Next Article in Journal
Paced Breathing Increases the Redundancy of Cardiorespiratory Control in Healthy Individuals and Chronic Heart Failure Patients
Previous Article in Journal
Rectangular-Normalized Superpixel Entropy Index for Image Quality Assessment
Previous Article in Special Issue
A New Belief Entropy to Measure Uncertainty of Basic Probability Assignments Based on Belief Function and Plausibility Function
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Age of Information in Wireless Powered Networks in Low SNR Region for Future 5G

1
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
2
Beijing Key Laboratory of Traffic Data Analysis and Mining, Beijing Jiaotong University, Beijing 100044, China
3
State Grid Energy Research Institute Co., Ltd., Beijing 102209, China
4
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
5
Beijing Computing Center, Beike Industry Park, Beijing 100094, China
6
China Academy of Telecommunications Technology, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(12), 948; https://doi.org/10.3390/e20120948
Submission received: 7 November 2018 / Revised: 3 December 2018 / Accepted: 5 December 2018 / Published: 10 December 2018
(This article belongs to the Special Issue Information Theory and 5G Technologies)

Abstract

:
Wireless powered communication technology has a great potential to power low-power wireless sensor networks and Internet of Things (IoT) for real-time applications in future 5G networks, where age of information (AoI) plays a very important performance metric. This paper studies the system average AoI of a wireless powered network, where a wireless-powered user harvests energy from a wireless power source (WPS) and then transmits data packets to its access point (AP) by using the harvested energy. The user generates data packets with some probability and adopts the first-come-first-served (FCFS) service policy. For such a system, by using the queuing theory and the probability models, we derive a closed-form expression of the system average AoI. We also formulate an optimization problem to minimize the AoI by optimizing the data packet generating probability, and find its solution by simple calculation and search. Simulation results demonstrate the correctness of our obtained analytical results. It also shows that, when the total distance of the two hops is fixed, the system average AoI increases linearly with the increment of the distance of the first hop, and a smaller data packet generating probability should be selected to match a bigger first-hop distance for achieving a smaller system average AoI. Moreover, a smaller data packet size also contributes to a smaller system average AoI.

1. Introduction

Recently, the widespread use of mobile devices and applications has made the real-time information updating applications such as news, weather forecasting and traffic alert more and more popular [1,2,3]. Timely information updating is also becoming more and more critical for real-time monitoring and control systems, including wireless sensor networks (WSNs) and internet of Things (IoT) for temperature and humidity detection in warehouses [4], safety and state monitoring in industrial production lines, embedded equipments in medical care [5], and road condition detection in automatic droving for future 5G systems [6,7]. The common key point of above-mentioned real-time applications is how to guarantee the freshness of the collected data.
Traditionally, delay and throughput are two important and widely adopted indices to evaluate the system performance of communication networks [8,9]. However, they are insufficient to describe the freshness of the data [10]. Therefore, a new metric, referred to as age of information (AoI), has emerged recently, which is defined to characterize the elapsed time since the last received data was generated [11]. The AoI actually describes the freshness of status updates based on time-varying wireless channel transmissions because it can reflect real world constraints condition that the delivery of a status message requires a nonzero and typically random time in the system [12].
In the past several years, AoI has been analyzed and studied in various queuing systems. For instance, the AoI was analyzed for single-source single-server queues in [11], and for M/M/1 first-come-first-served (FCFS) systems with multiple sources in [13]. In [14], AoI was explored for a multi-class M/G/1 queueing system. In [15], a packet deadline was regarded as a control mechanism to study its impact on the average AoI for M/M/1 queueing systems, and in [16], it was found that the packet waiting in queue was replaced if a new packet arrives service discipline is optimal.
Meanwhile, in order to realize the fresh-data transmission and explore the system performance limit, AoI was minimized for single-hop networks, see e.g., [11,14,17,18], and multi-hop networks, see e.g., [19,20], with different system setups. In [19], it was shown that for general system settings (including arbitrary network topology, packet generation times, packet arrival times, and queue buffer sizes), age-optimality can be achieved. In [20], an energy harvesting (EH) assisted two-hop system was studied, where an EH-enabled source collected measurements from a physical phenomenon and then sent updates to a destination with the help of an EH-enabled relay.
As for EH, it is able to power the device by harvesting energy from external environment [21] and has a great potential to be applied to energy-constrained networks including IoT and WSNs in future 5G [22,23,24,25,26,27,28]. EH technologies can be classified into two categories: the natural energy source-based EH and the radio frequency (RF) signal-based EH [29,30,31,32,33,34]. Compared with natural source, RF signal is easier to control and has less environmental limitations to deploy. Therefore, it is becoming more and more popular. Since RF EH-enabled IoT and sensor networks are expected to be widely employed for industrial control, unmanned driving systems and real-time applications, analyzing AoI performance and designing AoI minimized systems for RF-EH wireless networks have attracted increasing interest, see e.g., [35,36]. In [35], the average AoI of the two-way networks, where the slave node is powered by RF EH supply and the uplink average AoI was analyzed. In [36], the authors studied how to design optimal online status update policies to minimize the long-term average AoI, subject to the energy causality constraint at the sensor.
In this paper, we study the average AoI in a wireless powered network, where a wireless-powered user harvests energy from a wireless power source (WPS) and transmits data packets to its access point (AP). The user generates a data packet with some probability p in each time block, and the generated data are stored in an infinite buffer queue. FCFS service policy is employed, using the queuing theory and the probability model. We derive a closed-form expression of the average AoI for such a system. Numerical results are provided to discuss the system AoI performance. It is observed that there is an optimal p such that the AoI reaches minimal. Therefore, we formulate an optimal problem to minimize the AoI to find the optimal p. Since the problem is non-convex, we use the one-dimensional search to find the optimal p. Moreover, with other parameters being fixed, we find that the minimal average AoI linearly increase with the increment of packet size. In addition, we also analyze the effects of other factors on the average AoI. It is found that, when the total distance of the two hops is fixed, the system average AoI increases linearly with the increment of the distance of the first hop, and a smaller data packet generating probability should be selected to match a bigger first-hop distance for achieving a smaller system average AoI. Moreover, a smaller data packet size also contributes to a smaller system average AoI.
The rest of the paper is organized as follows. In Section 2, we present the system model, including the channel model, the data transmission model and the energy transfer model. In Section 3, we derive an explicit expression of the average AoI. Section 4 discusses the system AoI performance via simulations. Section 5 summarizes the paper with some conclusions.

2. System Model

We consider a wireless powered network, as depicted in Figure 1, where a user (e.g., a sensor node) desires to transmit its data to its AP (e.g., a sink node). Since the user is lack of energy, it has to harvest energy from a WPS that deployed in the system and used to charge the wireless devices via wireless power transfer. Our considered network model can be regarded as a basic component of complex networks. For example, when multiple nodes are deployed, by using time division multiple access(TDMA) or frequency division multiple access (FDMA), the complex network can be decomposed into multiple point-to-point networks [37,38,39], each of which is like our considered model.
It is assumed that the system works in a discrete time manner. That is, the time is divided into blocks with equal interval T b . The time period from the epoch n to the epoch n + 1 is referred to as the time block n. Block Rayleigh fading channel model from WPS to the user and from the user to its AP is assumed, so that the channel coefficient can be considered as a constant in each time block, and it may vary from one time block to the next for information transmission. Let h 1 [ n ] and h 2 [ n ] be the channel coefficients of the links from the WPS to the user and from the user to the AP, respectively, associated with time block n. The corresponding power gains | h 1 | 2 and | h 2 | 2 follow the exponential distribution, which can be expressed by
f | h 1 | 2 ( x ) = λ 1 e λ 1 x ,
and
f | h 2 | 2 ( x ) = λ 2 e λ 2 x ,
where λ 1 and λ 2 are the exponential distribution parameters.
In each block, the user generates a data packet with size of δ bits randomly with a certain probability p, and the generated data packets are first stored in a data buffer, and then transmitted with the FCFS policy. Denote the distance between the WPS and the user and between the user and the AP to be d 1 and d 2 , respectively. Let the transmit power of the WPS be P w . If in time block n, the user performs energy harvesting, the energy received at the user from the WPS in time block n is given by
E [ n ] = μ | h 1 [ n ] | 2 P w T b ,
where η is the energy transfer efficiency and μ = η d 1 α . α is the pass loss factor.
Since the energy transfer efficiency η is less than one and the received power is also relatively small due to pass loss, the user may take several blocks to harvest and accumulate energy to complete a block of transmission. The energy accumulated at the user within j blocks is
e j = i = 1 j E [ i ] = μ P w T b i = 1 j | h 1 [ i ] | 2 .
According to Equation (1), | h 1 | 2 follows exponential distribution with parameter λ 1 , so e j follows Erlang ( j , λ 1 μ P w T b ) distribution, i.e.,
f e j = v j x j 1 e v x ( j 1 ) ! ,
where v = λ 1 μ P w T b .
It is assumed that the energy transmission and data transmission are over orthogonal frequency bands. Let the transmit power of the user be P u . Assume that the received signals are suffered from additive white Gaussian noise. If in time block n, the user performs data transmission, the data size can be delivered in block n is (see Endnote [40]—which refers to Reference [35,41])
c [ n ] = T b B log 1 + | h 2 [ n ] | 2 P u B N 0 ,
where B is the system bandwidth and N 0 = n 0 d 2 α with n 0 denoting the noise spectral density.
For such a system, our goal is to analyze its average AoI performance in fading channels.

3. AOI Analysis

In IoT and sensor networks, the transmit power of the devices is usually very low, so that the received energy from the transmitted signals of WPS at the user is relatively very small. Therefore, we analyze the system AoI performance in the low SNR regime, where c [ n ] can be approximated by
c [ n ] | h 2 [ n ] | 2 P u T b N 0 .

3.1. Preliminary Analysis

Denote the number of time blocks required to complete the transmission of one data packet with size of δ to be N I . Define the probability of successfully completing a packet transmission with j time blocks to be p j n i . When the user accumulates sufficient energy, we obtain the following theoretical results.
Proposition 1.
The probability of successfully completing a packet transmission with j time blocks is
p j n i = θ j 1 ( j 1 ) ! e θ ,
where j = 1 , 2 , 3 , , n and θ = λ 2 N 0 δ P u T b .
Proof. 
According to the definition of p j n i and [42], it can be expressed that
p j n i = Pr N I = j = Pr i = 1 j 1 c [ i ] < δ , i = 1 j c [ i ] δ = 0 δ f C ( x ) d x δ x f c ( x ) d x ,
where f C ( x ) and f c ( x ) are probability density function (pdf) of i = 1 j 1 c [ i ] and c [ i ] , respectively.
Since | h 2 | 2 follows exponential distribution, from Equation (6), c [ n ] obeys exponential distribution. Thus, the cumulative distribution function (CDF) of c [ n ] is
F c ( x ) = Pr ( c < x ) = Pr | h 2 | 2 < N 0 P u T b x = 0 N 0 x P u T b λ 2 e λ 2 y d y = 1 e ( λ 2 N 0 P u T b ) x .
Furthermore, it can be inferred that i = 1 j c [ i ] follows the Gamma distribution. Thus, the pdf of i = 1 j c [ i ] is given by
f C ( x ) = ( λ 2 N 0 P u T b ) ( j 1 ) Γ ( j 1 ) x ( j 2 ) e ( λ 2 N 0 P u T b ) x ,
where Γ ( j 1 ) = 0 e t t j 2 d t is the Gamma function. Thus,
p j n i = 0 δ f C ( x ) d x δ x f c ( x ) d x = 0 δ ( λ 2 N 0 P u T b ) ( j 1 ) Γ ( j 1 ) x ( j 2 ) e ( λ 2 N 0 P u T b ) x d x δ x f c ( x ) d x = ( λ 2 N 0 δ P u T b ) j 1 ( j 1 ) ! e λ 2 N 0 δ P u T b ,
with θ = λ 2 N 0 δ P u T b . Therefore, we arrive at Proposition 1. □
Proposition 2.
The probability generating function (PGF) and the expectation of N I are
G N I ( z ) = z e θ ( z 1 ) ,
and
E ( N I ) = 1 + θ ,
respectively.
Proof. 
In terms of the definition of P G F , we have
G N I ( z ) = E ( z n i ) = j = 0 z j Pr { N I = j } = j = 0 z j θ j 1 ( j 1 ) ! e θ = z e θ ( z 1 ) .
By the property of P G F , we have
E ( N I ) = lim z 1 G N I ( z ) = 1 + θ .
 □
In our model, the harvested energy is allowed to be used for information transmission in the same block. As long as the accumulated energy at the user is greater than or equal to P u T b , it performed a block of transmission. Suppose the number of blocks that need to harvest energy for the user to complete a block of transmission is N E . Since the energy transfer efficiency η is less than one and the received power is also relatively small due to pass loss, the user may take several blocks to harvest energy to complete a block of transmission, i.e., N E 1 . As a result, the transmitter start information delivering at time block j, if
{ e j 1 < P u T b , e j P u T b } , for j = 1 , 2 , 3 , .
Therefore, the actual time required to complete a block of transmission is N E = j . Without loss of generality, we suppose P w = β P u , with β > 0 . In terms of Equations (4) and (5), the probability Pr { N E = j } of N E = j can be given by
Pr { N E = j } = Pr { e j 1 < P u T b , e j P u T b } = 0 P u T b f e j ( x ) d x P u T b x f e 1 ( y ) d y = ( λ 1 β μ ) j 1 ( j 1 ) ! e ( λ 1 β μ ) , for j = 1 , 2 , 3 , .
Let the service time of the kth data packet is T k ( S ) , which represents the time for harvesting energy and the time for transmitting data.
Lemma 1.
The probability that j time blocks are needed to actually transfer a data packet is
p j s = Pr { T k ( S ) = j } = ( ( 1 + θ ) λ 1 β μ ) j 1 ( j 1 ) ! e ( 1 + θ ) λ 1 β μ .
Proof. 
When the user accumulates sufficient energy, in terms of Equation (9), the average time to transmit a data packet is 1 + θ . Since the user needs N E time blocks to harvest energy to perform a block of transmission, that is, T k ( S ) contains 1 + θ independent and identically distributed variables N E ( i ) , according to Equation (10), one can derive Equation (11). □
Proposition 3.
The probability generating function (PGF) of T k ( S ) is
G T k ( S ) ( z ) = z e ( z 1 ) ( 1 + θ ) λ 1 β μ ,
and the expectation of T k ( S ) is
E ( T k ( S ) ) = 1 + ( 1 + θ ) λ 1 β μ .
Proof. 
In terms of the definition of P G F , we have
G T k ( S ) ( z ) = E ( z T ) = j = 0 z j Pr { T k S = j } = j = 0 z j ( ( 1 + θ ) λ 1 β μ ) j 1 ( j 1 ) ! e ( 1 + θ ) λ 1 β μ = z e ( z 1 ) ( 1 + θ ) λ 1 β μ .
By the property of P G F , we have
E ( T k ( S ) ) = lim z 1 G T k ( S ) ( z ) = 1 + ( 1 + θ ) λ 1 β μ .
 □

3.2. Description of System Average AoI

The AoI is defined as the time elapsed since the last received packet was generated [11], which is used to measure the freshness of information at the destination. We assume that the most recently received data packet at AP in block n was generated at the time U [ n ] . Therefore, the AoI in block n, can be expressed by
Δ [ n ] = n U [ n ] .
Figure 2 illustrates a sample evolution of AoI versus time blocks with initial age Δ 0 , i.e., Δ [ 0 ] = Δ 0 . Since time is discrete, the AoI is constant within each block and varies from a block to next block. Let n k denote the generation time of the kth data packet, and n k denote the time when the kth data packet is completely transmitted. The number of blocks from the generation of a data packet to the completion of the transmission is T k ( T ) , i.e.,
T k ( T ) = n k n k ,
which is called the system time. The interval time between the generation of data packet k 1 and data packet k is set as I k . That is,
I k = n k n k 1 .
Let T k ( W ) denote the waiting time of data packet k. The time of a data packet in system is also equal to the sum of waiting time T k ( W ) and service time T k ( S ) , i.e.,
T k ( T ) = T k ( W ) + T k ( S ) . ( )
It is observed that the AoI increases linearly in time and is reset to a smaller value when a data packet is received. That is, at n k , the AoI is reset to Δ [ n ] = n k n k . Over a period of N blocks where K data packets are delivered, the average AoI is defined as
Δ ¯ = 1 N n = 1 N Δ [ n ] .
As illustrated in Figure 2, the average AoI of system can be calculated as the average area of the blue graphic Q k , i.e.,
Δ ¯ = lim N 1 N Q 0 + k = 1 K 1 Q k + R K ,
where R K = 1 2 T K ( T ) T K ( T ) + 1 .
In the following, we shall discuss how to derive a closed-form exprtession of the average AoI Δ ¯ .

3.3. Closed-Form Expression of Δ ¯

From Figure 2, one can see that the area of Q 0 and R K are limited, with large enough N, Q 0 N and R k N are close to zero. Therefore, Δ ¯ can be approximatively give by
Δ ¯ = lim N 1 N k = 1 K 1 Q k = lim N K 1 N 1 K 1 k = 1 K 1 Q k = p E ( Q k ) .
Moreover, one can see that the area of Q k is the difference of the area of the large red triangle minus the area of the small black triangle, as illustrated in Figure 3. That is,
E ( Q k ) = E 1 2 T k ( T ) + I k + 1 2 2 1 2 T K ( T ) + 1 2 2 = E 1 2 I k I k + 1 + I k T K ( T ) = 1 2 E I k + 1 2 E I k 2 + E I k T K ( T ) .
Now, we begin to drive the explicit expressions of E I k , E I k 2 and E I k T K ( T ) as follows.

3.3.1. Expressions of E I k and E I k 2

Since p is the generation rate of the data packet at the user, i.e., data generating with probability p in each block. Therefore, the inter arrival time I k follows geometric distribution. I k = j means that in the j-th block data packet is successfully generated, but was not generated in the previous j 1 consecutive blocks. Thus,
Pr { I k = j } = ( 1 p ) j 1 p , j = 1 , 2 , .
As a result,
E ( I k ) = 1 p ,
and
E ( I k 2 ) = 2 p p 2 .

3.3.2. Expressions of E I k T K ( T )

Let Y k be the number of data packets generated during the system time of the kth data packet. It is also a random variable. To describe it, we define { Y k } as an independent and identically distributed random sequence. The probability of generating j data packets during the service time of a data packet can be given by
p j y = Pr { Y k = j } ,
where j = 0 , 1 , 2 , and j = 0 p j y = 1 . Let L k be the number of data packets in the queue before servicing the kth data packet. Thus, we have
L k + 1 = L k 1 + Y k , L k 1 , Y k , L k = 0 .
By regarding { L k } as a state of the system, it can be expressed by a Markov chain. Its state transition diagram is shown in Figure 4, where the numbers in the figure represents the different status (i.e., value of L k ), and the probability on the curve represents the transition probability from one state to the next. The transition probability is obtained as follows:
p 00 y = Pr ( L k + 1 = 0 | L k = 0 ) = Pr ( Y k = 0 ) = p 0 y , p 01 y = Pr ( L k + 1 = 1 | L k = 0 ) = Pr ( Y k = 1 ) = p 1 y , p 02 y = Pr ( L k + 1 = 2 | L k = 0 ) = Pr ( Y k = 2 ) = p 2 y , p 03 y = Pr ( L k + 1 = 3 | L k = 0 ) = Pr ( Y k = 3 ) = p 3 y , p 10 y = Pr ( L k + 1 = 0 | L k = 1 ) = Pr ( L k 1 + Y k = 0 | L k = 1 ) = Pr ( Y k = 0 ) = p 0 y , p 11 y = Pr ( L k + 1 = 1 | L k = 1 ) = Pr ( L k 1 + Y k = 1 | L k = 1 ) = Pr ( Y k = 1 ) = p 1 y , p 12 y = Pr ( L k + 1 = 2 | L k = 1 ) = Pr ( L k 1 + Y k = 2 | L k = 1 ) = Pr ( Y k = 2 ) = p 2 y , p 13 y = Pr ( L k + 1 = 3 | L k = 1 ) = Pr ( L k 1 + Y k = 3 | L k = 1 ) = Pr ( Y k = 3 ) = p 3 y . . . .
By doing so, the transition probability associated with every link in Figure 4 is determined.
Proposition 4.
The probability distribution and the PGF of Y are respectively given by,
p j y = ( 1 p ) e ( 1 + θ ) λ 1 β μ p ( ( 1 + θ ) λ 1 β μ p ) j j ! + p e ( 1 + θ ) λ 1 β μ p ( ( 1 + θ ) λ 1 β μ p ) j 1 ( j 1 ) ! ,
and
G Y ( z ) = ( 1 p + p z ) e ( 1 + θ ) λ 1 β μ p ( z 1 ) .
Proof. 
See Appendix A. □
In terms of Foster’s Theorem of [43], when the data arrival rate less than the service rate, the system is stable. That is, p ( 1 + ( 1 + θ ) λ 1 β μ ) < 1 . Therefore, we discuss the case when p ( 1 + ( 1 + θ ) λ 1 β μ ) < 1 , where ( 1 + ( 1 + θ ) λ 1 β μ ) is actually the service time of a data packet. In this case, Markov chain { L k } has a stationary distribution π = ( π 0 , π 1 , . . . ) with
π j = lim k Pr { L k = j } .
Thus, we can obtain the following Proposition 5.
Proposition 5.
When p ( 1 + ( 1 + θ ) λ 1 β μ ) < 1 , the PGF of L k is given by
G L k ( z ) = ( 1 p ( 1 + θ ) λ 1 β μ p ) ( 1 p + p z ) ( 1 z ) 1 p + p z z e ( 1 + θ ) λ 1 β μ p ( 1 z ) .
Proof. 
See Appendix B. □
Proposition 6.
The PGF of the system time of each data packet is given by
G T ( z ) = ( 1 p ( 1 + θ ) λ 1 β μ p ) z ( 1 z ) p z ( z 1 + p ) e ( 1 + θ ) λ 1 β μ ( 1 z ) .
Proof. 
See Appendix C. □
Lemma 2.
The average system time is
E ( T k ( T ) ) = 1 + ( 1 + θ ) λ 1 β μ + 2 p ( 1 + θ ) λ 1 β μ + ( ( 1 + θ ) λ 1 β μ ) 2 p 2 ( 1 p ( 1 + θ ) λ 1 β μ p ) .
Proof. 
By the property of PGF, we can obtain
E ( T k ( T ) ) = lim z 1 G T ( z ) = ( ( 1 + θ ) λ 1 β μ ) 2 p + 2 ( 1 + θ ) λ 1 β μ p + 2 p 2 ( 1 + θ ) λ 1 β μ 2 2 ( ( 1 + θ ) λ 1 β μ p + p 1 ) = 1 + ( 1 + θ ) λ 1 β μ + 2 p ( 1 + θ ) λ 1 β μ + ( ( 1 + θ ) λ 1 β μ ) 2 p 2 ( 1 p ( 1 + θ ) λ 1 β μ p ) .
 □
Recall Equation ( ) , i.e., the system time of data packet k. Note that, when the kth data packet is generated at the user, if the ( k 1 ) th data packet has completed the service, T k ( W ) = 0 . In this case, the waiting time for the data packet is T k ( W ) = max ( 0 , T k 1 ( T ) I k ) . As T k ( W ) and I k are not independent of each other, and T k ( S ) is independent of I k , one has
E ( I k T k ( T ) ) = E ( I k ( T k ( W ) + T k ( S ) ) ) = E ( I k ) E ( T k ( S ) ) + E ( I k T k ( W ) ) .
Proposition 7.
For the considered system,
E ( I k T k ( W ) ) = ( 2 + 4 p + 3 ( 1 + θ ) λ 1 β μ p ) ( 1 + θ ) λ 1 β μ 2 p ( 1 p ( 1 + θ ) λ 1 β μ p ) + ( 1 p ( 1 + θ ) λ 1 β μ p ) ( e ( 1 + θ ) λ 1 β μ p 1 ) p 2 .
Proof. 
See Appendix D. □
Theorem 1.
When p ( 1 + ( 1 + θ ) λ 1 β μ ) < 1 , the average AoI is given by
Δ ¯ = 1 p + ( 1 + ( 1 + θ ) λ 1 β μ ) + ( 2 + 4 p + 3 ( 1 + θ ) λ 1 β μ p ) ( 1 + θ ) λ 1 β μ 2 ( 1 p ( 1 + θ ) λ 1 β μ p ) + ( 1 p ( 1 + θ ) λ 1 β μ p ) ( e ( 1 + θ ) λ 1 β μ p 1 ) p ,
where θ = λ 2 N 0 δ P u T b .
Proof. 
Combining Equations (13), (17)–(20) and (28), one can get the expression for Δ ¯ . □
Furthermore, from Theorem 1, we can get the following two corollaries.
Corollary 1.
When p ( 1 + ( 1 + θ ) λ 1 β μ ) 0 , (i.e., p 0 ), Δ ¯ .
Proof. 
Let p = ϵ , where ϵ > 0 is a small enough number. Equation (29) can be approximately written as
Δ ¯ lim ϵ 0 1 ϵ + 1 + ( 1 + θ ) λ 1 β μ .
Since
lim ϵ 0 1 ϵ + 1 + ( 1 + θ ) λ 1 β μ = ,
we arrive at Corollary 1. □
Corollary 2.
When p ( 1 + ( 1 + θ ) λ 1 β μ ) 1 , (i.e., p 1 1 + ( 1 + θ ) λ 1 β μ ), Δ ¯ .
Proof. 
Let p = 1 1 + ( 1 + θ ) λ 1 β μ and 1 p ( 1 + ( 1 + θ ) λ 1 β μ ) = ϵ , where ϵ > 0 is a small enough number. Equation (29) can be approximately written as
Δ ¯ lim ϵ 0 2 1 + ( 1 + θ ) λ 1 β μ + ( 1 + θ ) λ 1 β μ ( 1 + θ ) λ 1 β μ + 2 2 ( 1 + θ ) λ 1 β μ + 1 · 1 ϵ .
Since
lim ϵ 0 2 1 + ( 1 + θ ) λ 1 β μ + ( 1 + θ ) λ 1 β μ ( 1 + θ ) λ 1 β μ + 2 2 ( 1 + θ ) λ 1 β μ + 1 · 1 ϵ = ,
we arrive at Corollary 2. □

3.4. The Minimal Average AoI of the System

Our objective is to minimize the average AoI. The maximum data rate that can make the data packets queue stable is p max = 1 1 + ( 1 + θ ) λ 1 k μ . Hence, we can formulate the problem as follows:
Problem 1.
min p Δ ¯ s . t . 0 < p < p max .
Since it is difficult to theoretically prove that the problem 1 is a convex or non-convex, we cannot directly obtain the optimal solution. Thus, we use the one-dimensional search to find the optimal p, and give simulation results to illustrate that there exists an optimal solution for Problem 1 in the next section (see Endnote [44]).
Fact 1.
The average AoI converges to a constant with the increment of P u .
Although it is difficult to prove Fact 1 and the converged constant is also hard to derive mathematically, we may analyze it from the physical perspective. It is known that with the increment of P u , the information rate of the second hop is increased, which may decrease the system AoI. However, due to the Shannon capacity theorem, the information rate of the second hop cannot be increased infinitely, so the system AoI cannot be decreased infinitely, which must converge to some value with the increment of P u .

4. Numerical Results

In this section, numerical simulations are conducted to discuss the system AoI performance. The simulation parameters are set according to [35]. Specifically, the distances between the WPS and the user and between the user and the AP, are set to unit distance, i.e., d 1 = d 2 = 1 meter. The pass loss factor is α = 2 . The transmit power of the user is set as P u = 0.01 W, and β = 1 , i.e., P w = P u . The size of data packet is δ = 8 bits. The energy transmission efficiency is η = 0.6 , the system bandwidth is B = 1 MHz, the block length is set as T b = 10 3 s, and the noise spectral density is n 0 = 4 × 10 7 . The parameters of the channel power gain | h 1 | 2 and | h 2 | 2 are set as λ 1 = 3 and λ 2 = 3 , respectively.
As shown in Figure 5, the analytical results match the simulation ones well, which validates the correctness of our analytical results. Moreover, when p is close to 0, the average AoI is very large because the interval of data generation I k is very large in this case. When p approaches p max , the average AoI also increases to be infinite because, in this case, the waiting time in the queue becomes very long. This observation is consistent with Corollary 1 and 2. It is also observed that there exists a unique optimal p such that the system average AoI achieves a minimum.
To further discuss the system performance, we fix D = d 1 + d 2 to be two meters and then increase d 1 gradually, as illustrated in Figure 6. The simulation results are plotted in a 3D figure as shown in Figure 7. One can observe that with, the increment of d 1 , the system average AoI increases linearly, and the smaller p should be selected for the bigger d 1 in order to achieve the system minimal average AoI.
Figure 8 plots the system average AoI versus data generation probability p and data size δ in a 3D figure. One can see that the minimal average AoI increases linearly with the increment of packet size δ , and the smaller p should be selected for the larger δ . In order to clearly show this, for each given data size δ , we mark the corresponding minimum AoI and it is plotted versus δ in Figure 9, which can be considered as the lower bound of the system average AoI. This observation also implies that, to keep the data fresh, the smaller packet size is preferred.
Figure 10 shows the system minimal average AoI versus P u with different configurations of T b . It is shown that, for a given block length T b , the minimum AoI decreases with increment of P u and then tends to be flat. That is, the average AoI converges to a constant with the increment of P u , which is consistent with the result in Fact 1. Moreover, the larger the the block length T b is, the smaller the minimal AoI of the system is.

5. Conclusions

In this paper, we studied the system average AoI of a wireless powered communication network, where a wireless powered user harvests energy from a WPS and then transmits data packets to its AP by using the harvested energy. By using the queuing theory and some typical probability models on the channel fading, we derived a closed-form expression of the system average AoI. Some interesting results are obtained, and there exists an optimal generating probability of sensor data (user) p such that the AoI reaches a minimum. Simulation results also show that, when the total distance of the two hops is fixed, the system AoI increases linearly with the increment of the distance of the first hop, and a smaller data packet generating probability should be selected to match a bigger first-hop distance for achieving a smaller system average AoI. Moreover, a smaller data packet size of users will result in contributing to a smaller system average AoI.

Author Contributions

H.H. and K.X. equally contributed to this work on System modeling and Methodology; K.X. also contributed to project administration; H.H. also contributed to writing and editing; P.F., Y.Z. contributed to the review and editing; T.L. and S.K. contributed to funding acquisition and simulations.

Funding

This work was supported in part by the Beijing Intelligent Logistics System Collaborative Innovation Center (No. BILSCIC-2018KF-05), in part by the General Program of the National Natural Science Foundation of China (NSFC) (No. 61671051), in part by the Beijing Natural Science Foundation (No. 4162049), in part by the major projects of Beijing Municipal Science and Technology Commission (No. Z181100003218010), and also in part by the Young Talents Program of State Grid Energy Research Institute Co., Ltd. (Research on the key technology of fog computing for smart grid, No. XM2018020035180).

Acknowledgments

We would like to thank all the reviewers for their constructive comments and helpful suggestions. In addition, we would like to give special thanks to Ruihong Jiang, who discussed the relative methods and also gave some helpful suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AoIage of information
CDFcumulative distribution function
EHenergy harvesting
RFradio frequency
FCFSfirst-come-first-served
PDFprobability density function
FDMAfrequency division multiple access
TDMAtime division multiple access
WPSwireless power source

Appendix A

Proof. 
According to Equation (11), Pr { T k ( S ) = m } = p m s . For the case Y k = 0 , we have
p 0 y = m = 1 Pr { T k ( S ) = m } Pr { Y k = 0 | T k ( S ) = m } = m = j p m s Pr { Y k = 0 | T k ( S ) = m } = m = j ( ( 1 + θ ) λ 1 β μ ) m 1 ( m 1 ) ! e ( 1 + θ ) λ 1 β μ ( 1 p ) m = ( 1 p ) e ( 1 + θ ) λ 1 β μ p ,
For the case Y k = j 1 , we have
p j y = m = j Pr { T k ( S ) = m } Pr { Y k = j | T k ( S ) = m } = m = j p m s Pr { Y k = j | T k ( S ) = m } = m = j ( ( 1 + θ ) λ 1 β μ ) m 1 ( m 1 ) ! e ( 1 + θ ) λ 1 β μ m ! j ! ( m j ) ! ( 1 p ) m j p j = e ( ( 1 + θ ) λ 1 β μ ) p j j ! m = 0 ( ( 1 + θ ) λ 1 β μ ) m + j 1 m m ! ( 1 p ) m = ( 1 p ) e ( 1 + θ ) λ 1 β μ p ( ( 1 + θ ) λ 1 β μ p ) j j ! + p e ( 1 + θ ) λ 1 β μ p ( ( 1 + θ ) λ 1 β μ p ) j 1 ( j 1 ) ! .
In terms of the definition of PGF, the PGF of Y k is
G Y ( z ) = E ( z Y k ) = j = 0 p j y z j = ( 1 p ) z j e ( 1 + θ ) λ 1 β μ p ( ( 1 + θ ) λ 1 β μ p ) j j ! + p z j e ( 1 + θ ) λ 1 β μ p ( ( 1 + θ ) λ 1 β μ p ) ( j 1 ) ( j 1 ) ! = ( 1 p + p z ) e ( 1 + θ ) λ 1 β μ p ( z 1 ) .
 □

Appendix B

Proof. 
When p ( 1 + ( 1 + θ ) λ 1 β μ ) < 1 , the queue is stable. According to the queueing theory and properties of stationary distribution, we have π P = π and
π = π 0 p j y + i = 1 j + 1 π i p j + 1 i y , j 0 .
The two sides of the equation are multiplied by z j , we can obtain
G L k ( z ) = π 0 j = 0 p j y z j + j = 0 z j i = 1 j + 1 π i p j + 1 i y = π 0 G Y ( z ) + 1 z [ G L k ( z ) π 0 ] G Y ( z ) ,
where G Y ( z ) is given by Equation (A3). In order to calculate G L k ( z ) , Equation (A4) can be expressed as
G L k ( z ) = π 0 ( 1 z ) G Y ( z ) G Y ( z ) z = π 0 ( 1 z ) 1 z / G Y ( z ) .
According to the properties of the PGF, we have
lim z 1 G L k ( z ) = π 0 1 p ( 1 + θ ) λ 1 β μ p = 1 .
Therefore, π 0 = 1 p ( 1 + θ ) λ 1 β μ p . We can calculate G L k ( z ) by taking π 0 into Equation (A5). □

Appendix C

Proof. 
In the first-come first-served queue, the queue length at the packet departure time being transmitted is equal to the number of arriving data packets during the system time of the leaving data packet. Thus,
Pr { L k = j } = i = j Pr ( T k ( T ) = i ) C i j p j ( 1 p ) i j ,
where j = 0 , 1 , 2 , , a n d j i .
According to the definition of PGF, we have
G L k ( s ) = E ( s L ) = j = 0 s j Pr { L k = j } = j = 0 s j i = j Pr { T k ( T ) = i } C i j p j ( 1 p ) i j = i = 0 Pr { T k ( T ) = i } j = 0 i C i j ( p s ) j ( 1 p ) i j = i = 0 Pr { T k ( T ) = i } ( 1 p + p s ) i = G T ( 1 p + p s ) .
Combining formulas G L k ( z ) in Proposition 5 and G L k ( s ) = G T ( 1 p p s ) in Equation (A6), and replacing ( 1 p p s ) with z, we can get G T ( z ) . □

Appendix D

Proof. 
In order to calculate E ( I k T k ( W ) ) , we define an auxiliary function as
F ( z ) = i = 1 Pr { I k = i } z i j = 0 Pr { T k ( T ) i + j } = j = 1 i = 1 j Pr { I k = i } z i Pr { T k ( T ) j } j = 1 Pr { T k ( T ) j } p z 1 ( 1 p ) j z j 1 ( 1 p ) z p z 1 ( 1 p ) z ( E ( T k 1 ( T ) ) 1 G T ( ( 1 p ) z ) 1 ( 1 p ) z ) ,
where the last two { } obtained by Lemma 3 [42]. G T ( z ) and E ( T k 1 ( T ) ) are given by Equations (25) and (26). Thus, we have
E ( I k T k ( W ) ) = E ( I k E ( max ( 0 , T k 1 ( T ) I k ) ) ) = i = 1 i Pr ( I k = i ) j = 0 Pr ( max ( 0 , T k 1 ( T ) i > j ) ) = i = 1 i Pr ( I k = i ) j = 0 Pr ( T k 1 ( T ) > j + i ) = lim z 1 ( F ( z ) ) = lim z 1 p ( E ( T k 1 ( T ) ) ) ( 1 ( 1 p ) z ) 2 + p ( 1 p ) z ( 1 ( 1 p ) z ) 2 G T ( ( 1 p ) z ) p ( 1 + ( 1 p ) z ) ( 1 ( 1 p ) z ) 3 ( 1 G T ( ( 1 p ) z ) ) = ( 2 + 4 p + 3 ( 1 + θ ) λ 1 β μ p ) ( 1 + θ ) λ 1 β μ 2 p ( 1 p ( 1 + θ ) λ 1 β μ p ) + ( 1 p ( 1 + θ ) λ 1 β μ p ) ( e ( 1 + θ ) λ 1 β μ p 1 ) p 2 ,
where G T ( ( 1 p ) z ) and G T ( ( 1 p ) z ) can be calculated by Equation (25). □

References and Notes

  1. Karevan, Z.; Suykens, J.A.K. Transductive feature selection using clustering-based sample entropy for temperature prediction in weather forecasting. Entropy 2018, 20, 264. [Google Scholar] [CrossRef]
  2. Li, Y.; Xu, S. Traffic offloading in unlicensed spectrum for 5G cellular network: A two-layer game approach. Entropy 2018, 20, 88. [Google Scholar] [CrossRef]
  3. Sun, Y.; Uysal-Biyikoglu, E.; Yates, R.D.; Koksal, C.E.; Shroff, N.B. Update or wait: How to keep your data fresh. IEEE Trans. Inf. Theory 2017, 63, 7492–7508. [Google Scholar] [CrossRef]
  4. Al-Ali, A.R.; Zualkernan, I.; Aloul, F. A mobile GPRS-sensors array for air pollution monitoring. IEEE Sens. J. 2010, 10, 1666–1671. [Google Scholar] [CrossRef]
  5. Parhizkar, T.; Balali, S.; Mosleh, A. An entropy based bayesian network framework for system health monitoring. Entropy 2018, 20, 416. [Google Scholar] [CrossRef]
  6. Gandhi, T.; Trivedi, M.M. Pedestrian protection systems: Issues, survey, and challenges. IEEE Trans. Intell. Transp. Syst. 2007, 8, 413–430. [Google Scholar] [CrossRef]
  7. Ni, Y.; Cai, L.; Bo, Y. Vehicular beacon broadcast scheduling based on age of information (AoI). China Commun. 2018, 15, 67–76. [Google Scholar] [CrossRef]
  8. Floor, P.A.; Kim, A.N.; Ramstad, T.A.; Balasingham, I. Zero delay joint dource channel coding for multivariate gaussian sources over orthogonal gaussian channels. Entropy 2013, 15, 2129–2216. [Google Scholar] [CrossRef]
  9. Ejaz, W.; Shah, G.A.; Hasan, N.; Kim, H.S. Optimal entropy-based cooperative spectrum sensing for maritime cognitive radio networks. Entropy 2013, 15, 4993–5011. [Google Scholar] [CrossRef]
  10. Kam, C.; Kompella, S.; Nguyen, G.D.; Wiesilthier, J.E.; Ephremides, A. On the age of information with packet deadlines. IEEE Trans. Inf. Theory 2018, 64, 6419–6428. [Google Scholar] [CrossRef]
  11. Kaul, S.K.; Yates, R.D.; Gruteser, M. Real-time status: How often should one update? In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012. [Google Scholar]
  12. Kosta, A.; Pappas, N.; Angelakis, V. Age of information: A new concept, metric, and tool. Found. Trends Netw. 2017, 12, 162–259. [Google Scholar] [CrossRef]
  13. Yates, R.D.; Kaul, S.K. The age of information: Real-time status updating by multiple sources. IEEE Trans. Inf. Theoty 2018, 1–20. [Google Scholar] [CrossRef]
  14. Huang, L.; Modiano, E. Optimizing age-of-information in a multi-class queueing system. arXiv, 2015; arXiv:1504.05103v1. [Google Scholar]
  15. Kam, C.; Kompella, S.; Nguyen, G.D.; Wieselthier, J.E.; Ephremides, A. On the age of information with a packet deadline. Proc. IEEE Int. Symp. Inf. Theory 2016, 64, 6419–6428. [Google Scholar] [CrossRef]
  16. Costa, M.; Codreanu, M.; Ephremides, A. On the age of information in status update systems with packet management. IEEE Trans. Inf. Theory 2016, 62, 1897–1910. [Google Scholar] [CrossRef]
  17. Najm, E.; Nasser, R. Age of information: The gamma awakening. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016. [Google Scholar]
  18. Chen, K.; Huang, L. Age-of-information in the presence of error. In Proceedings of the International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016. [Google Scholar]
  19. Bedewy, A.M.; Sun, Y.; Shroff, N.B. Age-optimal information updates in multihop networks. In Proceedings of the International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
  20. Arafa, A.; Ulukus, S. Age-minimal transmission in energy harvesting two-hop networks. arXiv, 2017; arXiv:1704.08679v2. [Google Scholar]
  21. Chang, S.; Li, J.; Fu, X.; Zhang, L. Energy harvesting for physical layer security in cooperative networks based on compressed sensing. Entropy 2017, 9, 462. [Google Scholar] [CrossRef]
  22. Xiong, K.; Chen, C.; Qu, G.; Fan, P.; Letaief, K.B. Group cooperation with optimal resource allocation in wireless powered communication networks. IEEE Trans. Wirel. Commun. 2017, 16, 3840–3853. [Google Scholar] [CrossRef]
  23. Mekikis, P.-V.; Kartsakli, E.; Antonopoulos, A.; Alonso, L.; Verikoukis, C. Connectivity analysis in clustered wireless sensor networks powered by solar energy. IEEE Trans. Wirel. Commun. 2018, 17, 2389–2401. [Google Scholar] [CrossRef]
  24. Ruan, T.; Chew, Z.J.; Zhu, M. Energy-aware approaches for energy harvesting powered wireless sensor nodes. IEEE Sens. J. 2017, 17, 2165–2173. [Google Scholar] [CrossRef]
  25. Mekikis, P.-V.; Antonopoulos, A.; Kartsakli, E.; Lalos, A.S.; Alonso, L.; Verikoukis, C. Information exchange in randomly deployed dense WSNs with wireless energy harvesting capabilities. IEEE Trans. Wirel. Commun. 2016, 15, 3008–3018. [Google Scholar] [CrossRef]
  26. Xiong, K.; Wang, B.; Liu, K.J.R. Rate-energy region of SWIPT for MIMO broadcasting under nonlinear energy harvesting model. IEEE Trans. Wirel. Commun. 2017, 16, 5147–5161. [Google Scholar]
  27. Mekikis, P.-V.; Lalos, A.S.; Antonopoulos, A.; Alonso, L.; Verikoukis, C. Wireless energy harvesting in two-way network coded cooperative communications: A stochastic approach for large scale networks. IEEE Commun. Lett. 2014, 18, 1011–1014. [Google Scholar] [CrossRef]
  28. Zhang, H.; Huang, S.; Jiang, C.; Long, K.; Leung, V.C.M.; Poor, H.V. Energy efficient user association and power allocation in millimeter wave based ultra dense networks with energy harvesting base stations. IEEE J. Sel. Areas Commun. 2017, 35, 1936–1947. [Google Scholar] [CrossRef]
  29. Di, X.; Xiong, K.; Fan, P.Y.; Yang, H.C. Simultaneous wireless information and power transfer in cooperative relay networks with rateless codes. IEEE Trans. Veh. Technol. 2017, 66, 2981–2996. [Google Scholar] [CrossRef]
  30. Gorlatova, M.; Wallwater, A.; Zussman, G. Networking low-power energy harvesting devices: Measurements and algorithms. IEEE Trans. Mob. Comput. 2013, 12, 1853–1865. [Google Scholar] [CrossRef]
  31. Xiong, K.; Fan, P.Y.; Zhang, C.; Letaief, K.B. Wireless information and energy transfer for two-hop non-regenerative MIMO-OFDM relay networks. IEEE J. Sel. Areas Commun. 2015, 33, 1595–1611. [Google Scholar] [CrossRef]
  32. Jiang, R.; Xiong, K.; Fan, P.; Zhang, Y.; Zhong, Z. Optimal design of SWIPT systems with multiple heterogeneous users under non-linear energy harvesting model. IEEE Access 2017, 5, 11479–11489. [Google Scholar] [CrossRef]
  33. Zhang, H.; Du, J.; Cheng, J.; Long, K.; Leung, V.C.M. Incomplete CSI based resource optimization in SWIPT enabled heterogeneous networks: A non-cooperative game theoretic approach. IEEE Trans. Wirel. Commun. 2018, 17, 1882–1892. [Google Scholar] [CrossRef]
  34. Zheng, H.; Xiong, K.; Fan, P.; Zhou, L.; Zhong, Z. SWIPT-aware fog information processing: Local computing vs. fog offloading. Sensors 2018, 18, 3291. [Google Scholar] [CrossRef]
  35. Dong, Y.; Chen, Z.; Fan, P. Uplink age of information of unilaterally powered two-way data exchanging systems. In Proceedings of the IEEE INFOCOM, Honolulu, HI, USA, 15–19 April 2018. [Google Scholar]
  36. Wu, X.; Yang, J.; Wu, J. Optimal status update for age of information minimization with an energy harvesting source. IEEE Trans. Green Commun. Netw. 2018, 2, 193–204. [Google Scholar] [CrossRef]
  37. Lee, J.K.; Noh, H.J.; Lim, J. TDMA-based cooperative MAC protocol for multi-hop relaying networks. IEEE Trans. Lett. Year 2014, 18, 435–438. [Google Scholar] [CrossRef]
  38. Zhang, J.; Yang, L.; Hanzo, L.; Gharavi, H. Advances in cooperative single-carrier FDMA communications: Beyond LTE-advanced. IEEE Commun. Surv. Tutor. Year 2015, 17, 730–756. [Google Scholar] [CrossRef]
  39. Di, X.; Xiong, K.; Fan, P. Optimal resource allocation in wireless powered communication networks with user cooperation. IEEE Trans. Wirel. Commun. 2017, 16, 7936–7949. [Google Scholar] [CrossRef]
  40. Note that we analyze system AoI on the basis of the Shannon capacity from an information-theoretical perspective. That is, when the information transmission rate of over channel is less than the channel capacity and the code word is long enough, the minimum average error decoding probability of the channel output can be arbitrarily small. Therefore, similar to many existing works, see e.g., [35,41], we do not consider the retransmission mechanism.
  41. Mohamed, A.A.E.; Harpreet, S.D. Average age-of-information minimization in UAV-assisted IoT networks. arXiv, 2018; arXiv:1804.06543v1. [Google Scholar]
  42. Dong, Y.; Fan, P. Queueing analysis for block fading Rayleigh channels in the low SNR regime. In Proceedings of the International Conference on Wireless Communications and Signal Processing, Hangzhou, China, 24–26 October 2013. [Google Scholar]
  43. Bremaud, P. Lyapunov functions and martingales. In Markov Chains; Springer: New York, NY, USA, 1999. [Google Scholar]
  44. Although the numerical experiments show that Problem 1 may be convex w.r.t p, it is difficult to be proved theoretically. Thus, we adopt one-dimensional search to find the global optimal p. Since p∈(0,1), a proper search step size could be selected to achieve the trade-off between the precision of the optimal solution and the search complexity. It should be addressed that our goal is to show the existence of the optimal p rather than the solving method. Therefore, the one-dimensional search is just an optional method for achieving it.
Figure 1. An illustration of the wireless powered communication system.
Figure 1. An illustration of the wireless powered communication system.
Entropy 20 00948 g001
Figure 2. An illustration of a sample evolution of AoI versus time blocks.
Figure 2. An illustration of a sample evolution of AoI versus time blocks.
Entropy 20 00948 g002
Figure 3. An illustration of an example of calculating AoI.
Figure 3. An illustration of an example of calculating AoI.
Entropy 20 00948 g003
Figure 4. State transition diagram of Markov chain { L k , k 0 } .
Figure 4. State transition diagram of Markov chain { L k , k 0 } .
Entropy 20 00948 g004
Figure 5. Average age of information versus data generation probability p.
Figure 5. Average age of information versus data generation probability p.
Entropy 20 00948 g005
Figure 6. Illustration of the simulation scenario by moving the user from the WPS to the AP with the fixed D.
Figure 6. Illustration of the simulation scenario by moving the user from the WPS to the AP with the fixed D.
Entropy 20 00948 g006
Figure 7. Average age of information versus data generation probability p and distance.
Figure 7. Average age of information versus data generation probability p and distance.
Entropy 20 00948 g007
Figure 8. Average age of information versus data generation probability p and data size δ .
Figure 8. Average age of information versus data generation probability p and data size δ .
Entropy 20 00948 g008
Figure 9. Impact of data size δ on average AoI under optimal p.
Figure 9. Impact of data size δ on average AoI under optimal p.
Entropy 20 00948 g009
Figure 10. Impact of transmit power P u on average AoI under optimal p.
Figure 10. Impact of transmit power P u on average AoI under optimal p.
Entropy 20 00948 g010

Share and Cite

MDPI and ACS Style

Hu, H.; Xiong, K.; Zhang, Y.; Fan, P.; Liu, T.; Kang, S. Age of Information in Wireless Powered Networks in Low SNR Region for Future 5G. Entropy 2018, 20, 948. https://doi.org/10.3390/e20120948

AMA Style

Hu H, Xiong K, Zhang Y, Fan P, Liu T, Kang S. Age of Information in Wireless Powered Networks in Low SNR Region for Future 5G. Entropy. 2018; 20(12):948. https://doi.org/10.3390/e20120948

Chicago/Turabian Style

Hu, Huimin, Ke Xiong, Yu Zhang, Pingyi Fan, Tong Liu, and Shaoli Kang. 2018. "Age of Information in Wireless Powered Networks in Low SNR Region for Future 5G" Entropy 20, no. 12: 948. https://doi.org/10.3390/e20120948

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop