ArticlePDF Available

End-to-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach

Authors:

Abstract and Figures

Understanding the fundamental end-to-end delay performance in mobile ad hoc networks (MANETs) is of great importance for supporting Quality of Service (QoS) guaranteed applications in such networks. While upper bounds and approximations for end-to-end delay in MANETs have been developed in literature, which usually introduce significant errors in delay analysis, the modeling of exact end-to-end delay in MANETs remains a technical challenge. This is partially due to the highly dynamical behaviors of MANETs, but also due to the lack of an efficient theoretical framework to capture such dynamics. This paper demonstrates the potential application of the powerful Quasi-Birth-and-Death (QBD) theory in tackling the challenging issue of exact end-to-end delay modeling in MANETs. We first apply the QBD theory to develop an efficient theoretical framework for capturing the complex dynamics in MANETs. We then show that with the help of this framework, closed form models can be derived for the analysis of exact end-to-end delay and also per node throughput capacity in MANETs. Simulation and numerical results are further provided to illustrate the efficiency of these QBD theory-based models as well as our theoretical findings.
Content may be subject to copyright.
arXiv:1312.7201v1 [cs.NI] 27 Dec 2013
End-to-End Delay Modeling for Mobile Ad Hoc
Networks: A Quasi-Birth-and-Death Approach
JUNTAO GAO1
, YULONG SHEN2
, XIAOHONG JIANG1
, OSAMU
TAKAHASHI1, NORIO SHIRATORI3
1School of Systems Information Science, Future University Hakodate, 041-8655
Japan
2School of Computer Science and Technology, Xidian University, 710071 China
3GITS, Waseda University, Tokyo and RIEC, Tohoku University, Sendai-shi,
980-8579 Japan.
Understanding the fundamental end-to-end delay performance
in mobile ad hoc networks (MANETs) is of great importance
for supporting Quality of Service (QoS) guaranteed applications
in such networks. While upper bounds and approximations for
end-to-end delay in MANETs have been developed in literature,
which usually introduce significant errors in delay analysis, the
modeling of exact end-to-end delay in MANETs remains a tech-
nical challenge. This is partially due to the highly dynamical be-
haviors of MANETs, but also due to the lack of an efficient theo-
retical framework to capture such dynamics. This paper demon-
strates the potential application of the powerful Quasi-Birth-and-
Death (QBD) theory in tackling the challenging issue of exact
end-to-end delay modeling in MANETs. We first apply the QBD
theory to develop an efficient theoretical framework for capturing
the complex dynamics in MANETs. We then show that with the
help of this framework, closed form models can be derived for
the analysis of exact end-to-end delay and also per node through-
put capacity in MANETs. Simulation and numerical results are
further provided to illustrate the efficiency of these QBD theory-
email: gaojuntao223@gmail.com
email: ylshen@mail.xidian.edu.cn
email: jiang@fun.ac.jp
1
based models as well as our theoretical findings.
Key words: Ad hoc networks, routing protocol, delay performance anal-
ysis.
1 INTRODUCTION
Mobile ad hoc networks (MANETs) represent a class of important wireless ad
hoc networks with mobile nodes. Since the flexible and distributed MANETs
are robust and rapidly deployable/reconfigurable, they are highly appealing
for a lot of critical applications [6, 14], like deepspace communication, disas-
ter relief, battlefield communication, outdoor mining, device-to-device com-
munication for traffic offloading in cellular networks, etc. To facilitate the
applications of MANETs in providing Quality of Service (QoS) guaranteed
services, understanding the fundamental delay performance of such networks
is of great importance [18].
Notice that the end-to-end delay, the time it takes a packet to reach its
destination after it is generated at its source, serves as the most fundamental
delay performance for a network. However, the end-to-end delay modeling
in MANETs remains a technical challenge. This is partially due to the highly
dynamical behaviors of MANETs, like node mobility, interference, wireless
channel/traffic contention, packet distributing, packet queueing process in a
node and the complicated packet delivering process among mobile nodes,
but also due to the lack of a theoretical framework to efficiently depict the
complicated network state transitions under these network dynamics. By now,
the available works on end-to-end delay analysis in MANETs mainly focus
on deriving upper bounds or approximations for such delay.
Based on the M/G/1queueing model, some closed-form upper bounds
on the expected end-to-end delay were derived for MANETs with two-hop
relay routing [23]. For MANETs with multi-hop back-pressure routing, the
Lyapunov drift model was adopted to derive an upper bound on the expected
end-to-end delay [4]. For MANETs with multi-hop linear routing, a network
calculus approach was proposed to derive upper bounds on end-to-end delay
distribution [12, 8]. In addition to the delay upper bound results, approxi-
mations to end-to-end delay in MANETs have also been explored recently
[17, 19]. By adopting the polling model, an approximation to expected end-
to-end delay was provided in [17] for a simple two-hop relay MANET con-
sisting of only one source node, one relay node and one destination node. For
2
more general MANETs with multiple source-destination pairs and multi-hop
relay routing, approximations to corresponding end-to-end delay were devel-
oped in [19] based on the elementary probability theory.
It is notable that the results in [23, 4, 12, 8, 17, 19] indicate that although
above upper bound and approximation results are helpful for us to understand
the general delay behaviors in MANETs, they usually introduce significant
errors in end-to-end delay analysis. This is mainly due to the lack of an
efficient theoretical framework to capture the complex network dynamics and
thus the corresponding network state transitions in MANETs. This paper
demonstrates the potential application of the powerful Quasi-Birth-and-Death
(QBD) theory in capturing the network state transitions and thus in tackling
the challenging exact end-to-end delay modeling issue in MANETs.
The main contributions of this paper are as follows:
We first demonstrate that the QBD theory actually enables a novel and
powerful theoretical framework to be developed to efficiently capture
the main network dynamics and thus the complex network state transi-
tions in two-hop relay MANETs.
With the help of the theoretical framework, we then show that we are
able to analytically model the exact expected end-to-end delay and also
exact per node throughput capacity in the concerned MANETs.
Extensive simulation and numerical results are further provided to val-
idate the efficiency of our QBD theory-based models for end-to-end
delay and per node throughput capacity, and to illustrate how end-to-
end delay and throughput capacity in MANETs are affected by some
main network parameters.
The rest of this paper is organized as follows. Section 2 introduces the
system models involved in this study. A QBD-based theoretical framework is
developed in Section 3 to capture network state transitions, based on which
the exact expected end-to-end delay and per node throughput capacity are
then derived in Section 4. Section 5 first provides simulation results to vali-
date the efficiency of our theoretical framework and related delay and capac-
ity results, and then explores the effects of network parameters on delay and
capacity. Finally, we conclude this paper in Section 6.
3
S
m
m
FIGURE 1
A snapshot of a cell partitioned MANET with m= 16.
2 SYSTEM MODELS
In this section, we introduce first the basic network models regarding node
mobility, wireless channel, radio and traffic pattern in the considered MANET,
and then Medium Access Control (MAC) protocol for transmission schedul-
ing to resolve wireless channel contention and interference issues. Finally,
the two-hop relay routing scheme that deals with packet delivery and traffic
contention is discussed.
2.1 Network Models
Node mobility and channel models: As shown in Fig. 1 that we consider
a unit torus MANET partitioned evenly into m×mcells [25, 9, 22]. In the
concerned MANET, there are nnodes moving around according to the i.i.d.
mobility model [15, 23]. We consider the time slotted system, where each
node randomly chooses one cell to move into at the beginning of every time
slot and then stays in it for the whole time slot. We assume that a common
bandwidth limited wireless channel is shared by all nodes for data transmis-
sions. In each time slot, the data transmitted between any two nodes through
the wireless channel is normalized to one packet.
Radio model: Each node employs the same radio power to transmit data
through the common wireless channel. To enable the transmission region of
4
a node (say Sin Fig. 1) to cover its own cell and also its 8neighbor cells
(called coverage cells of the node hereafter), the corresponding radio range r
of the node should be set as r=8/m. Based on the widely used protocol
model [16, 20, 9, 22], data transmission from a transmitting node (transmitter)
ito a receiving node (receiver) jcan be conducted only if the Euclidean
distance dij between them is less than r(i.e., dij r), while the data can
be successfully received by receiver jonly if dkj (1 + ∆) ·rholds for
any other concurrent transmitter k, here k6=i, j, and 0is a specified
guard-factor for interference prevention.
Traffic model: Similar to previous work [9], we consider the permutation
traffic pattern in which each node acts as the source of a traffic flow and at
the same time the destination of another traffic flow. Thus, there are in total n
distinct traffic flows in the MANET. Each source node exogenously generates
packets for its destination according to an Bernoulli process with average rate
λ(packets/slot) [23].
2.2 MAC Protocol
For a fair channel access, we consider here a commonly used MAC protocol
for transmission scheduling, based on the idea of equivalent-class (EC) [20,
9, 22]. An EC is defined as a set of cells as illustrated in Fig. 2, where any
two cells in an EC are separated by a horizontal and vertical distance of some
integer multiple of αcells (1αm). Thus, we have in total α2ECs in
the MANET. Under the EC based MAC protocol (MAC-EC), these ECs are
scheduled to be active alternatively as time evolves. The cells in an active
EC are called active cells and nodes (if any) in an active cell contend fairly to
access the common wireless channel.
To enable as many number of concurrent transmissions to be scheduled as
possible while avoiding interference among these transmissions, the param-
eter αshould be set appropriately. As illustrated in Fig 2 that for the trans-
mission between a transmitter Sand its possible receiver Rto be successful,
the distance between Rand another possible closest concurrent transmitter
W, i.e., (α2)/m, should satisfy the following condition according to the
protocol model [16]:
(α2)/m (1 + ∆) ·r, (1)
Notice also that r=8/m and αm, the parameter αshould be deter-
mined as
α= min{⌈(1 + ∆)8 + 2, m},(2)
5
2 3 44
5 6 7 8
9 10 11 12
m
1 1 1 1
13 14 15 16
1 1 1 1
1 1 1 1
1 1 1 1
S
R
W
)1( !
r
"
#
#
m
FIGURE 2
Illustration of equivalent-classes in a cell partitioned MANET. There are 16
equivalent-classes in this MANET with α= 4. All shaded cells belong to equivalent-
class 1.
where xtakes the least integer value greater than or equal to x.
2.3 Two-Hop Relay Routing
Once a node, say Sin Fig. 2, succeeds in wireless channel contention and
becomes a transmitter, it executes the popular two-hop relay (2HR) routing
protocol defined in Algorithm 1 for packet delivery [11, 5]. With the 2HR
routing, each exogenously generated packet at Sis first distributed out to
relays through wireless broadcast [11, 24], and it is then delivered to its des-
tination Dvia these relays.
Algorithm 1 2HR Routing Protocol
1: Transmitter Sselects to conduct packet-broadcast with probability q,0<
q < 1, and to conduct packet-delivery with probability 1q;
2: if Sselects packet-broadcast then
3: Sexecutes Procedure 1.1;
4: else
5: Sexecutes Procedure 1.2;
6: end if
6
Procedure 1.1 packet-broadcast
1: if Shas packets in its source-queue then
2: Sdistributes out the head-of-line (HoL) packet of source-queue
through wireless broadcast to all nodes in its coverage cells;
3: Any node, say R, in the coverage cells of Sreserves a copy of that
packet;
4: if Ris not the destination Dthen
5: Rinserts the HoL packet into the end of its relay-queue associated
with D;
6: else
7: if Ris currently requesting the HoL packet then
8: Rkeeps the HoL packet and increases AC K (D)by 1;
9: else
10: Rdiscards that packet;
11: end if
12: end if
13: Smoves that HoL packet out of source-queue and inserts it into the
end of its broadcast-queue;
14: Smoves ahead the remaining packets in its source-queue;
15: else
16: Sremains idle;
17: end if
To facilitate the operation of the 2HR routing protocol, each node, say S,
is equipped with three types of First In First Out(FIFO) queues: one source-
queue, one broadcast-queue and n2parallel relay-queues (no relay-queue
is needed for node Sitself and its destination node D).
Source-queue: Source-queue stores packets exogenously generated at S
and destined for D. These exogenous packets will be distributed out to relay
nodes later in FIFS way.
Broadcast-queue: Broadcast-queue stores packets from source-queuethat
have already been distributed out by Sbut have not been acknowledged yet
by Dthe reception of them.
Relay-queue: Each node other than Sand Dis assigned with a relay-
queue in Sto store redundant copies of packets distributed out by the source
of that node.
To ensure the in-order packet reception at D, similar to previous work [23]
that Slabels every exogenously generated packet with a unique identification
7
Procedure 1.2 packet-delivery
1: Srandomly selects a node Uas its receiver from nodes in its coverage
cells. Denote the source of Uas V;
2: Sinitiates a handshake with Uto acquire the packet number ACK(U) +
1and thus to know which packet Uis currently requesting;
3: Schecks its corresponding relay-queue/broadcast-queue whether it bears
a packet with I D(V) = ACK(U) + 1;
4: if Sbears such packet then
5: Sdelivers that packet to U;
6: Sclears all packets with I D(V)ACK (U)from its corresponding
relay-queue/broadcast-queue;
7: Smoves ahead the remaining packets in its corresponding relay-
queue/broadcast-queue;
8: Uincreases ACK(U)by 1;
9: end if
number ID(S), which increases by 1every time a packet is generated; des-
tination Dalso maintains an acknowledgment number ACK(D)indicating
that Dis currently requesting the packet with ID(S) = AC K (D) + 1 (i.e,
the packets with ID(S)ACK(D)have already been received by D).
3 QBD-BASED THEORETICAL FRAMEWORK
In this section, we first present some preliminaries, and then develop a novel
theoretical framework based on the QBD theory to capture the complex net-
work state transitions in the concerned MANETs.
3.1 Preliminaries
We focus on one specific traffic flow from source Sto destination Din our
analysis. Notice that once a packet is generated at S, it first experiences
a queueing process in the source-queue of Sbefore being distributed out
(served), and it then experiences a network delivery process after being dis-
tributed out into the network by Sand before being successfully received
by D. Since Drequests packets in order according to AC K (D), all pack-
ets distributed out by Swill be also delivered (served) in order. Thus, we
can treat the network delivery process as a queueing process of one virtual
network-queue. Notice also that the departure process of source-queue is just
the arrival process of network-queue.
8
To fully depict the two queueing processes in both source-queue and network-
queue, we define following probabilities for a time slot.
pb:probability that Sbecomes transmitter and also selects to do packet-
broadcast.
pc(j) : probability that jcopies of a packet exist in the network (includ-
ing the one in S) after the packet is distributed out by Sin the current
time slot, 1jn1.
pr(j) : probability that Dreceives the packet it is currently requesting
given that jcopies of the packet exist in the network, 1jn1.
p0(j) : probability that jcopies of a packet exist in the network after S
becomes transmitter and selects to do packet-broadcast for this packet,
given that Dis out of the coverage cells of Sand network-queue is
empty, 1jn1.
p0(0) : p0(0) = 1 Pn1
j=1 p0(j).
p+
b(j) : probability that Sbecomes transmitter, selects to do packet-
broadcast and also successfully conducts packet-broadcast for one packet;
at the same time, Dreceives the packet it is requesting given that j
copies of that packet exist in the network, 1jn1.
p
b(j) : probability that Sbecomes transmitter, selects to do packet-
broadcast and also successfully conducts packet-broadcast for one packet;
at the same time, Ddoes not receive the packet it is requesting given
that jcopies of that packet exist in the network, 1jn1.
p+
f(j) : probabilitythatSdoes not successfully conduct packet-broadcast
for any packet; at the same time, Dreceives the packet it is requesting
given that jcopies of that packet exist in the network, 1jn1.
p
f(j) : probabilitythat Sdoes not successfully conduct packet-broadcast
for any packet; at the same time, Ddoes not receive the packet it
is requesting given that jcopies of that packet exist in the network,
1jn1.
The following lemma reveals a nice property about the source-queue and
network-queue, which will help us to evaluate the above probabilities in Lemma 2.
9
Lemma 1: For the considered MANET with MAC-EC protocol for trans-
mission scheduling and 2HR-B protocol for packet delivery, the arrival pro-
cess of network-queue is a Bernoulli process with probability λand it is in-
dependent of the state of source-queue.
Proof. We know from Section 2.1 that the arrival process of source-queue in
Sis a Bernoulli process with probability λ. The service process of source-
queue is actually also a Bernoulli process, because in every time slot Sgets
a chance with constant probability pbto do packet-broadcast to distribute out
a packet in source-queue (or equivalently, the source-queue is served with
probability pbin every time slot). Thus, the source-queue in Sfollows a
Bernoulli/Bernoulli queue, and in equilibrium the packet departure process of
source-queue is also a Bernoulli process with probability λ, which is indepen-
dent of the state of source-queue (i.e., the number of packets in source-queue)
[10]. Because the arrival process of network-queue is just the departure pro-
cess of source-queue, this finishes the proof of this Lemma.
Lemma 2:
10
pb=qm2
α2n1m21
m2n(3)
pc(j) = nn2
j1(m29)n1j
m2n(m21)nn(m29)f(j) +f(j+ 1)o(4)
pr(j) = j(1q)m2
α2n(n1)1m21
m2n
n
m2m29
m2n1(5)
p0(j) = λ·q·n2
j1(m29)nj
α2m2n2pb
f(j)(6)
p0(0) = 1 λ·q·(m29)
α2(n1)pb1m21
m2n1(7)
p+
b(j) = (j1) λ(qq2)(m4m2α2)
α4n(n1)(n2)pb
·12m21
m2n
+m22
m2n
n
m2m29
m2n1
+n
m2m210
m2n1(8)
p
b(j) = λp+
b(j)(9)
p+
f(j) = pr(j)p+
b(j)(10)
p
f(j) = 1 p+
b(j)p
b(j)p+
f(j)(11)
where
f(x) = 9x8x
x(12)
Proof. The proof of Lemma 2 is given in Appendix A.
Remark: The complex network dynamics of node mobility, interference,
wireless channel and traffic contention are incorporated into the calculation
of the above probabilities as shown in Appendix A. The network dynamics of
packet distributing, packet queueing and delivering processes will be captured
in the following QBD modeling process.
3.2 QBD Modeling
We use L(t)0to denote the number of local packets distributed out from S
but not received yet by Duntil time slot t, and use J(t)to denote the number
of copies of the packet Dis currently requesting at time slot tin the network,
11
0J(t)n1. As time tevolves, the queueing process of network-queue
follows a two-dimensional QBD process [3, 21]
{(L(t), J(t)), t = 0,1,2,··· },(13)
on state space
{(0,0)} ∪ {(l, j)};l1,1jn1(14)
where (0,0) corresponds to the empty network-queue state. L(t)increases
by 1if Sdistributes out a packet from its source-queue while Ddoes not
receive the packet it is requesting at slot t,L(t)decreases by 1if Sdoes not
distribute out a packet from its source-queue while Dreceives the packet it is
requesting at slot t, and L(t)keeps unchanged, otherwise.
All states in (14) can be divided into the following subsets
N(0) = {(0,0)}(15)
N(l) = {(l, j)},1jn1, l 1(16)
where subset N(0) is called level 0and subset N(l)is called level l. It is
notable that when network-queue is in some state of level l(l1) at a time
slot, the next state of one-step state transitions could only be somestate in the
same level lor in its adjacent levels l1and l+ 1.
Based on the queueing process of network-queue and the definitions of
probabilities in Lemma 2, the underlying QBD process of the network-queue
has state transition diagram shown in Fig. 3. In Fig. 3, p+
f()pc(j)denotes
the probability of the transition from some state (3,)in level 3to the state
(2, j)in level 2, where the asterisk ‘ means some eligible copy number in
{1,2,···, n 1}.
To facilitate our discussion, we classify the state transitions in Fig. 3 as
intra-level transition (denoted by dotted arrows in Fig. 3) and inter-level
transition (denoted by solid arrows in Fig. 3).
Intra-level Transition: There are two cases regarding the intra-level tran-
sitions, namely, the state transition inside level 0and the state transitions
inside level l(l1). For level 0, it has only one state (0,0), which could
only transit to itself. For levels l1, they all follow the same intra-level
transitions, i.e., a state (l, j)in level lcould transit to any state (including
itself) in the same level, 1jn1.
Inter-level Transition: There are also two cases regarding the inter-level
transitions, namely, transitions between level 0and level 1, and transitions
between level land level l+ 1 (l1). The inter-level transitions between
12
)1(
N
)2(
N
)(l
N
1,1
2,1
j
,1
1,1
n
!
!
!
!
1,2
2,2
j
,2
1,2
n
)1()( cb pjp!
)1()(
!npjp cb
)()()( jpjpjp fcb
!
!
)2()( cb pjp!
)( jpb
)()( jpjp cf
!
)( jpf
!
)0(
0
p
)(
0jp
)1()(
!
npjp cf
)2()( cf pjp
!
)1()( cf pjp
!
)( jpb
)()( jpp cf "
!
)1()( cb pjp!
)1()(
!npjp cb
)()()( jpjpjp fcb
!
!
)2()( cb pjp!
0,0
)0(
N
FIGURE 3
State transition diagram for the QBD process of network-queue.
level 0and level 1are simply bi-transitions between state (0,0) and any state
(1, j),1jn1. For adjacent levels land l+ 1 (l1), they all follow
the same inter-level transitions, i.e., a state (l, j)in level lcould only transit
to the corresponding state (l+ 1, j)in level l+ 1, while a state (l+ 1, j)in
level l+ 1 could transit to any state in level l,1jn1.
4 DELAY AND THROUGHPUT CAPACITY
With the help of the QBD-based theoretical framework, we derive the ex-
pected end-to-end delay and also per node throughput capacity for the con-
cerned MANETs.
Definition 1: End-to-end delay Teof a packet is the time elapsed between
the time slot the packet is generated at its source and the time slot it is deliv-
ered to its destination.
Definition 2: Per node throughput capacity µis defined as the maximum
packet arrival rate λevery node in the concerned MANET can stably support.
Before presenting our main result on the expected end-to-end delay, we
13
first derive the per node throughput capacity, with which the input rate the
MANET can stably support and the corresponding end-to-end delay can then
be determined.
Theorem 1: For the considered MANET, its per node throughput capacity
µis given by
µ= min (pb,1
Pn1
j=1
pc(j)
pr(j))(17)
Proof. In equilibrium, the service rate µsof source-queue is
µs=pb(18)
and the service rate µdof network-queue, i.e., the rate Dreceives its request-
ing packets, is
µd=1
Pn1
j=1
pc(j)
pr(j)
.(19)
To ensure network stability, packet generation rate λat Sshould satisfy
λ < min{µs, µd}(20)
Thus, the per node throughput capacity µis determined as
µ= min{µs, µd}(21)
Based on above per node throughput capacity result and the QBD-based
theoretical framework, we now establish the following theorem on the ex-
pected end-to-end delay of the concerned MANET.
Theorem 2: For the concerned MANET, where each source node exoge-
nously generates packets according to a Bernoulli process with probability λ
(λ < µ), the expected end-to-end delay E(Te)of a packet is determined as
E(Te) = L1+L2
λ,(22)
where
L1=λλ2
pbλ(23)
L2=y1(IR)21
φ(24)
14
R=A0(IA1A01v0)1(25)
[y0,y1] = [y0,y1]B1B0
B2A1+RA2(26)
φ=y0+y1(IR)11(27)
v0=pc(1) pc(2) ··· pc(j)··· pc(n1) (28)
A0= diag p
b(1), p
b(2),···, p
b(j),···, p
b(n1)(29)
A1=diagp
f(1), p
f(2),···, p
f(j),···, p
f(n1)
+
p+
b(1) p+
b(2) ··· p+
b(j)··· p+
b(n1) Tv0(30)
A2=B2v0(31)
B0=p0(1) p0(2) ··· p0(j)··· p0(n1) (32)
B1= [p0(0)] (33)
B2=hp+
f(1) p+
f(2) ··· p+
f(j)··· p+
f(n1) iT(34)
here Idenotes an identity matrix of size (n1)×(n1),1denotes a column
vector of size (n1) ×1with all elements being 1,y0is a scalar value, and
y1is a row vector of size 1×(n1).
Proof. From Lemma 1 we know that we can analyze queueing processes of
source-queue and network-queue separately.
First, for the source-queue at S, since it follows a Bernoulli/Bernoulli
queue, we know from [23, 3] that the expected number of packets L1in the
queue is determined as
L1=λλ2
pbλ(35)
Then, for the network-queue, its queueing process follows a QBD process
shown in Fig. 3. The corresponding state transition matrix Qof the transition
diagram in Fig. 3 is given by
Q=
B1B00 0 ···
B2A1A00···
0 A2A1A0···
0 0 A2A1···
.
.
..
.
..
.
..
.
....
(36)
where B1defined in (33) represents the state transition from (0,0) to (0,0);
B0defined in (32) represents the state transitions from (0,0) to (1, j ),1
15
jn1;B2defined in (34) represents the state transitions from (1, j)to
(0,0),1jn1;A1defined in (30) represents the state transitions from
(l, j)to (l, i),l1,1j, i n1;A0defined in (29) represents the state
transitions from (l, j )to the corresponding (l+ 1, j),l1,1jn1;
A2defined in (31) represents the state transitions from (l, j )to (l1, i),
l2,1j, i n1.
Based on the QBD process theory [3, 21], the queueing process of the
network-queue can be analyzed through two related matrices Rand Gdeter-
mined as:
R=A0(IA1A0G)1(37)
G=A2+A1G+A0G2(38)
where R= (rij )(n1)×(n1), the entry rij (1i, j n1) of matrix R
is the expected number that the QBD of network-queue visits state (l+ 1,j)
before it returns to states in N(0) ∪ · ·· ∪ N(l), given that the QBD starts in
state (l,i), and G= (gij )(n1)×(n1), the entry gij (1i, j n1) of
matrix Gis the probability that the QBD starts from state (l,i) and visits state
(l1,j) in a finite time.
Due to the special structure of A2, which is the product of a column vector
B2by a row vector v0, matrix Gcan be calculated as
G=1v0(39)
Based on the results in [3], the expected number of packets L2of network-
queue is given by
L2=y1(IR)21
φ,(40)
where y1and φare determined by (26) and (27), respectively.
Finally, by applying Little’s Theorem [7], (22) follows. This finishes the
proof of Theorem 2.
5 NUMERICAL RESULTS
To validate the QBD-based theoretical results on expected end-to-end delay
and per node throughput capacity, a customized C++ simulator has been de-
veloped to simulate packet generating, distributing and delivering processes
16
FIGURE 4
Expected packet end-to-end delay vs. number of nodes nin MANET.
in the considered MANET. In the simulator, not only the i.i.d. node mobil-
ity model but also the typical random walk [13] and random waypoint [26]
mobility models have been implemented.
Random Walk Model: At the beginning of each time slot, each node
first independently selects a cell with equal probability 1/9among its
current cell and its 8neighboring cells; it then moves into that cell and
stays in it until the end of that time slot.
Random Waypoint Model: At the beginning of each time slot, each
node first independently generates a two-element vector [x, y ], where
both elements xand yare uniformly drawn from [1/m, 3/m]; it then
moves along the horizontal and vertical direction of distance xand y,
respectively.
5.1 End-to-End Delay Validation
For networks of different size n, Fig. 4 shows both theoretical and simulation
results on packet end-to-end delay under the settings of m= 16, system load
The program of our simulator is now available online at [1]. Similar to [2], the guard-factor
is set as ∆ = 1.
17
FIGURE 5
Expected packet end-to-end delay vs. system load ρin MANET.
ρ= 0.6 (ρ=λ/µ)and packet-broadcast probability q={0.1,0.3,0.5}.
Unless otherwise mentioned, simulation results are reported with small 95%
confidence intervals. The results in Fig. 4 show clearly that in a wide range
of network scenarios considered here, theoretical results match very nicely
with simulated ones, indicating that our QBD-based theoretical modeling is
really efficient in capturing the expected packet end-to-end delay behavior of
concerned MANETs. From Fig. 4 we can also see that as network size n
increases, packet end-to-end delay increases as well. This is because that in
the concerned MANET with fixed unit area and fixed setting of m= 16, as n
increases the contention for wireless channel access becomes more intensive,
resulting in a lower packet deliveryopportunity and thus a longer packet end-
to-end delay.
For the setting of n= 150, m = 16 and q= 0.4, Fig. 5 shows both the
theoretical and simulation results on packet end-to-end delay when system
load ρchanges from ρ= 0.2to ρ= 0.9. In addition to the i.i.d. mobility
model considered in this paper, the corresponding simulation results for the
random walk and random waypoint mobility models have also been included
in Fig. 5 for comparison. Again, we can see from Fig. 5 that our theoretical
18
FIGURE 6
Per node throughput VS. packet generation rate λin MANET.
delay model is very efficient. It is interesting to see from Fig. 5 that although
our theoretical framework is developed under the i.i.d. mobility model, it can
also nicely capture the general packet end-to-end delay behavior under more
realistic random walk and random waypoint mobility models.
5.2 Throughput Capacity Validation
Another observation of Fig. 5 is that the packet end-to-end delay increases
sharply as system load ρapproaches 1.0(i.e., as packet generation rate λ
approaches per node throughput capacity µ), which serves as an intuitive
verification of our theoretical per node throughput capacity result. To fur-
ther validate our theoretical model on throughput capacity, Fig. 6 provides
the simulation results on the achievable per node throughput, i.e., the av-
erage rate of packet delivery to destination, when packet generation rate λ
increases gradually, where the results of three network scenarios with differ-
ent throughput capacity {n= 150, m = 16, q = 0.4, µ1= 2.37 ×104},
{n= 100, m = 16, q = 0.2, µ2= 3.46 ×104}and {n= 100, m = 8, q =
0.3, µ3= 7.52 ×104}are presented. We can see from Fig. 6 that for each
19
FIGURE 7
Expected packet end-to-end delay TeVS. 2HR-B parameter q.
network scenario there, the corresponding per node throughput first increases
monotonously as λincreases before λreaches the corresponding throughput
capacity (µ1,µ2and µ3), and then per node throughput remains a constant
and does not increase anymore when packet generation rate λgoes beyond
the corresponding theoretical throughput capacity. Thus, our theoretical ca-
pacity model is also efficient in depicting the per node throughput capacity
behavior of the considered MANET.
5.3 Performance Analysis
With the help of the QBD-based theoretical models, we explore how parame-
ter qof 2HR-B routing will affect the packet end-to-end delay Teand per node
throughput capacity µunder given m,nand ρ. The corresponding numerical
results are summarized in Figs. 7 and 8.
We first examine the impact of qon Te. For network settings of m= 16,
ρ= 0.5and n={80,300,500}, Fig. 7 shows that for a given network its
delay Tealways first decreases and then increases as qincreases. This phe-
nomenon can be explained as follows. The end-to-end delay experienced by
20
FIGURE 8
Per node throughput capacity µVS. 2HR-B parameter q.
a packet consists of the time it spends in the source-queue and the time it
spends in the network-queue. An increase in qhas two-fold effects on Te: on
one hand, it decreases the time a packet spends in the source-queue, because
source Shas more chance to do packet-broadcast for packets in its source-
queue, which makes the queue to be served more quickly; on the other hand,
it increases the time a packet spends in the network-queue, because each re-
lay has less chance to do packet-delivery to deliver a packet to destination
D, which makes the network-queue to be served more slowly. Thus, Tede-
creases as qincreases when the first effect dominates the second one, while
Teincreases as qincreases when the second effect dominates the first one.
We next explore how parameter qaffects µ. For network settings of m=
16 and n={80,300,500}, Fig. 8 shows that for a given network its capac-
ity µalways first increases and then decreases as qincreases. Notice that µis
determined by the minimum of service rates of the source-queue and network-
queue. When qis small, µis determined by the service rate of source-queue,
which increases as qincreases. When qis large, µis determined by the service
21
rate of network-queue, which decreases as qincreases. Another observation
from Fig. 8 is that the capacity µof n= 80 is the largest among different n
there. This is because that for a MANET with fixed m= 16, a larger num-
ber of nodes there will cause a more intensive wireless channel contention,
which decrease opportunities of packet transmission and thus the per node
throughput capacity.
6 CONCLUSION
The main finding of this paper is that the Quasi-Birth-and-Death (QBD) pro-
cess can be a promising theory to tackle the challenging issue of analytical
end-to-end delay modeling in MANETs. We demonstrated through a two-hop
relay MANET that QBD theory can help us: 1) to develop a novel theoretical
framework to capture the complicated network state transitions in the highly
dynamic MANET, 2) to analytically model the expected end-to-end delay and
also the per node throughput capacity of the network, and 3) to enable many
important network dynamics like node mobility, wireless channel contention,
interference and traffic contention to be jointly considered in the delay mod-
eling process. It is expected that this work will shed light on end-to-end delay
modeling in general MANETs also.
A PROOF OF LEMMA 2
Calculation of pb:The event corresponding to pbhappens iff the following
sub-events happen simultaneously:
1) Smoves into an active cell; jout of the remaining n1nodes move
into the same cell with S,0jn1; other nodes move into cells other
than that active cell;
2) Sbecomes transmitter after fair wireless channel contention;
3) Sselects to do packet-broadcast after traffic contention (i.e. conducting
packet-broadcast or packet-delivery).
Notice that in a time slot, every node moves according to the i.i.d. mobility
model. Thus, we have
pb=1
α2
n1
X
j=0 n1
j 1
m2jm21
m2n1j1
j+1 q(41)
=qm2
α2n1m21
m2n(42)
22
Calculation of pc(j):According to the definition of pc(j), it is a condi-
tional probability determined as
pc(j) = pb(j)
pb(43)
where pb(j)is the probability that jcopies of a packet exist in the network
after Sbecomes transmitter and selects to do packet-broadcast for that packet,
1jn1. The event corresponding to pb(j)happens iff the following
sub-events happen:
1) Smoves into in an active cell; j1out of the remaining n2nodes
other than Sand Dmove into the coverage cells of S, among which knodes
are in the same cell with Sand the remaining j1knodes are in other
coverage cells of S,0kj1; other nodes move into cells other than
the coverage cells of S;
2) Sbecomes transmitter after fair channel contention;
3) Sselects to do packet-broadcast.
Notice that Dcould move either into the same cell with Sor any cell other
than that active cell, we have
pb(j) = 1
α21
m2n2
j1j1
X
k=0j1
k1
m2k
8
m2j1k
·m29
m2n1j1
k+ 2q
+m21
m2n2
j1j1
X
k=0 j1
k 1
m2k
·8
m2j1km29
m2n1j1
k+ 1q(44)
=q
α2n2
j1m29
m2n1j
·m29
m2jf(j) + 1
m2jf(j+ 1)(45)
where
f(x) = 9x8x
x(46)
After substituting (45) and (42) into (43) and conducting some basic algebraic
23
calculations, we have
pc(j) = nn2
j1(m29)n1j
m2n(m21)nn(m29)f(j) + f(j+1)o(47)
Calculation of pr(j):Notice that in a time slot, Dcould only receive the
packet it is currently requesting from one of the jnodes carrying copies of
that packet. Thus, after similar arguments to the calculation of pb, we have
pr(j) = j(1q)m2
α2n(n1)1m21
m2n
n
m2m29
m2n1
(48)
To calculate the remaining probabilities, we need to construct the arrival
process of network-queue. From Lemma 1, we know that the arrival process
of network-queue is a Bernoulli process with probability λ. The arrival pro-
cess of network-queue can be constructed as follows: once source node S
becomes transmitter and selects to do packet-broadcast (with probability pb),
Ssuccessfully conducts packet-broadcast for one packet with probability λ,
λ=λ
pb(49)
Thus, after Sbecomes transmitter and selects to do packet-broadcast, Swill
successfully distribute out one packet with probability λ.
Calculation of p0(j):The event corresponding to p0(j)happens iff the
following sub-events happen:
1) Smoves into an active cell; Dmoves into any cell other than that active
cell; j1out of the remaining n2nodes move into the coverage cells of S,
among which knodes are in the same cell with Sand the remaining j1k
nodes are in other coverage cells of S,0kj1; other nodes move into
cells other than the coverage cells of S;
2) Sbecomes transmitter after fair contention;
3) Sselects to do packet-broadcast and Sdistributes out a packet.
Then, we have
p0(j) = 1
α2
m29
m2n2
j1j1
X
k=0j1
k1
m2k
8
m2j1k
·m29
m2n1j1
k+ 1 qλ(50)
=λ·q·n2
j1(m29)nj
α2m2n2pb
f(j)(51)
24
Calculation of p0(0):From the definition of p0(0), we know that
p0(0) = 1
n1
X
j=1
p0(j)(52)
After substituting (51) into (52), we have
p0(0) = 1 λ·q·(m29)
α2(n1)pb1m21
m2n1(53)
Calculation of p+
b(j):The event corresponding to p+
b(j)is composed of
j1exclusive sub-events, each of which is that: in a time slot Sbecomes
transmitter, selects to do packet-broadcast for one packet; at the same time D
receives the packet it is requesting from a specific relay node (say R) carrying
a copy of that packet. If we denote by p+
bthe probability that one such sub-
event occurs in a time slot, then
p+
b(j) = (j1)p+
b(54)
The event corresponding to p+
bhappens iff the following sub-events happen:
1) Smoves into an active cell; Rmoves into another active cell; Dmoves
into either the same active cell with Ror other coverage cells of R;kout of
the remaining n3nodes move into the coverage cells of R, among which
i0nodes are in the same cell with R;t0of the remaining n3k
nodes are in the same active cell with S; other nodes move into cells other
than the active cell of Sand the coverage cells of R;
2) Sand Rboth become transmitters after fair contention in their respec-
tive active cells;
3) Sselects to do packet-broadcast and Sdistributes out a packet; Rselects
to do packet-delivery and Dis selected as its receiver.
25
Then, we have
p+
b=1
α2
m2α2
m2α2
n3
X
k=0n3
k(k
X
i=0 k
i1
m2i
8
m2ki
·
n3k
X
t=0 n3k
t 1
m2tm210
m2n3kt
·1
m2
1
i+ 2
1
k+ 1 +8
m2
1
i+ 1
1
k+ 1(1q)1
t+1
)(55)
=λ(qq2)(m4m2α2)
α4n(n1)(n2)pb
·12m21
m2n
+m22
m2n
n
m2m29
m2n1
+n
m2m210
m2n1(56)
From (56) and (54), (8) follows.
Calculation of p
b(j):From the definitions of p
b(j)and p+
b(j), we know
that p
b(j) + p+
b(j)is the probability that in a time slot Sbecomes trans-
mitter, selects to do packet-broadcast and also successfully conducts packet-
broadcast for one packet. This probability is just λaccording to the arrival
process of network-queue. Thus, p
b(j)can be calculated as
p
b(j) = λp+
b(j)(57)
Calculation of p+
f(j):By the definition of pr(j), it is easy to see that
p+
f(j)can be calculated as
p+
f(j) = pr(j)p+
b(j)(58)
Calculation of p
f(j):From the definitions of p+
b(j),p
b(j),p+
f(j)and
p
f(j), we know that
p+
b(j) + p
b(j) + p+
f(j) + p
f(j) = 1 (59)
Thus, (11) follows.
REFERENCES
[1] C++ simulator for the 2HR-B MANETs. [Online]. Available: http://researchplatform.blogspot.jp/.
26
[2] The network simulator ns-2. [Online]. Available: http://www.isi.edu/nsnam/ns/.
[3] Attahiru Sule Alfa. (2010). Queueing Theory for Telecommunications: Discrete Time
Modelling of a Single Node System. Springer.
[4] Majed Alresaini, Maheswaran Sathiamoorthy, and Michael J. Neely. (2012). Backpressure
with adaptive redundancy (bwar). In INFOCOM.
[5] Eitan Altman, Tamer Basar, and Francesco De Pellegrini. (March 2011). Optimal control
in two-hop relay routing. IEEE Transactions on Automatic Control, 56(3):670–675.
[6] Jeffrey Andrews, Sanjay Shakkottai, Robert Heath, Nihar Jindal, Martin Haenggi, Randy
Berry, Dongning Guo, Michael J. Neely, Steven Weber, Syed Jafar, and Aylin Yener. (De-
cember 2008). Rethinking information theory for mobile ad hoc networks. IEEE Commu-
nications Magazine, 46(12):94–101.
[7] Dimitri P. Bertsekas and Robert G. Gallager. (1992). Data Networks. New Jersey:
Prentice-Hall, Inc.
[8] Florin Ciucu. (2011). Non-asymptotic capacity and delay analysis of mobile wireless
networks. In SIGMETRICS.
[9] Delia Ciullo, Valentina Martina, Michele Garetto, and Emilio Leonardi. (December 2011).
Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks.
IEEE/ACM Transactions on Networking, 19(6):1745–1758.
[10] Hans Daduna. (2001). Queueing Networks with Discrete Time Scale: Explicit Expressions
for the Steady State Behavior of Discrete Time Stochastic Networks. Springer.
[11] Renato M. de Moraes, Hamid R. Sadjadpour, and J.J. Garcia-Luna-Aceves. (June 2007).
Taking full advantage of multiuser diversity in mobile ad hoc networks. IEEE Transactions
on Communications, 55(6):1202 – 1211.
[12] Oliver Hohlfeld Florin Ciucu and Pan Hui. (2010). Non-asymptotic throughput and
delay distributions in multi-hop wireless networks. In Annual Allerton Conference on
Communicaiton, Control, and Computing (Allerton).
[13] Abbas El Gamal, James Mammen, Balaji Prabhakar, and Devavrat Shah. (June 2006).
Optimal throughput-delay scaling in wireless networks-part i: The fluid model. IEEE
Transactions on Information Theory, 52(6):2568–2592.
[14] Andrea Goldsmith, Michelle Effros, Ralf Koetter, Muriel Mdard, and Lizhong Zheng.
(May 2011). Beyond shannon: the quest for fundamental performance limits of wireless
ad hoc networks. IEEE Communications Magazine, 49(5):195–205.
[15] Matthias Grossglauser and David N.C. Tse. (August 2002). Mobility increases the capacity
of ad hoc wireless networks. IEEE/ACM Transactions on Networking, 10(4):477–486.
[16] P. Gupta and P.R. Kumar. (March 2000). The capacity of wireless networks. IEEE
Transactions on Information Theory, 46(2):388–404.
[17] Ahmad Al Hanbali, Roland de Haan, Richard J. Boucherie, and Jan-Kees van Ommeren.
(2008). A tandem queueing model for delay analysis in disconnected ad hoc networks. In
Proceedings of the 15th international conference on Analytical and Stochastic Modeling
Techniques and Applications (ASMTA), pages 189–205.
[18] Lajos Hanzo II and Rahim Tafazolli. (2nd Quarter 2007). A survey of qos routing solutions
for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 9(2):50–70.
[19] Apoorva Jindal and Konstantinos Psounis. (February 2009). Contention-aware perfor-
mance analysis of mobility-assisted routing. IEEE Transactions on Mobile Computing,
8(2):145–161.
[20] Sanjeev R. Kulkarni and Pramod Viswanath. (June 2004). A deterministic approach
to throughput scaling in wireless networks. IEEE Transactions on Information Theory,
50(6):1041–1049.
27
[21] G. Latouche and V. Ramaswamy. (1999). Introduction to Matrix Analytic Methods in
Stochastic Modeling. ASA-SIAM Series on Statistics and Applied Probability.
[22] Pan Li, Yuguang Fang, Jie Li, and Xiaoxia Huang. (March 2012). Smooth trade-offs
between throughput and delay in mobile ad hoc networks. IEEE Transactions on Mobile
Computing, 11(3):427–438.
[23] Michael J. Neely and Eytan Modiano. (June 2005). Capacity and delay tradeoffs for
ad-hoc mobile networks. IEEE Transactions on Information Theory, 51(6):1917–1936.
[24] Michael J. Neely and Rahul Urgaonkar. (July 2009). Optimal backpressure routing for
wireless networks with multi-receiver diversity. Ad Hoc Networks, 7(5):862–881.
[25] Gaurav Sharma, Ravi Mazumdar, and Ness B. Shroff. (October 2007). Delay and capacity
trade-offs for mobile ad hoc networks: A global perspective. IEEE/ACM Transactions on
Networking, 15(5):981–992.
[26] Shan Zhou and Lei Ying. (2010). On delay constrained multicast capacity of large-scale
mobile ad-hoc networks. In INFOCOM.
28
... Gao et. al. [30] used Quasi-Birth-and-Death (QBD) theory to model end-to-end delay in MANETs. They applied the QBD theory to produce an efficient theoretical framework for capturing the complex dynamics in MANETs. ...
Book
This book identifies the time-dependent network parameters: neighbour count, link load, path length, cluster count and delay, and presents a first-of-its-kind discussion on temporal parameters in mobile ad hoc networks. Frequent topology changes and multiple link failures occur in mobile ad hoc network due to arbitrary and random movement of nodes. This dynamic environment challenges the delivery of data and makes it essential to find better models for network parameters that are shifting with time. The parameters identified are put into the framework of time series because of their temporal characteristic, and when they are modelled using time series framework they exhibit a sound fit with Autoregressive AR(p) models of order p. The order p is evaluated for each fitted model and found to lie between one and three. The book also analyses the dependence of end-to-end delay of ad hoc network on various external factors such as the number of nodes, routing protocol, mobility models and path length and develops two prediction models. The book will be useful for researchers and professionals alike.
... But, they have not given much consideration to node mobility pattern and routing algorithm of the network in their work. Gao et al. [24] used Quasi-Birth-and-Death (QBD) theory to model end-to-end delay in MANETs. They applied the QBD theory to develop an efficient theoretical framework for capturing the complex dynamics in MANETs. ...
Article
Full-text available
Several parameters like routing protocol, mobility pattern, average speed of mobile nodes, path length from source to destination, previous delay, etc., affect the end-to-end packet delay in mobile ad hoc network. But the nature of relationship between end-to-end delay and those parameters is still unclear. In this article, we have tried to establish a relationship among end-to-end delay, path length and previous delay. A regression equation is established between path length and end-to-end delay. The end-to-end delay is also represented as a fuzzy time series. The current end-to-end delay is then obtained by combining delay predicted by path length regression equation and fuzzy time series. The suitable weights of these two predicted delays are also experimentally determined. To the best of our knowledge, comprehensive analysis for packet delay estimation using various network parameters along with fuzzy time series has not been explored earlier. Based on various performance evaluation criterion, we found that by combining the predicted values of delay using path length regression and fuzzy time series gives satisfactory packet delay prediction in ad hoc network.
Article
Different from traditional IP networks, named data networking (NDN) based on the named content can realize fast content retrieval and delivery. As one of the most important architectures for the future Internet, NDN needs flexible, effective, and efficient transport control strategies, which are crucial for widely development of NDN. In this paper, we present a comprehensive survey and research challenges on transport control of NDN for the first of time. We first provide an introduction of NDN and its data transport process. Then, the essential differences of NDN transport control compared with IP transport control are analyzed and compared from three perspectives: users side, routers, and network provider. Next, an in-depth taxonomy and classification of NDN recent transport control proposals is given. Finally, we present some research challenges and broader perspectives.
Conference Paper
Full-text available
The class of Gupta-Kumar results give the asymptotic throughput in multi-hop wireless networks but cannot predict the throughput behavior in networks of typical size. This paper addresses the non-asymptotic analysis of the multihop wireless communication problem and provides, for the first time, closed-form results on multi-hop throughput and delay distributions. The results are non-asymptotic in that they hold for any number of nodes and also fully account for transient regimes, i.e., finite time scales, delays, as well as bursty arrivals. Their accuracy is supported by the recovery of classical single-hop results, and also by simulations from empirical data sets with realistic mobility settings. Moreover, for a specific network scenario and a fixed pair of nodes, the results confirm Gupta-Kumar's Ω(1√(n log n)) asymptotic scaling law.
Article
Full-text available
We study the optimal control of propagation of packets in delay tolerant mobile ad-hoc networks. We consider a two-hop forwarding policy under which the expected number of nodes carrying copies of the packets obeys a linear dynamics. We exploit this property to formulate the problem in the framework of linear quadratic optimal control which allows us to obtain closed-form expressions for the optimal control and to study numerically the tradeoffs by varying various parameters that define the cost.
Conference Paper
How much traffic can wireless networks carry? Consider n nodes located in a disk of area A sq. meters, each capable of transmitting at a data rate of W bits/sec. Under a protocol based model for successful receptions, the total network can carry only Θ (W√An) bit-meters/sec, where 1 bit carried a distance of 1 meter is counted as 1 bit-meter. This is the best possible even assuming the nodes locations, traffic patterns, and the range/power of each transmission, are all optimally chosen. If the node locations and their destinations are randomly chosen, and all transmissions employ the same power/range, then each node only obtains a throughput of Θ (W√nlogn) bits/sec, if the network is optimally operated. Similar results hold for a physical SIR based model
Article
The available two-hop relay protocols with out-of-order or strictly in-order reception cannot provide a flexible control for the packet delivery delay, which may significantly limit their applications to the future mobile ad hoc networks (MANETs) with different delay requirements. This paper extends the conventional two-hop relay and proposes a general group-based two-hop relay algorithm with packet redundancy. In such an algorithm with packet redundancy limit $f$ and group size $g$ (2HR-$(f,g)$ for short), each packet is delivered to at most $f$ distinct relay nodes and can be accepted by its destination if it is a fresh packet to the destination and also it is among $g$ packets of the group the destination is currently requesting. The 2HR-$(f,g)$ covers the available two-hop relay protocols as special cases, like the in-order reception ones $(fgeq 1,g=1)$, the out-of-order reception ones with redundancy $(f>1,g=infty)$, or without redundancy $(f=1,g=infty)$. A Markov chain-based theoretical framework is further developed to analyze how the mean value and variance of packet delivery delay vary with the parameters $f$ and $g$, where the important medium contention, interference, and traffic contention issues are carefully incorporated into - he analysis. Extensive simulation and theoretical results are provided to illustrate the performance of the 2HR-$(f,g)$ algorithm and the corresponding theoretical framework, which indicate that the theoretical framework is efficient in delay analysis and the new 2HR-$(f,g)$ algorithm actually enables both the mean value and variance of packet delivery delay to be flexibly controlled in a large region.
Book
Matrix analytic methods are popular as modeling tools because they give one the ability to construct and analyze a wide class of queuing models in a unified and algorithmically tractable way. The authors present the basic mathematical ideas and algorithms of the matrix analytic theory in a readable, up-to-date, and comprehensive manner. In the current literature, a mixed bag of techniques is used-some probabilistic, some from linear algebra, and some from transform methods. Here, many new proofs that emphasize the unity of the matrix analytic approach are included.
Article
A large body of work has theoretically analyzed the performance of mobility-assisted routing schemes for intermittently connected mobile networks. But the vast majority of these prior studies have ignored wireless contention. Recent papers have shown through simulations that ignoring contention leads to inaccurate and misleading results, even for sparse networks. In this paper, we analyze the performance of routing schemes under contention. First, we introduce a mathematical framework to model contention. This framework can be used to analyze any routing scheme with any mobility and channel model. Then, we use this framework to compute the expected delays for different representative mobility-assisted routing schemes under random direction, random waypoint and community-based mobility models. Finally, we use these delay expressions to optimize the design of routing schemes while demonstrating that designing and optimizing routing schemes using analytical expressions which ignore contention can lead to suboptimal or even erroneous behavior.
Conference Paper
This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET that consists of n<sub>s</sub> multicast sessions. Each multicast session has one source and p destinations. Each source sends identical information to the p destinations in its multicast session, and the information is required to be delivered to all the p destinations within D time-slots. Assuming the wireless mobiles move according to a two-dimensional i.i.d. mobility model, we first prove that the capacity per multicast session is O(min{1, (log p)(log (n<sub>s</sub>p)) ¿(D/n<sub>s</sub>)}). We then propose a joint coding/scheduling algorithm achieving a throughput of ¿ (min {1, ¿(D/n<sub>s</sub>)}). Our simulation results suggest that the same scaling law also holds under random walk and random waypoint models.
Article
We consider the problem of optimal scheduling and routing in an ad-hoc wireless network with multiple traffic streams and time varying channel reliability. Each packet transmission can be overheard by a subset of receiver nodes, with a transmission success probability that may vary from receiver to receiver and may also vary with time. We develop a simple backpressure routing algorithm that maximizes network throughput and expends an average power that can be pushed arbitrarily close to the minimum average power required for network stability, with a corresponding tradeoff in network delay. When channels are orthogonal, the algorithm can be implemented in a distributed manner using only local link error probability information, and supports a “blind transmission” mode (where error probabilities are not required) in special cases when the power metric is neglected and when there is only a single destination for all traffic streams. For networks with general inter-channel interference, we present a distributed algorithm with constant-factor optimality guarantees.