Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Nov 14;18(11):3946. doi: 10.3390/s18113946

Outage-Based Resource Allocation for DF Two-Way Relay Networks with Energy Harvesting

Chunling Peng 1,, Fangwei Li 1,, Huaping Liu 2, Guozhong Wang 3,*
PMCID: PMC6263727  PMID: 30441871

Abstract

A joint resource allocation algorithm to minimize the system outage probability is proposed for a decode-and-forward (DF) two-way relay network with simultaneous wireless information and power transfer (SWIPT) under a total power constraint. In this network, the two sources nodes exchange information with the help of a passive relay, which is assumed to help the two source nodes’ communication without consuming its own energy by exploiting an energy-harvesting protocol, the power splitting (PS) protocol. An optimization framework to jointly optimize power allocation (PA) at the source nodes and PS at the relay is developed. Since the formulated joint optimization problem is non-convex, the solution is developed in two steps. First, the conditionally optimal PS ratio at the relay node for a given PA ratio is explored; then, the closed-form of the optimal PA in the sense of minimizing the system outage probability with instantaneous channel state information (CSI) is derived. Analysis shows that the optimal design depends on the channel condition and the rate threshold. Simulation results are obtained to validate the analytical results. Comparison with three existing schemes shows that the proposed optimized scheme has the minimum system outage probability.

Keywords: two-way relay, decode-and-forward, energy harvesting, joint resource allocation

1. Introduction

Two-way relay (TWR) communications [1,2] to extend transmission range and improve communications reliability have been studied extensively. The traditional TWR network with two source nodes exchanging information between each other via a relay requires four time slots. Combined with appropriate network coding, the number of time slots can be reduced to two [3]. Two of the most commonly-used relay strategies are the amplify-and-forward (AF) [4] and DF [5] protocols. With the AF and DF protocols, plenty of significant research efforts designing optimal resource allocation schemes have been proposed, aiming at further improving essential performance objectives for such networks. For example, a power allocation (PA) scheme for an AF-TWR system and its achievable rates over Rayleigh fading channels were studied in [6]. In [7], based on maximizing the objective rate under a total power budget, a power allocation method for a specific DF relay network by exploiting physical-layer network coding was proposed. In [8], optimization of PA and time allocation (TA) was investigated to minimize the system outage probability to support asymmetric data rates for DF-TWR networks.

The aforementioned works all assumed that the relay spends its own power to support the TWR transmission. In most practical cases, it will be very attractive if the relay can harvest the energy it needs for relaying the information between the source nodes. One promising energy-harvesting technique is SWIPT, with which the relay performs energy harvesting (EH) by scavenging radio-frequency signals, typically transmitted by the source nodes, and then utilizes the harvested energy to forward information. Recent work has studied AF-TWR networks with SWIPT extensively. An AF-TWR with SWIPT that employs the PS protocol is proposed in [9] together with the derivation of tight upper- and lower-bounds of the outage probability and the ergodic capacity of the network. To further improve the AF-TWR performance, a joint optimization of the PS ratio and the transmission PA based on minimizing the outage probability was studied in [10]. A distributed energy beamforming scheme was proposed in [11] to maximize the achievable sum-rate of AF-TWR network with SWIPT. There are also some research efforts of SWIPT based on the DF-TWR network; for example, an energy-harvesting protocol for three-step TWR was proposed and analyzed [12]. A joint optimization scheme for a DF-TWR with energy harvesting was developed in [13].

In this paper, we focus on jointly optimizing the PS ratio and the PA ratio for a power-constrained, two-way relay network with a wireless powered relay that employs the DF protocol, a problem that has not been studied yet, to our knowledge. The major contributions of our works are summarized as follows. We form a jointly optimizing PS ratio and PA ratio problem to minimize the system outage probability in the context of a two-way energy-harvesting relay network that is subject to a total transmit power constraint. Since this original optimization problem is very difficult to solve, if not impossible, a two-step solution is developed to obtain a closed-form solution efficiently. Simulation results are obtained to verify the proposed algorithm and to assess the impact of various network parameters on system performance. The performances of three existing schemes are also simulated and compared with that of the proposed scheme.

The remainder of this paper is organized as follows. In Section 2, we describe the model of the two-way relay network being considered and formulate the joint resource allocation problem, aiming to minimize the outage probability. Transformation of the joint resource allocation problem to a two-step optimization problem is described in Section 3. Numerical results are presented in Section 4, and conclusions are given in Section 5.

2. System Model and Problem Formulation

2.1. System Model

The TWR network under consideration is shown in Figure 1, where two communicating devices S1 and S2 exchange their messages assisted by a passive relay node (no power is available for its information forwarding) with energy harvesting ability, denoted as R. It is assumed that there are no direct links between the two source nodes; thus, the information exchange must rely on the passive relay, which harvests the energy it needs from the RF signals transmitted by the two source nodes through the power splitting protocol. We assume all the nodes are single-antenna devices and operate in a half-duplex mode. In addition, we assume that the channel between any two nodes is reciprocal and that perfect channel state information is known at all nodes. The transmit power at S1 and S2 is denoted by P1 and P2, respectively, which share a total power budget constraint P1+P2=PT for each transmission round.

Figure 1.

Figure 1

(a) System model (b) energy-harvesting protocol.

Two consecutive phases are involved to complete each round of information transmission: a multiple access (MA) phase and a broadcast (BC) phase.

During the MA phase, nodes S1 and S2 broadcast their signals simultaneously to relay R. The received signal at R in this phase is expressed as:

yR=h1P1x1+h2P2x2+na,w (1)

where hi denotes the coefficient of the channel between Si and R and na,wCN0,σa2 is the noise generated at the receiver antenna.

The power splitter at R then splits the received signal yR into two portions ρ:(1ρ), of which ρyR is utilized for energy harvesting, and the remaining portion in the amount of 1ρyR is used for information decoding. Let the energy conversion efficiency be η. The harvested energy at the relay is expressed as:

E=T2·ηρ(|h1|2P1+|h2|2P2+σa2) (2)

Note that power splitting is done before the received signal is converted from passband to baseband; hence, the signal in the information decoding (ID) receiver can be expressed as:

yID=1ρh1P1x1+h2P2x1+na,w+nb,w (3)

where nb,wCN0,σb2 is the noise generated in the down-conversion process of the received signal [8]. Since in practice, the power of the noise generated at the antenna σa2 is generally much smaller than the noise generated in the down-conversion process of the received signal σb2, to simplify the derivation, the noise term σa2 will be neglected in the following analysis. This kind of assumption has been wildly used in SWIPT system analysis, such as [9,10,11,12,13].

During the BC phase, the relay exploits one of the decoding methods—physical layer network coding—to decode yID, and the decoded information is written as xR=x1x2. Then, the relay exhausts the harvested power PR to broadcast xR. The received signal at Si,i1,2 is given by:

ySi=hiPRxR+ni (4)

where PR=2ET=ηρ(|h1|2P1+|h2|2P2), niCN0,σi2,i=1,2, is the noise generated at source Si. For the noise components in the source and relay nodes, it is reasonable to assume σ12=σ22=σb2=σ2.

Finally, the source node Si,i={i,2} decodes xR and derives the information from Sj,j{1,2|ji} by using its own information. For example, S1 decodes the information from S2 as x2=xRx1.

2.2. Performance Metric

The network outage probability is used as the performance metric. The outage probability of the network we considered is defined as the probability that the achievable instantaneous received rate pair (R12,R21) falls below an outage rate pair threshold (Rth1,Rth2). The achievable instantaneous received rate pair is constrained by the achievable rate regions D, which can be obtained by using the results in [14] (Refer to Equations (37)–(39) in reference [14]). The rate region is mathematically expressed as:

D={(R12,R21)|0R12min(R1R,RR2),0R21min(R2R,RR1),R12+R21RMA} (5)

where Rij,i,j[1,2,R] denotes the end-to-end transmission rate from node i to node j, RMA denotes the MA information transfer rate region. The transmission rate Rij,i,j[1,2,R] and RMA can be calculated by Rij=12log2(1+γij) and RMA=12log2(1+γMA), respectively, where γij, γMA are the related signal-to-noise ratios (SNR).

From Equations (3) and (4), we can obtain the SNR of each transmission as the following equations:

γ1R=(1ρ)αk1 (6a)
γR2=|h2|2ηρ(αk1+(1α)k2) (6b)
γ2R=(1ρ)(1α)k2 (6c)
γR1=|h1|2ηρ(αk1+(1α)k2) (6d)
γMA=(1ρ)(αk1+(1α)k2) (6e)

where k1=|h1|2Ptσ2, k2=|h2|2Ptσ2, α is the power allocation ratio and P1=αPt, P2=(1α)Pt.

With the required target transmission rate threshold Rth1 and Rth2 at the receiving nodes S1 and S2, respectively, the outage probability can be expressed as:

Pout=Pr(Rth1,Rth2)D=PrR12<Rth1PrR21<Rth2PrRMA<Rth1+Rth2=Prmin(R1R,RR2)<Rth1Prmin(R2R,RR1)<Rth2PrRMA<Rth1+Rth2=Prmin(γ1R,γR2)<γth1Prmin(γ2R,γR1)<γth2PrγMA<γthΣ=Prminγ1Rγth1,γR2γth1,γ2Rγth2,γR1γth2,γMAγthΣ<1 (7)

where γthi=22Rthi1,i=1,2, γthΣ=22(Rth1+Rth2)1.

Denote FX(·) as the cumulative distribution function (CDF) of a random variable X. We can rewrite Equation (7) as:

Pout=FΛ(1). (8)

where:

Λ=minγ1Rγth1,γR2γth1,γ2Rγth2,γR1γth2,γMAγthΣ=min(1ρ)αk1γth1,|h2|2ηρ(αk1+(1α)k2)γth1,(1ρ)(1α)k2γth2,|h1|2ηρ(αk1+(1α)k2)γth2,(1ρ)(αk1+(1α)k2)γthΣ. (9)

2.3. Problem Formulation

Our goal is to provide insights into the optimal PS at the relay and the optimal PA at each source node for the proposed SWIPT-TWR network to minimize the network outage probability derived in Equation (7). That is, the optimization problem is formulated as:

OP0:(αo,ρo)=argminα,ρPout(α,ρ)subjectto0<α<1and0<ρ<1. (10)

With the available instantaneous channel state information (CSI), it is more desirable to formulate an equivalent joint optimization problem, which aims at maximizing the normalized SNR Λ shown in Equation (9). This transformed optimization problem is expressed as:

OP1:(αo,ρo)=argmaxα,ρΛ(α,ρ)subjectto0<α<1and0<ρ<1. (11)

Since Λ is a complex minimization function of two variables α and ρ, it is very difficult, if not impossible, to solve for a solution directly based on the optimization formed in (11), but Λ(α,ρ) in Equation (9) is observed to be a concave function of ρ for a fixed α. This observation leads to a two-step approach to solve this joint resource allocation problem, which is developed in the next section.

3. A Two-Step Optimization Algorithm

To solve Equation (11) effectively, we adopt a successive approach to transform the original problem into two subproblems. First, an optimal PS ratio is obtained by fixing α. Then, the resulting PS ratio is substituted into Equation (11) to derive a closed-form solution of the optimal PA ratio through case studies. This kind of method, which transforms a complex original problem into a series of easily-solved convex problems, is a typical non-convex problem solution, which has been widely used in solving mathematical problems [15] and solving formulated optimization problems applied in communication scenarios [16].

For a fixed α, the optimization problem reduces to a one-dimensional problem related to the power splitting ratio ρ. For α, the optimization problem can be expressed as:

OP2:ρo=argmaxρΛ(ρ)subjectto0<ρ<1. (12)

where Λ(ρ) is rewritten as:

Λ(ρ)=min(1ρ)g1(α),ρg2(α) (13)

and g1(α), g2(α) are expressed as:

g1(α)=minαk1γth1,(1α)k2γth2,αk1+(1α)k2γthΣ (14a)
g2(α)=min|h2|2γth1,|h1|2γth2·[η(αk1+(1α)k2)] (14b)

It is easy to notice that Equation (13) is a convex function of ρ for a given α. Thus, the optimal ρ derived from Equation (13) is obtained when (1ρ)g1(α)=ρg2(α), i.e.,

ρo=g1(α)g1(α)+g2(α). (15)

Note that ρo is a function of α. Substituting Equation (15) into Λ leads to a one-dimensional function of α written as:

Λ(α)=g1(α)g2(α)g1(α)+g2(α). (16)

The optimal power allocation ratio αo can be obtained by maximizing Equation (16), which is equivalent to minimizing its reciprocal transformation Λ¯(α)=1g1(α)+1g2(α). The transformed problem is written as follows.

OP3:αo=argminΛ¯(α)=argmin1g1(α)+1g2(α)subjectto0<α<1 (17)

Equation (17) shows that the optimal αo is determined by g1(α) and g2(α). Define the three components of g1(α) in Equation (14a) as f1=αk1/γth1, f2=(1α)k2/γth2 and f3=(αk1+(1α)k2)/γthΣ. Let α12, α13 and α23 be, respectively, the points of intersection of f1 and f2, f1 and f3 and f2 and f3. The analytical expression of Λ¯(α) can be classified as two cases, which is shown in the following Theorem 1.

Theorem 1.

Λ¯(α) is a continuous piecewise function and can be divided into two cases dependent on the size of α13 and α23. The two cases are:

Case 1: When α13α23:

Λ¯(α)=1f1+1v·(αk1+(1α)k2)1,0<αα121f2+1v·(αk1+(1α)k2)1,α12α<1 (18)

Case 2: When α13<α23:

Λ¯(α)=1f1+1v·(αk1+(1α)k2)1,0<αα131f3+1v·(αk1+(1α)k2)1,α13αα231f2+1v·(αk1+(1α)k2)1,α23α<1 (19)

where v=η·min|h2|2γth1,|h1|2γth2,

α12=k2γth1k1γth2+k2γth1α13=k2γth1k1(γthΣγth1)+k2γth1α23=k2(γthΣγth2)k2(γthΣγth2)+k1γth2 (20)

Proof. 

The proof is given in Appendix A. ☐

It can be concluded that the monotony of f3=(αk1+(1α)k2)/γthΣ, g2(α)=v·(αk1+(1α)k2) has a relationship with the size of k1 and k2. When k1=k2, f3 and g2(α) are constant; when k1>k2, f3 and g2(α) are monotonically increasing functions of α; and when k1<k2, f3 and g2(α) are monotonically decreasing functions of α. Thus, the monotony of Λ¯(α) for each case in Theorem 1 has three subcases. With the above analysis, we analyze OP3 with case studies.

3.1. Case 1: α13α23

In this case, Λ¯(α) is a continuous two-segment piecewise function generated from Equation (18), With the size of k1 and k2, Λ¯(α) and OP3 have three subcases, which are analyzed as follows.

3.1.1. Subcase 1: k1=k2

In this subcase, g2(α) is a constant for all values of α; thus, the variation of Λ¯(α) is determined by f1 or f2. From Equation (18), it is easy to get that, in the range of α(0,α12], Λ¯(α)=f11+v1·(αk1+(1α)k2)1 is a decreasing function of α; and in the range of α(α12,1), Λ¯(α)=f21+v1·(αk1+(1α)k2)1 is an increasing function of α. Thus, in this subcase, Λ¯(α) is non-negative convex, which gets its minimum at α=α12. The solution of OP3occurs at α=α12.

3.1.2. Subcase 2: k1>k2

In this subcase, g2(α) is an increasing function, and f3 does not affect Λ¯(α). Through analysis, Lemma 1 can be obtained as follows.

Lemma 1.

The optimal power allocation of Subcase 2 is unique and lies in the range of α[α12,1], which can be calculated by αo=αcase1*=max(α*,α12). α* is the stationary point of the second segment of Λ¯(α), which is obtained by solving (Λ¯(α))=(f21+v1·(αk1+(1α)k2)1)=0, and the solved α* is:

α*=k2(k1k2)k2vγth2k2(k1k2)+(k1k2)vγth2 (21)
Proof. 

With the former analysis that g1(α) is a non-negative convex function with its maxima at α=α12 and g2(α) is an increasing function in this subcase, it is easy to see that Λ¯(α=α12) is the minima in the range of α[0,α12]. Given Λ¯(α12) as the initial value of Λ¯ in the range of α[α12,1], the variation of Λ¯(α) in the range α[α12,1] is analyzed as follows. There is the conclusion that g1(α)=f1 decreases as α increases and g2(α) increases as α increases in the range of α[α12,1]. This characteristic leads to the conclusion that the optimal value of Λ¯ occurs in the range of [α12,1]. In this range, Λ¯(α)=1f2+1g2. The second-order derivative of Λ¯(α) given in Equation (22a) is greater than zero; thus, the optimal α can be obtained by solving Λ¯(α)α=1f2+1v·(αk1+(1α)k2)1α=0. The first-order derivative Λ¯(α)α is given in Equation (22b).

2Λ¯(α)α2=2γth2k21(1α)3+1v(k1k2)2(αk1+(1α)k2)4 (22a)
Λ¯(α)α=γth2k21(1α)21vk1k2(αk1+(1α)k2)2. (22b)

 ☐

By solving Equation (22b), one obtains the minimum of [1f2+1v·(αk1+(1α)k2)1]α, which is shown in Equation (21). Compared with the boundary value in the range of α[α12,1], we get the conclusion that if α*<α12, the optimal power allocation ratio is αo=α12; else, if α*α12, the optimal power allocation ratio is αo=α*. Rephrasing the above analysis results in Lemma 1.

3.1.3. Subcase 3: k1<k2

In this subcase, g2(α) is a decreasing function and f3 does not affect Λ¯(α). Through analysis, Lemma 2 can be derived as follows.

Lemma 2.

The optimal power allocation of Subcase 3 is unique and lies in the range of α[0,α12], which can be calculated by αo=αcase1+=min(α+,α12). α+ is the stationary point of the first segment of Λ¯(α), which is obtained by solving (Λ¯(α))=(f11+v1·(αk1+(1α)k2)1)=0, and the solved α+ is:

α+=k2v·γth1k2k1(k1+v·γth1(k2k1)) (23)
Proof. 

The convexity of this case can be verified using a similar analysis as Lemma 1. Given α12 as an initial value, it is easy to see that g1(α) decreases as α decreases from this initial value; however, g2(α) increases as α decreases from this initial value. This characteristic shows that the optimal value of Λ¯(α) occurs in the range of [0,α12], where g1(α)=f1(α). Thus, Λ¯(α)=1f1+v1·(αk1+(1α)k2)1. Since the second-order derivative of Λ¯(α) given in Equation (24a) is greater than zero, the optimal α is obtained by letting the first derivative Λ¯(α)α=[1f1+v1·(αk1+(1α)k2)1]α expressed in (24b) equal zero.

2Λ¯(α)α2=2γth1k11α3+1v(k1k2)2(αk1+(1α)k2)4 (24a)
Λ¯(α)α=γth1k11α21vk1k2(αk1+(1α)k2)2 (24b)

 ☐

By solving Equation (24b), one obtains the minimum of [1f1+1v·(αk1+(1α)k2)1]α, which is shown in Equation (23). Compared with the boundary value in the range of α[0,α12], we get the conclusion that if α+<α12, the optimal power allocation ratio is αo=α+; else, if α+α12, the optimal power allocation ratio is αo=α12. Rephrasing the above analysis results in Lemma 2.

3.2. Case 2: α13<α23

In this case, Λ(α) is generated from Equation (19), which is a three-segment continuous function. Since f3 and g2(α) have a relationship with the size of the channel gains k1 and k2, the same as for Case 1, Case 2 has three subcases, as well.

3.2.1. Subcase 1: k1=k2

In this subcase, f3 and g2(α) are constants for all values of α. From Equation (19), it is easy to get that, the first segment of Λ¯(α) is a decreasing function, the third segment of Λ¯(α) is an increasing function and the second segment of Λ¯(α) is a constant. Thus, Λ¯ will get its minimum at α[α13,α23].

3.2.2. Subcase 2: k1>k2

In this subcase, f3 and g2(α) are monotonically increasing functions. Through analysis, Lemma 3 can be obtained as follows.

Lemma 3.

The optimal power allocation for this subcase is unique and lies in the range of α[α23,1), which can be calculated by αo=αcase2*=max(α*,α23). α* is the stationary point of the third segment of Λ¯(α), which is equivalent to that obtained in Equation (21).

Proof. 

Since f1 and f2 are respectively an increasing function and a decreasing function with the increase of α, since f3 and g2(α) are monotonic functions in this subcase, it is easy to obtain that the first and second segments of Λ¯(α) are decreasing functions. Due to the continuous feature, Λ¯(α=α23) is the minima in the range of α[0,α23]. Given Λ¯(α23) as the initial value of Λ¯ in the range of α[α23,1], the variation of Λ¯(α) in the range of α[α23,1] is analyzed as follows. In the range, Λ¯(α)=1f2+1g2. The second-order derivation and first-order derivation of Λ¯(α) can be obtained as shown in Equations (22a) and (22b). α* is the minima of [1f2+1v·(αk1+(1α)k2)1]α, which is shown in Equation (21). Compared with the boundary value in the range of α[α23,1], we get the conclusion that if α*<α23, the optimal power allocation value is αo=α23; else, if α*α23, the optimal power allocation value is αo=α*. Rephrasing the above analysis results in Lemma 3. ☐

3.2.3. Subcase 3: k1<k2

In this subcase, f3 and g2(α) are monotonically decreasing functions. Through analysis, Lemma 4 can be obtained as follows.

Lemma 4.

The optimal power allocation for this subcase is unique and lies in the range of α(0,α13], which can be calculated by αo=αcase2+=min(α+,α13). α+ is the stationary point of the first segment of Λ¯(α), which is equivalent to that obtained in Equation (23).

Proof. 

With monotonically decreasing functions of f3 and g2(α), the second and third segments of Λ¯(α) are increasing functions. Due to the continuous feature, Λ¯(α=α13) is the minima in the range of α[α13,1]; whereas in the range of α[0,α13], Λ¯(1f1)+1v·(αk1+(1α)k2). The second-order derivation and first-order derivation of Λ¯(α) can be obtained as shown in Equations (24a) and (24b). α+ is the minima of [1f1+1v·(αk1+(1α)k2)1]α, which is shown in Equation (23). Compared with the boundary value in the range of α[0,α13], we get the conclusion that if α+<α13, the optimal power allocation value is αo=α+; else, if α+α13, the optimal power allocation value is αo=α13. Rephrasing the above analysis results in Lemma 4. ☐

4. The Closed-Form of PA and PS

From the above analysis, the closed-form of optimal power allocation ratio αo is calculated and presented below.

When α12α23:

αo=α12,ifk1=k2αcase1*,ifk1>k2αcase1+,ifk1<k2 (25)

When α12<α23:

αo=α[α13,α23],ifk1=k2αcase2*,ifk1>k2αcase2+,ifk1<k2 (26)

Substituting αo into Equation (15), the optimal power splitting ratio is obtained below.

ρo=g1(αo)g1(αo)+g2(αo) (27)

Algorithm 1 summarizes the optimal power allocation ratio and power splitting ratio design for a given set of η, |h1|2, |h2|2, Rth1, Rth2 and Pt.

Algorithm 1 Optimal joint resource allocation for αo, ρo.
  • 1:

    Given η, |h1|2, |h2|2, Rth1, Rth2 and Pt   

  • 2:

    Compute k1=|h1|2Ptσ2 and k2=|h2|2Ptσ2   

  • 3:

    Compute α13, α23.   

  • 4:

    if α13α23 then

  • 5:

    if k1=k2 then

  • 6:

      αo=α12   

  • 7:

    else if k1>k2 then

  • 8:

      Compute α*, α12   

  • 9:

      αo=αcase1*=max(α*,α12)   

  • 10:

    else if k1<k2 then

  • 11:

      Compute α+, α12   

  • 12:

      αo=αcase1+=min(α+,α12)   

  • 13:

    end if  

  • 14:

    else if α13<α23 then

  • 15:

    if k1=k2 then

  • 16:

      αo=αo[α13,α23]   

  • 17:

    else if k1>k2 then

  • 18:

      Compute α*   

  • 19:

      αo=αcase2*=max(α*,α23)   

  • 20:

    else if k1<k2 then

  • 21:

      Compute α+   

  • 22:

      αo=αcase2+=min(α+,α13)   

  • 23:

    end if  

  • 24:

    end if

  • 25:

    Compute ρo=g1(αo)g1(αo)+g2(αo)   

5. Numerical Results

In this section, some numerical and simulation results are presented to verify the proposed algorithm and to assess the influence of various system parameters. To better display the superiority of the proposed resource allocation scheme, three benchmark schemes: optimal α equal ρ, optimal ρ equal α and equal α and ρ are presented as a comparison. The parameters are set as follows: the energy conversion efficiency is set to be η=0.8; the distance between the two sources is d=10; the noise power is set to be σ2=90 dBm; the channel gains are set to be |hi|=|gi|·(1+di)m, where giCN(0,λi) represents the Rayleigh fading coefficient; di is the distance between Si and R; m is the channel path loss exponent (m=2); and λ1=λ2=1. All results are generated from 104 channel realizations.

Figure 2 depicts the effects of total power constraint on the system outage probability with rate threshold (Rth1,Rth1)=(1,1) bit/s/Hz. Since Algorithm 1 shows that the asymmetry of the channel affects the optimal parameters, and thus further affects the outage performance, this simulation chose two channel conditions to assess the system performance: symmetric channel condition d1=d2=5 m (the left figure); asymmetric channel condition (d1,d2)=(3,7) m (the right figure). Note that (d1,d2)=(3,7) is just a case of the asymmetric channel condition, which we chose to reflect the system performance; relay deployments of (d1,d2)={(1,9),(2,8),(4,6),} are asymmetric channel conditions, as well. From this figure, we can see that the outage probability decreases with the increase of total power constraint Pt. Pout of the proposed jointly optimal resource allocation obtained by using the proposed Algorithm (A1) matches precisely with that obtained by using numerical search (NS) over the range of α[0,1] (step size of 0.005). The Pout of three benchmark schemes are presented, as well, which verified that the proposed jointly optimal resource allocation scheme outperforms the three benchmark schemes. The advantage of the proposed schemes is more obvious when the channel is asymmetric.

Figure 2.

Figure 2

Comparison of outage performance vs. the total power constraint of different resource allocation schemes: (a) (d1,d2)=(5,5) (the left figure); (b) (d1,d2)=(3,7) (the right figure).

Figure 3 shows the system outage probabilities Pout versus the relay deployment. For relay deployment, the distance between source S1 and relay R (d1) is used as the x-axis. Simulation parameters are set as: γt=15 dBm (the left figure) or γt=20 dBm (the right figure), (Rth1,Rth1)=(1,1) bit/s/Hz. It is observed that increasing the distance between source S1 and relay (i.e., d1) leads to a concave characteristic of the outage probability. This behavior shows that the outage performance is much better when the relay is close to any of the source nodes than when the relay is in the middle of the two sources. It can be also noted that compared with the other three benchmark schemes, the proposed scheme has the best outage performance when the channels are asymmetric. When the channel is symmetric, the proposed scheme has the same outage performance as the scheme optimal ρ equal α. This is because when the channels are symmetric, the optimal α is equal to α with (Rth1,Rth1)=(1,1)bit/s/Hz. Thus, to better enhance the system performance, the relay should be deployed close to each of the source nodes.

Figure 3.

Figure 3

Comparison of the outage performance vs. the distance between source S1 and relay R (d1) of different schemes: (a) Pt=15 dBm (the left figure); (b)Pt=20 dBm (the right figure).

Figure 4 shows the outage performance Pout versus the rate threshold Rth1 with setting Rth2=1 bit/s/Hz. The simulation evaluates two situations: (a) the target transmit power is Pt=15 dBm (the left figure); (b) the target transmit power is Pt=20 dBm (the right figure). The relay is deployed at d1=3 m and d2=7 m. It is observed that as Rth1bit/s/Hz increases, the outage probability becomes worse. This is because with the increase of the threshold rate, the achievable rate region is more prone to less than the rate threshold. Thus, the outage probability increases based on Equation (7). This figure also shows that the jointly optimal resource allocation scheme outperforms the other three benchmark schemes with any of the threshold settings.

Figure 4.

Figure 4

Comparison of outage performance vs. the rate threshold Rth1 of different schemes: (a) Pt=15 dBm (the left figure); (b) Pt=20 dBm (the right figure).

6. Conclusions

We have derived a joint optimal resource allocation design for DF-TWR networks with SWIPT to minimize its system outage probability. The optimization of such a network is a very complex problem. To make it easy to tackle, a two-step method is proposed. With the two-step method, the optimal PS ratio for a given PA ratio is derived first, from which it is found that it is a function of the PA ratio. Then, the obtained PS ratio is substituted back into the main optimization problem to determine the closed-form of the optimal PA ratio. Simulation results matched the analytical results well and confirmed that the optimized system achieved a lower outage probability than existing schemes, especially in asymmetric channel conditions.

Abbreviations

DF Decode-and-forward
SWIPT Simultaneous wireless information and power transfer
PS Power splitting
PA Power allocation
CSI Channel state information
TWR Two-way relay
AF Amplify-and-forward
EH Energy harvesting
MA Multiple access
BC Broadcast
ID Information decoding
SNR Signal-to-noise ratio
CDF Cumulative distribution function
CSI Channel state information

Appendix A

From Equations (14a) and (14b), we obtain that 1g1(α)=max(γth1αk1,γth2(1α)k2,γthΣαk1+(1α)k2) and 1g2(α)=v1·(αk1+(1α)k2). Denote q1(α)=γth1αk1, q2(α)=γth2(1α)k2, q3(α)=γthΣαk1+(1α)k2; it is easy to get that q1(α) and q2(α) are, respectively, an increasing function and a decreasing function in the range of α[0,1]. q3(α) is either constant or a monotonic function depending on the relative values of k1 and k2 in the range of α[0,1]. The domain boundary values of qi,i{1,2,3} are calculated as:

q1(0)=+,q1(1)=γth1k1q2(0)=γth2k2,q2(1)=+q3(0)=γthΣk2,q3(1)=γthΣk1 (A1)

Since γthΣ>γth1 and γthΣ>γth2, q1(α), q2(α) and q3(α) have three intersection points in the range α[0,1]: α12, α13 and α23, where αij,i,j{1,2,3} are the intersections of qi and qj. Since qi=fi1, the intersections of qi and qj are the same as the intersection of fi and fj. When α13α23, max(q1,q2) is always larger than q3, which results in g1(α), as shown in Equation (18); when α13<α23, any of the segments f1 and f2 might be less than f3 in some certain range, which results in g1(α), as shown in Equation (19). On the other hand, 1g2(α) is a monotonic function of α; thus, we can get Λ(α)=1g1(α)+1g2(α), as shown in Equations (14a) and (14b) for these two cases. Theorem 1 is proven.

Author Contributions

The main contributions of C.P. and G.W. were to create the main ideas and execute the performance evaluations by theoretical analysis and simulation, while F.L. and H.L. worked as the advisors of C.P. to discuss, create and advise on the main ideas and performance evaluations together.

Funding

This research was supported by The National Science Foundation of China (61771084, 61601071) and The Ph.D. Project of Chongqing University of Posts and Telecommunications (BYJS2016006).

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Liu K.J.R., Sadek A.K., Su W., Kwasinski A. Cooperative Communications and Networking. Cambridge University Press; Cambridge, UK: 2009. [Google Scholar]
  • 2.Hong Y.W.P., Huang W.J., Kuo C.C.J. Cooperative Communications and Networking: Technologies and System Design. Springer; Berlin, Germany: 2010. [Google Scholar]
  • 3.Zhang S., Liew S., Lam P. Hot Topic: Physical-Layer Network Coding; Proceedings of the 12th Annual International Conference on Mobile Computing and Networking; Los Angeles, CA, USA. 23–29 September 2006; pp. 358–365. [DOI] [Google Scholar]
  • 4.Kim S.J., Mitran P., Tarokh V. Performance bounds for bidirectional coded cooperation protocols. IEEE Trans. Inf. Theory. 2008;54:5235–5241. doi: 10.1109/TIT.2008.929913. [DOI] [Google Scholar]
  • 5.Liu P., Kim I.M. Performance analysis of bidirectional communication protocols based on decode-and-forward relaying. IEEE Trans. Commun. 2010;58:2683–2696. doi: 10.1109/TCOMM.2010.080310.090292. [DOI] [Google Scholar]
  • 6.Rodríguez L.J., Tran N., Le-Ngoc T. Achievable rates and power allocation for two-way AF relaying over Rayleigh fading channels; Proceedings of the 2013 IEEE International Conference on Communications (ICC); Budapest, Hungary. 9–13 June 2013; pp. 5914–5918. [DOI] [Google Scholar]
  • 7.Pang L., Zhang Y., Li J., Ma Y., Wang J. Power allocation and relay selection for two-way relaying systems by exploiting physical-layer network coding. IEEE Trans. Veh. Technol. 2014;63:2723–2730. doi: 10.1109/TVT.2013.2294650. [DOI] [Google Scholar]
  • 8.Do T.P., Kim Y.H. Outage-optimal power and time allocation for rate-aware two-way relaying with a decode-and-forward protocol. IEEE Trans. Veh. Technol. 2016;65:9673–9686. doi: 10.1109/TVT.2016.2524039. [DOI] [Google Scholar]
  • 9.Chen Z., Xia B., Liu H. Wireless information and power transfer in two-way amplify-and-forward relaying channels; Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP); Atlanta, GA, USA. 3–5 December 2014; pp. 168–172. [DOI] [Google Scholar]
  • 10.Men J., Ge J., Zhang C., Li J. Joint optimal power allocation and relay selection scheme in energy harvesting asymmetric two-way relaying system. IET Commun. 2015;9:1421–1426. doi: 10.1049/iet-com.2014.1129. [DOI] [Google Scholar]
  • 11.Fang Z., Yuan X., Wang X. Distributed energy beamforming for simultaneous wireless information and power transfer in the two-way relay channel. IEEE Signal Process. Lett. 2015;22:656–660. doi: 10.1109/LSP.2014.2365718. [DOI] [Google Scholar]
  • 12.Nguyen T.P.V., Syed F.H., Xiang G., Subhas M., Hung T. Three-Step Two-Way Decode and Forward Relay With Energy Harvesting. IEEE Commun. Lett. 2017;21:857–860. doi: 10.1109/LCOMM.2016.2637891. [DOI] [Google Scholar]
  • 13.Do T.P., Song I., Kim Y.H. Simultaneous Wireless Transfer of Power and Information in a Decode-and-Forward Two-Way Relaying Network. IEEE Trans. Wirel. Commun. 2017;16:1579–1592. doi: 10.1109/TWC.2017.2648801. [DOI] [Google Scholar]
  • 14.Kim S., Devroye N., Mitra P., Tarokh V. Achievable rate regions and performance comparison of half duplex bi-directional relaying protocols. IEEE Trans. Inf. Theory. 2011;57:6405–6418. doi: 10.1109/TIT.2011.2165132. [DOI] [Google Scholar]
  • 15.Ciccone V., Ferrante A., Zorzi M. An alternating minimization algorithm for Factor Analysis. arXiv. 2018. 1806.04433
  • 16.Mishra D., De S., Chiasserini C. Joint Optimization Schemes for Cooperative Wireless Information and Power Transfer Over Rician Channels. IEEE Trans. Commun. 2016;64:554–571. doi: 10.1109/TCOMM.2015.2506699. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES