Wireless Powered Communication Networks: TDD or FDD?

07/16/2018
by   Arman Ahmadian, et al.
0

In this paper, we compare two common modes of duplexing in wireless powered communication networks (WPCN); namely TDD and FDD. So far, TDD has been the most widely used duplexing technique due to its simplicity. Yet, TDD does not allow the energy transmitter to function continuously, which means to deliver the same amount of energy as that in FDD, the transmitter has to have a higher maximum transmit power. On the other hand, when regulations for power spectral density limits are not restrictive, using FDD may lead to higher throughput than that of TDD by allocating less bandwidth to energy and therefore leaving more bandwidth for data. Hence, the best duplexing technique to choose for a specific problem needs careful examination and evaluation.

READ FULL TEXT

page 1

page 2

research
07/14/2018

Backscatter-assisted Relaying in Wireless Powered Communications Network

This paper studies a novel cooperation method in a two-user wireless pow...
research
04/13/2021

Probabilistic Accumulate-then-Transmit in Wireless-Powered Covert Communications

In this paper, we investigate the optimal design of a wireless-powered c...
research
05/23/2018

Covert Transmission with Harvested Energy by a Wireless Powered Relay

This work examines the possibility, performance limits, and associated c...
research
02/25/2019

Optimal Online Transmission Policy for Energy-Constrained Wireless-Powered Communication Networks

This work considers the design of online transmission policy in a wirele...
research
11/30/2018

Energy-efficient Resource Allocation for Wirelessly Powered Backscatter Communications

In this letter, we consider a wireless-powered backscatter communication...
research
12/06/2019

A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks

Security aspects in underwater wireless networks have not been widely in...
research
08/08/2023

Achieving Covert Communication With A Probabilistic Jamming Strategy

In this work, we consider a covert communication scenario, where a trans...

Please sign up or login with your details

Forgot password? Click here to reset