You are on page 1of 16

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO.

11, NOVEMBER 2013 7597

Spatial Throughput of Mobile Ad Hoc Networks


Powered by Energy Harvesting
Kaibin Huang, Senior Member, IEEE

Abstract—Designing mobiles to harvest ambient energy such as This paper considers a mobile ad hoc network (MANET)
kinetic activities or electromagnetic radiation will enable wireless where transmitters are modeled as a homogeneous Poisson
networks to be self-sustaining. In this paper, the spatial throughput point process (PPP). Energy arrives randomly at a transmitter
of a mobile ad hoc network powered by energy harvesting is ana-
lyzed using a stochastic-geometry model. In this model, transmit-
with a fixed average rate, called the energy-arrival rate. The
ters are distributed as a Poisson point process and energy arrives at energy-arrival process is modeled as an i.i.d. sequence of
each transmitter randomly with a uniform average rate called the random variables and different processes are assumed indepen-
energy arrival rate. Upon harvesting sufficient energy, each trans- dent. Each transmitter deploys an energy harvester that stores
mitter transmits with fixed power to an intended receiver under an arriving energy in a rechargeable battery. Upon harvesting
outage-probability constraint for a target signal-to-interference- sufficient energy, a transmitter transmits with fixed power to an
and-noise ratio. It is assumed that transmitters store energy in bat-
teries with infinite capacity. By applying the random-walk theory, intended receiver under an outage-probability constraint for a
the probability that a transmitter transmits, called the transmission target signal-to-interference-and-noise ratio (SINR). Based on
probability, is proved to be equal to the smaller of one and the ratio the above model, the network spatial throughput is maximized
between the energy-arrival rate and transmission power. This re- by optimizing transmission power for a given energy-arrival
sult and tools from stochastic geometry are applied to maximize rate.
the network throughput for a given energy-arrival rate by opti-
mizing transmission power. The maximum network throughput is
shown to be proportional to the optimal transmission probability, A. Prior Work and Motivation
which is equal to one if the transmitter density is below a derived
function of the energy-arrival rate or otherwise is smaller than one
The fluctuation in harvested energy due to random energy
and solves a given polynomial equation. Last, the limits of the max- arrivals requires redesigning existing transmission algorithms
imum network throughput are obtained for the extreme cases of for wireless communication systems. Assuming infinitely back-
high energy-arrival rates and sparse/dense networks. logged data, existing work focuses on adapting transmission
Index Terms—Energy harvesting, mobile ad hoc networks, power to channel states and the temporal profile of energy ar-
mobile communication, power control, stochastic processes, rivals to maximize the system throughput [2]–[5]. For single-
throughput. user systems, the optimal power-control policies are shown to
be variations of the classic water-filling policy such that the
causality of energy arrivals and finite battery capacity are ac-
I. INTRODUCTION counted for [2], [3]. Adaptive transmission for broadcast chan-
nels with energy harvesting has been also investigated [4], [5].

R ECENT years have seen increasing popularity of mobile


devices such as sensors and smart phones, giving rise to
two design issues among others. First, the power consumption
In [4], the optimal power-control for a two-user single-antenna
broadcast channel is shown to attempt to allocate a fix amount
of harvested energy to the user with the better channel before
of mobile-device networks makes an escalating contribution to giving the remaining energy to the other user. A two-user mul-
global warming. Second, conventional batteries that power mo- tiple-input-multiple-output broadcast channel is considered in
bile devices periodically interrupt their operation due to finite [5] where one user receives data and the other scavenges trans-
battery lives; battery recharging or replacement is inconvenient mission energy, and the precoder at the base station is designed
or even impossible in certain cases. These issues provide strong to optimize the tradeoff between the data rate and the rate of
motivation for powering mobile devices by harvesting ambient harvested energy.
energy such as solar energy, vibration, kinetic activities, and In wireless communication systems with both bursty
electromagnetic radiation [1]. The capacity of mobile-device data-and-energy arrivals, buffering energy and data create two
networks powered by energy harvesting remains largely un- corresponding queues at each transmitter. Jointly controlling
known, which is addressed in this paper. these two coupled queues is more challenging than controlling
only the data queue in traditional systems with reliable power
supplies [6]. The algorithms for optimally controlling the
Manuscript received March 03, 2012; revised October 28, 2012; accepted energy-and-data queues have been proposed for single-user
June 15, 2013. Date of publication September 25, 2013; date of current version systems [7] and downlink systems [8] to minimize the packet
October 16, 2013. This paper was presented in part at the Asilomar Conference
on Signals, Systems, and Computers, Pacific Grove, CA, USA, 2011, and in part transmission delay, for interference channels to minimize
at the 2013 IEEE International Conference on Communications. queuing delay [9], and for downlink systems to maximize the
The author is with the Hong Kong Polytechnic University, Hong Kong system throughput [10]. These algorithms share a common
(e-mail: huangkb@ieee.org).
Communicated by F. Baccelli, Associate Editor for Communication
objective of optimizing a particular performance metric for
Networks. given average harvested power. The objective is aligned with
Digital Object Identifier 10.1109/TIT.2013.2276811 that for designing the traditional energy-efficient systems

0018-9448 © 2013 IEEE


7598 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

with only data queues, namely minimizing the average trans- as the probability that a transmitter transmits and the network in-
mission power under a performance constraint such as fixed terference temperature as the maximum active transmitter den-
packet-transmission delay for single-user systems [11], [12], sity under the outage-probability constraint. Let denote the
allowed queuing delay for downlink systems [13], and given transmitter density, the energy-arrival rate, the transmis-
traffic load in wireless networks [14]. sion power, and a nonnegative random variable representing
Wireless networks with energy harvesting have been studied the amount of energy harvested by a typical harvester in an arbi-
[15]–[17]. For a wireless sensor network with energy harvesting trary slot.1 Note that and the density of active trans-
and based on a simple channel model that omits channel noise mitters is equal to .
and path loss, the probability that a sensor successfully trans- The main contributions of this paper are summarized as
mits a data packet to a fusion center is analyzed in [15] for dif- follows.
ferent multiple-access protocols including time-division mul- 1) Assume infinite battery capacity. Using the law of large
tiple access and Aloha like random access. Managing traffic numbers and random-walk theory, it is proved that is
load in time and space is important for wireless sensor net- equal to the smaller of and one. It is worth men-
works to be self-sustaining through energy harvesting. There- tioning that the tractable analysis relies on assuming
fore, distributive strategies are proposed in [16] for adapting the suboptimal fixed-power transmission. To the best
traffic load to the spatial-and-temporal energy profile and evalu- of the author’s knowledge, the aforementioned result
ated using a network prototype. For a two-user interference net- is unknown from existing work that mostly focuses on
work with energy harvesting, the data-and-energy arrivals are designing the optimal adaptive transmission algorithms
modeled as Bernoulli processes and the stability region is char- [2]–[5], [7]–[10].
acterized such that it comprises all data-rate pairs under the con- 2) Consider the case of finite battery capacity. Bounds on
straint of finite data-queue lengths [17]. In view of prior work, are derived, which converge to the results stated above as
there are few results that quantify the tradeoff between the net- the battery capacity increases. Moreover, two special cases
work throughput and the energy-arrival rate though such results are considered. If is bounded and no larger than , it is
specify the fundamental limit of the network performance. This shown that is equal to so long as the battery ca-
tradeoff is investigated in the sequel using a stochastic-geom- pacity is larger than . If is a discrete random variable,
etry approach. is analyzed using Markov-chain theory.
Stochastic geometry provides a set of powerful mathemat- 3) Assume infinite battery capacity. By applying the said re-
ical tools for modeling and designing wireless networks [18]. sult on transmission probability and tools from stochastic
MANETs based on random access and carrier-sensing multiple geometry, the network throughput is maximized by opti-
access have been modeled using the PPPs [19], [20] and Matern mizing for given . Consider the condition that is
hard-core processes [21], respectively. Cellular networks have smaller than the network interference temperature evalu-
been shown to be suitably modeled using the Poisson Voronoi ated for equal and . If this condition holds, the max-
tessellation [22]. Models of coexisting networks can be con- imum throughput is shown to be
structed by superimposing multiple point processes [23], [24].
Stochastic-geometry models of wireless networks have been
employed to quantify the network-performance gains due to
physical-layer techniques such as opportunistic transmission where is the target SINR. If the aforementioned condition
[25], bandwidth partitioning [26], successive interference is not satisfied
cancellation [27], and multiantenna techniques [28]–[32].
The performance metric typically considered in the literature
is the network spatial throughput under a constraint on the
outage probability for a target SINR, which is also adopted where the optimal transmission power is larger than
in this paper. Using this metric, most prior work focuses on and solves a derived polynomial equation.
deriving the outage probability using techniques such as the 4) Furthermore, the limits of the maximum network
Laplace transform [19], [22] and probabilistic inequalities throughput are obtained for the extreme cases of high
[20], [25]. This paper considers a MANET with Poisson energy-arrival rates ( ) and dense networks
distributed transmitters similar to the existing literature (see ( ). Specifically,
e.g., [20]). However, the transmitters in the current network
model are powered by energy harvesting instead of reliable
power supplies as in prior work. The consideration of energy
harvesting introduces several new design issues including the
aforementioned tradeoff between the network throughput and
energy-arrival rate, the corresponding optimization of trans- where is a positive constant determined by the max-
mission power, and the effect of finite energy storage, which imum outage probability.
are investigated in the sequel. The remainder of this paper is organized as follows. The net-
work model and performance metric are described in Section II.
B. Contributions and Organization The transmission probability is analyzed in Section III. The
results are applied to maximize the network throughput in
For exposition, a few definitions and notations are provided
as follows. Time is slotted. Define the transmission probability 1A typical point is selected from a spatial point process by uniform sampling.
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7599

transmitter transmits one data packet with fixed power when-


ever the corresponding battery level exceeds . As a result,
evolves as

(1)

where and the indicator function for an event


is equal to one if occurs or else is zero. The battery-level
evolutions in prior work are similar to that in (1) but with fixed
power replaced with power adapted to factors such as the
channel state and battery level [2], [9], [10].

B. Performance Metric
Assume infinitely backlogged and packetized data. The trans-
mission probability can be written as
Fig. 1. Single-antenna transmitters in the MANET are modeled as a homoge-
neous PPP in the horizontal plane. Each transmitter is powered by an energy har-
vester and transmits to an intended single-antenna receiver at an unit distance. (2)

According to Coloring Theorem [34], the process of active


Section IV. Numerical results are presented in Section V transmitters, denoted as , is a PPP with density .
followed by concluding remarks in Section VI. Data is encoded at a fixed rate bit/(s Hz) with
being the target SINR. Correct decoding of a data packet
requires the received SINR to be no smaller than or else an
II. MODEL AND METRIC outage event occurs. The outage probability is defined as
where represents the received
SINR at the receiver for . It is assumed that the receiver for
A. Network Model
is located at the origin, which does not compromise the
As illustrated in Fig. 1, the transmitters of the MANET generality based on Slyvnyak’s Theorem [35], and that noise
are distributed in the Euclidean plane following a homoge- has unit variance. Based on these assumptions, can be
neous PPP with density , where denotes the coordinates written as
of a transmitter. Each transmitter is associated with an intended
receiver located at a unit distance, which is assumed to sim- (3)
plify the expression for the received signal power by omitting
the data-link path loss. The signal transmitted by with power
is received by a receiver located at with power equal to
with being the path-loss exponent. In other (4)
words, propagation is characterized by path loss while fading is
omitted to simplify notation.2
Time is partitioned into slots of unit duration with denoting (5)
the slot index. The amount of energy harvested by the typical
harvester in the th slot is represented by the nonnegative where the summation in (3) represents the interference power
random variable . and (5) uses Slyvnyak’s Theorem. It is worth mentioning that the
Assumption 1: The energy-arrival process probabilities in (3) and (4) are palm measures [35] but that in (5)
is an i.i.d. sequence and independent of other energy-arrival is not. To ensure the quality-of-service, an outage-probability
processes. Moreover, the cumulant generating function of the constraint is applied such that with . The
random variable with being a given constant, performance metric is the spatial network-throughput density
namely , has a root such that [bit/(s Hz unit-area)] that is referred to simply as the network
if and if . throughput and defined as
This assumption allows the use of results on the large devia-
tion of random walks in the subsequent analysis [33]. Let de- (6)
note the battery capacity identical for all harvesters. Moreover, (7)
the typical transmitter and the battery level of the corresponding
(typical) harvester are represented by and , respectively. A where is controlled by adjusting such that the outage-prob-
2The consideration of random transmission distances and fading has no ef-
ability constraint is satisfied. To be precise, should be scaled
fect on the main results except that the parameter defined in (34) has to be by the success probability but this factor is close to
redefined by including additional random variables. one given and thus omitted to simplify analysis.
7600 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

III. TRANSMISSION PROBABILITY amount of energy stored in the typical harvester in excess of a
threshold in the th slot:
A. Infinite Battery Capacity
Deriving transmission probability requires analyzing the dis-
(14)
tribution of battery levels at energy harvesters. By substituting
into (1), the battery level at the typical energy harvester
with infinite battery capacity evolves as where represents the probability density function of .
The function can be bounded as shown in Lemma 3,
(8) which is proved in Appendix C using Lemma 2.
Lemma 3: Given infinite battery capacity and , the
The distribution of can be related to the threshold-crossing energy-overshoot function satisfies
probability for a random walk as follows. Denote the in-
stants when the battery level crosses the threshold from
below as , namely that and
for . These time instants are grouped into the with .
set . Moreover, define the random variable Using Lemma 3, the main result of this section is readily ob-
and two random processes and as tained as shown below.
Theorem 1: Given infinite battery capacity, the transmission
(9) probability is
(10)

with and . Based on (9), the probability that


crosses a threshold in the th slot can be written as Proof: First, consider the case of . Replacing the
indicator function in (8) with one yields a lower bound on ,
namely that . As a result, given in (2) can be
lower bounded as
(11)

Consider the random walk starting in the th


slot and progressing backward. Given , the probability in (15)
(11) can be interpreted as the probability that the said random
walk with a negative drift ever crosses the threshold by the
th step. Applying Kingman bound on the threshold-crossing Using and applying the weak law of large numbers
probability for a random walk [33, p. 234] gives that for all [33], for given and , there exists such that
, for all ,

(12)
(16)
where as defined in Assumption 1 with is the
positive root of the cumulant generating function of . Since , it follows that given , there exist
Lemma 1: Given infinite battery capacity, the battery level and such that for all . Using
satisfies this fact and substituting (16) into (15),

The proof of Lemma 1 is provided in Appendix A. Using (12)


and Lemma 1, the threshold-crossing probability for the battery
level can be shown to be bounded as follows.
Lemma 2: Given infinite battery capacity and , the
distribution of the battery level satisfies

(13)
(17)
with .
The proof of Lemma 2 is given in Appendix B. Define the As is arbitrary and , the desired result for the case of
energy-overshoot function as the expected follows from (17) and letting .
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7601

Next, consider the case of . The expected total the case of , can be bounded by the same upper
amounts of harvested and transmitted energy by the th slot bound on (see Lemma 3) as shown below.
differ by the battery level in the th slot, namely Lemma 4: Given finite battery capacity and , the
energy-overshoot function satisfies

(18)
with .
Since , Lemma 4 is proved in Appendix D. Next, the tail probability
of can be bounded for the case of as shown in the
following lemma, which is proved in Appendix E.
Lemma 5: Given finite battery capacity and , the
(19) distribution of the battery level satisfies

where (19) is obtained using the definition of in (2). It follows


that
with and .
(20)
Using Lemmas 4 and 5, bounds on the transmission proba-
bility are obtained as follows.
Note that with . Using Lemma 3,
Proposition 1: Given finite battery capacity, the transmission
for given , there exists such that .
probability satisfies the following.
Combining this fact and (18) yields
1) If

(22)

with .
2) If

(23)
As a result, with .
3) If
(21)

The desired result for the case of is proved by com-


bining (20) and (21). (24)
Last, the desired result for the boundary case of is
proved by using the results proved above for and letting with given .
from either the right or the left, completing the proof. Proof: Consider the case of . By accounting for
the discarded energy due to battery overflow, the expected total
Remark 1: According to Theorem 1, if , each trans- amounts of transmitted and harvested energy by the th slot is
mitter transmits continuously in the steady state and is free of related by modifying (18) as
interruption caused by energy shortage. However, continuous
transmissions are at the cost that the fraction of harvested en-
ergy at the rate of is never used for transmission and
hence wasted. Next, if , there exists nonzero probability
where the last term gives the expected amount of discarded en-
that the battery level of a transmitter is below and hence trans-
ergy. Applying Lemma 4 and yields
mission can be interrupted. Nevertheless, all harvested energy
will be eventually used for transmission.

B. Finite Battery Capacity


The dynamics of the battery level at the typical harvester
are characterized in (1). Let denote the energy-overshoot
function for the case of finite-battery capacity, which is defined
similarly as in the preceding section. Given finite bat-
tery capacity, battery overflow can occur such that the battery and the first inequality in (22) follows. The second inequality
saturates and arriving energy has to be discarded, where the ex- is proved using Theorem 1 and the fact that limiting the battery
pected amount of discarded energy is measured by . For capacity reduces .
7602 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

Next, consider the case of . The definition of in (2)


can be rewritten as

(25) Fig. 2. Markov chain modeling the battery level at the typical transmitter for
the special case of binary energy arrivals and .

The last term can be upper bounded using Lemma 5, yielding


the first inequality in (23). The second inequality is trivial. Proposition 2: Consider bounded energy arrivals. If
Last, consider the case of . Let denote the trans- and the battery capacity , the probability for battery-
mission probability for the virtual scenario where all transmis- overflow is zero and the transmission probability is
sions use the power with . It can be proved sim-
ilarly as the first inequality in (22) that (27)

(26) where .
Proof: By expanding (1),

with . Note that also gives the transmission prob- (28)


ability for a virtual transmission strategy that removes unit .
of energy from the battery of a harvester following every in- Given and , it follows from (28) that
stance of transmission. Since removing energy from the battery ensures . Since , this result implies zero bat-
reduces the transmission probability, holds. Com- tery-overflow probability. Consequently, the transmission prob-
bining this inequality and (26) yields ability is identical to that for the case of infinite battery capacity
in Theorem 1, proving the desired result in (27).
2) Special Case: Discrete Energy Arrivals: Assume that
is a discrete random variable and takes on values from
for all . The first inequality in (23) follows. The second , and that and are positive integers with
inequality is trivial, completing the proof. . Under these assumptions, the distribution of battery
Remark 2: For a sanity check, it can be observed from Propo- levels can be analyzed using Markov-chain theory. Since
sition 1 that as , converges to its counterpart for the is independent of given , satisfies
case of infinite battery capacity as stated in Theorem 1. the Markov property and is hence a Markov chain. Given
Remark 3: By comparing Propostion 1 with Theorem 1, it is battery capacity , the Markov chain has the state
observed that the degradation of due to finite battery capacity space . Define the transition probability as
decreases exponentially with increasing . Hence, the effect . If , the battery level is
of finite battery capacity on is expected to diminish rapidly below its limit and the transition probability is given as
as increases, which is confirmed by simulation results in the
sequel. (29)
Remark 4: The battery-level process for the case of
where the indicator function specifies if energy of units
is related to a random walk with a zero drift for which is
is consumed for transmission in the current slot depending on
not defined and the threshold-crossing probability does not have
if reaches . If , the transmission from state to
an exponential upper bound [33]. This causes the difficulty in
includes all events that the energy arrival in the current slot
deriving a lower bound on simpler than that in (24). Moreover,
causes battery saturation, namely
the maximization of the lower bound in (24) cannot be solved
if and if .
analytically. One should not expect that the bound is maximized
It follows that
as because the function can be a monotone
increasing function of . For instance, given that follows the
exponential distribution with unit mean, it is obtained that (30)

Combining (29) and (30) yields that

where denotes the 0th branch of the Lambert W function.


The function can be plotted and observed to be monotone in-
creasing for . (31)
In general, exact analysis of for the case of finite battery
capacity is challenging except for some special cases, two of .
which are discussed as follows.
1) Special Case: Bounded Energy Arrivals: Consider the Let denote the steady-state probability of state of the
case that has bounded support and . Markov chain . Moreover, let represent the transition-
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7603

Fig. 3. Relation between the nominal node density and the maximum outage probability .

probability matrix with the th element given by and The probability for battery overflow is zero and the transmission
the steady-state-probability row vector with the th element probability is .
given by . Applying Perron–Frobenius theorem [33],
IV. NETWORK THROUGHPUT
(32)
In this section, using results on the transmission probability
The stationary probabilities can be computed by solving derived in the preceding section, the network throughput
(32) under the constraint . Given , the trans- is maximized by optimizing transmission power under the
mission probability is obtained as . outage-probability constraint and assuming infinite battery
The stationary probabilities can be derived in closed capacity. It is straightforward though tedious to extend the net-
form for the simple case of binary energy arrivals, namely that work-throughput analysis to the case of finite battery capacity
. Then energy-arrival rate is using related results from the last section.3 Such an extension
. The corresponding transition probabilities are modified from provides little new insight and thus is omitted.
(31) as
A. Maximum Network Throughput
or
or To characterize the network throughput, transmission power
otherwise. is related to the active transmitter density under the outage-
probability constraint. To this end, we define a parameter ,
Based on above transition probabilities, the Markov chain called the nominal node density, as the density of a homoge-
is illustrated in Fig. 2. The stationary distribution satis- neous PPP such that
fies the following equations obtained from (32) and the above
expression for :
(34)

where the summation can be interpreted as the interference


power measured at a receiver located at the origin from
(33) unit-power interferers distributed as . Note that
depends only on , , and the distribution of a PPP and is
Solving the equations in (33) and gives the independent of other network parameters. Moreover, is a
following proposition. strictly-monotone-increasing function of due to the fact that
Proposition 3: Consider the case that energy arrivals are bi- denser interferers result in larger outage probability for a link.
nary ( ) and the transmission power is a positive The expression of has no closed form and its value can be
integer no larger than the battery capacity . The distribution computed by simulation (see e.g., [36]). The relation between
of the battery level is and is shown in Fig. 3. The following lemma results from
Mapping Theorem [34, p. 18].
3Essentially, the network throughput for the case of finite battery capacity
can be bounded by modifying the current analysis such that the transmission
probability is replaced with its bounds as specified in Proposition 1.
7604 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

Fig. 4. Admissible set is sketched as the shaded region that contains all combinations of active transmitter density and transmission power that satisfy
the outage-probability constraint. Given infinite battery capacity and fixed transmitter density , is a monotone-decreasing function of as plotted with
the thick lines based on Theorem 1 for the cases of and , where the intersections are indicated by and , respectively. Note
that and an arbitrary value in give the optimal transmission power that maximizes the network throughput for the corresponding cases.

Lemma 6: Consider the homogeneous PPP . Remark 5: The network interference temperature
The process with is a homogeneous specifies the maximum density of interferers a link can tol-
PPP with density . erate without violating the outage-probability constraint. This
Define the admissible set as all combinations of quantity is analogous to the interference temperature in cog-
that satisfy the outage-probability constraint nitive-radio systems that measures the maximum amount of
additional interference for a certain frequency band without
(35) significantly degrading the reliability of communications
A combination is admissible if it belongs to . To derive therein [37]. On one hand, the network for large is interfer-
, since follows the same distribution as , in (5) ence-limited and further increasing does not contribute any
can be rewritten as network-throughput gain. Correspondingly, it can be observed
from (38) that saturates as :

(39)

On the other hand, the network for small is noise-limited. The


According to Lemma 6, has the same distribution as value of is not well defined if is below the target SINR
with . Consequently, , for which the outage constraint cannot be satisfied even in the
absence of interference.
Remark 6: The admissible set is illustrated as the shaded
region in Fig. 4. Increasing (relaxing the outage-probability
constraint) enlarges and vice versa. Let denote the max-
imum of the admissible values for under the outage con-
straint. Then, the boundary of corresponds to .
Remark 7: The condition for the admissible set in
(37) guarantees that (equal to the received SNR) is no smaller
(36)
than that is the minimum received SINR required for correct
decoding.
Combining (34)–(36) leads to the following lemma. We are ready to derive the maximum network throughput
Lemma 7: The admissible set is given as and the optimal transmission power . Let denotes the func-
tion that maps to for fixed and , which is obtained
(37) from Theorem 1 as
where represents the network interference temperature
and is given as
The derivation of can be intuitively explained using Fig. 4.
(38)
It can be observed from the curve depicting the function
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7605

that is fixed at for all and a strictly-mono- . Combining and shows that the
tone-decreasing function for . Let correspond to the assumption of violates the constraint in (44), proving
intersection between the curve and the admissible set that . Then, applying Theorem 1 yields the desired
. Then, under the outage-probability constraint, is max- result in (41). Last, since and are strictly-mono-
imized at , which corresponds to based on the defi- tone-decreasing and strictly-monotone-increasing functions, re-
nition in (6) since it is proportional to . Note that the claim is spectively, the solution for the problem in (44) must satisfy
based on the assumption or else need not hold (see Re- or equivalently solves the polynomial
mark 10). Depending on if is larger or smaller than , equation in (42), completing the proof.
and have different expressions as shown in Theorem 2 that Remark 8: For the case of , the network is rela-
states the main result of this section. tively sparse and is sufficiently large such that it is optimal as
Theorem 2: Given infinite battery capacity, the maximum well as feasible for all transmitters to transmit with probability
network throughput and the optimal transmission power 1, resulting in the network throughput in (40). For the case of
are specified as follows. , the network is relatively dense and high transmis-
1) If , sion power is required for satisfying the outage-probability con-
(40) straint. Consequently, not all transmitters can transmit simulta-
neously, corresponding to the optimal transmission probability
and is an arbitrary value in the range smaller than one and the network throughput in (41).
. Remark 9: With and the last coefficient at the right-
2) If , hand side being negative, the polynomial equation in (42) has
at least one strictly positive solution that gives for the case
(41) of . For the special case of , the polynomial
equation in (42) is quadratic and solving it gives in closed
form as shown below.
where and solves the following polynomial
Corollary 1: Given infinite battery capacity, and
equation:
, the optimal transmission power is
(42)

Proof: First, consider the case of . The


throughput expression in (7) implies that
Remark 10: Recall that the throughput maximized in The-
(43) orem 2 is defined in (6) based on the assumption , where
the scaling factor (success probability) is omitted for
Define such that (see Fig. 4). Using the defini- simplicity since it is close to one under the outage-probability
tion of in (38), constraint. If this factor is considered, changing the value of
over the range [see Theorem 2 for the case
of ] can lead to a throughput variation no larger than
It can be observed from (38) that is a strictly-monotone-in-
, which is negligible given . However, if is com-
creasing function. As a result, since and
parable with one or there is no outage constraint ( ), the
, and thus the set (the range of in
success probability should be accounted for and the throughput
the theorem statement) is nonempty. Consider an arbitrary value
redefined as
. Since from the monotonicity of ,
is admissible according to Lemma 7. Fur-
thermore, is feasible as based on
Theorem 1 and . It follows that maximizes by where . The results in Theorem 2 can be extended using
achieving the equality in (43). This proves the desired result for the redefined metric by analyzing as a function of , which
the case of . has no closed-form but can be approximated by its bounds [27].
Next, consider the other case of . Using
the throughput expression in (7) and Lemma 7, the problem of B. Maximum Network Throughput: Extreme Cases
maximizing the network throughput is equivalent to
Consider a network with a high energy-arrival rate
( ). The maximum network throughput can be
upper bounded as
(44) (45)

The inequality in the theorem statement can be proved since the outage-probability constraint requires that (see
by contradiction as follows. Assume that . This as- Lemma 7)
sumption results in by applying Theorem 1. More-
over, is obtained using the aforementioned
monotonicity of , and hence given that (46)
7606 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

where (46) follows from (39) and that is a monotone-in- density without violating the outage-probability constraint. For
creasing function. Combining the two upper bounds on in this reason, the network-throughput limit in (48) for the cur-
(43) and (45) gives rent case is proportional to the transmitter density. However,
for the case of , active transmitter density reaches
(47) the network-interference temperature and cannot be further in-
creased. Consequently, the corresponding network-throughput
limit in (48) is independent of the transmitter density.
For a high energy-arrival rate, equality is achieved in (47) as
Consider a sparse network ( ). It is optimal for each
shown below.
transmitter to transmit with probability 1 by setting the transmis-
Proposition 4: Given infinite battery capacity, as the energy-
sion power if or otherwise with probability
arrival rate , the maximum network throughput con-
by setting to be equal to (see Theorem 1). The cor-
verges as
responding network throughputs are and
, respectively, of which both diminish as
(48) . Next, for a dense network ( ), the maximum
network throughput is specified as follow.
Proof: First, consider the case of . Set Proposition 5: Given infinite battery capacity, as the trans-
with . This results in according to Theorem mitter density , the maximum network throughput con-
1. Consequently, and hence from the verges as
assumption about . Combining this inequality and (39) yields (52)
that as along with . It follows
that as , the combination is Proof: Set as the following function of :
admissible according to Lemma 7. This proves the equality in
(47) for the current case. (53)
Next, consider the case of . Given this strict
inequality, there exists such that that is shown shortly to achieve the limit of in (52). Given
(53), there exists such that for all .
(49) Therefore, it follows from (7) and Theorem 1 that

Set as
(50)

Combining (49) and (50) gives . Consequently, applying


Theorem 1 gives (54)

Combining (45) and (54) shows that the maximum network


throughput has the limit in (52) as increases.
and hence The remaining proof verifies that and the corre-
(51) sponding are admissible as . It follows from (53)
and Theorem 1 that for all , is a function of and
As along with , it follows from (39) and (51) given as
that there exists such that . As a result, by (55)
applying Lemma 7, the combination of as specified in
(50) and(51) is admissible. This leads to Substituting (53) into (38) yields

(56)
Letting proves the equality in (48) for the current case,
completing the proof. By comparing (55) and (56), there exists such that
Remark 11: Given a high energy arrival rate and infinite bat- for all . This proves the admis-
tery capacity, in the steady state, transmitters always have suffi- sibility of in (53) and in (55) as , com-
cient energy for transmission. Therefore, the expression in (48) pleting the proof.
also specifies the maximum network throughput of a MANET Remark 13: The rate of total energy harvested per unit area
with reliable power supplies instead of energy harvesting. is as . The linear growth of the rate with
Remark 12: For the case of , the active trans- increasing is due to the fact that the harvester density is equal
mitter density is below the network-interference temperature to . However, more aggressive energy harvesting in a dense
even though all transmitters transmit with probability 1. There- network does not continuously increase the network throughput
fore, there is margin for further increasing active transmitter that saturates at high transmitter power as the network becomes
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7607

Fig. 5. Maximum network throughput versus energy-arrival rate for the optimal transmission power, infinite battery capacity, and the transmitter density
.

Fig. 6. Maximum network throughput versus transmitter density for the optimal transmission power, infinite battery capacity, and the energy-arrival rate
.

interference limited (see Proposition 5). This issue may be re- density is equal to . Based on this setup, the values of
solved by using an alternative multiple-access protocol such as are computed using the Monte Carlo method that yields the plot
frequency-hopping multiple access that reduces the density of in Fig. 3. In addition, all numerical results are based on the SINR
simultaneous cochannel transmitters. threshold and the path-loss exponent .
The distribution of the energy arrival process is
V. NUMERICAL RESULTS specified as follows. Let denote an i.i.d. sequence of
The nominal node density is fixed as 0.05 for all numer- random variables following the chi-squared distribution with
ical results, corresponding to the maximum outage probability degrees of freedom (DoF) and mean equal to
. The relation between and is obtained by simula- . Let and hence has mean and variance
tion based on the following procedure (see e.g., [36]). The sum- . The chosen distribution of allows its variance to be
mation over the PPP in (34) is approximated by the signal controlled by varying while the mean of is fixed. Note that
power measured at the origin due to unit-power transmissions converges to a constant in probability as by the
by transmitters uniformly distributed in a disk. The number of law of large numbers.
transmitters follows the Poisson distribution with mean 200 and Infinite battery capacity is assumed for the numerical results
the disk radius is adjusted such that the expected transmitter presented in Figs. 5 and 6. In Fig. 5, the maximum network
7608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

Fig. 7. Comparison between the average tail probability of the battery level, , evaluated by simulation and its upper bound com-
puted based on Lemma 2 for infinite battery capacity, the DoF of the energy-arrival process , the energy-arrival rate , and the transmission power
.

Fig. 8. Transmission probability versus transmission power for finite battery capacity , the DoF of the energy-arrival process ,
the energy-arrival rate , and the transmitter density .

throughput computed using Theorem 2 is plotted against compared in Fig. 7 with its upper bound from Lemma 2 given
the increasing energy-arrival rate for the transmitter den- infinite battery capacity, , , and . The bound
sity . It can be observed from Fig. 5 is observed to be loose but sufficient for the analysis. The
that grows as increases and saturates for large . The similar observation and remark also hold for the upper bound
limits agree with those computed using Proposition 4, namely on the energy-overshoot function as given in Lemma 3
0.04 bit/(s Hz unit-area) for and 0.048 bit/(s Hz unit- and the numerical results are omitted for brevity.
area) for . In addition, Fig. 5 shows that in Next, consider the case of finite battery capacity. In Fig. 8,
a denser network (i.e., ), reaches its limit more the transmission probability obtained by simulation is plotted
rapidly as increases. against increasing transmission power for finite battery ca-
Fig. 6 shows the curves of versus for , pacity , , , and
which are obtained using Theorem 2. As increases and . It is found that is sufficiently large such that the
regardless of the value of , is observed to converge to values of closely match those for the case of infinite battery ca-
the limit 0.048 bit/(s Hz unit-area) predicted by Proposition 5. pacity as computed using Theorem 1. As observed from Fig. 8,
Moreover, it is observed from Fig. 6 that larger results in finite battery capacity degrades significantly only when and
faster convergence of to its limit as increases. hence are relatively small; as and increase, rapidly ap-
The average tail probability of the battery level, proaches the counterpart for the case of infinite battery capacity
, is evaluated by simulation and (or that for ).
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7609

Fig. 9. Transmission probability versus transmission power for both the cases of finite ( ) and infinite battery capacity. The DoF of the energy-arrival
process is , the energy-arrival rate , and the transmitter density .

Fig. 10. Maximum network throughput versus energy-arrival rate for the optimal transmission power and both the cases of finite ( ) and infinite battery
capacities. The DoF of the energy-arrival process is and the transmitter density .

Fig. 9 displays the curves of versus obtained by simula- smaller for larger because of less randomness in harvested
tion for , , , and . energy and hence smaller battery-overflow probability.
For comparison, the curve for the case of infinite battery ca-
pacity is also plotted. As observed from Fig. 9, reducing the VI. CONCLUSION
randomness of the energy arrival process by increasing leads The energy dynamics in a mobile ad hoc network have been
to smaller battery-overflow probability and hence higher . The characterized in terms of transmission probability. Assuming
effect of on diminishes as (and hence battery capacity) infinite battery capacity, it has been found that the transmis-
increases and converges to its counterpart for the case of infi- sion probability is equal to 1 when the energy-arrival rate ex-
nite battery capacity. ceeds transmission power or otherwise is equal to their ratio.
Last, we investigate the effect of the DoF of the energy arrival Moreover, for the case of finite battery capacity, bounds on
process on the network throughput. To this end, Fig. 10 shows the transmission probability have been obtained and exact ex-
the curves of versus obtained by simulation for pressions have been derived for the special cases of bounded
, , and . The curve for the or discrete energy arrivals. The results on transmission proba-
case of infinite battery capacity is also plotted for comparison. It bility have been applied to derive the maximum network spa-
can be observed from Fig. 10 that finite battery capacity causes tial throughput for a given energy-arrival rate and optimized
significant throughput loss especially for large . Such loss is transmission power. It has been shown that it is optimal and
7610 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

feasible for all transmitters to transmit with probability one if By bounding the first term in (60) using Chernoff bound [33]
the transmitter density is below a threshold that depends on the and the second using (12)
energy-arrival rate; otherwise, each transmitter should transmit
with probability smaller than one.
There are several potential directions for extending this
work. Coexisting wireless networks may harvest electromag-
(61)
netic (EMR) energy from each others’ transmissions. Modeling
and designing coexisting networks with EMR energy har- where (61) results from setting . By choosing such
vesting give rise to many new research issues ranging from that the exponents of the two terms in (61) are equal, the desired
algorithm design to throughput analysis. The current work result follows.
focuses on ad hoc networks with random access and can be
extended to other types of networks such as cellular networks or APPENDIX C
other medium-access-control protocols such as carrier-sensing PROOF OF LEMMA 3
multiple access. Last, it is interesting to investigate the effects From the definition in (14),
of bursty data arrivals and more sophisticated power control
on the throughput of wireless networks powered by energy
harvesting.
APPENDIX A (62)
PROOF OF LEMMA 1
If , it follows from (10) that and hence the (63)
inequality in the lemma statement holds since . Next,
consider the case of and let denote the time where (62) and (63) are obtained using integration by parts and
instant closest to but smaller than . It follows that the random Lemma 2, respectively. The desired result follows from (63).
walk does not cross the threshold from below in the time
slots . Therefore, .
Then, can be upper bounded as APPENDIX D
PROOF OF LEMMA 4
The definitions of the random processes and in
(57) (9) and (10) are modified for the case of finite-battery capacity.
Specifically, is redefined as
It can be obtained from (9) that

(64)
(58) and is as given in (10) but with the battery-level evolution
following (1). Given finite battery capacity , the inequality
Since and from (10), combining (57) and can be proved using induction as follows. This
(58) proves the inequality in the lemma statement for the case inequality holds for since and .
of , completing the proof. Assume that . Consider the case of . It
APPENDIX B follows from the definition of in (10) that .
PROOF OF LEMMA 2 Therefore, since from (64).
Next, consider the case of . Based on the evolution
Using Lemma 1 and for , of in (1),

(65)
.

Given that and , based on


(59) the definition of . As a result,
Let specify the slot such that . Since (66)
based on the definition of , using (8). It
follows from this equality and (59) that since and from (10). If , since
,

(67)
(60) (68)
HUANG: SPATIAL THROUGHPUT OF MOBILE AD HOC NETWORKS POWERED BY ENERGY HARVESTING 7611

where (67) applies , and (68) uses (64) and By inspecting (71), the event is equivalent
given that . Combining (65), (66), and (68) proves to the one . Then, the
that if . It follows that inequality in (72) can be rewritten as
for all . Furthermore, it can be shown
by expanding (64) that is no larger than that for
the case of infinite battery capacity. Using these results and fol-
lowing the same procedures as for proving Lemma 2 and 3, it
can be shown that (13) also holds for the case of finite battery
capacity and

Note that removing the conditioning of the last term increases


the probability. Therefore,

The desired result follows by setting .

APPENDIX E
PROOF OF LEMMA 5
(73)
Define the random process such that

Applying a similar technique as for proving the result in The-


(69) orem 1 for the case of shows that given

with . Comparing (69) and the evolution of in (1) (74)


shows that . Therefore, given

(70) Using the definition of , the last term in (73) can be rewritten
as
By expanding (69)

(71)

For ease of notation, define

since . Applying Kingman bound in a similar way


as for obtaining (12) yields

Then, . It follows that (75)

where according to Assumption 1 given .


By combining (73), (74), and (75)

(76)

The desired result follows from (70) and (76).

ACKNOWLEDGMENT
The author thanks R. Zhang for helpful discussion that moti-
vated this research, and the anonymous reviewers whose com-
(72) ments have significantly improved the quality of this paper.
7612 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 11, NOVEMBER 2013

REFERENCES [24] K. Huang, V. K. N. Lau, and Y. Chen, “Spectrum sharing between


[1] J. A. Paradiso and T. Starner, “Energy scavenging for mobile and wire- cellular and mobile ad hoc networks: Transmission-capacity trade-off,”
less electronics,” IEEE Pervasive Comput., vol. 4, no. 1, pp. 18–27, IEEE J. Select. Areas Commun., vol. 27, no. 7, pp. 1256–1267, Sep.
Jan.-Mar. 2005. 2009.
[2] C. Ho and R. Zhang, “Optimal energy allocation for wireless com- [25] S. P. Weber, J. G. Andrews, and N. Jindal, “The effect of fading,
munications with energy harvesting constraints,” IEEE Trans. Signal channel inversion, and threshold scheduling on ad hoc networks,”
Process., vol. 60, no. 9, pp. 4808–4818, Sep. 2012. IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4127–4149, Nov. 2007.
[3] O. Ozel, K. Tutuncuoglu, J. Yang, S. Ulukus, and A. Yener, “Trans- [26] N. Jindal, J. G. Andrews, and S. P. Weber, “Bandwidth partitioning in
mission with energy harvesting nodes in fading wireless channels: Op- decentralized wireless networks,” IEEE Trans. Wireless Commun., vol.
timal policies,” IEEE J. Select. Areas Commun., vol. 29, no. 8, pp. 7, no. 12, pp. 5408–5419, Dec. 2008.
1732–1743, Sep. 2011. [27] S. P. Weber, J. G. Andrews, X. Yang, and G. de Veciana, “Transmis-
[4] J. Yang, O. Ozel, and S. Ulukus, “Broadcasting with an energy har- sion capacity of wireless ad hoc networks with successive interference
vesting rechargeable transmitter,” IEEE Trans. Wireless Commun., vol. cancelation,” IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2799–2814,
11, no. 2, pp. 571–583, Feb. 2012. Aug. 2007.
[5] R. Zhang and C. Ho, “MIMO broadcasting for simultaneous wireless [28] A. M. Hunter, J. G. Andrews, and S. P. Weber, “Transmission ca-
information and power transfer,” IEEE Trans. Commun., vol. 12, no. pacity of ad hoc networks with spatial diversity,” IEEE Trans. Wireless
5, pp. 1989–2001, May 2013. Comm., vol. 7, no. 12, pp. 5058–5071, Dec. 2008.
[6] L. Georgiadis, M. Neely, and L. Tassiulas, Resource Allocation and [29] R. Vaze and R. W. Heath Jr., “Transmission capacity of ad-hoc net-
Cross Layer Control in Wireless Networks, 1 ed. The Netherlands: works with multiple antennas using transmit stream adaptation and in-
Now Publishers Inc., 2006. terference cancellation,” IEEE Trans. Inf. Theory, vol. 58, no. 2, pp.
[7] J. Yang and S. Ulukus, “Optimal packet scheduling in an energy har- 780–792, Feb. 2012.
vesting communication system,” IEEE Trans. Commun., vol. 60, no. 1, [30] N. Jindal, J. G. Andrews, and S. Weber, “Multi-antenna communica-
pp. 220–230, Jan. 2012. tion in ad hoc networks: Achieving MIMO gains with SIMO transmis-
[8] M. A. Antepli, E. Uysal-Biyikoglu, and H. Erkal, “Optimal packet sion,” IEEE Trans. Commun., vol. 59, no. 2, pp. 529–540, Feb. 2011.
scheduling on an energy harvesting broadcast link,” IEEE J. Select. [31] R. H. Y. Louie, M. R. McKay, and I. B. Collings, “Open-loop spatial
Areas Commun., vol. 29, no. 8, pp. 1721–1731, Aug. 2011. multiplexing and diversity communications in ad hoc networks,” IEEE
[9] H. Huang and V. K. N. Lau, “Decentralized delay optimal control for Trans. Inf. Theory, vol. 57, no. 1, pp. 317–344, Jan. 2011.
interference networks with limited renewable energy storage,” IEEE [32] K. Huang, J. G. Andrews, R. W. Heath Jr., D. Guo, and R. A. Berry,
Trans. Signal Process., vol. 60, no. 5, pp. 2552–2561, May 2012. “Spatial interference cancelation for mobile ad hoc networks,” IEEE
[10] M. Gatzianas, L. Georgiadis, and L. Tassiulas, “Control of wireless Trans. Inf. Theory, vol. 58, no. 3, pp. 1660–1676, Mar. 2012.
networks with rechargeable batteries,” IEEE Trans. Wireless Commun., [33] R. Gallager, Discrete Stochastic Processes, 1st ed. New York, NY,
vol. 9, no. 2, pp. 581–593, Feb. 2010. USA: Springer-Verlag, 1995.
[11] E. Uysal-Biyikoglu, B. Prabhakar, and A. El Gamal, “Energy-efficient [34] J. F. C. Kingman, Poisson Processes. Oxford, U.K.: Oxford Univ.
packet transmission over a wireless link,” IEEE/ACM Trans. Netw., Press, 1993.
vol. 10, no. 4, pp. 487–499, Aug. 2002. [35] D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry and its
[12] W. Chen, M. J. Neely, and U. Mitra, “Energy-efficient transmissions Applications, 2nd ed. New York, NY, USA: Wiley, 1995.
with individual packet delay constraints,” IEEE Trans. Inf. Theory, vol. [36] S. P. Weber and M. Kam, “Computational complexity of outage prob-
54, no. 5, pp. 2090–2109, May 2008. ability simulations in mobile ad-hoc networks,” presented at the Conf.
[13] M. J. Neely, “Optimal energy and delay tradeoffs for multiuser wireless Inf. Sci. Syst., Mar. 2005.
downlinks,” IEEE Trans. Inf. Theory, vol. 53, no. 9, pp. 3095–3113, [37] S. Haykin, “Cognitive radio: Brain-empowered wireless communica-
Sep. 2007. tions,” IEEE J. Select. Areas Commun., vol. 23, no. 2, pp. 201–220,
[14] M. J. Neely, “Energy optimal control for time-varying wireless net- Feb. 2005.
works,” IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 2915–2934, Jul.
2006.
[15] F. Iannello, O. Simeone, and U. Spagnolini, “Medium access control
protocols for wireless sensor networks with energy harvesting,” IEEE
Trans. Commun., vol. 60, no. 5, pp. 1381–1389, May 2012.
[16] A. Kansal, J. Hsu, M. Srivastava, and V. Raghunathan, “Harvesting Kaibin Huang (SM’08) received the B.Eng. (first-class hons.) and the M.Eng.
aware power management for sensor networks,” ACM Trans. Em- from the National University of Singapore in 1998 and 2000, respectively, and
bedded Comput. Syst., vol. 6, no. 4, p. Article 32, Sep. 2007. the Ph.D. degree from The University of Texas at Austin (UT Austin) in 2008,
[17] J. Jeon and A. Ephremides, “On the stability of random multiple access all in electrical engineering.
with stochastic energy harvesting,” presented at the IEEE Int. Symp. Since Jul. 2012, he has been an assistant professor in the Dept. of Applied
Inf. Theory, Jul.-Aug. 2011. Mathematics at The Hong Kong Polytechnic University (PolyU), Hong Kong.
[18] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. He had held the same position in the School of Electrical and Electronic En-
Franceschetti, “Stochastic geometry and random graphs for the gineering at Yonsei University, S. Korea from Mar. 2009 to Jun. 2012 and
presently is affiliated with the school as an adjunct professor. From Jun. 2008 to
analysis and design of wireless networks,” IEEE J. Select. Areas
Feb. 2009, he was a Postdoctoral Research Fellow in the Department of Elec-
Commun., vol. 27, no. 7, pp. 1029–1046, Jul. 2009.
trical and Computer Engineering at the Hong Kong University of Science and
[19] F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, “An ALOHA pro-
Technology. From Nov. 1999 to Jul. 2004, he was an Associate Scientist at
tocol for multihop mobile wireless networks,” IEEE Trans. Inf. Theory, the Institute for Infocomm Research in Singapore. He frequently serves on the
vol. 52, no. 2, pp. 421–36, Feb. 2006. technical program committees of major IEEE conferences in wireless commu-
[20] S. P. Weber, X. Yang, J. G. Andrews, and G. de Veciana, “Transmission nications. He will chair the Comm. Theory Symp. of IEEE GLOBECOM 2014
capacity of wireless ad hoc networks with outage constraints,” IEEE and has been the technical co-chair for IEEE CTW 2013, the track chair for
Trans. Inf. Theory, vol. 51, no. 12, pp. 4091–4102, Dec. 2005. IEEE Asilomar 2011, and the track co-chair for IEE VTC Spring 2013 and IEEE
[21] H. Nguyen, F. Baccelli, and D. Kofman, “A stochastic geometry anal- WCNC 2011. He is a guest editor for the IEEE JOURNAL ON SELECTED AREAS
ysis of dense IEEE 802.11 networks,” presented at the IEEE Infocom, OF COMMUNICATIONS and an editor for the IEEE WIRELESS COMMUNICATIONS
May 2007. LETTERS and also the Journal of Communication and Networks. He is an elected
[22] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to member of the SPCOM Technical Committee of the IEEE Signal Processing
coverage and rate in cellular networks,” IEEE Trans. Commun., vol. Society. Dr. Huang received the Outstanding Teaching Award from Yonsei,
59, no. 11, pp. 3122–3134, Nov. 2011. Motorola Partnerships in Research Grant, the University Continuing Fellow-
[23] H. Dhillon, R. Ganti, F. Baccelli, and J. Andrews, “Modeling and anal- ship at UT Austin, and a Best Paper Award from IEEE GLOBECOM 2006. His
ysis of -tier downlink heterogeneous cellular networks,” IEEE J. Se- research interests focus on the analysis and design of wireless networks using
lect. Areas Commun., vol. 30, no. 3, pp. 550–560, Mar. 2012. stochastic geometry and multiantenna limited feedback techniques.

You might also like