Achievable throughput of energy harvesting fading multiple-access channels under statistical QoS constraints

Deli Qiao, Jingwen Han

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

This paper studies the achievable throughput of fading multiple-access channels (MACs) with energy harvesting transmitters subject to statistical quality of service (QoS) constraints in the form of limitations on the buffer overflow probability. Effective capacity, which characterizes the maximum constant arrival rate that a given process can support while satisfying the QoS constraints, is employed as the performance metric. Perfect channel state information (CSI) and energy arrivals are assumed to be available at both the transmitters and the receiver. With the assumption of naive power control scheme, in which the transmission power level is irrespective of the CSI and decided by the instantaneous harvested energy, the effective throughput regions of time division multiple access and superposition coding (SC) with fixed decoding are characterized. In the special case of the same QoS constraints, the optimal decoding order strategy for SC with variable decoding order is obtained. With the assumption that the channel states and harvested energy in all time slots are known at the transmitters, the point-to-point link is first revisited. Then, for a given decoding order strategy in two-user MACs, a suboptimal power control policy based on the average energy arrivals and causal energy and channel information is proposed and shown to achieve performance close to the optimal one.

Original languageEnglish
Pages (from-to)2906-2917
Number of pages12
JournalIEEE Transactions on Wireless Communications
Volume17
Issue number5
DOIs
StatePublished - May 2018

Keywords

  • Effective capacity
  • Energy harvesting
  • Multiple-access channels
  • Power control
  • Statistical delay constraints

Fingerprint

Dive into the research topics of 'Achievable throughput of energy harvesting fading multiple-access channels under statistical QoS constraints'. Together they form a unique fingerprint.

Cite this