Next Article in Journal
Optical Emission Detector Based on Plasma Discharge Generation at the Tip of a Multimaterial Fiber
Previous Article in Journal
Quantitative Analysis of EEG Power Spectrum and EMG Median Power Frequency Changes after Continuous Passive Motion Mirror Therapy System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Throughput and Energy Efficiency Scheme for Unlicensed Massive Machine Type Communications  †

by
Iran Ramezanipour
1,*,‡,
Hirley Alves
1,‡,
Pedro H. J. Nardelli
2,‡ and
Ari Pouttu
1,‡
1
Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland
2
School of Energy Systems, LUT University, 53850 Lappeenranta, Finland
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Ramezanipour, I., Nardelli, P. H., Alves, H., and Pouttu, A. Increasing the throughput of an unlicensed wireless network through retransmissions. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018. pp. 1–5.
These authors contributed equally to this work.
Sensors 2020, 20(8), 2357; https://doi.org/10.3390/s20082357
Submission received: 19 February 2020 / Revised: 29 March 2020 / Accepted: 18 April 2020 / Published: 21 April 2020
(This article belongs to the Section Communications)

Abstract

:
In this paper, the throughput and energy efficiency of an unlicensed machine type communications network is studied. If an outage event happens in the network, there is a possibility for packet retransmission in order to obtain a lower error probability. The concept of spectrum sharing is used here for modeling the network, which allows the two types of licensed and unlicensed users to share the same uplink channel allocated to the licensed users. However, it is done in a way that no harm is done to the licensed nodes’ transmission for sharing the same channel with the unlicensed users, while licensed nodes’ transmission causes interference on the unlicensed network. Poisson point process is used here to model the location of the nodes and the effect of interference on the network. We study how different factors such as the number of retransmissions, SIR threshold and outage can affect the throughput and energy efficiency of the network. Throughput and energy efficiency are also both studied in constrained optimization problems where the constraints are the SIR threshold and the number of retransmission attempts. We also show why it is important to use limited transmissions and what are the benefits.

Graphical Abstract

1. Introduction

Internet of things has revolutionized the way communication works and is slowly becoming a part of our daily lives. Many applications are currently becoming IoT based, from remotely controlling your house to different processes in an industrial setting [1]. Billions of devices are expected to join the Internet by the year 2020, which while providing a big economic impact, will also create new challenges such as the availability of spectrum resources [2,3]. This makes finding ways to efficiently use the spectrum more valuable than ever. Machine-type communications (MTC) is a non-human centric concept introduced under the umbrella of IoT for the future communications technology, 5G, which can support a high number of connectivity in the network and can provide different quality of services [4].
MTC can be divided into three categories based on the expected properties, (i) enhanced mobile broadband (eMBB); which should be able to provide connectivity with high peak rates in addition to moderate rates for the cell-edge users; (ii) ultra-reliable MTC (uMTC), which focuses on making ultra reliable and low latency connections in the networks possible and (iii) massive machine type communication (mMTC), whose main goal is to provide massive connectivity for a large number of nodes (in the order of 10 times higher than the current number of connected devices) with different quality of service (QoS) [5,6]. A mMTC network usually consists of billions of low-complexity low-power machine-type devices as nodes. A good example of this type of networks are smart grids where the data from a very large number of nodes (smart meters) needs to be collected [7,8,9]. Industrial control is also another application of mMTC. In both of these examples, the reliability level of the network needs to be high, and it also should be able to handle critical situations [10]. A very good recent study on why 5G and MTC are needed in order to achieve the expected performance in smart grids, specifically with regards to grid protection and control is done in [11]. Motivated by this, in our work, we focus on throughput optimization and energy efficiency in a mMTC network in the presence of retransmissions.
The spectrum resources are limited, and hence, the availability of spectrum is a never ending challenge for wireless communications. Considering that mMTC is going to connect billions of devices together, this notion is becoming even more challenging in the upcoming 5G networks. Thus, studying different ways to efficiently use the available spectrum is very important [8]. This is specifically important in the future 5G technology, specially mMTC, since suitable spectrum resources below 6 GHz are limited. Moreover, it is not really possible to use mmWave for mMTC applications since they are limited in terms of resources and are mostly implemented in locations where we could face propagation problems, such as indoor or underground locations [12].
Keeping all these in mind, spectrum sharing can provide useful tools which can help mMTC networks to use the spectrum more efficiently [13,14,15,16]. One of these methods is the unlicensed spectrum access, which is a suitable option for low-power IoT-based networks and is also the spectrum access method used in this paper. It should be noted that while the studied model here is based on the concept of cognitive radios and spectrum sharing, the focus is not on design and issues related to these networks but rather on evaluating different performance metrics important to these kinds of networks. Our analysis is motivated by the aforementioned lack of spectrum resources and better ways to use these limited resources and increase the spectral efficiency of the network.
A valuable study has been done in [17] where the authors study the energy grid as an important case of mMTC and propose and evaluate using the LTE network as a communication tool in these networks. Moreover, in [18,19], the previously mentioned unlicensed spectrum access model is studied, where the unlicensed users use the licensed nodes uplink channel too. In there, they show that the positions of the unlicensed users are fixed, which makes it reasonable to use highly directional antennas and limited transmit power in the unlicensed network in order to avoid interference from this network affecting the licensed network. However, this does not prevent the licensed nodes from causing interference on the unlicensed users. Since these works are limited to smart grids applications, later on we expanded these works in [20], by following the work done in [21,22], to make the model more generalized and compatible with other wireless networks. In [23], authors propose a spectrum sharing method for a MTC network in LTE with large number of nodes where simultaneous transmissions are possible. In this model, dynamic spectrum access is possible for a dense network with low data rates. The advantage of this model is that there is no need for signaling procedures that are going to need channel reservation. Moreover, in [24], authors introduce interesting new schemes which make implementing cognitive radio and spectrum sharing methods in smart gird applications easier. They also study a number of routing protocols and interference mitigation schemes related to smart grids. A valuable study has been done in [25] regarding the resource allocation in different spectrum sharing networks such as SINR-based, transmission power-based, and centralized and distributed methods of decision making. In [26], Liu et al. propose a novel multichannel IoT scheme for dynamic spectrum sharing in 5G networks. In their work, an IoT node is able to do two different types of communications at the same time, both 5G and IoT communications. This is done by allocating different sub-channels for these two communication modes.
All the above mentioned works have done great works with regards to addressing spectrum sharing in IoT and machine type communications; however, they do not aim at optimizing the performance of the system while having different reliability constraints, which is one of the main pillars of future 5G. In this paper, we expand one of the scenarios in our previously published work [27] and follow the same model as in [18,20,28] to prove that the approximation used in those papers for the average number of retransmission attempts is in fact a tight approximation. We show why it is worth to use limited number of retransmission, and optimize the throughput as a function of the SIR threshold and number of retransmissions. Moreover, we also study the energy efficiency of the proposed model in this paper. Energy efficiency is one of the most important issues that needs to be considered in wireless networks, specifically in ultra dense networks [29]. As was previously mentioned, mMTC networks are designed to support massive connectivity between billions of sensors and IoT devices with minimum human interactions [5], most of which are low powered. Most of theses devices are battery supplied, and hence, they have a limited energy supply (wireless sensor networks for instance). It also happens often that these mMTC networks are deployed in critical or hard to access locations, which makes changing the batteries and renewing the energy resources very difficult [30,31,32]. All these reinforce the importance of the energy efficiency in mMTC in general.
Valuable works have been done in the field of energy efficiency. In [33], authors study different challenges and metrics with regards to reducing the total power consumption of the network while in [34,35], maximizing the energy efficiency by optimizing the packet size and constrained by an outage threshold in non-cooperative and cooperative wireless networks is studied respectively. In [36], a new scheduling algorithm based on frame aggregation is proposed in order to achieve energy efficiency in IEEE 802.11n wireless networks. In terms of the physical properties of the battery equipped machine type devices, two interesting medium access control protocol and power scheduling schemes are proposed in [37,38] in order ro preserve battery life. Moreover in [39], Takeshi Kitahara et al. introduce a data transmission control method based on the well-known electrochemical characteristics of batteries, which makes increasing the discharge capacity possible.
While the above mentioned works are interesting and valuable, none of them really addresses the massive connectivity issue and how the energy efficiency needs to be handled in a mMTC network. In [40], the authors investigate access control algorithms for machine type nodes, which can reduce the energy consumption in the uplink channel. There, the machine type nodes access to the base station is maximized by means of grouping and coordinator selection. However, in this paper, we evaluate the energy efficiency of an unlicensed mMTC network and optimize the energy efficiency constrained by an outage threshold and maximum number of retransmissions. We also show the effect of different network parameters such as network density and the SIR threshold on the behavior of the energy efficiency.
The following are the main contributions of this paper.
  • We show how tight is the approximation used for the average number of retransmission attempts in our other work and the desired range that the approximation is valid for.
  • The maximum number of allowed retransmissions and the SIR threshold that leads to the maximum link throughput is studied.
  • The optimal throughput in the sense of spectral efficiency and the energy efficiency of the optimal throughput are also studied. Moreover, we show why it is important to have limited transmissions in the network and why it is beneficial to use our proposed optimal throughput model.
  • The effect of different network properties such as network density and the SIR threshold on the optimal throughput and the energy efficiency of the network are also studied.
The rest of the paper is divided as follows. Section 2 introduces the network model and how the Poisson point process is used to model the network and carry out the analysis, while Section 3 details the throughput optimization analysis. In Section 4, we study the energy efficiency and the energy efficiency of the optimal throughput. Section 5 presents the numerical results while Section 6 concludes this paper. Table 1 provides a list of functions and symbols used in this paper.

2. System Model

In order to do the throughput and energy efficiency analysis in this paper, we use a dynamic spectrum access network model, shown in Figure 1. The two types of nodes in this model, which are licensed and unlicensed nodes. These nodes share the same frequency band which is used by the licensed nodes in the uplink channel. This sharing is done in a way that the unlicensed users do not cause any interference on the licensed nodes. In this model, the licensed link is the one between the mobile users and the cellular base stations while the unlicensed link is what is used by the sensors to communicate with their corresponding aggregators. The unlicensed users are considered to be static, which would make use of directional antennas with restricted radiation pattern; hence, the orientation errors could be avoided.
We assume here the ideal case, where the beam can be modeled as a straight line. Although this is a strong assumption, it can be seen as the theoretical limit of this scheme. A more realistic beam with orientation errors has been studied, for example, in [41] where Wildman et al. study different trade offs regarding the network throughput and transmission capacity with changes in the antenna beamwidth. In that paper, the authors study an ad hoc network implemented using bipolar Poisson point process and use stochastic geometry in order to analyze the optimal beamwidths that maximize different throughput-based metrics, including the orientation errors. They have shown that in case of having a fixed transmit power, decreasing the beamwidth will increase the antennas main beam gain, which in its turn will result in lower interference from the interfering nodes on the receiver. In such situation, aligning the transmitter and receiver appropriately would be more challenging; however, when they are aligned, it will result in an increase in the desired signal strength.
In this paper, we do not consider how the link between sensor and aggregator is formed since the unlicensed network has a fixed topology. In this model, only the typical link in the unlicensed network suffers from the interference caused by the uplink licensed network. The licensed network, on the other hand, is highly mobile in the sense that the topology of active transmitters change at every transmission attempt of the unlicensed network. Hence, we have the following assumptions to evaluate our scenario:
  • Unlicensed network: We assume only a reference link, which is fixed and associated with a specific gateway/base-station/aggregator.
  • Licensed network: This is not evaluated in this work. We only assume that at every transmission attempt by the unlicensed reference link, there is a random number of active users in the licensed network with a random relative position in relation to the aggregator node (thus, we can model the positions of the active transmitters of the licensed network in respect to the reference aggregator of the unlicensed as a Poisson Point Process).
The power used by the unlicensed users for their transmission is limited. This limitation which is either imposed on them from the licensed network or comes from sensors own properties, restricts the maximum range that the unlicensed network transmitted signal can reach. This means that the unlicensed users radiation patterns can be considered as a line segment in which the starting points are these nodes, and the end point is determined by the power constraint. Moreover, it is assumed that in this model, there are no packet collisions between the transmitted packets by the sensors to the same aggregator. This is justifiable since the packet size in these transmissions is assumed to be small and the unlicensed network can take advantage of the multiple access solutions. Another important aspect that should be considered in this model is that before the unlicensed users use the licensed nodes channel, they first evaluate the channel usage and then do their transmission if they sense the channel is free; otherwise, they have to postpone their transmission or use another frequency band [42,43].
Considering the above explanations, we can see that the interference in this model can stem from the following different sources, (i) from the mobile users to aggregators, (ii) from sensors to cellular base stations and (iii) from sensors to aggregators that they are not communicating with. Taking into account the aforementioned system model assumptions, it is possible to conclude that if the licensed and unlicensed nodes are implemented in explicit positions, it makes it possible to eliminate the interferences in cases (ii) and (iii).
Following [18,27], we assume that (iii) can be eliminated by a specific access policy since the links between sensors and aggregator are deterministic (each sensor is assumed to be connected with one specific and known aggregator). Therefore, the aggregator can allocate orthogonal channels or different time slots to each sensor. Besides, due to the narrow beam and limited transmit power, the interference from sensors related to different aggregators can be neglected. Even if it is assumed that the nodes are implemented in random locations, the probability of having the base station or aggregator in the same line segment as the unlicensed users signal is close to zero [18,20,28]. As follows, the only source of interference in this model is then (i). In order to be able to evaluate the impact of this interference on the system performance, we need to be able to have a good understanding of the uncertainty of the licensed nodes’ locations. Hence, a Poisson point process Φ is used to model the interfering nodes distributed over an infinite two-dimensional plane where λ > 0 (average number of nodes per m2) denotes the spatial density. This model is also elaborated in detail in [20,44].
For modeling the wireless channel in this paper, we consider distance dependent path-loss and quasi-static fading model. Here, r i represents the distance between the reference receiver and the i-th interfering node. Based on Slivnyak theorem [44], the reference receiver being located arbitrarily at the origin means that the receiver’s position is at the center of the Euclidean space. Having this location as a fixed point makes locating the surrounding elements easier [27,44]. More detailed explanation about using this tool in modeling mMTC networks and why it is useful can be found in [45,46]. The channel gain between the reference receiver and the i-th interfering node is shown as g i . If we consider P T x to be the transmit power and α > 2, the path-loss exponent, then the power received at the reference receiver is equivalent to P T x g i r i α . With these in hand, the signal to interference ratio at the reference receiver SIR0 Signal-to-interference-plus-noise ratio (SINR) is defind as SINR = S N + I where S denotes the desired signal power and N and I the noise power and interference power, respectively; however, in interference limited scenarios such as the one studied in this paper, where noise can be neglected, the SINR is reduced to signal-to-interference ratio (SIR) [44].) is then defined as:
SIR 0 = P s g 0 r 0 α P p i Φ g i r i α ,
in which, P p denotes the licensed nodes transmit power and P s is the transmit power used by the unlicensed users for their transmissions. (Note that noise is not considered in this analysis, even if it is considered, adding noise would not have much effect on the output as also stated in [47].) The data rate in this model is defined as log ( 1 + β ) in bits/s/Hz. This is justifiable since the reference link takes advantage of point-to-point Gaussian codes and interference-as-noise decoding rules [20,48,49]. This spectral efficiency can only be achieved if the SIR is greater than a given threshold, which here is defined as β , i.e., SIR > β . An outage event happens if a transmitted message is not successfully decoded at the receiver side, meaning that SIR β . The probability of the system being in outage is P out = Pr [ SIR < β ] . In this model, there is possibility of retransmission in case an outage event occurs. There can be up to m retransmissions in the network; hence, if the message is not successfully decoded by the receiver after 1 + m transmission attempts (first transmission plus m retransmissions), it is then dropped [21], which will result in packet loss. Here, P suc is used to refer to the probability of having a successfully decoded message and is P suc = 1 P out 1 + m .
In order to compute P out , the previously mentioned channel gains g are considered to be quasi-static (squared envelopes), which are also independent and identically distributed exponential random variables (Rayleigh fading) with mean 1 [41]. In this model, the licensed nodes, which are also the source of interference, are not static but rather highly dynamic. Therefore, we consider that their locations with respect to the reference receiver are constantly changing during each transmission. Considering a Poisson point process Φ , it is possible to characterize the signal-to-interference ratio at the reference link SIR0 as in [20]. Then, the outage probability P out = Pr SIR 0 β for each transmission attempt is as presented below (we assume that the distance r o is fixed (but arbitrary) due to the fixed topology we assumed for the unlicensed network. However, this assumption could be easily relaxed following Nardelli et al. work [50] by taking the expected value of the performance metric under investigation in relation to the distribution of r o .) where k = π r 0 2 Γ 1 2 α Γ 1 + 2 α [20].
P out = 1 e k λ β 2 / α .
We are now able to evaluate the link throughput T in the reference link as:
T = log ( 1 + β ) 1 + m ¯ 1 P out 1 + m ,
It should be noted that in this throughput equation, m shows the retransmissions attempts whereas 1 + m ¯ is the average number of transmissions for a successful transmission. Further details shall be seen in Section 3. As stated above, 1 P out 1 + m is the probability of having a successful transmission.

3. Throughput Optimization

3.1. Constrained Optimization

In this section we evaluate the optimal link throughput in the sense of spectral efficiency. We consider a constrained throughput optimization problem where the constraint is a maximum acceptable error rate imposed by the application at hand. This means that the quality requirement of this network is determined by how often a message is eventually dropped after all retransmission attempts. Considering (3), the optimization problem is defined as below.
max ( β , m ) log ( 1 + β ) 1 + m ¯ 1 P out 1 + m subject to P out 1 + m ϵ , .
where ϵ represents the aforementioned quality requirement. In this equation, the SIR threshold β > 0 and the number of allowed retransmissions m N are the design variables.
Lemma 1.
The throughput T in (3) is a function of the variables m > 0 and β > 0 , i.e., T = f ( β , m ) . The function f is then concave with respect to β if 2 T β 2 < 0 . After that, we can calculate β * , which is the value of the SIR threshold that maximizes the link throughput.
β * = 1 k λ log 1 ϵ 1 m + 1 α 2 .
Proof. 
As m and β are strictly positive variables, and function T is twice differentiable in terms of β , then T is concave if and only if 2 T β 2 < 0 . Based on our calculations, we can see below that the second derivative of the throughput equation is in fact negative with respect to β . Hence, in the region 2 T β 2 < 0 , T is concave.
2 T β 2 = ϵ + 1 ϵ 1 m + 1 + 1 ϵ m + 1 + 1 β + 1 2 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 ,
Knowing this, we can now calculate β * . To do so, we follow the same steps as in ([18], Prop.1) where β * is the highest value that satisfies the inequality 1 P s u c ϵ , thus β * , which is presented as (5).
With this result at hand, we move forward as follows. The constraint in the optimization problem is P out 1 + m ϵ . By considering the equality part P out 1 + m = ϵ in addition to ([51], §17), we reach the below equation for the average number of retransmission attempts 1 + m ¯ :
1 + m ¯ = ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 ϵ + 1 ϵ 1 m + 1 + 1 .
By inserting (2) and (7) into (3), we reach the following as the throughput equation.
T = log β + 1 ϵ + 1 ϵ 1 m + 1 + 1 ϵ m + 1 + 1 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 .
 □
m * = max m N α ϵ 1 m + 1 1 k log ϵ 1 m + 1 + 1 α 2 ϵ + 1 ϵ m + 1 + 1 log ϵ 2 m + 1 2 1 k log ϵ 1 m + 1 + 1 α 2 + 1 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 log ϵ 1 m + 1 + 1 + ϵ 1 m + 1 ϵ + 1 ϵ m + 1 + 1 log ϵ log 1 k log ϵ 1 m + 1 + 1 α 2 + 1 m + 1 2 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 ϵ m + 1 log ϵ log 1 k log ϵ 1 m + 1 + 1 α 2 + 1 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 ϵ + 1 ϵ 1 m + 1 + 1 + log 1 k log ϵ 1 m + 1 + 1 α 2 + 1 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1 2 ϵ + 1 ϵ 1 m + 1 + 1 ϵ m + 1 + 1 × ϵ ϵ 1 m + 1 m + 1 log ϵ + ϵ ϵ 1 m + 1 + 1
Proposition 1.
The maximum number of allowed retransmissions m * that maximizes the link throughput is then given by (9).
Proof. 
By taking into account the β * from (5) and (8), we can find the optimal maximum number of retransmissions ( m * ) for the throughput. Hence, the optimal throughput T * in terms of both m and β is then given by the value of m that maximizes the throughput, which is achieved by (9). It should be noted that the maximum number of retransmissions m is a natural number that is usually small and, therefore, (9) is easy to evaluate.  □

3.2. Extreme Cases

In this section, we evaluate the two extreme cases in terms of maximum number of transmissions and their effect on the throughput. To do so, we consider having no transmission m = 0 and having a very high number of retransmissions m in the network. Considering the zero transmission case (A detailed analysis of the model studied in this paper while m = 0 can be found in our previous work [18].), we reach the following for the throughput:
T = log ( 1 + β ) 1 ϵ 1 m + 1 = log ( 1 + β ) 1 P out = log ( 1 + β ) e k λ β 2 / α .
Moving on to the m case, by replacing ϵ = P out ( 1 + m ) in (7), we reach the below equation for the average number of retransmissions for the extreme cases ( 1 + m ¯ e ):
1 + m ¯ e = P out ( 1 + m ) ( 1 + m ) ( P out 1 ) P out ( 1 + m ) + 1 ( P out 1 ) ( P out ( 1 + m ) 1 ) ,
now by inserting (11) in (3), we can achieve the throughput equation in this case. After some mathematical manipulation, it is proven that while m , we reach the same throughput equation as in (10). Hence, for both extreme cases of m = 0 and m , the system behavior remains the same in terms of throughput. We later use these results in the numerical results section of this paper and discuss what they show and why they are important. More details about these two extreme cases can also be found in [52].

3.3. Error Analysis

In our previous work, we can see that in ([20], Lemma 2), we use an approximation of (7) (which is also shown in this paper as (12)) presented in this analysis in order to calculate the average number of retransmissions in the throughput optimization problem in [20]. In this section we aim to prove that this previously used approximation is in fact a tight and good approximation, and the error in calculations is low when using the approximated expression. It is important to remember that this approximation is suitable when the number of transmissions is not large and also ϵ < 40%, which is the case in most of practical communications anyway since having a very large m is not efficient, and 40% is already a quite a loose error threshold for most systems.
In Figure 2 and Figure 3, we can see how (7) and ([20], §6) compare to each other with respect to increasing the number of retransmissions and outage threshold, respectively. From these figures, we confirm our previous claims and show the accuracy of the approximated expression. In these figures, the previously mentioned fact about ([20], §6) being suitable for low m and ϵ is also proven. It is shown that in both figures, the approximated and the original 1 + m ¯ are either the same or very close to each other in the mentioned areas.
Moving on, we analyze the error between 1 + m ¯ a p p and 1 + m ¯ o r g as:
1 + m ¯ a p p = n = 0 m P out n 1 P out 1 + m 1 P out 1 ϵ 1 ϵ 1 1 + m .
E r r o r = | ( 1 + m ¯ a p p ) ( 1 + m ¯ o r g ) ( 1 + m ¯ o r g ) |
where ( 1 + m ¯ a p p ) is ([20], Equation (6)) and ( 1 + m ¯ o r g ) is (7). Figure 4 shows this error as a function of number of retransmissions while Figure 5 shows how the error changes as a function of the outage threshold. We can see that as expected, the error increases when m or ϵ get larger. It is also shown that the increase in ϵ has a bigger impact on increasing the error. In Figure 4, when we have strict outage threshold in the network, increasing m does not increase the error much. However, as the outage threshold gets looser, increasing m results in higher error and we can see that for ϵ = 0.1 , error can even reach 20%. This is also true for Figure 5 where the highest error happens when both m and ϵ are high, further proving the point that the approximation is tight only for low m and ϵ .

4. Energy Efficiency

After the throughput optimization, we are now moving on to the energy efficiency (EE) optimization problem. This is important specially since the energy efficiency can be seen as a tool that represents the trade-off between the throughput and the total energy consumption per bit ( P T ) in a network. The total energy consumption per bit in the network is itself a function of the distance dependent transmission power, total energy consumed by the radio components and bit rate [28,31,53,54]. Having this in mind, the total energy consumption per bit of this model is calculated as:
P T = k = 1 m + 1 P P A ( k ) + P T x + P R x log ( 1 + β * ( k ) ) .
In the above equation, P P A is the power consumed by the power amplifier in an one-hop communication network. This consumed power is itself a function of the drain efficiency parameter of the amplifier. This parameter is shown by δ and is δ = 0.35 , and hence, P P A = β * ( k ) δ . As it was also mentioned earlier, β * is the optimal SIR threshold and log ( 1 + β * ) represents the bit rate (bits/s/Hz) of the network. P T x is the power consumed for the transmission, which is constant, and P T x = 97.9 mW while P R x is the consumed power during reception, and is P R x = 112.2 mW [31]. It should be noted that both of these parameters are constant since their value depends on the current technology and also on the internal circuitry power consumption. Thus, by inserting (8) and (14) into the energy efficiency equation, which is T P T , we can express the energy efficiency of our system as:
EE = T P T = log ( 1 + β ) ( 1 ϵ ( 1 + m ) ) ( 1 + m ¯ ) ( β * δ + P T ) ,
The energy efficiency optimization problem is then:
max ( β , m ) log ( 1 + β ) ( 1 ϵ ( 1 + m ) ) ( 1 + m ¯ ) ( β * δ + P T ) subject to P out 1 + m ϵ ,
which like throughput, is also a function of SIR threshold β > 0 and the number of allowed retransmissions m N . The energy efficiency equation in (16) is concave with respect to β if 2 E E β 2 < 0 , and (17) obtained for 2 E E β 2 proves that this in fact is true and the energy efficiency is concave with respect to β . Energy efficiency is also concave with respect to m, but since the obtained expression is long and complicated, we show this concavity and the optimal throughput in the numerical results section of this paper.
2 E E β 2 = ϵ + 1 ϵ 1 m + 1 + 1 ϵ m + 1 + 1 β + 1 2 p c + 1 η 1 k log ϵ 1 m + 1 + 1 α 2 ϵ ϵ 1 m + 1 + 1 m + 1 ϵ + 1

5. Numerical Results

In this section, we present the numerical results for the previously studied optimal throughput T * and energy efficiency E E . It is important to mention that to obtain these results, the following arbitrary parameters where considered in our simulations. The distance between the reference receiver and sensor r 0 = 1 and path-loss exponent α = 4 ; the required error rate ϵ and the density of interferers λ are the input parameters that their effects are analyzed. Moreover, based on [31], P T x = 97.9 mW, P R x = 112.2 mW and δ = 0.35 were considered.
Figure 6 shows how the throughput behaves as a function of the maximum number of retransmissions in with different network densities. In this plot, we consider ϵ = 0.02 in order to show how tight the previously mentioned approximation is. If Figure 6 in this paper is compared with ([20], Figure 3), we can see that the two plots are almost identical since here we have strict outage threshold in the network, which is the area where the approximation works well.
It is shown that in Figure 6, as the number of allowed retransmissions increases, the link throughput also improves until the point at which the throughput stars decreasing. This is true for different network densities as well. By increasing m, the system experiences a twofold effect which results in the trade-off. This effect can be explained since by increasing m we are allowing for also higher values of β , which also means having higher spectral efficiency in each transmission attempt (higher log ( 1 + β ) ). However, by doing so, we are also increasing the outage probability since this reduces the chance of a message being correctly decoded in a single transmission attempt. In order to capture these trade-offs, we have the studied constrained optimization, whose solutions are m * and β * , which results in the optimal throughput T * , which represents the maximum points shown in Figure 6.
Figure 7 represents the optimal throughput as a function of the network density for 5 different cases. First, we can see that for the stricter outage threshold range, the optimal throughput obtained by the optimization problem in this paper is the same as the one in ([20], Figure 4), which again proves how precise the approximation is (It is important to mention that different scales for the plots are used in the two papers. In ([20], Figure 4), the linear scale is used in order to plot the optimal throughput whereas in Figure 7 in this paper, logarithmic is used, hence, the difference seen between the two plots.). Moreover, we can see how the optimal throughput decreases as λ increases. Since λ is an indicator of the number of active transmitters, i.e., source of interference in the network, it is understandable that as it increases, the throughput decreases since the unlicensed network experiences a higher level of interference from the licensed nodes.
As it was proven in Section 3.2, both extreme cases of having zero and a very large number of retransmissions will result in the same throughput. It can also be seen in Figure 7 that the optimal throughput obtained from both of these cases is also the same. One interesting notion to consider in this plot is that, when the packet error threshold is loose ( ϵ = 0.1 ), even though the number of retransmissions is not as large as m , the system outperforms the other cases. In cases with limited transmissions and strict outage threshold ( ϵ = 0.001 , ϵ = 0.01 ), this is understandable because the stricter the error is, the worse the throughput gets, and in these cases, we are fixing the number of retransmissions to lead to the outage probability that maximizes the throughput via β . Compared to the other two extreme cases. Moreover, when m = 0 , we are forcing the system to have zero retransmissions in which the β would be high, and as it was shown, having higher SIR threshold would result in high outage probability as well, which will decrease the throughput. As for the m , we are optimizing in terms of an error probability of 0; in other words, we are basically forcing the packet loss probability to be zero, and hence, we are losing spectral efficiency since infinite retransmissions will use a lot more spectrum resources which results in the worse throughput compared to ϵ = 0.1 .
In both of these extreme cases, we are taking the system degree of freedom away in terms of retransmissions and packet loss, which in the former would result in high packet loss probability and in the latter in a very high delay. On the other hand, in the proposed throughput optimization problem (4), where the outage probability and number of retransmissions are the designed variables, we are in fact relaxing the two very tight constraints that were considered in the two extreme cases, giving back the system’s degree of freedom of having a certain arbitrary level of outage while also benefiting from retransmissions in case an outage event happens. The delay of this network would be much lower than the m 0 and although the packet loss probability would not be zero, having limited retransmission would not only reduce that but would also result is the same or even higher system throughput compared to the case where m = 0 which proves the benefits and importance of the optimized throughput problem studied in this paper.
Moving on to the energy efficiency analysis, EE is shown in Figure 8, Figure 9 and Figure 10 as a function of network density, SIR threshold and number of retransmissions, respectively. As can be seen in Figure 8, EE faces a decrease after some point when λ increases. When the nodes are sparsely located in the network, the level of interference is low but a lot of power is also used to transfer a message between nodes, hence EE is low. As λ gets higher, meaning that the nodes are getting closer to each other, the EE improves since less power is used for the transmission while interference is still low and the transmission is affected only by path loss. However, when the network gets very dense, the level of interference gets so high that in order to prevent outage, a lot of power should again be used for transmissions, which will cause the decrease in energy efficiency after some point in the plot.
It should be noted that when λ is low, the scenario with the loosest outage threshold has the lowest energy efficiency because the SIR in this case is lower compared to the other cases; however, when the network gets denser, the interference level rises, which would eventually decrease the throughput, and hence, the loosest outage threshold would result in the highest energy efficiency since there is more room allowed for having outage and less power is used to do the transmission in the presence of the interference. Although having a denser network also means having a higher level of interference, when there is room for higher levels of outage, less retransmissions are also needed in order to meet the reliability requirements of the network, and hence, less transmission power is used. All of these would eventually result in the system being more energy efficient in the presence of loose outage threshold in a dense network.
Figure 9 shows how EE performs as the SIR threshold gets larger while having different network densities. As β increases, it means that the throughput is also increasing, even though power consumption is also increasing at the same time. The rate at which the throughput is increasing is higher, and thus, the energy efficiency also improves during this time. This however means that the outage events are also increasing, which will decrease the throughput and eventually EE will also decrease. That is why we see the maximum point in Figure 9. Moreover, we can see that the denser the network is, the more energy efficient it is. This is due to the fact that while nodes being close to each other means higher interference, less power is used for the transmission since the distances are smaller in denser networks. This figure also shows that the energy efficiency is concave in terms of β , which was also proven in the EE optimization problem.
Moreover, the effect of increasing the number of retransmissions on EE with different network densities can be seen in Figure 10. While λ is low, lower numbers of retransmission are needed for a successful message delivery, and therefore, the energy efficiency is higher in less dense networks. As the number of retransmissions increases, we can see that while the overall EE starts to decrease, denser networks become more energy efficient as well. The reason behind this is that in networks with high λ , less power is used per each retransmission attempt to send the message since the distance between the nodes is smaller. Therefore, although the interference is higher, using less transmit power makes the network more energy efficient.
In Figure 11 we can see the behavior of the optimal energy efficiency while λ and outage threshold level is increasing. As it was shown earlier, due to the previously explained reasons, the energy efficiency is concave with respect to λ meaning that while increasing at first, it starts decreasing after a certain density of interferers is met in the network. Hence, it is understandable that the same thing is happening in the case of optimal energy efficiency as well. It is also shown in this figure that while the scenarios when the outage threshold is somewhat strict in the network ( ϵ = 0.001 , ϵ = 0.001 ), E E * is almost the same, and the difference is negligible. However, when the outage threshold gets loose ( ϵ = 0.1 ) the optimal throughput that the system can attain is slightly higher than the other two cases. The crossing point between these cases can also be explained the same way as described in Figure 8.

6. Discussion and Final Remarks

In this paper, we studied the throughput and energy efficiency of a network where licensed and unlicensed nodes share the same frequency band that is used by the licensed nodes for their transmission. The interference in this model comes from the licensed network on the unlicensed users. There is also the possibility of retransmissions in case the transmitted message is not successfully decoded at the receiver. We studied the optimal throughput in a constrained optimization problem where the interferers locations are modeled using Poisson point process. We then derived the value of the optimal number of retransmissions and SIR threshold that jointly result in the optimal throughput. We showed how increasing the number of nodes and the outage threshold can decrease and increase the optimal throughput respectively and how these cases compared to the two extreme cases of having zero and infinite numbers of retransmissions in the network. It should be mentioned that the “uncoordinated” nature (ALOHA-like) of our proposed solution leads to lower throughput while using time-division or frequency-division in order to make the communication orthogonal would improve the situation. We also studied the optimal energy efficiency and how it also decreases by increasing the number of nodes and gets better by having a looser outage threshold. The energy efficiency behavior with respect to network density, SIR threshold and the number of retransmissions was also studied. In addition to the above results, we also show that the approximation used in our previous work for the average number of retransmissions is very precise and has very low error in the range. It should be noted that in this paper, we did not consider the block length since the analysis is intricate and would add to the complexity of the analysis; however, this important notion will be part of our future work.

Author Contributions

Conceptualization, I.R., H.A., and P.H.J.N.; methodology, I.R.; software, I.R.; validation, I.R., H.A. and P.H.J.N.; formal analysis, I.R.; investigation, I.R.; resources, I.R., H.A., P.H.J.N. and A.P.; writing—original draft preparation, I.R.; writing—review and editing, I.R., H.A., P.H.J.N. and A.P.; supervision, H.A., P.H.J.N. and A.P.; project administration, A.P.; funding acquisition, A.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work is partially supported by Strategic Research Council/Aka BCDC Energy (Grant no. 292854), and the Academy of Finland 6Genesis Flagship (Grant no. 318927) and EE-IOT (grant no. 319008).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cerwall, P.; Jonsson, P.; Möller, R.; Bävertoft, S.; Carson, S.; Godor, I. Ericsson mobility report. On the Pulse of the Networked Society. Hg. v. Ericsson. Available online: https://edna.iea-4e.org/files/otherfiles/0000/0438/11_-_Ericsson_Mobility_Report_-_Patrik_Cerwall.pdf (accessed on 21 April 2020).
  2. Manyika, J.; Chui, M.; Bisson, P.; Woetzel, J.; Dobbs, R.; Bughin, J.; Aharon, D. Unlocking the Potential of the Internet of Things; McKinsey Global Institute: Washington, DC, USA, 2015. [Google Scholar]
  3. Perera, C.; Liu, C.H.; Jayawardena, S.; Chen, M. A survey on internet of things from industrial market perspective. IEEE Access 2014, 2, 1660–1679. [Google Scholar] [CrossRef]
  4. Ali, A.; Hamouda, W.; Uysal, M. Next generation m2m cellular networks: Challenges and practical considerations. IEEE Commun. Mag. 2015, 53, 18–24. [Google Scholar] [CrossRef] [Green Version]
  5. Popovski, P.; Trillingsgaard, K.F.; Simeone, O.; Durisi, G. 5g wireless network slicing for embb, urllc, and mmtc: A communication-theoretic view. IEEE Access 2018, 6, 55765–55779. [Google Scholar] [CrossRef]
  6. Dawy, Z.; Saad, W.; Ghosh, A.; Andrews, J.G.; Yaacoub, E. Toward massive machine type cellular communications. IEEE Wirel. Commun. 2017, 24, 120–128. [Google Scholar] [CrossRef]
  7. Bockelmann, C.; Pratas, N.; Nikopour, H.; Au, K.; Svensson, T.; Stefanovic, C.; Popovski, P.; Dekorsy, A. Massive machine-type communications in 5g: Physical and mac-layer solutions. IEEE Commun. Mag. 2016, 54, 59–65. [Google Scholar] [CrossRef] [Green Version]
  8. Nielsen, J.J.; Madueño, G.C.; Pratas, N.K.; Sørensen, R.B.; Stefanovic, C.; Popovski, P. What can wireless cellular technologies do about the upcoming smart metering traffic? IEEE Commun. Mag. 2015, 53, 41–47. [Google Scholar] [CrossRef] [Green Version]
  9. Niyato, D.; Lu, X.; Wang, P. Machine-to-machine communications for home energy management system in smart grid. IEEE Commun. Mag. 2011, 49, 53–59. [Google Scholar] [CrossRef]
  10. Durisi, G.; Koch, T.; Popovski, P. Toward massive, ultrareliable, and low-latency wireless communication with short packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef] [Green Version]
  11. Hovila, P.; Syväluoma, P.; Kokkoniemi-Tarkkanen, H.; Horsmanheimo, S.; Borenius, S.; Li, Z.; Uusitalo, M. 5g networks enabling new smart grid protection solutions. In Proceedings of the CIRED 2019, Madrid, Spain, 3–6 June 2019. [Google Scholar]
  12. Sharma, S.K.; Wang, X. Towards massive machine type communications in ultra-dense cellular IoT networks: Current issues and machine learning-assisted solutions. IEEE Commun. Surv. Tutor. 2019, 22, 426–471. [Google Scholar] [CrossRef] [Green Version]
  13. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  14. Akyildiz, I.F.; Lee, W.-Y.; Vuran, M.C.; Mohanty, S. Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Comput. Netw. 2006, 50, 2127–2159. [Google Scholar] [CrossRef]
  15. Cormio, C.; Chowdhury, K.R. A survey on mac protocols for cognitive radio networks. Ad Hoc Netw. 2009, 7, 1315–1329. [Google Scholar] [CrossRef]
  16. Darsena, D.; Gelli, G.; Verde, F. An opportunistic spectrum access scheme for multicarrier cognitive sensor networks. IEEE Sens. J. 2017, 17, 2596–2606. [Google Scholar] [CrossRef]
  17. Madue no, G.C.; Nielsen, J.J.; Kim, D.M.; Pratas, N.K.; Stefanović, Č.; Popovski, P. Assessment of lte wireless access for monitoring of energy distribution in the smart grid. IEEE J. Sel. Areas Commun. 2016, 34, 675–688. [Google Scholar] [CrossRef] [Green Version]
  18. Nardelli, P.H.; de Castro Tomé, M.; Alves, H.; de Lima, C.H.; Latva-aho, M. Maximizing the link throughput between smart meters and aggregators as secondary users under power and outage constraints. Ad Hoc Netw. 2016, 41, 57–68. [Google Scholar] [CrossRef] [Green Version]
  19. Tomé, M.C.; Nardelli, P.H.; Alves, H.; Latva-aho, M. Joint sampling-communication strategies for smart-meters to aggregator link as secondary users. In Proceedings of the 2016 IEEE International Energy Conference (ENERGYCON), Leuven, Belgium, 4–8 April 2016; pp. 1–6. [Google Scholar]
  20. Ramezanipour, I.; Nardelli, P.H.; Alves, H.; Pouttu, A. Increasing the throughput of an unlicensed wireless network through retransmissions. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
  21. Nardelli, P.H.; Kaynia, M.; Cardieri, P.; Latva-aho, M. Optimal transmission capacity of ad hoc networks with packet retransmissions. IEEE Trans. Wirel. Commun. 2012, 11, 2760–2766. [Google Scholar] [CrossRef]
  22. Nardelli, P.H.; Kountouris, M.; Cardieri, P.; Latva-Aho, M. Throughput optimization in wireless networks under stability and packet loss constraints. IEEE Tran. Mob. Comput. 2014, 13, 1883–1895. [Google Scholar] [CrossRef]
  23. Beyene, Y.; Malm, N.; Kerttula, J.; Zhou, L.; Ruttik, K.; Jäntti, R.; Tirkkonen, O.; Bockelmann, C. Spectrum sharing for MTC devices in LTE. In Proceedings of the 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Stockholm, Sweden, 29 September–2 October 2015; pp. 269–270. [Google Scholar]
  24. Khan, A.A.; Rehmani, M.H.; Reisslein, M. Cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms, and networking protocols. IEEE Commun. Surv. Tutor. 2015, 18, 860–898. [Google Scholar] [CrossRef]
  25. Tsiropoulos, G.I.; Dobre, O.A.; Ahmed, M.H.; Baddour, K.E. Radio resource allocation techniques for efficient spectrum access in cognitive radio networks. IEEE Commun. Surv. Tutor. 2014, 18, 824–847. [Google Scholar] [CrossRef]
  26. Liu, X.; Jia, M.; Zhang, X.; Lu, W. A novel multichannel Internet of things based on dynamic spectrum sharing in 5G communication. IEEE Internet Things J. 2018, 6, 5962–5970. [Google Scholar] [CrossRef]
  27. Ramezanipour, I.; Nouri, P.; Alves, H.; Nardelli, P.H.; Souza, R.D.; Pouttu, A. Finite blocklength communications in smart grids for dynamic spectrum access and locally licensed scenarios. IEEE Sens. J. 2018, 18, 5610–5621. [Google Scholar] [CrossRef] [Green Version]
  28. Ramezanipour, I.; Nardelli, P.H.; Alves, H.; Pouttu, A. Energy efficiency of an unlicensed wireless network in the presence of retransmissions. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018. [Google Scholar]
  29. Osseiran, A.; Boccardi, F.; Braun, V.; Kusume, K.; Marsch, P.; Maternia, M.; Queseth, O.; Schellmann, M.; Schotten, H.; Taoka, H.; et al. Scenarios for 5g mobile and wireless communications: The vision of the metis project. IEEE Commun. Mag. 2014, 52, 26–35. [Google Scholar] [CrossRef]
  30. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  31. De Oliveira Brante, G.G.; Kakitani, M.T.; Souza, R.D. Energy efficiency analysis of some cooperative and non-cooperative transmission schemes in wireless sensor networks. IEEE Trans. Commun. 2011, 59, 2671–2677. [Google Scholar] [CrossRef]
  32. Vardhan, S.; Wilczynski, M.; Portie, G.; Kaiser, W.J. Wireless integrated network sensors (wins): Distributed in situ sensing for mission and flight systems. In Proceedings of the Aerospace Conference Proceedings, 2000 IEEE, Big Sky, MT, USA, 25 March 2000; Volume 7, pp. 459–463. [Google Scholar]
  33. Hasan, Z.; Boostanimehr, H.; Bhargava, V.K. Green cellular networks: A survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 2011, 13, 524–540. [Google Scholar] [CrossRef] [Green Version]
  34. Wang, S.; Nie, J. Energy efficiency optimization of cooperative communication in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2010, 2010, 1–8. [Google Scholar] [CrossRef] [Green Version]
  35. Sadek, A.K.; Yu, W.; Liu, K. On the energy efficiency of cooperative communications in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2009, 6, 5. [Google Scholar] [CrossRef]
  36. Zhihui, G.; Anzhong, L.; Taoshen, L. Eefa: Energy efciency frame aggregation scheduling algorithm for ieee 802.11 n wireless network. China Commun. 2014, 11, 19–26. [Google Scholar] [CrossRef]
  37. Ma, C.; Yang, Y. A battery aware scheme for energy efficient coverage and routing in wireless mesh networks. In Proceedings of the GLOBECOM’07 2007 Global Telecommunications Conference, Washington, DC, USA, 26–30 November 2007; pp. 1113–1117. [Google Scholar]
  38. Jayashree, S.; Manoj, B.; Murthy, C.S.R. A battery aware medium access control (bamac) protocol for ad hoc wireless networks. In Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, Barcelona, Spain, 5–8 September 2004; Volume 2, pp. 995–999. [Google Scholar]
  39. Kitahara, T.; Nakamura, H. A data transmission control to maximize discharge capacity of battery. In Proceedings of the 2008 Wireless Communications and Networking Conference, WCNC 2008, Las Vegas, NV, USA, 31 March–3 April 2008; pp. 2951–2956. [Google Scholar]
  40. Tu, C.-Y.; Ho, C.-Y.; Huang, C.-Y. Energy-efficient algorithms and evaluations for massive access management in cellular based machine to machine communications. In Proceedings of the 2011 IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA, 5–8 September 2011; pp. 1–5. [Google Scholar]
  41. Wildman, J.; Nardelli, P.H.J.; Latva-aho, M.; Weber, S. On the joint impact of beamwidth and orientation error on throughput in directional wireless poisson networks. IEEE Trans. Wirel. Commun. 2014, 13, 7072–7085. [Google Scholar] [CrossRef]
  42. Saleem, Y.; Rehmani, M.H. Primary radio user activity models for cognitive radio networks: A survey. J. Netw. Comput. Appl. 2014, 43, 1–16. [Google Scholar] [CrossRef]
  43. Yu, R.; Zhang, Y.; Gjessing, S.; Yuen, C.; Xie, S.; Guizani, M. Cognitive radio based hierarchical communications infrastructure for smart grid. IEEE Netw. 2011, 25, 6–14. [Google Scholar] [CrossRef]
  44. Haenggi, M. Stochastic Geometry for Wireless Networks; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  45. López, O.L.A.; Alves, H.; Nardelli, P.H.J.; Latva-aho, M. Aggregation and resource scheduling in machine-type communication networks: A stochastic geometry approach. IEEE Trans. Wirel. Commun. 2018, 17, 4750–4765. [Google Scholar] [CrossRef] [Green Version]
  46. López, O.L.A.; Alves, H.; Nardelli, P.H.; Latva-aho, M. Hybrid resource scheduling for aggregation in massive machine-type communication networks. Ad Hoc Netw. 2019, 94, 101932. [Google Scholar] [CrossRef] [Green Version]
  47. Weber, S.; Andrews, J.G.; Jindal, N. An overview of the transmission capacity of wireless networks. IEEE Trans. Commun. 2010, 58, 3593–3604. [Google Scholar] [CrossRef]
  48. Nardelli, P.H.; de Lima, C.H.; Alves, H.; Cardieri, P.; Latva-aho, M. Throughput analysis of cognitive wireless networks with poisson distributed nodes based on location information. Ad Hoc Netw. 2015, 33, 1–15. [Google Scholar] [CrossRef] [Green Version]
  49. Baccelli, F.; el Gamal, A.; David, N. Interference networks with point-to-point codes. IEEE Trans. Inf. Theory 2011, 57, 2582–2596. [Google Scholar] [CrossRef]
  50. Nardelli, P.H.J.; Cardieri, P.; Latva-aho, M. Efficiency of wireless networks under different hopping strategies. IEEE Trans. Wirel. Commun. 2012, 11, 15–20. [Google Scholar] [CrossRef]
  51. Nardelli, P.H.J.; de Abreu, G.T.F.; Cardieri, P. Multi-hop aggregate information efficiency in wireless ad hoc networks. In Proceedings of the 2009 IEEE International Conference on Communications, ICC’09, Dresden, Germany, 14–18 June 2009; pp. 1–6. [Google Scholar]
  52. Haenggi, M. The local delay in poisson networks. IEEE Trans. Inf. Theory 2013, 59, 1788–1802. [Google Scholar] [CrossRef]
  53. Cui, S.; Goldsmith, A.J.; Bahai, A. Energy-constrained modulation optimization. IEEE Trans. Wirel. Commun. 2005, 4, 2349–2360. [Google Scholar]
  54. Alves, H.; Souza, R.D.; Fraidenraich, G. Outage, throughput and energy efficiency analysis of some half and full duplex cooperative relaying schemes. Trans. Emerg. Telecommun. Technol. 2014, 25, 1114–1125. [Google Scholar] [CrossRef]
Figure 1. An illustration of the dynamic spectrum access scenario, where licensed and unlicensed users share the up-link channel. The unlicensed transmitter is depicted by the smart meter, the aggregator (unlicensed receiver) by the red aggregator, the handsets are the mobile licensed nodes (interferers to the aggregator) and the big antenna is the cellular base-station. As the smart meter uses directional antennas with limited transmit power (bold arrow), its interference towards the base-station can be ignored. The thin black arrows represent the licensed nodes’ desired signal, while the dotted ones represent their interference towards the aggregator.
Figure 1. An illustration of the dynamic spectrum access scenario, where licensed and unlicensed users share the up-link channel. The unlicensed transmitter is depicted by the smart meter, the aggregator (unlicensed receiver) by the red aggregator, the handsets are the mobile licensed nodes (interferers to the aggregator) and the big antenna is the cellular base-station. As the smart meter uses directional antennas with limited transmit power (bold arrow), its interference towards the base-station can be ignored. The thin black arrows represent the licensed nodes’ desired signal, while the dotted ones represent their interference towards the aggregator.
Sensors 20 02357 g001
Figure 2. Comparison between the approximated and original average number of retransmissions 1 + m ¯ versus the number of retransmissions with different outage threshold ϵ levels.
Figure 2. Comparison between the approximated and original average number of retransmissions 1 + m ¯ versus the number of retransmissions with different outage threshold ϵ levels.
Sensors 20 02357 g002
Figure 3. Comparison between the approximated and original average number of retransmissions 1 + m ¯ versus the outage threshold ϵ with different number of retransmissions.
Figure 3. Comparison between the approximated and original average number of retransmissions 1 + m ¯ versus the outage threshold ϵ with different number of retransmissions.
Sensors 20 02357 g003
Figure 4. Error between the approximated and original average number of retransmissions 1 + m ¯ versus the number of retransmissions with different outage threshold ϵ levels.
Figure 4. Error between the approximated and original average number of retransmissions 1 + m ¯ versus the number of retransmissions with different outage threshold ϵ levels.
Sensors 20 02357 g004
Figure 5. Error between the approximated and original average number of retransmissions 1 + m ¯ versus the number of retransmissions with different outage threshold ϵ levels.
Figure 5. Error between the approximated and original average number of retransmissions 1 + m ¯ versus the number of retransmissions with different outage threshold ϵ levels.
Sensors 20 02357 g005
Figure 6. Throughput T versus the maximum number of allowed retransmission attempts m for α = 4 , r 0 = 1 , ϵ = 0.02 and different densities λ .
Figure 6. Throughput T versus the maximum number of allowed retransmission attempts m for α = 4 , r 0 = 1 , ϵ = 0.02 and different densities λ .
Sensors 20 02357 g006
Figure 7. Optimal Throughput T * versus the density of interferers λ where α = 4 , r 0 = 1 .
Figure 7. Optimal Throughput T * versus the density of interferers λ where α = 4 , r 0 = 1 .
Sensors 20 02357 g007
Figure 8. Energy efficiency E E versus the network density λ with different outage threshold ϵ levels and α = 4 , r 0 = 1 .
Figure 8. Energy efficiency E E versus the network density λ with different outage threshold ϵ levels and α = 4 , r 0 = 1 .
Sensors 20 02357 g008
Figure 9. Energy efficiency E E versus the SIR threshold β with different network densities λ and α = 4 , r 0 = 1 , m = 5 and ϵ = 0.001 .
Figure 9. Energy efficiency E E versus the SIR threshold β with different network densities λ and α = 4 , r 0 = 1 , m = 5 and ϵ = 0.001 .
Sensors 20 02357 g009
Figure 10. Energy efficiency E E versus the number of retransmissions m with different network densities λ and α = 4 , r 0 = 1 and ϵ = 0.001 .
Figure 10. Energy efficiency E E versus the number of retransmissions m with different network densities λ and α = 4 , r 0 = 1 and ϵ = 0.001 .
Sensors 20 02357 g010
Figure 11. Energy efficiency of the optimal throughput E E * versus the number of retransmissions m with different network densities λ , α = 4 and r 0 = 1 .
Figure 11. Energy efficiency of the optimal throughput E E * versus the number of retransmissions m with different network densities λ , α = 4 and r 0 = 1 .
Sensors 20 02357 g011
Table 1. Summary of the functions and symbols.
Table 1. Summary of the functions and symbols.
SymbolExpression
Γ · Gamma function
r i Distance from the reference receiver and the ith interfering node
g i Channel gain
P p Licensed users’ transmit power
P s Unlicensed users’ transmit power
SIRSignal to interference ratio
β SIR threshold
β * Optimal SIR threshold
Φ ^ Poisson point process
P out Outage probability
P suc Probability of a successful transmission
λ Network density (nodes/m2)
TLink throughput
T * Optimal throughput
ϵ Outage threshold
EEEnergy efficiency
α Path loss exponent
P T Total energy consumption per bit
P P A Power amplifier consumed energy
P T x Transmission power
P R x Reception power
mNumber of retransmission attempts
1 + m ¯ Average number of retransmission attempts
1 + m ¯ e Average number of retransmission attempts in the extreme cases
m * Maximum allowed number of retransmission attempts
δ Drain efficiency

Share and Cite

MDPI and ACS Style

Ramezanipour, I.; Alves, H.; J. Nardelli, P.H.; Pouttu, A. A Throughput and Energy Efficiency Scheme for Unlicensed Massive Machine Type Communications . Sensors 2020, 20, 2357. https://doi.org/10.3390/s20082357

AMA Style

Ramezanipour I, Alves H, J. Nardelli PH, Pouttu A. A Throughput and Energy Efficiency Scheme for Unlicensed Massive Machine Type Communications . Sensors. 2020; 20(8):2357. https://doi.org/10.3390/s20082357

Chicago/Turabian Style

Ramezanipour, Iran, Hirley Alves, Pedro H. J. Nardelli, and Ari Pouttu. 2020. "A Throughput and Energy Efficiency Scheme for Unlicensed Massive Machine Type Communications " Sensors 20, no. 8: 2357. https://doi.org/10.3390/s20082357

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop