Научная статья на тему 'A Queueing Network Model for Delay and Throughput Analysis in Multi-hop Wireless Ad Hoc Networks'

A Queueing Network Model for Delay and Throughput Analysis in Multi-hop Wireless Ad Hoc Networks Текст научной статьи по специальности «Математика»

CC BY
219
27
i Надоели баннеры? Вы всегда можете отключить рекламу.
Область наук
Ключевые слова
queue / network / phase type distribution / Markov chain

Аннотация научной статьи по математике, автор научной работы — T. G. Deepak

In this paper we present a queueing network model for computing average end-to-end delay, and maximum throughput that can be attained in random access multi-hop wireless ad hoc networks with stationary nodes under two popular contention resolution schemes namely, Binary Exponential Back-off (BEB) and Double Increment Double Decrement (DIDD) rules. This model takes into consider some realistic features of the system like (i) the generation of different classes of packets at nodes, and (ii) the dependence of the transmission time and transmission probability on the distance between the transmitter and receiver. Probability distributions and the associated measures of characteristics of the time spent by a packet at arbitrary node are analytically derived by using phase type random variate theory, which in turn are used for the computation of average end-to-end delay and maximum achievable throughput. Theoretical results are numerically illustrated.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «A Queueing Network Model for Delay and Throughput Analysis in Multi-hop Wireless Ad Hoc Networks»

A Queueing Network Model for Delay and Throughput Analysis in Multi-hop Wireless Ad Hoc Networks

T.G.Deepak

Department of Mathematics, Indian Institute of Space Science and Technology, Thiruvananthapuram, India. mailto:deepak@iist.ac.indeepak@iist.ac.in

Abstract

In this paper we present a queueing network model for computing average end-to-end delay, and maximum throughput that can be attained in random access multi-hop wireless ad hoc networks with stationary nodes under two popular contention resolution schemes namely, Binary Exponential Back-off (BEB) and Double Increment Double Decrement (DIDD) rules. This model takes into consider some realistic features of the system like (i) the generation of different classes of packets at nodes, and (ii) the dependence of the transmission time and transmission probability on the distance between the transmitter and receiver. Probability distributions and the associated measures of characteristics of the time spent by a packet at arbitrary node are analytically derived by using phase type random variate theory, which in turn are used for the computation of average end-to-end delay and maximum achievable throughput. Theoretical results are numerically illustrated.

Keywords: queue, network, phase type distribution, Markov chain

1 Introduction

A multi-hop wireless ad hoc network is a collection of nodes that communicate with each other without any established infrastructure or centralized control. Due to the limited transmission range of wireless network interfaces, multiple network hops may be needed for one node to exchange data with another across the network. Thus, in this network, the packets may have to be forwarded by several intermediate nodes before they reach their destinations and therefore each node operates not only as a host but also as a router. Hence, each node may act as a source, destination or relay. For a detailed description of some of the situations where ad hoc networks can be used, refer [7].

The wireless medium is shared and scarce. Multiple stations may want to transmit data frames at the same time over the same channel. So, multiple access protocols are needed to coordinate the transmissions. Since ad hoc networks lack infrastructure and centralized control, these protocols should be distributed. IEEE 802.11 protocol has been set up for fixing international standards for Wireless Local Area Networks (WLAN's). In the 802.11 protocol, the fundamental mechanism to access the medium is known as the distributed co-ordination function (DCF). DCF is a random access scheme based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol.

According to DCF basic access mechanism, each station with a packet, ready for transmission, monitors the channel activity and if the channel is found to be idle for a pre-determined period called distributed inter-frame space (DIFS), transmits the packet. Otherwise, if the channel is sensed busy, the station initializes its back-off timer and defers transmission for a randomly selected back-off period to minimize the collisions. At each time point at which the channel is monitored, the back-off counter is decremented when the medium is idle, and is frozen when the medium is sensed busy. The timer resumes only after the medium has been idle for a period longer than DIFS. The station

whose back-off timer expires first begins transmission and the other stations freeze their timers and defer transmission. Once the current transmission gets completed, the back-off process repeats again and the remaining stations reactivate their back-off timers. Upon the successful reception of a packet, the destination sends back an immediate acknowledgement (ACK) after a time interval equal to short inter-frame space (SIFS). In addition to the basic access mechanism, another optional method called ready-to-send/clear-to-send (RTS/CTS) mechanism is also adopted under DCF. According to this, a node operating in RTS/CTS mode, before transmission, reserves the channel by sending a special ready-to-send short frame and the destination node acknowledges the receipt of the same by sending back a clear-to send frame. After this, the normal packet transmission and ACK response occur. Since collision may occur only on the RTS frame, and it is detected by the lack of CTS response, the RTS/CTS mechanism allows to increase the system performance by reducing the duration of a collision when lengthy messages are transmitted. More importantly, to some extent, the RTS/CTS mechanism adopted in the 802.11 protocol is useful to address the so called hidden terminal problem, which was first mentioned by [14]. For more details on hidden node problem, also refer [6].

DCF employs a contention resolution method namely, binary exponential back-off (BEB) rule, to minimize the probability of collisions due to multiple simultaneous transmissions. Under this rule, if a packet is ready for transmission from a node for the first time, contention window size is chosen as W and according to the collision avoidance protocol procedures, a random value for its back-off counter is uniformly selected from 0, 1,2, W — 1. If the packet meets with a collision in that attempt, the contention window size will be set as W1 = 2W and a value for back-off counter is selected uniformly from 0, 1,2, W1 — 1 and if it is further included in a collision on its next attempt, the contention window size will be doubled again and this will continue up to a maximum of m collisions. After m unsuccessful attempts, if it is again met with a collision, the contention window size will be fixed as Wm = 2mW. If an attempt results in successful transmission, the contention window size for that node will be reset as W. Hence the minimum contention window size CWmin = W , and the maximum contention window size CWmax = 2mW.

Apart from the BEB scheme, many researchers have proposed different schemes to fix the contention window size in order to enhance the performance of wireless LANs. Of which the DIDD (Double Increment Double Decrement) scheme proposed by [8] deserves special mention. Under this scheme, if a packet meets with collision while it is being transmitted, the contention window size for the next transmission will be doubled as in the case of BEB rule, whereas after a successful transmission it will be halved unlike under BEB scheme where the contention window size is reset to W under the same scenario. For more about other schemes and their detailed performance analysis, refer [8] and the references therein.

Several researchers have attempted to analyse the throughput and packet delay occurring in communication networks. [2] proposed analytical models to learn the IEEE 802.11 protocol under unsaturated traffic conditions for multihop networks. [4] made an attempt to characterize the average end-to-end delay and maximum achievable per-node throughput in random access multi-hop wireless ad hoc network with stationary nodes. They modelled random access multi-hop wireless networks as open G/G/1 queueing networks and used the diffusion approximation (see [10]) to derive closed form expressions for the average end-to-end delay. However, none of these aforementioned references has addressed the important problem of finding the probability distribution of the end-to-end delay experienced by the packets in the network.

This article is in the same line with [4]; however, a more detailed and comprehensive delay analysis has been carried out for a multi-hop wireless ad hoc network with stationary nodes under more general and realistic assumptions. More importantly, probability distributions of the time spent by a packet at an arbitrary node from the epoch at which it is ready for transmission till it is successfully transmitted have been derived under both BEB and DIDD rules, as discrete Phase-Type(PH) distributions. Analytical representation of these distributions enable us to compute some important statistical measures like variance and coefficient of variation of the packet waiting time at

a node, which in turn could be used in computing the mean total time spent by a packet in the system before it reaches its destination. For more details on PH distributions and their characteristics, see [12] and [11]. Following are some of the highlights of this paper. (i) The analysis aims to capture several salient aspects of wireless networks like the relationship between the probability of successful transmission between two nodes and the distance between them, interferences caused by hidden nodes, generation of different classes of packets at nodes based on the number of hops to be visited etc. (ii) PH- representation of single hop delay under both BEB and DIDD back-off schemes are derived explicitly and the important statistical measures like mean, variance, and coefficient of variation of the single hop delay are computed analytically and are presented in compact form. (iii) By using the diffusion approximation, the important measures like average queue size and mean waiting time of a packet at an arbitrary node are computed.

Though the present paper does not consider the routing algorithms, mobility models, and path length of source-destination pair that are currently applied in ad hoc scenarios, it renders a concrete analytic approach which may be helpful to get approximate solutions to some important measures that decide the performance of ad hoc models. Even though it does not take into account all the features of a practical ad hoc model, it may be treated as an analytical model which help us to get some insight into the performance behavior of a system governed by probabilistic laws. A detailed description of our model is as follows.

2 Methods

We consider a wireless ad hoc network with N nodes that are assumed to be uniformly distributed inside a compact set W c R3 of unit volume. Each node has an equal transmission range R. That is, if a node transmits a packet, it can reach at another node which is at a distance of maximum R units from the source node. Let ry be the distance between nodes i and j. Nodes i and j are called as neighbours if they can directly communicate with each other, that is if ry < R. The set of neighbours

of node i is denoted by N(i) and it is assumed that all neighbours of a node lie inside a sphere of

4

volume v = -nR3 (< 1) centered at that node. Since the nodes are distributed uniformly, the number of neighbours is binomially distributed with mean (N — 1)v. Being an ad hoc network, each node in the network can be a source, destination, or relay of packets. Depending on the number of hops to be traversed by a packet, we classify the packets into M categories. A packet is said to be of class I , 1 < I < M, if it has to visit I nodes before reaching its destination. A packet generated at an arbitrary node is assumed to be class 1,1 < I < M with probability ct, where 1 Ci = 1. Packets are generated at nodes in the network as a renewal process with rate Ae and coefficient of variation CE . It is to be noted that, as per our assumption, the process by which an arbitrary node generates class I packets is a renewal process with rate

Computation of forwarding probability

Let qtj be the probability that a packet at node i (either generated at i or received from some other node) is forwarded to node j. When node i transmits a packet, any of its neighbours can receive it; however, we assume that the probability that it reaches at a neighbouring node depends on how far the receiving node is from node i. More precisely, the probability that the packet reaches at the node which is the kth neighbour of i is assumed to be inversely proportional to the average distance between node i and its kth neighbour.

By equation (13) in [13] , the average distance between a node and its kth neighbour,

E(Rk)=Rr(k+1/3)r(L+1), (1)

V r(fc)r(L+4/3) V '

where

Y(m + 1/3) = Y(1/3)(33^——,

L is the largest integer less than or equal to (N — 1)v, n!(l) is the Zth multifactorial of n, and r(1/3) « 2.6789385347.

We have

9y = P[i ^j} = P[i e N(i)} * P{j e N(i)}. By conditioning on the number of neighbours of i, we get

qu = YNP-1 P{i^i\i e N(i), \N(i)\ = p} * P{\N(i)\ = p\j e N(i)} * P{j e N(i)}. (2)

Now

P{i^j\jeN(i),\N(i)\=p} = Zl=i P{i^j\\N(i)\ = p,j is the k th neighbour of i } *

P{j is the k th neighbour of i \\N(i)\ = p}. (3)

We have

P{i ^ y\\W(i)\ = p,j is the k th neighbour of ¿} = P{the packet is not absorbed at i } *

E(Rk\\N(i)\=p)'

where £(flfc\\N(i)\ = p) is obtained from eqn(1) by replacing L by p, and

E = (Yp _1_)-i

p E(Rl\\N(i)\=Py

is the normalization constant. Thus

P{i ^ y\\W(i)\ = p,j is the k th neighbour of i} = [1 P{ the final destination of the packet is ¿}] * Up(k), where

U„(k) =-^-.

E(Rk\\N(i)\=p)

So

P{i^y\\N(i)\ =p,j is the k th neighbour of ¿}

= [1 — Yli=1 P{ the packet is absorbed at ¿\ the packet is of class I}* P{ the packet is of class l}]Up(k)

= [1 — YJi=1 P{ the packet has traversed exactly I hops } * Ci]Up(k). Now qij, the forwarding probability from node i to node j is independent of the particular choice for i and j so that we can remove the suffix to write q instead of qy. Hence we get

P{i ^ j\\N(i)\ = p,j is the k th neighbour of i} = (1 — Yd=1 qlCi)Up(k). (4) Substituting eqn (4) in (3) we get

P{i^j\jeN(i),\N(i)\=p} = (1 —

^L'iL1qlCi)^^1P{j is the k th neighbour of i\\N(i)\ =p}Up(k). (5)

Now from [9], the average distance between two random points uniformly distributed inside a

72r2

sphere of radius r is Therefore

P{j is the k th neighbour of i\\N(i)\ = p} = P{ among p — 1 neighbours (other than j) of i exactly k —

72R2

1 lie inside a sphere of radius "^i"}

= p — 1 (v')k-1(1 — v')p-k, where v' = (r^)3.

Hence eqn (5) becomes

N(i).\N(i)\ = n} = (1 — Y™. alc,)Yp -n — 1k ±

P[i^j\j E N(i), |N(i)| =p}=(1- Z?=1 qlc{)ZPk=1 P-K, (V)k-1(1 - v')p-kUp(k).

E

P

Also

and

P{IN(i)l=pljEN(i)] = N-2 vv-1(l-v)

p — 1

— v)N-P-1

P{j e N(i)} = V. By substituting eqns (6), (7), and (8) in eqn (2) we get

(7)

(8)

q = (i- Yf=i qlci) n=i N-2v_lP-ik_ ^(1 - v)N-p-1(v')k~1(i - v')p~kup(k)

(9)

A recursive algorithm to compute q

From eqn (9) we get

where

f — X*N—1 X*P

u = Lp=i Lk=i

N

2 ,P p — 1

q =

1

1+c1G '

(10)

VP(1 — v)N-P-1(v')k-1(i — v')P-kn(k).

— V- w -px

As a particular case, if ct is assumed as uniform (that is, if ct = 1/M,l = 1,2 ..., M), then we can write

q =

M+G+MG

which in turn gives the recursive algorithm

[k + 1] = MG + (q[k])2M+(g[k])M+1G ^ M+G+MG .

Lemma: The effective arrival rate at an arbitrary node, denoted by A, is

X = -

N(1-(N-1)vq)

(11) (12)

Proof: Since the effective arrival rate at a node is the sum of the external arrival rate at that node and the average inflow rate to that node from its neighbouring nodes, we have

X = '^+(N — 1)Xvq.

Hence the lemma.

MG + q2M + qM+1

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

G

Finding the interfering nodes

Figure 1: Illustration of hidden-terminal area

While a packet is being transmitted from a node to another, all the nodes that are lying in the neighbourhood of the source node can hear the details regarding the transmission by sensing the medium , whereas the ones which are not the neighbours can not. So the nodes which are located within the sensing region of the intended destination and off-range of the source node may make transmission to destination node simultaneously with source node, which may result in collision at the destination node. This is the well known hidden terminal problem and the corresponding nodes

are termed as hidden nodes. These hidden nodes together with the neighbouring nodes of the source node constitute the set of interfering nodes of the source node. In order to conduct the waiting time analysis for a packet in the whole network, we need to get a measure of the average number of interfering neighbours an arbitrary node has. For this, we proceed as follows.

Distribution function of the distance X between source and destination nodes is given by

F(x) = fy3,0<x<R.

The volume of the solid inside which the hidden nodes lie is a random variable. For a given value of X, this volume ( two-dimensional analogue of this case is shown as shaded portion in Figure 1, the details of which are given in [1]) can be computed as

V(x) = v--^n(4R+x)(2R — x)2. So the average volume of the solid inside which the hidden nodes lie,

vh = f* V(x)dF(x) = ^nR3. Hence the average volume of the solid inside which the interfering nodes lie,

49 o

v, = vb + v = —nR3.

' n 24

Now it is easy to see that the probability distribution of the interfering neighbours of a node is binomial with mean (N — 1)vj. Hence the average number of interfering neighbours of an arbitrary node,

N, = (N — 1)v,. (13)

Waiting time analysis

In this section, we derive the probability distribution and some important measures of characteristics of waiting time for a packet at an arbitrary node under both BEB and DIDD schemes. Here, by waiting time at a node we actually mean the time spent by a packet at that node from the instant at which it is ready for transmission till it s successfully transmitted. This does not include the time spent by the packet at the buffer before its transmission turn occurs. The objective of this paper is not to compare the efficiency among BEB or DIDD or any other scheme proposed by researchers, rather our focus here is to derive the waiting time distribution of a packet at an arbitrary node analytically, for which BEB and DIDD rules are being used just for theoretical illustration.

Under the DIDD scheme

[3] analysed the performance of IEEE 802.11 distributed coordination function, where BEB rule is used as contention resolution method, by means of a two dimensional Markov chain and computed the conditional collision probability (that is, the probability of collision seen by a packet while it is being transmitted). By the same approach, in this case, we can compute the conditional collision probability say, pD by means of the formula

pD=1 — (1—rDr2, (14)

where td , the transmission probability of a node in a random time slot under DIDD rule, is derived as (proof is shown below)

__2(l-2a)(l-am+1)__, >

D (1-(2a)m+1)(1-a)W+(1-2a)(1-am+1) ( )

with a = , and N2 represents the largest integer less than or equal to N,.

Eqns (14) and (15) represent a nonlinear system in unknowns td and pD, which can be solved numerically (by using fixed point iteration scheme) to get pD.

Now, we derive the probability distribution of the number of time slots spent by an arbitrary packet at a node from the time instant at which it is ready for transmission till it is successfully transmitted, by using the embedded Markov chain technique. For this, consider the system at the

end of a time slot at which either the channel is sensed idle by the node or transmission of a packet (which may or may not be successful) from that node is over. More precisely, let ti be the beginning of a time slot such that the previous slot [ti-1, ti) ends either with transmission of a packet from the node, or the channel is sensed idle by the node. Then the embedded stochastic process {(s(ti),b(ti); i £ N}, where s(ti) and b(ti) respectively denote the backoff stage and backoff time counter of the node at ti, is a Markov chain. Note that whenever s(ti) = j, then b(ti) can take one of the values uniformly from {0,1,2,..., Wj — 1}, where Wj = 2jW,j = 0,1,2,..., m.

The transition probabilities of the Markov chain are denoted by

P{(h.ki)\(io,ka)} = P{(s(ti+1),b(ti+i)) = (ii,ki)\(s(ti),b(ti)) = (iQ,ko)}. Under the DIDD scheme, it can be seen that

P{(i, k) \(i,k + 1)} = 1, for k = 0,1, ...,Wi—2; i = 0,1, ...,m

P{(i-1,k)\(i,0)} = 1-PD, for k = 0,1,...,Wi_1-1; i = l,...,m

Wi-1

P{(i + 1,k)\(i,0)} = JP^, for k = 0,1,...,Wi+1-1; i = 0,1,.,m - l

P{(m,k)\(m,0)}=^, for k = 0,1.....Wm - 1

P{(0,k)\(0,0)} =1-E°, for k = 0,1,., W - 1.

and

Define state vector

i = (( i, 0), (i,1),( i,2),...,( i,Wi — 1)), for i = 0,1,...,m. Then the transition probability matrix of the Markov chain is given by

[Do + Co, Bi 0 ............

P =

0

Di B2 -, Ci D2 B3

where Bi, i = 1,2,..., m of dimension Wi_1xWi, given by

D

Bm

Dm + Bm']

Bi =

Ci, i = 0,1, ...,m — 1, Wi+ixWi matrix, given by

Wi Wi 00

Ci =

Wi Wi 00

Di, i = 0,1,..., m, of dimension WixWi, given by

PD Wi 0

1_ PD 1_ PD 1_ PD

W

D =

W-i 0

with Iw—1 as the identity matrix of order Wi — 1 and 0 is row(column) vector of appropriate dimension.

C0, has the same structure as C0 with the only distinction that it is a square matrix of order W. Similarly Bm,, a square matrix of order Wm, differs from Bm only in dimension.

m

0

C

m_2

0

0

C

m_1

0

0

0

0

0

If we define n = (n0, n^ ...,nm), where ni = (ni0,ni1, .,niWi-1),i = 0,1, . ,m, as the stationary distribution of the above Markov chain, it can be seen that

"* = (-^y^^oo, for i = 0,1.....m; k = 0,1.....Wi-1

and

-oo = w^a - (-2^)m+1) + (S^a - (^)m+1)]-1.

Hence td , the probability that a node transmits in a random slot time is given by

T _ ym _ _2(1-2a)(1-am+1)_

D Li=0 i° (1-(2a)m+1)(1-a)W+(1-2a)(1-am+iy

which is eqn (15).

Now, let a.i, i = 0,1,2, ...,m — 1 be the probability that a packet at the head of the waiting line at a node starts with backoff stage i. Then

at =

P{ the previous packet which was successfully transmitted from the node left the system

at stage i + 1 }

so that

ai = Ilii=0 al(1-pD)piD-l+1, for i = 1,...,m-2

with

„ — ym-1 „m-l

am-1 = Ll=0 alPo ,

and

a0 = a1(1 - pD) + 0.0(1 - pi).

From this, by recursion we get

_ pd "i -

so that

1+1

a: =—-—ran, for i = 1,2,... ,m — 1

1 (1-PD)1 01

_ (1-2pD)(1-pD)m-1 . > = n-PD^+i-Pr1 ()

by using the normalizing condition YiZo1 ai = 1- Thus we have

_(1-2pp)pl,+1_

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

((1-PD)m+1-p'S+1)(1-PD)i-m+1

*i = ^.^jZZ^-in+i. for i = 1.....m-1 (I7)

with a0, given by eqn (16).

Now the definition of a discrete PH random variable (see [12] and [11]) for details on PH distribution and PH renewal theory) leads to the following theorem.

Theorem 1: The number of transitions undergone (time slots spent) by a packet say, SD from the instant at which it is ready for transmission till it is successfully transmitted, is a discrete PH random variable having representation (aD,TD) with aD = ,0wm,0), where

cii, i = 0,1,2 ...,m — 1 is the vector having Wi components with each component a^, 0Wm is the vector of zeroes having Wm components, and TD is the matrix given by

vD0 B1 0 ............ 0

0 D1 B2 • •

• • D2 B3 • •

• '• '• Dm-1 Bm L0 ............... 0 Dm+Bm,

Also, its pmf, P(SD =k) = aDTk-1(—TDe),k > 0, where e is a column vector, having components 1, of appropriate dimension.

Corollary 1: Average number of transitions undergone(time slots spent) by a packet at an arbitrary node from the instant at which it is ready for transmission till it is successfully transmitted, is given by

where

E(Sd) = sd (I - TD)-1e = % (Wx0 + ^W-1) + zm^i1 % №i + ^WT11)- (18) x. + WiPB(1_(2PD)m-i-1) for i = 0,1,2.....m-1. (19)

i 2(1_Pd) 1-2PD 1_PD ' V '

Under the standard BEB scheme

Following the same lines as in the case of DIDD scheme, we have

Theorem 2: Under the standard BEB scheme, SB, the number of time slots spent by a packet at a node from the instant at which it is ready for transmission till it is successfully transmitted, is a

T

discrete PH variate having representation (aB,TB) with aB = (^,0,0, ...,0), and TB is the matrix having the same structure as TD with the only exception that pD in TD is replaced by pB in TB, where the conditional collision probability pB under BEB scheme is computed by solving the nonlinear system of equations (see [3])

Pb = 1 — (1 — TB)n2, (20)

and

= -20-2PS)-. (2!)

Also, pmf of SB is given by

P(Sb = k) = aBT^-1(—TBe),k> 0. Corollary 2: Under the standard BEB scheme, average number of time slots spent by a packet at an arbitrary node from the instant at which it is ready for transmission till it is successfully transmitted, is given by

E(SB) = &B(I — TB)-1e = 1 (Wyo + (22)

where y0 has the same expression as x0 (given by eqn (19)), in which pD is replaced by pB.

Probability distribution of slot length

We start with this section by summarizing the important steps (with minor changes pertaining to our model) in the derivation of probability distribution of length of an arbitrary slot, as detailed in [3]. A slot is called active if at least one transmission takes place in that slot. Let Pa be the probability that the slot is active. Since, on the average N2 + 1 nodes are contending on the channel (we have seen that on the average, a node will have N2 interfering nodes), and each transmits with probability

Pa = 1 — (1 — t)n2+1, (23)

where t=td or tb depending on whether DIDD or BEB scheme is used. Transmission of a packet may result either in success or in collision. Let

Ps = P( transmission in a slot is successful\slot is active).

Then

_ (N2 + 1)T(1-T)N2 _ (N2 + 1)T(1-T)N2

Ps pa 1-(1-T)N2 + 1 . (24)

At this juncture it may be remembered that a time slot may be (i) a back off time slot a if no transmission takes place in that slot (ii) Ts, the average time the channel is sensed busy because of a successful transmission, or (iii) Tc, the average time the channel is sensed busy because of a collision. Thus the probability distribution of the slot length SL is given by

!a with prob 1 — Pa

Ts with prob PaPs (25)

Tc with prob Pa(1 — Ps) If we assume that the system is completely managed by the basic access mechanism, then

Ts = SIFS + T(E(P)) + DIFS + T(ACK)

and

Tc = DIFS + T(E(P*)),

where E(P) denotes the expected packet size and T(E(P)) represents the average time required for a node to transmit a packet of size E(P) to its neighbouring node. Similarly, E(P*) stands for the expected value of the largest packet size included in a collision and T(E(P*)) for the corresponding mean transmission time . Also, T(ACK) represents the mean time required to transmit an acknowledgement message from destination to source node. Just in the lines of eqn (15) in [3] it can be seen that

1-(1-T

)(Nl+1)-(Nj+1)T(1-T)Nl ' ( )

where F(.) is the packet size distribution function and Pmax is the maximum value of the packet size. It is to be noted that

E(P) = f0Pmax(1—F(x))dx. Now, for the computation of T(E(P)), T(E(P*)), and T(ACK), we assume that the transmission time for a packet from a node to another depends on how far the latter is from the former. Earlier we have seen that if a packet is transmitted from node i,

P{ it reaches at node j | j is the kth neighbour of i} = Eh

B(Rk)' where

El = ^^ 7(^li)-1,

and E(Rk) is given by eqn (1). So, if Z represents the transmission time (in ns) for a bit to reach the receiving node, which lies at a unit distance from the source node, then the transmission time for a packet to reach the receiver, which is the kth neighbour of the source node is ZE(P)E(Rk) so that

T(E(P)) = Yd=k ZE(P)E(Rk)^ = LZWlE(P). (27)

Similar results hold for T(E(P*)), and T(ACK). Now the expected slot length,

E(SL) = (1 — Pa)o + PaPsTs + Pa(1— PS)TC. (28)

If TS denotes the time spent by a packet at a node from the instant at which it is ready for transmission till its successful transmission, then

E(TS) = E(S)E(SL), (29)

where S = SD or SB depending on whether the system is under DIDD or BEB scheme, and E(S) is given by eqn (18) or (22) as the case may be. Note that since TS is the actual time taken for a node to complete a packet transmission since the epoch at which it is ready for transmission, as per the queueing terminology, TS is equivalent to the effective service time rendered for a packet at a node in the network. Now, let us compute the variance of TS.

E(TS2) = E(E(TS2IS = k)).

Now

E(TS2IS = k)= E((X1=1 SLj)(Zkh=1 SLh)), where SLj denotes the length of y'th time slot. Since SLj are iid variates with mean E(SL), we have

E(TS2IS = k) = Ylj=1 Ihh=1 (E(SL))2 + Ylj=1 E(SL2).

Thus

Var(TS) = [(1 — Pa)a + PaPsTs + Pa(1 — Ps)Tc]2[2a(I — T)-2Te

+a(I — T)-1e — (a(I — T)-1e)2] + a(I — T)-1e[(1 — Pa)o2 + PaPsTs2 + Pa(1 — PS)TC2],(30) where a = aD or aB, and T=TD or TB depending on whether the system is under DIDD or BEB scheme. Moreover CTS, the coefficient of variation of TS, given by

Cts = Var(TS^2 can be computed by using the eqns (29) and (30).

These results can be used to get approximate solution to queue size distribution at each node as done in [4]. [10] introduced a vector-valued normal process and its diffusion equation in order to obtain an approximate solution to the joint distribution of queue lengths in a general network of queues. By this approximation, the queue size distribution at node i say, pt is obtained as

Deepak, T.G. RT&A, No 2 (45) A QUEUEING NETWORK MODEL_Volume 12, June 2017

(1 — Pi, n = 0

Pi(n) = \pi(1—Pi)Pin-1, n > 0 (31)

where pi = AiE(Si); Ai is the effective arrival rate at node i , and E(Si) is the mean service time required for a packet at node . Also,

Pi= exp(—^-i)r), (32)

where Cand C| are the squares of coefficients of variation of inter-arrival times and service times respectively, of packets at node i. As shown in [5] , C;2 is approximated by using the relation

Ch = 1 + XN=o l(Cs) — Vqfaer1, (33)

where C|0 = Cj, and ej is the average number of visits that a packet makes to node j during its stay

ls0 = ce, mid cj

in the network. Since all the nodes are considered identical in our model, the eqn, analogues to the one given by(33), associated with our model assumes the form

Ct~1+ ^ +(N — 1)(C2S — 1)q2, (34)

where q is given by eqn (11).

Also, mean number of packets at an arbitrary node

K = ^. (35)

By Little's law, average waiting time of a packet at an arbitrary node

W =- = —^r, (36)

where A, the effective arrival rate at a node is given by eqn (12).

Since a packet generated at an arbitrary node is of class l, l = 1,2, ...,M with probability ct and a class packet visits exactly hopes before absorption, average number of hops traversed by a packet before absorption

H = Ya=1 lci = if C is uniform.

Hence, the average end to end delay experienced by a packet in the whole network

D =HW = if cl is uniform. (37)

Since A, given by eqn (12), is the effective arrival rate at an arbitrary node, and E(TS), given by eqn(29), is the actual mean time required for a packet to be successfully transmitted from a node, for the stability of the system

AE(TS) < 1.

Hence the maximum achievable throughput can be attained when Ae is enhanced to the values near its upper bound, governed by the rule

Ae < N(1 — (N — 1)vq)E(TS) (38)

for a selected set of parameters.

3 Results

In order to illustrate the performance of the system, we present some numerical results. The values of the system parameters used in this analysis are summarized in Table 1 and Table 2. Most of these parameters are set to comply with the 802.11 MAC specifications. The wireless nodes are assumed to be distributed uniformly inside a compact subset in R3 of volume 106 m3, which is taken as 1 cub ic unit. All nodes are considered as identical. Packets are generated independently at nodes as per a renewal process with rate Ae and coefficient of variation CE = 0.95. types of packets generated at each node are assumed as uniform with mean 1/M, where M = 15. Packet size are assumed to be uniformly distributed over an interval [64,1518], measured in bytes, so that the average packet size is 791 bytes. In all numerical illustrations, we have included both BEB and DIDD schemes in order to get a complete picture of the system performance.

Deepak, T.G. RT&A, No 2 (45) A QUEUEING NETWORK MODEL_Volume 12, June 2017

Table 1: Physical Parameters

Parameter Value

CW ■ ^ vvmin 32

CWmax 1024

No. of classes of packets(M) 15

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Propagation speed 3x108m/s

Channel bit rate 1 Mbps

Slot time ( a) 50 ßs

SIFS 28 ßs

DIFS 128 ßs

Table 2: Packet Parameters

Parameter Value

Average Packet size 6328 bits

COV of the packet arrival process CE 0.95

PHY header 128 bits

ACK 112 bits + PHY header

Figure 2: Average Delay versus Transmission Range (N = 300, Ae = 2 packets/sec )

N

Figure 3: Average Delay versus Number of Nodes (R = 25m, Ae = 2packets/sec)

4 Discussion

Figure 2 shows how the average end to end delay D experienced by a packet in the whole network varies with different values of the transmission range R. When R increases, average number of interfering neighbours of nodes increases so that the conditional collision probability also increases, which results in more delay for packets at each node. Also, since the conditional collision probability is more for the system under standard BEB scheme than under the DIDD scheme, the average end to end delay for the former is much higher than the latter, as obvious from Figure 2.

In Figure 3, the variation in average end to end delay corresponding to change in values of the the number of nodes N, by keeping R = 25m, and Ae = 2packets/sec, is exhibited. As in the previous case, here also it is seen that D moves in the same direction with N, under both schemes.

References

[1] Abdullah, A. A. Gebali, F. and Cai, L. (2009). Modeling the throughput and delay in wireless multihop ad hoc networks. IEEE "GLOBECOM" Proceedings.

[2] Barowski, Y. Biaz, S. and Agrawal, P. (2005). Towards the performance analysis of IEEE 802.11 in multi-hop ad-hoc networks. IEEE Wireless Communications and Networking Conference, 100-106.

[3] Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18: 535-547.

[4] Bisnik, N. and Abouzeid, A. (2009). Queueing network models for delay analysis of multihop wireless adhoc networks. Ad Hoc Networks, 7(1): 79-97.

[5] Bolch, G. Greiner, S. Meer, H. D. and Trivedi, K. S. Queueing Networks and Markov Chains, Wiley, 2006.

[6] Boroumand, L. Khokhar, R. H. Bakhtiar, L. A. and Pourvahab, M. (2012). A review of

techniques to resolve the hidden node problem in wireless networks. Smart Computing Review, 2:95-110.

[7] Broch, J. Maltz, D. A. Johnson, D. B. Hu, Y. C. and Jetcheva, J. (1998). A performance comparison of multi-hop wireless adhoc networking routing protocols. Proceedings of the fourth annual ACM/IEEE international conference on mobile computing and networking, 85-97.

[8] Chatzimisios, P. Vitsas, V. Boucouvalas, A. C. and Soulfa, M. (2007). Achieving performance enhancement in IEEE WLANs by using the DIDD backoff mechanism. International Journal of Communication Systems, 20:23-41.

[9] Hammersley, J. M. (1950). The distribution of distance in a hypersphere. The Annals of Mathematical Statistics, 21:447-452.

[10] Kobayashi, H. (1974). Application of the diffusion approximation to queueing networks: Equilibrium queue distributions. Journal of the Association for Computing Machinery, 21:316328.

[11] Latouche, G. and Ramaswami, V. Introduction to Matrix Analytic Methods in Stochastic Modeling, SIAM, 1999.

[12] Neuts, M. F. Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach, Dover, 1995.

[13] Srinivasa, S. and Haenggi, M. (2010). Distance distributions in finite uniformly random networks:Theory and applications. IEEE Transactions on Vehicular Technology, 59:940-949.

[14] Tobagi, F. and Kleinrock, L. (1975). Packet switching in radio channels: part II-The hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transactions on Communications, 23:1417-1433.

i Надоели баннеры? Вы всегда можете отключить рекламу.