Puig-Vidal, M.; Miribel-Catala, P.; Verikoukis, C. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs. Sensors 2015, 15, 12635–12650. [Google Scholar] [CrossRef] [PubMed]
  24. Kosunalp, S. MAC Protocols for Energy Harvesting Wireless Sensor Networks: Survey. Etri J. 2015, 37, 804–812. [Google Scholar] [CrossRef]
  25. Ramezani, P.; Pakravan, M. Overview of MAC Protocols for Energy Harvesting Wireless Sensor Networks. In Proceedings of the IEEE 26th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2015), Hong Kong, China, 30 August–20 September 2015; pp. 2032–2037. [Google Scholar] [CrossRef]
  26. Hadzi-Velkov, Z.; Nikoloska, I.; Karagiannidis, K.; Duong, T. Wireless Networks with Energy Harvesting and Power Transfer: Joint Power and Time Allocation. IEEE Signal Process. Lett. 2016, 23, 50–54. [Google Scholar] [CrossRef]
  27. Oueis, J.; Stanica, R.; Valois, F. Energy Harvesting Wireless Sensor Networks: From Characterization to Duty Cycle Dimensioning. In Proceedings of the 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2016), Brasilia, Brazil, 10–13 October 2016; pp. 183–191. [Google Scholar] [CrossRef]
  28. Nguyen, T.; Kahn, J.; Ngo, D. An Adaptive MAC Protocol for RF Energy Harvesting Wireless Sensor Networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM 2016), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  29. Kim, T.; Park, J.; Kim, J.; Noh, J.; Cho, S. REACH: An Efficient MAC Protocol for RF Energy Harvesting in Wireless Sensor Network. Wirel. Commun. Mob. Comput. 2017, 2017, 1–8. [Google Scholar] [CrossRef]
  30. Ha, T.; Kim, J.; Chung, J. HE-MAC: Harvest-Then-Transmit Based Modified EDCF MAC Protocol for Wireless Powered Sensor Networks. IEEE Trans. Wirel. Commun. 2018, 17, 3–16. [Google Scholar] [CrossRef]
  31. Sarang, S.; Drieberg, M.; Awang, A.; Ahmad, R. A QoS MAC Protocol for Prioritized Data in Energy Harvesting Wireless Sensor Networks. Comput. Netw. 2018, 144, 141–153. [Google Scholar] [CrossRef]
  32. Choi, H.; Shin, W. Harvest-until-Access Protocol Based on Slotted ALOHA for Wireless Powered Dense Networks. In Proceedings of the IEIE 18th International Conference on Electronics, Information and Communication (ICEIC 2019), Auckland, New Zealand, 22–25 January 2019; pp. 188–193. [Google Scholar]
  33. Choi, J.; Jain, M.; Srinivasan, K.; Levis, P.; Katti, S. Achieving Single Channel, Full Duplex Wireless Communication. In Proceedings of the ACM 16th Annual International Conference on Mobile Computing and Networking, New York, NY, USA, 20–24 September 2010; pp. 1–12. [Google Scholar] [CrossRef]
  34. Mahmood, N.; Ansari, I.; Berardinelli, G.; Mogenson, P.; Qaraqe, K. Analysing Self Interference Cancellation in Full Duplex Radios. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference (WCNC 2016), Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar] [CrossRef]
  35. Rom, R.; Sidi, M. Multiple Access Protocols—Performance and Analysis; Springer-Verlag: New York, NY, USA, 1990; ISBN 978-1-4612-7997-6. [Google Scholar]
  36. Raychauhuri, D.; Joseph, K. Performance Evaluation of Slotted ALOHA with Generalized Retransmission Backoff. IEEE Trans. Commun. 1990, 38, 117–122. [Google Scholar] [CrossRef]
  37. Jeong, D.; Jeon, W. Performance of an Exponential Backoff Scheme for Slotted-ALOHA Protocol in Local Wireless Environment. IEEE Trans. Veh. Technol. 1995, 44, 470–479. [Google Scholar] [CrossRef]
  38. Haas, Z.; Deng, J. On Optimizing the Backoff Interval for Random Access Schemes. IEEE Trans. Commun. 2003, 51, 2081–2090. [Google Scholar] [CrossRef]
  39. Liu, Q.; Li, P. Backoff Algorithm Optimization and Analysis for IEEE 802.15.4 Wireless Sensor Networks. In Proceedings of the 9th International Symposium on Communication Systems, Networks and Digital Sign (CSNDSP 2014), Manchester, UK, 23–25 July 2014; pp. 411–416. [Google Scholar] [CrossRef]
  40. Syed, I.; Roh, B. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs. Mob. Inf. Syst. 2016, 2016, 1–11. [Google Scholar] [CrossRef]
  41. Daley, D.; Vere-Jones, D. An Introduction to the Theory of Point Processes; Springer-Verlag: New York, NY, USA, 1988; ISBN 978-0-387-95541-4. [Google Scholar]
  42. Flint, I.; Lu, X.; Privault, N.; Niyato, D.; Wang, P. Performance Analysis of Ambient RF Energy Harvesting: A Stochastic Geometry Approach. In Proceedings of the 2014 IEEE Global Communications Conference (GLOBECOM 2014), Austin, TX, USA, 8–12 December 2014; pp. 1448–1453. [Google Scholar] [CrossRef]
  43. Sato, K. Lévy Processes and Infinitely Divisible Distributions; Cambridge University Press: Cambridge, UK, 1999; ISBN 978-0-521-55302-5. [Google Scholar]
  44. Çinlar, E. Introduction to Stochastic Processes; Prentice Hall: Upper Saddle River, NJ, USA, 1975; ISBN 978-0-134-98089-8. [Google Scholar]
Figure 1. Configuration of RF energy harvesting wireless sensor network.
Figure 1. Configuration of RF energy harvesting wireless sensor network.
Sensors 19 01822 g001
Figure 2. Time structure adopted by basic MAC scheme.
Figure 2. Time structure adopted by basic MAC scheme.
Sensors 19 01822 g002
Figure 3. Behavior of basic MAC scheme.
Figure 3. Behavior of basic MAC scheme.
Sensors 19 01822 g003
Figure 4. Harvest times, back-off times and transmission times.
Figure 4. Harvest times, back-off times and transmission times.
Sensors 19 01822 g004
Figure 5. Relation of V t m and W t m .
Figure 5. Relation of V t m and W t m .
Sensors 19 01822 g005
Figure 6. Total throughput with respect to expected back-off time.
Figure 6. Total throughput with respect to expected back-off time.
Sensors 19 01822 g006
Figure 7. Total throughput with respect to expected back-off time when harvest time is longer than transmission time.
Figure 7. Total throughput with respect to expected back-off time when harvest time is longer than transmission time.
Sensors 19 01822 g007
Figure 8. Total throughput with respect to expected back-off time when harvest time is shorter than transmission time.
Figure 8. Total throughput with respect to expected back-off time when harvest time is shorter than transmission time.
Sensors 19 01822 g008
Figure 9. Comparison of total throughputs achieved with and without taking back-off times.
Figure 9. Comparison of total throughputs achieved with and without taking back-off times.
Sensors 19 01822 g009
Figure 10. Total throughput and standard deviation with respect to shape parameter of Erlang distribution.
Figure 10. Total throughput and standard deviation with respect to shape parameter of Erlang distribution.
Sensors 19 01822 g010

Share and Cite

MDPI and ACS Style

Choi, C.W. Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization. Sensors 2019, 19, 1822. https://doi.org/10.3390/s19081822

AMA Style

Choi CW. Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization. Sensors. 2019; 19(8):1822. https://doi.org/10.3390/s19081822

Chicago/Turabian Style

Choi, Cheon Won. 2019. "Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization" Sensors 19, no. 8: 1822. https://doi.org/10.3390/s19081822

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop