Two-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation

Similar documents
4884 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER Energy Cooperation in Energy Harvesting Communications

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications

ECE559VV Project Report

x = x 1 + :::+ x K and the nput covarance matrces are of the form ± = E[x x y ]. 3.2 Dualty Next, we ntroduce the concept of dualty wth the followng t

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Power Allocation/Beamforming for DF MIMO Two-Way Relaying: Relay and Network Optimization

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 3, MARCH

State Amplification and State Masking for the Binary Energy Harvesting Channel

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

MMA and GCMMA two methods for nonlinear optimization

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Lecture Notes on Linear Regression

Assortment Optimization under MNL

Module 9. Lecture 6. Duality in Assignment Problems

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

University of Alberta. Library Release Form. Title of Thesis: Joint Bandwidth and Power Allocation in Wireless Communication Networks

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

The Minimum Universal Cost Flow in an Infeasible Flow Network

Which Separator? Spring 1

Economics 101. Lecture 4 - Equilibrium and Efficiency

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business

Solutions to exam in SF1811 Optimization, Jan 14, 2015

A 2D Bounded Linear Program (H,c) 2D Linear Programming

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

Energy-Efficient Power Allocation for M2M Communications with Energy Harvesting Transmitter

Kernel Methods and SVMs Extension

Section 8.3 Polar Form of Complex Numbers

Numerical Heat and Mass Transfer

Downlink Throughput Maximization: TDMA versus CDMA

Joint Scheduling and Resource Allocation in CDMA Systems

More metrics on cartesian products

PHYS 705: Classical Mechanics. Calculus of Variations II

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

The Order Relation and Trace Inequalities for. Hermitian Operators

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Joint Scheduling and Resource Allocation in CDMA Systems

Joint Scheduling and Resource Allocation in CDMA Systems

Lagrange Multipliers Kernel Trick

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

On the Multicriteria Integer Network Flow Problem

VQ widely used in coding speech, image, and video

Error Probability for M Signals

Chapter 7 Channel Capacity and Coding

Pricing and Resource Allocation Game Theoretic Models

The Two-User Gaussian Fading Broadcast Channel

Composite Hypotheses testing

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

Joint Scheduling and Resource Allocation in CDMA Systems

Arizona State University

Problem Set 9 Solutions

Lecture 10 Support Vector Machines II

Cognitive Access Algorithms For Multiple Access Channels

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

An Analytical Model for Interference Alignment in Multi-hop MIMO Networks

Fundamental loop-current method using virtual voltage sources technique for special cases

Inductance Calculation for Conductors of Arbitrary Shape

Lecture 3: Shannon s Theorem

PROBLEM SET 7 GENERAL EQUILIBRIUM

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Welfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium?

Secret Communication using Artificial Noise

On Network Coding of Independent and Dependent Sources in Line Networks

Distributed Power Control for Interference-Limited Cooperative Relay Networks

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

On Spatial Capacity of Wireless Ad Hoc Networks with Threshold Based Scheduling

), it produces a response (output function g (x)

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Chapter 7 Channel Capacity and Coding

Throughput Capacities and Optimal Resource Allocation in Multiaccess Fading Channels

Some modelling aspects for the Matlab implementation of MMA

Rate Maximization in Wireless Powered Communication Systems with Non-Ideal Circuit Power Consumption

6.854J / J Advanced Algorithms Fall 2008

Energy Efficient Resource Allocation for Quantity of Information Delivery in Parallel Channels

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.

NUMERICAL DIFFERENTIATION

CHAPTER 14 GENERAL PERTURBATION THEORY

Closed form solutions for water-filling problems in optimization and game frameworks

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Chapter - 2. Distribution System Power Flow Analysis

LECTURE 9 CANONICAL CORRELATION ANALYSIS

Lecture 14: Bandits with Budget Constraints

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that

f(x,y) = (4(x 2 4)x,2y) = 0 H(x,y) =

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Distributed Non-Autonomous Power Control through Distributed Convex Optimization

Lecture 4: November 17, Part 1 Single Buffer Management

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

Difference Equations

An Interactive Optimisation Tool for Allocation Problems

Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India February 2008

Perfect Competition and the Nash Bargaining Solution

Transcription:

Two-Way and Multple-Access Energy Harvestng Systems wth Energy Cooperaton Berk Gurakan, Omur Ozel, Jng Yang 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 20742 2 Department of Electrcal Engneerng, Unversty of Arkansas, Fayettevlle, AR 7270 Abstract We study the capacty regons of two-way and multple-access harvestng communcaton systems wth one-way wreless transfer. In these systems, requred for data transmsson s harvested by the users from nature throughout the communcaton duraton, and there s a separate unt that enables transfer from the frst user to the second user wth an effcency of. Energy harvests are known by the transmtters a pror. We frst nvestgate the capacty regon of the harvestng Gaussan two-way channel (TWC wth one-way transfer. We show that the boundary of the capacty regon s acheved by a generalzed two-dmensonal drectonal water-fllng algorthm. Then, we study the capacty regon of the harvestng Gaussan multple access channel (MAC wth one-way transfer. We show that f the prorty of the frst user s hgher, then transfer s not needed. In addton, f the prorty of the second user s suffcently hgh, then the frst user must transfer all of ts to the second user. I. INTRODUCTION We study the capacty regons of the Gaussan two-way channel (TWC and the Gaussan two-user multple access channel (MAC wth one-way transfer. In both scenaros, there are two users powered by harvestng devces communcatng messages to each other or to an access pont. We model these scenaros as two users havng exogenous arrval processes that recharge ther batteres throughout the communcaton duraton. Addtonally, oneway transfer s possble: The frst user can transmt a porton of ts to the second user through a separate wreless transfer unt subject to an neffcency (.e., loss durng the transfer. Wreless transfer enables a new form of cooperaton whch we call cooperaton; see also []. In contrast to the usual noton of cooperaton, whch s at the sgnal level [2], cooperaton s at the battery level. In ths paper, we study optmal management polces for the users n systems wth cooperaton. Assumng that the users know the realzatons of the arrval processes n advance, as n the exstng lterature [], [3] [4], we characterze the correspondng capacty regons. We frst consder the Gaussan TWC wth transfer. We show that the boundary of the capacty regon s obtaned by a generalzed two-dmensonal drectonal water-fllng Ths work was supported by NSF Grants CNS 09-64632, CCF 09-64645, CCF 0-885 and CNS -478. Fg.. E User δ Ē User 2 TWC wth one-way transfer. algorthm. Ths algorthm optmzes the levels n two dmensons, namely the tme and user dmensons, subject to causalty constrants. We then study the Gaussan MAC wth transfer. We show that f the frst user has a hgher prorty, then transfer s not needed and the boundary s acheved by the generalzed backward drectonal water-fllng algorthm gven n [9]. Moreover, we show that f the second user has a suffcently hgh prorty, then transferrng all of the of the frst user to the second user s optmal. In between these two extremes, some non-zero porton of the frst user s s transferred to the second user. II. TWC WITH ONE-WAY ENERGY TRANSFER We consder a Gaussan TWC as shown n Fg.. The two s at the nodes are the data and s. The energes that arrve at the nodes are saved n the correspondng s. The s of both users always carry some data packets. The physcal layer s a memoryless Gaussan TWC [5] where the channel nputs and outputs are x, x 2 and y, y 2, respectvely. The nput-output relatons are y = x + x 2 + n and y 2 = x + x 2 + n 2 where n and n 2 are ndependent Gaussan noses wth zero-mean and untvarance. We assume that the tme s slotted and there are a total of T equal length slots. In slot t, the frst and second users harvest n amounts E t and Ēt, respectvely. There s a separate one-way wreless transfer unt from the frst user to the second user wth effcency 0 : When the frst user transfers δ amount of to the second user, δ amount of exts the frst user s and δ amount of enters the second user s n the same slot. The power polcy of user

s composed of the sequences P,δ, and the power polcy of user 2 s the sequence P. For both users, the that has not arrved yet cannot be used for data transmsson or transfer. In addton, transfer amounts cannot be larger than the harvested. These constrants yeld the followng set F of feasble power control and transfer polces: F = (δ, P, P : P P δ (E δ, k (Ē +δ, k } E, k For the Gaussan TWC wth ndvdual power constrants P and P 2, rate pars (R,R 2 wth R 2 log(+p,r 2 2 log(+p 2 are achevable [5]. For a fxed transfer vector δ, and feasble power control polces P and P, the set of achevable rates s: C δ (P, P = (R,R 2 : R R 2 2 log(+p 2 log(+ P } The notaton shows the dependence of the regon on the transfer vector δ. Ths regon s shown n Fg. 2 for dfferent values of δ. Each of these regons are rectangles of the form R C where C s the mum throughput acheved for user found by mzng (2 constraned to the feasblty constrants F. As δ s ncreased, s transferred from user to user 2 therefore C decreases whle C 2 ncreases. By takng the unon of the regons over all possble transfer vectors and power polces for the users, we obtan the capacty regon of the Gaussan TWC as: C(E, Ē = C δ (P, P (3 (δ,p, P F III. CAPACITY REGION OF THE GAUSSIAN TWC In ths secton, we characterze the capacty regon as well as the optmal power allocaton and transfer polces. We start by notng that the capacty regon s convex. Lemma C(E, Ē s a convex regon. Snce C(E, Ē s convex, each boundary pont can be found by solvng the followng weghted rate mzaton problem: P,P,δ θ 2 log(+p +θ 2 2 log(+ P ( (2 s.t. (δ, P, P F (4 The problem n (4 s a convex optmzaton problem as the objectve functon s concave and the feasble set s a convex R Fg. 2. θr 2 3 R 2 Capacty regon of the Gaussan TWC. set [6]. We wrte the Lagrangan functon for (4 as L = θ log(+p +θ 2 log(+ P + k( P (E δ k=µ + k( P (Ē +δ k=η + k( δ E ρ k δ k (5 k=γ k= The Lagrange multplerρ k s due to the constrantδ k 0. We exclude the non-negatvty constrants for P and P as P and P are always non-zero n the optmal polcy for θ,θ 2 > 0. Smlarly, we elmnate the constrants k δ k E and the multplers γ k n the followng analyss snce these constrants can never be satsfed wth equalty n the optmal polcy for the Gaussan TWC for θ,θ 2 > 0, as that would requre P = 0 for some. However, we note that these constrants and the multplers γ k play an mportant role for the analyss of the capacty regon of the MAC and hence we renstate these constrants when necessary. The KKT condtons for the case of TWC are: θ + µ k = 0, (6 +P θ 2 + P + η k = 0, (7 µ k η k ρ = 0, (8 wth the addtonal complementary slackness condtons as: µ k ( P (E δ η k ( P (Ē +δ = 0, k (9 = 0, k (0 ρ k δ k = 0, k (

From (6, (7 and (8 we get: P = θ µ, (2 k θ 2 P = η, k (3 ρ = µ k η k, (4 We wll gve the soluton for general θ,θ 2 > 0 n the sequel. Before that, we note that n the extreme case when θ 2 = 0, the problem reduces to mzng the frst user s throughput only and hence any transfer s strctly suboptmal,.e., δ = 0 s optmal. Ths corresponds to pont n Fg. 2. Smlarly, when θ = 0, the problem reduces to mzng the second user s throughput only and the frst user must transfer all of ts to the second user,.e., δ = E s optmal. Ths corresponds to pont 3 n Fg. 2. When θ,θ 2 > 0, we obtan the ponts between ponts and 3 n Fg. 2. In ths case, for a gven transfer profle δ,...,δ T, the optmzaton problem can be separated nto two optmzaton problems, each only n terms of the power control polcy of the correspondng user. Lemma 2 The optmal power sequences P and P are monotoncally ncreasng sequences:p+ P, P + P. Next, we provde the necessary optmalty condton for a non-zero transfer. Lemma 3 For the optmal power sequences P, P and transfer sequence δ, f δ 0 for a slot, then, +P + P = θ θ 2 Proof: From (2-(4 we have +P + P = θ η k θ 2 ( η k +ρ (5 (6 If there s a non-zero transfer, δ 0, we have from (, ρ = 0. Therefore, (5 must be satsfed f δ 0. In order to devse an algorthmc soluton, we apply a change of varable P = P and re-wrte the optmzaton problem n terms of P, P,δ as follows: P,P,δ s.t. θ 2 log(+p +θ 2 2 log(+ P P P δ (E δ, k (Ē +δ, k E, k (7 The optmal power allocaton for ths problem s: where ν and ν n slot are defned by ν = P = θ ν, (8 P = θ 2 ν, (9 µ k and ν = η k (20 The power level expressons n (8-(9 lead to a drectonal water-fllng nterpretaton [5]. In partcular, we note that has to be jontly allocated n tme and user dmensons together. Ths calls for a two-dmensonal drectonal waterfllng algorthm where s allowed to flow n two dmensons, from left to rght (n tme and from up to down (among users. We utlze rght permeable taps to account for whch wll be used n the future and down permeable taps to account for that wll be transferred from user to user 2. We see from the KKT optmalty condtons that ν = ν n slots where there s non-zero transfer. We note that n the orgnal problem, ths mples that f some s transferred, then the power levels n that slot need to satsfy (5. The base levels for users and 2 are and, respectvely. Moreover, to facltate the water flow nterpretaton, we scale the arrvals of user 2 by as seen n (7. If the resultng water levels are hgher for user or not monotoncally ncreasng n tme for both users, then water has to flow untl the levels are balanced. Whle fndng the balanced water levels, the two dmensons of the water flow (.e., n tme and among users are coupled and therefore t s not easy to determne beforehand whch taps wll be open or closed n the optmal soluton. In partcular, the water flow of user 2 from tme slot to tme slot + j, j > 0, may become redundant f some s transferred from user. To crcumvent ths dffculty, we let each tap (rght/down permeable have a meter measurng the water that has already passed through t and we allow that tap to let the water flow back f an update n the allocaton necesstates t. Ths way, we keep track of the source of the and whether t s transferred to future tme slots or to the other user. Frst, we fll nto the slots wth all taps closed. Then, we open only the rght permeable taps and perform drectonal water-fllng for both users ndvdually [5]. Then, we open the down taps one by one n a backward fashon. If water flows down through a tap, the amount s measured by the meter. Water levels n the slots connected by the bdrectonal horzontal taps need to be equal. Whenever water flows down through a down permeable tap, the water levels must satsfy the proportonalty relatonshp n (5. When the water levels are properly balanced, the optmal soluton s obtaned. IV. MAC WITH ONE-WAY ENERGY TRANSFER In ths secton, we consder the MAC scenaro as shown n Fg. 3. In MAC, the receved sgnal s y = x +x 2 +n where x and x 2 are sgnals of user and user 2, respectvely, and n s a Gaussan nose wth zero-mean and unt-varance. For the

E δ Ē R 2 User User 2 3 Recever < = 4 4 R 2 Fg. 3. MAC wth one-way transfer. Fg. 4. Capacty regon of the Gaussan MAC. Gaussan two-user MAC wth ndvdual power constrants P and P 2, rate pars (R,R 2 wth R 2 log(+p,r 2 2 log(+p 2, R +R 2 2 log(+p +P 2 are achevable [7]. For a fxed transfer vector δ, and feasble power control polces P and P, the set of achevable rates s a pentagon defned as [9]: C δ (P, P = (R,R 2 :R R 2 R +R 2 2 log(+p 2 log(+ P 2 log(+ P } +P (2 For each feasble (P, P, δ the regon s a pentagon. The capacty regon of the Gaussan MAC wth transfer s the unon over all feasble power allocatons and transfer profles: C(E, Ē = C δ (P, P (22 (δ,p, P F where F s gven n (. Ths regon s shown n Fg. 4. V. CAPACITY REGION OF THE GAUSSIAN MAC In ths secton, we characterze the capacty regon of the Gaussan MAC wth one-way transfer. Frst, we note that the capacty regon s convex. Lemma 4 C(E, Ē s a convex regon. Snce the regon s convex, each boundary pont s a soluton to R C M θr [8] for some θ = [θ,θ 2 ]. We examne two cases separately, θ θ 2 and θ < θ 2. A. θ θ 2 We show that when θ θ 2, no transfer from user to user 2 s needed. Note that as θ θ 2, the boundary ponts between, 2 and 3 n Fg. 4 are found by solvng the followng problem: P,P, δ (θ θ 2 2 log(+p +θ 2 2 log(+ P +P s.t. (δ, P, P F (23 The problem n (23 s a convex optmzaton problem and the correspondng KKT condtons are: θ θ 2 θ 2 +P +P + P + µ k = 0, (24 θ 2 +P + P + η k = 0, (25 µ k η k + γ k ρ = 0, (26 Snce θ θ 2, from (24-(25, we have µ k η k, whch s satsfed wth equalty ff θ = θ 2. Ths together wth (26 mples that ρ γ k 0, whch s satsfed wth equalty ff θ = θ 2 and =. Therefore, unless we have exactlyθ = θ 2 and =, then we must haveρ > 0 for all. Ths together wth the complementary slackness condtons n ( mples that we must have δ = 0 for all,.e., no transfer s needed. However, when θ = θ 2 and addtonally f =, then there may exst multple dfferent optmal transfer profles, ncludng the one wth no transfer. Snce transfer s not needed, optmal power control polces for the two users are the same as those n the harvestng MAC wth no transfer and can be found by the generalzed backward drectonal water-fllng algorthm descrbed n [9]. That s, the capacty regon boundary from pont to pont 3 n Fg. 4 s found by the algorthm n [9]. Specfcally, for θ = θ 2, we have η k = µ k for all k and the sum-rate optmal power polces are obtaned by applyng sngle-user drectonal water-fllng algorthm to the sum of the profles of the users [9]. B. θ < θ 2 Here, we consder the remanng parts of the boundary, namely the ponts from pont 3 to pont 4 n Fg. 4. In ths

case, we need to solve the followng optmzaton problem: P,P,δ (θ 2 θ log(+ P +θ log(+ P +P s.t. (δ, P, P F (27 whch s a convex optmzaton problem and the correspondng KKT condtons are: θ +P + P + µ k = 0, (28 θ 2 θ θ + P +P + P + µ k η k + η k = 0, (29 γ k ρ = 0, (30 We do not have an analytcal closed form soluton for (28- (30. Snce (27 s a convex optmzaton problem, standard numercal methods for convex optmzaton may be employed. We fnd that the soluton of (27 has a smple form n some specal cases, whch we nvestgate next. When =, we fnd that the optmal soluton of (27 requres all the of user transferred to user 2. To verfy ths fact, we note from (28-(29 that η T > µ T, snce θ 2 > θ. Combnng ths wth (30, we obtan γ T ρ T > 0. Note that f δ < E, then γ T = 0 and hence ρ T < 0, whch s not possble. Thus, n the optmal soluton, we must have δ = E. Therefore, user should not transmt any data, and nstead should transfer all of ts to user 2 by the end of T slots. Ths polcy corresponds to pont4n Fg. 4. On the other hand, sum-rate optmal pont, pont 3, acheves the same throughput as pont 4. Ths mples that when =, ponts 2, 3 and 4 n Fg. 4 le on the 45 o lne. In partcular, the optmal throughput of user 2, whch s obtaned by sngleuser throughput mzaton subject to harvested energes of user 2 plus the harvested energes of user, concdes wth the optmal sum-throughput. When <, ponts 2, 3 and 4 n Fg. 4 are not on the same lne. However, we observe that when θ2 θ s suffcently large, user transfers all of ts to user 2. In order to verfy ths clam, we note that, f user transfers some but not all of ts at the end of T slots, then γ T = 0. In ths case, from (28-(30 and as ρ T 0, we have + P T + P T +P T (θ 2 θ (θ (3 + Snce P T + P T+P T <, we conclude that f (θ2θ (θ, then (3 cannot be satsfed whch forces all of the of user to be transferred to user 2 so thatγ T > 0. Note that (θ2θ (θ s equvalent to θ2 θ θ2. Hence, f θ, n the optmal soluton, user transfers all of ts to user 2. When θ2 θ, some non-zero porton of the frst user s may need to be transferred to the second user n the optmal soluton. VI. CONCLUSIONS In ths paper, we consdered the Gaussan TWC and the Gaussan two-user MAC under harvestng and one-way wreless transfer condtons. For the Gaussan TWC, we showed that a generalzed two-dmensonal drectonal water-fllng algorthm, whch dstrbutes the overall harvested optmally over the tme and user dmensons subject to causalty constrants acheves the boundary of the capacty regon. For the Gaussan two-user MAC, wth transfer from the frst user to the second user, we showed that, f the frst user has hgher prorty over the second user, then transfer s not needed. In addton, when the second user s prorty s suffcently hgh, the frst user must transfer all of ts to the second user. REFERENCES [] B. Gurakan, O. Ozel, J. Yang, and S. Ulukus, Energy cooperaton n harvestng wreless communcatons, n IEEE ISIT, July 202. [2] A. Sendonars, E. Erkp, and B. Aazhang, User cooperaton dversty. Part I. System descrpton, IEEE Trans. Comm., vol. 5, pp. 927 938, November 2003. [3] J. Yang and S. Ulukus, Optmal packet schedulng n an harvestng communcaton system, IEEE Trans. Comm., vol. 60, pp. 220 230, January 202. [4] K. Tutuncuoglu and A. Yener, Optmum transmsson polces for battery lmted harvestng nodes, IEEE Trans. Wreless Comm., vol., pp. 80 89, March 202. [5] O. Ozel, K. Tutuncuoglu, J. Yang, S. Ulukus, and A. Yener, Transmsson wth harvestng nodes n fadng wreless channels: Optmal polces, IEEE Jour. on Selected Areas n Commun., vol. 29, pp. 732 743, September 20. [6] J. Yang, O. Ozel, and S. Ulukus, Broadcastng wth an harvestng rechargeable transmtter, IEEE Trans. Wreless Comm., vol., pp. 57 583, February 202. [7] M. A. Antepl, E. Uysal-Bykoglu, and H. Erkal, Optmal packet schedulng on an harvestng broadcast lnk, IEEE Jour. on Selected Areas n Commun., vol. 29, pp. 72 73, September 20. [8] O. Ozel, J. Yang, and S. Ulukus, Optmal broadcast schedulng for an harvestng rechargeable transmtter wth a fnte capacty battery, IEEE Trans. Wreless Comm., vol., pp. 293 2203, June 202. [9] J. Yang and S. Ulukus, Optmal packet schedulng n a multple access channel wth harvestng transmtters, Journal of Communcatons and Networks, vol. 4, pp. 40 50, Aprl 202. [0] K. Tutuncuoglu and A. Yener, Sum-rate optmal power polces for harvestng transmtters n an nterference channel, Journal of Communcatons and Networks, vol. 4, pp. 5 6, Aprl 202. [] C. Huang, R. Zhang, and S. Cu, Throughput mzaton for the Gaussan relay channel wth harvestng constrants, IEEE Jour. on Selected Areas n Commun., submtted, September 20. Avalable at [arxv:09.0724]. [2] D. Gunduz and B. Devllers, Two-hop communcaton wth harvestng, n IEEE CAMSAP, December 20. [3] K. Tutuncuoglu and A. Yener, Communcatng usng an harvestng transmtter: Optmum polces under storage losses, IEEE Trans. Wreless Comm., submtted August 202, avalable at [arxv:208.6273]. [4] O. Orhan, D. Gunduz, and E. Erkp, Throughput mzaton for an harvestng communcaton system wth processng cost, n IEEE ITW, September 202. [5] T. S. Han, A general codng scheme for the two-way channel, IEEE Trans. Inform. Theory, vol. 30, pp. 35 44, January 984. [6] S. Boyd and L. Vandenberghe, Convex Optmzaton. Unted Kngdom: Cambrdge Unversty Press, 2004. [7] T. Cover and J. Thomas, Elements of Informaton Theory. Wley Seres n Telecommuncatons and Sgnal Processng, John Wley & Sons, 2006. [8] D. Tse and S. Hanly, Multaccess fadng channels - Part I: Polymatrod structure, optmal resource allocaton and throughput capactes, IEEE Trans. Inf. Theory, vol. 44, pp. 2796 285, November 998.