Abstract

The objective of a sensor network is the execution of specific signal processing functions on data that are collected in a distributed fashion. The transmission of the data is facilitated by protocols whose operations may be constrained by physical limitations of the network units, while their performance must simultaneously comply with the performance requirements of the deployed signal processing operations. At the same time, the network architecture affects the performance of both the signal processing and the data transmission operations, while some of the sensors may generate high-priority data. In this paper, we consider clustered sensor network topologies deploying a specific stable random access transmission algorithm per cluster, which facilitates high-priority data. We then introduce a dynamic architectural reconfiguration algorithm which controls individual cluster rates for optimal overall network performance. The latter algorithm is facilitated by a high-level traffic rate monitoring protocol.

1. Introduction

Wireless sensor networks satisfy signal processing objectives; their performance metrics are thus determined by those of the latter objectives [1]. When time constraints are imposed on high-accuracy signal processing operations, the consequence is increased required overall data rates. At the same time, in wireless sensor networks, observation data are transmitted via appropriate multiple access protocols [2–5], whose performance is a function of the their input data rates, and are collected and processed by life-limited nodes, whose life span is a function of the data rates they process, [6–9]. Thus, required overall data rates, in conjunction with rate-dependent transmission protocol performance and node life spans, necessitate network-architecture and network-operations adaptations, so that the nodes’ survivability limitations do not interfere with the required network overall performance [10, 11]. Since the network-architecture and network-operations adaptations are functions of the acting data rates, it is eminent that data rates be monitored and that rate changes be detected accurately and rapidly [12].

The distinguishing feature in wireless sensor networks is limited life spans of the nodes, induced by energy consumption. Interesting results focusing on energy consumption have been obtained by several researchers: Bounds on energy conservation techniques have been derived in [13], role assignments targeting energy conservation have been developed in [10], energy conservation routing techniques have been proposed in [7, 8, 14], and issues arising due to energy conservation have been discussed in [14]. In addition, topological and node-cooperation issues have been included in [11, 15], while approaches to performance monitoring have been presented in [16]. An interesting rate allocation algorithm has been presented in [9], which is based on a modification of the max-min routing in [17] and the lexicographic linear programming approach in [18]. In [12], a dynamic rate allocation methodology has been presented that is facilitated by a powerful data rate monitoring algorithm. In [19], energy-efficient clustering algorithms are proposed, including a discussion on LEACH approaches, where energy consumption is assumed to be strictly a function of geographical distances and where transmission collisions are completely ignored. Considering transmission protocols, those proposed or partially implemented (in ZigBee, IEEE802.15.4, etc.) within the random access class are ALOHA-based and are characterized by well-known instabilities that pull the throughput down rapidly to zero, as the user population increases.

In this paper, we consider clustered sensor network topologies containing many randomly distributed sensors some of which may generate high-priority data. We deploy specific stable random access transmission protocols per cluster, that facilitate high-priority data. Data rates are time-varying in such a network, mainly due to expiring life-limited nodes. We focus on the problem of dynamic architectural reconfigurations, facilitated by a data rate monitoring higher-level protocol. The organization of the paper is as follows. In Section 2, we present the system model and the problem formalization. In Section 3, we propose an architectural reconfiguration algorithm. In Section 4, we describe and evaluate a data transmission random access protocol that we recommend for deployment in each cluster. In Section 5, we summarize the data rate monitoring protocol used to facilitate the architectural reconfiguration process and discuss its performance. In Section 6, we discuss overall system issues. In Section 7, we include numerical results. In Section 8, we draw conclusions.

2. System Model and Problem Formalization

We consider a clustered network architecture, as in [9, 12], shown in Figure 1. The components in the architecture are microsensors, microsensor clusters, and a backbone network of cluster heads and a fusion center. In [9, 12], the microsensors, the cluster heads, and the fusion center have been, respectively, termed microsensor nodes (MSNs), aggregation and forwarding nodes (AFNs), and base station (BS). We will use the same terminology for consistency. Given a predetermined signal processing objective, the MSNs, AFNs, and BS perform the following functions. (a) The MSNs are grouped into distinct clusters, where each cluster contains a single AFN. Each MSN collects local data and transmits them to its local AFN, via some multiple access transmission protocol implemented on a distinct channel associated with the AFN, that is, the overall network encompasses distinct separate channels (e.g., distinct frequency bands), each associated with a single AFN. Since the identities of the sensors contained in each cluster are time-varying due to possible sensor expirations and to possible subsequent architectural reconfigurations, the unknown user population model per cluster arises dictating the deployment of multiple access protocols from the random access class (RAs) [2–5, 16]. We will further elaborate upon this concept in Section 4. The AFNs and the BS are connected via separate channels (or frequencies) comprising the backbone network. Commands regarding routing adaptations in the latter network and system architectural reconfigurations propagate through the backbone network and do not interfere with the MSN transmissions. Possible reconfiguration broadcasts to MSNs are implemented via their local AFN, either on separate channels (frequencies) or on dedicated minislots of the MSN transmission channel(s) and do not interfere with the MSN transmissions. The MSNs are of low cost and low energy; thus, short-life devices, and some of them generate high-priority data that must be received by the corresponding AFNs in relatively short time. (b) Each AFN collects the data sent by its local MSNs and processes them, using an operation determined by the network signal processing objective [1]; it also receives processed data sent by other neighboring AFNs. The AFN then processes the compounded processed data, utilizing an operation that is determined by the network signal processing objective [1], and transmits the outcome to selected neighboring AFNs or the BS. The AFNs have processing capabilities and are devices with energy and life spans that are much higher than those of the MSNs; their life spans and energy are still limited, however. (c) The BS fuses data transmitted to it by neighboring AFNs, utilizing an operation that is determined by the network signal processing objective [1]. The BS has practically unlimited life span and processing power.

The MSNs transmit to their assigned AFN via an RA protocol. Operations are performed at all nodes of the backbone network: at the AFNs and the BS. The nature of the operations is determined by the network signal processing objective, the environment that generates the data, and the data rates [1]. At the same time, the energy consumption of the AFNs is a function of the data rates they receive and produce, and the complexity of the operations they perform. Each AFN performs operations on its input data rates, to produce the data rates it outputs to neighboring AFNs and/or the BS. Let us define the notation shown in Table 1.

We will assume that the MSNs per cluster are spatially randomly and independently distributed, and their number is large. In addition, their life span is short; thus, each MSN basically transmits a short-duration data message/or signal and expires. This, gives rise to a limit Poisson data packet user model per cluster [3], that is, the cluster user model reflects infinitely many independent Bernoulli users, each generating a single data packet, where an overall Poisson data packet traffic is induced.

2.1. The Static Problem

We initially consider the static problem stated in [9, 12]. The network signal processing objective is specified, the network architecture is fixed, the data environments and the RA transmission protocols are known and unchanged, the operations performed by the AFNs are determined and the data rates {πœ†πΆπ‘–} generated in the clusters are fixed. Given, in addition, the time constraint 𝑇, for the completion of the signal processing objective, the performance of the network will be maximized when the maximum number of data is fused in time length 𝑇 [9]. Since the fusion operation is performed by the BS and since the maximum number of data in 𝑇 corresponds to the maximum attainable data rate, maximum network performance is then attained when the data rate πœ‡ in Table 1 is maximized. A generally nonlinear dynamic programming problem is then formalized to determine the optimal routing protocol in the backbone network comprised of the AFNs and the BS. This is known as the static rate allocation problem [12, 20].

2.2. The Dynamic Problem

The network is required to complete its signal processing objective within 𝑇 time units. During this time period, some MSNs generally expire, since their life spans are only fractions of the time period 𝑇. This causes changes in the cluster data rates {πœ†πΆπ‘–}, and thus induces dynamics, first in the rate allocation problem, and then in network architectural configurations. Specifically, the rates {πœ†πΆπ‘–} may generally change during the 𝑇 time period, when the network operates towards the satisfaction of its objective. For rate changes that are relatively modest, a dynamic rate allocation problem arises: if such changes of the rates {πœ†πΆπ‘–} can be detected, then the constants of the static rate allocation problem will be adjusted accordingly, and the new data rate allocations will be then dictated by the solution of the adjusted problem. For more dramatic detected rate changes, the satisfaction of the overall system performance requirements may necessitate network architectural reconfigurations. To detect changes in cluster data rates, an algorithm must be devised, that detects changes accurately and rapidly. Such algorithm will be deployed at the AFNs, as an upper level protocol, it will detect changes and will communicate them across the AFNs. Then, either a static rate allocation algorithm on the unchanged network architecture will be initiated that uses the newly detected cluster rates as constants, or an architectural network reconfiguration will be implemented with a matching rate allocation technique. The data rates required for the communication among the AFNs will be a fixed algorithmic characteristic, they will be added as a permanently fixed constants in the functions that interrelate network data rates [12] and will not interfere with the dynamics of the resulting rate allocation and architectural reconfiguration problems. The important performance characteristics of the rate monitoring algorithm are accuracy, speed, and stability: the detection time induced by the algorithm (convergence rate) compounded by the time to solve the static rate allocation and architectural reconfiguration problems must be shorter than the time taken for actual changes across the network (rate changes), while false detections must simultaneously occur infrequently.

3. An Architectural Reconfiguration Algorithm

The allowable values of the cluster data rates {πœ†πΆπ‘–} in the network are determined by the throughput/delay characteristics of the transmission random access (RA) algorithms deployed in the clusters. Specifically, given the cluster transmission RA algorithm, the highest allowable cluster data rate should be such that the induced delays and retransmissions are nondetrimental to the network mission, in the sense of causing the expiration of an unacceptable percentage of MSNs. We will elaborate upon this concept in Section 4. We note that algorithmic delays induced by RAs are dependent on their algorithmic throughput. Thus, the cluster data rates {πœ†πΆπ‘–} are all bounded from above by bounds determined by the characteristics of the per cluster deployed transmission protocols from the MSNs to the corresponding AFN. In addition, as induced by the deployed transmission algorithm, when the data rate in a cluster drops below a certain level, the existence of the cluster becomes wasteful, due to the then unnecessary induced increase in the size of the backbone network. Assuming that the transmission RA protocol per cluster is fixed, identical for all clusters and known, let us denote by πœˆπ‘™ and πœˆπ‘’ the common determined lower and upper bounds to each cluster data rate, respectively. If the aggregate data rate from all MSNs in the overall network is denoted by πœ†πΆ, the smallest possible number of clusters in the network is then βŒˆπœ†πΆ/πœˆπ‘’βŒ‰, while the largest such number is then βŒŠπœ†πΆ/πœˆπ‘™βŒ‹.

We will assume that a rate monitoring algorithm is deployed at the AFNs. When the data rates in all clusters remain within the (πœˆπ‘™,πœˆπ‘’) range, then detected data rate changes dictate only rate reallocations in the backbone network of the overall structure, without any imposed architectural reconfigurations, as in [12]. When, instead, some cluster data rates fall outside the (πœˆπ‘™,πœˆπ‘’) range then architectural reconfigurations are first imposed, dictated by an architectural reconfiguration algorithm, followed by data rate reallocations on the new backbone network topology, as dictated by the deployed routing algorithm. In this section, we focus on the architectural reconfiguration algorithm.

3.1. The Algorithm

The original overall network architecture is based on the aggregate network data rate πœ†πΆ and the upper and lower rate bounds πœˆπ‘’ and πœˆπ‘™ determined by the transmission protocols in the clusters. In particular, assuming that transmission range is not a limiting factor in the geographical region covered by the network, βŒˆπœ†πΆ/πœˆπ‘’βŒ‰. AFNs are originally deployed, each heading a cluster of MSNs with equal cluster data rates {πœ†πΆπ‘–}. The latter number of AFNs selected minimizes the size of the backbone network, subject to the rates per cluster remaining within the target range (πœˆπ‘™,πœˆπ‘’); thus, it minimizes routing complexities and delays as well as network propagation delays. When the data rate monitoring algorithm detects that one or more cluster data rates fall outside the (πœˆπ‘™,πœˆπ‘’) range, the architectural reconfiguration algorithm is initiated.

Let {𝑅𝑖}𝑖β‰₯0 denote the sequence of time instants when network architectural reconfigurations are initiated, where 𝑅0 denotes the time when the original network architecture is deployed, based on the principles stated in the above paragraph. Let {πœ†πΆ(𝑖)}𝑖β‰₯0 be the aggregate network data rates at the instants {𝑅𝑖}𝑖β‰₯0, respectively, where πœ†πΆ(0)β‰‘πœ†πΆ. Assuming no MSN replacement during the time when the network objective is satisfied, the sequence of rates in {πœ†πΆ(𝑖)}𝑖β‰₯0 is monotonically nonincreasing with increasing index 𝑖. According to the above notation, 𝑅𝑖 denotes the ith time when the data rate monitoring algorithm detects that one or more cluster data rates fall outside the (πœˆπ‘™,πœˆπ‘’) range. At 𝑅𝑖, the architectural reconfiguration algorithm implements the following steps.

Step 1. The aggregate network data rate πœ†πΆ(𝑖) and subsequently βŒˆπœ†πΆ(𝑖)/πœˆπ‘’βŒ‰ are computed.

Step 2. (a) If βŒˆπœ†πΆ(𝑖)/πœˆπ‘’βŒ‰=βŒˆπœ†πΆ(π‘–βˆ’1)/πœˆπ‘’βŒ‰, then, as compared to the network architecture at time π‘…π‘–βˆ’1, the architecture of the backbone network remains unchanged, while the MSNs are reallocated to formulate rate-equivalent clusters. The reallocation is initiated by the BS, broadcast to the MSNs by the AFNs, via logically separate channels than those used for MSN transmissions, and is implemented by each MSN independently via equiprobable selection among the active clusters. For the high-priority MSNs, the equiprobable selection will be among cluster groups, instead, as explained in Section 4. We note that MSN reallocation may be judged as inappropriate in cases where it may cause unacceptable increase in MSN extinction rate. This issue will be further discussed in Section 6.
(b) If βŒˆπœ†πΆ(𝑖)/πœˆπ‘’βŒ‰=βŒˆπœ†πΆ(π‘–βˆ’1)/πœˆπ‘’βŒ‰, then some clusters are eliminated. The clusters are first ranked according to their aggregate local data rate, and βŒˆπœ†πΆ(π‘–βˆ’1)/πœˆπ‘’βŒ‰βˆ’βŒˆπœ†πΆ(𝑖)/πœˆπ‘’βŒ‰ clusters possessing the lowest such rates are eliminated. The survived AFNs are decided upon by the BS and become known to the MSNs via broadcasting. The MSNs are then reallocated among the survived clusters, for rate-equivalence. The implementation of the reallocation is as in (a).

4. The Per Cluster Random Access Transmission Protocol

Due to the dynamically changing architectural reconfigurations in the considered sensor topologies, the identities of all sensors are not known to the AFNs at all times. Thus, the unknown user population model arises, where the sensors are the users in this case: the identity of each sensor becomes known to the system, only after the sensor accesses successfully some AFN. The only possible class of transmission protocols for the unknown user population model is the random access (RA) class [21]. In addition, within the RA class of transmission protocols, the only implementable stable subclass is the class of limited sensing random access algorithms (LSRAAs), where it is required that upon generation of a message, each user start monitoring the channel feedbacks continuously, until this message is successfully accepted for transmission [2–5]. We emphasize that the ALOHA-based protocols currently proposed (e.g., ZigBee, IEEE802.15.4, etc.) are unstable, leading to rapidly decreasing throughputs with increasing MSN rates.

As stated in Section 2, we assume a limit Poisson data packet user model per cluster. We will also assume a synchronous system, where all AFN channels are slotted synchronously across all AFNs, and where a slot is the time corresponding to the transmission of a single packet. In this model, each packet represents a separate independent user (separate MSN here); thus, any number of packets may simultaneously attempt transmission, unless organized by some protocol; an LSRAA, in this case.

As stated in Section 2, the MSNs in a single cluster transmit through a single channel (to their AFN) and overall system connectivity is attained via the backbone network. Due to the possible MSN mobility or the dynamics of the architectural topology, some MSNs may move across clusters, while they have a packet to transmit. At cluster boundaries, such MSNs are exposed to feedbacks from more than one cluster channels and have the capability to transmit through anyone of those channels. The latter phenomenon can be exploited to avoid temporary isolation of users moving across clusters, and especially to reduce their transmission delays while in transit across clusters. In addition, some MSNs may generate high-priority data, requiring accelerated transmission. We encompass boundary MSNs into the high-priority category and name them all high-priority MSNs. We name non-high-priority MSNs, regular MSNs. The following approach can be then taken: to each regular MSN assign as a single channel for its transmissions that corresponded to its local AFN. To each MSN that is of high-priority, provide the capability to monitor and possibly transmit through a group of channels, instead, associated with the corresponding group of AFNs. The MSNs can be then partitioned into two categories: the regular MSNs transmitting through a single local channel and the high-priority MSNs having access to several cluster channels. If we consider the environment where high-priority MSNs have access to M AFN channels, then incorporating the regular MSNs, 𝑀+1 classes of MSNs arise: (a) 𝑀 classes of regular MSNs, each class transmitting through one of the distinct M AFN channels and (b) the (𝑀+1)th class of high-priority MSNs that has access to all the M AFN channels. The objective is the design of limited sensing random access algorithms (LSRAAs) for the system that requires no knowledge of the system state by the users and present the high-priority MSNs with a delay advantage (compared to the non-high-priority MSNs), even when the traffic rates in the system change dynamically, while keeping the delays of the regular MSNs as low as possible. When architectural reconfigurations, as in Section 3, are in place, each regular MSN selects one of the AFNs equiprobably, while each high-priority MSN selects one M-size group of AFNs, equiprobably among all possible such groups, for their transmissions.

For the multichannel system considered in the above paragraph, let the M channels be indexed from 1 to M. Then, the regular MSNs assigned to channel i deploy a limited sensing random access algorithm, named LSRAAi, for their transmissions. For each of these LSRAAs, we adopt the class of limited sensing random access algorithms in [2] due to their simple operational properties and their performance characteristics: the algorithms are easily implemented in the limited sensing environment, they operate with binary (collision versus noncollision) feedback, they have superior resistance to feedback errors and in the presence of the limit Poisson user model they attain a throughput of 0.43. Throughput is here defined as the highest traffic rate for which the algorithmic system is stable, where within the algorithm’s stability region the traffic is maintained by the algorithm with finite delays. The high-priority MSNs in the system deploy the same LSRAA as that deployed by the local MSNs, in conjunction with a selection policy via which they choose their transmission channel. A selection policy may be either dynamic or probabilistic. The operations of a dynamic selection policy are dictated by the feedback sequences that the boundary MSNs observe. In contrast, a probabilistic selection policy is represented by a priori assigned probabilities. A probabilistic selection policy is simple, but it does not generally present the high-priority MSNs with significant advantage, especially in the presence of changing rates of the regular MSN traffics. In this paper, we propose a dynamic selection policy which does not require any a priori system state knowledge, and which indeed presents the high-priority MSNs with a significant delay advantage. The policy, which was first introduced in [4], induces light delay penalization for the regular MSNs, at the expense of a reduction in overall system throughput.

Considering an M-channel system as above, we assume that some synchronous LSRAA is deployed by all the MSNs in the system. In particular, (1) time is divided into slots of length equal to the duration of a packet, and the starting instants of the slots are identical in all channels. (2) Per channel, feedback per slot exists and corresponds to the outcomes induced by the local LSRAA. This feedback is binary, Collision (C) versus NonCollision (NC). (3) Each regular MSN is required to monitor the feedbacks from its assigned channel continuously, from the time it generates a new packet to the time that this packet is successfully transmitted. We initially assume that no propagation delays and no forward or feedback channel errors exist in the system.

We also assume that each high-priority MSN receives the feedbacks from all channels correctly and without propagation delays. At the time when a high-priority MSN generates a new packet, it starts monitoring the feedbacks from all channels continuously, until it decides to join the operations of one of the LSRAAs for the transmission of his packet. Upon this decision, it maintains the continuous monitoring of only those feedbacks that correspond to the LSRAA it chose, until its packet is successfully transmitted.

The regular MSN populations for each channel and the high-priority MSN population are all modeled as limit Poisson. That is, it is assumed that the regular data packet traffic 𝑖, 𝑖=𝑙,2,…,𝑀, is a limit Poisson process with intensity πœ†π‘–, 𝑖=𝑙,2,…,𝑀, and that the data packet traffic generated by the high-priority MSNs is another independent limit Poisson process with intensity πœ†π‘€+1. As an interesting remark, for a large class of LSRAAs, including that considered in this paper, the limit Poisson user model provides a lower bound in performance within the class of identical and independent users whose packet generating process is memoryless.

4.1. The Algorithm for the Two-Channel System

We assume that the two LSRAAs in the two-channel system are identical and belong to the class of window algorithms in [2], all of which induce throughput 0.43 and operate with binary feedback.

Upon generation of a new packet, a high-priority MSN imagines itself belonging to the systems of both LSRAAs and follows their algorithmic steps until the first time that they enter a collision resolution event in one of them: the rules of this first entry are stated by the channel selection policy. Then, the MSN remains with the latter LSRAA system, until its packet is successfully transmitted.

Let time be measured in slot units, where slot 𝑑 occupies the time interval [𝑑,𝑑+1). Let π‘₯𝑑(𝑗) denote the feedback that corresponds to slot 𝑑 for channel 𝑗, 𝑗=1,2, where π‘₯𝑑(𝑗)=𝐢 and π‘₯𝑑(𝑗)=NC represent collision and noncollision slot 𝑑 for channel 𝑗, respectively. The LSRAA for channel 𝑗 is implemented independently by each MSN in the system; its steps are dictated by the feedback sequence {π‘₯𝑑(𝑗)}𝑑. Each regular MSN is assigned one of the channels a priori and thus observes only the feedback sequence corresponding to the latter channel. Each high-priority MSN observes, instead, the feedback sequences of both channels until it selects the channel which it will transmit its packet through. Below, we first explain the algorithmic steps implemented by each local MSN, dropping the channel index 𝑗, for simplicity in notion.

Each algorithm in the class in [2] utilizes a window of size Ξ” as an operational parameter and induces a sequence of consecutive collision resolution intervals (CRIs). The window length Ξ” is subject to optimal selection for throughput maximization. Each CRI corresponds to the successful transmission of all packet arrivals within an arrival interval of length Ξ”. The length of the CRI is determined by the number of MSNs in the window Ξ” and the algorithmic steps of the collision resolution process. The placement of the Ξ”-size window on the arrival access is determined asynchronously by the MSNs and is named the examined interval if the CRI. We will first describe the collision resolution process induced by the algorithm. Then, we will explain the process which determines the placement of the Ξ”-size window per CRI.

The algorithmic class contains algorithms whose collision resolution process can be depicted by a stack with finite number of cells. Let us consider this algorithm in the class which can be described by a K-cell stack. Then, in the implementation of the collision resolution process, each MSN utilizes a counter whose values lie in the set of integers, [1,2,…,𝐾]. We denote by π‘Ÿπ‘‘ the counter value of some MSN at time 𝑑. The 𝐾 different possible values of the counter place the user in one of the 𝐾 cells of a 𝐾-cell stack. When its counter value is 1, the MSN transmits; it withholds at πΎβˆ’1 different stages otherwise. When a CRI begins, all MSNs in the Ξ”-size window set their counters at 1; thus, they all transmit within the first slot of the CRI. If the window contains at most one packet, the first slot of the CRI is a noncollision slot and the CRI lasts one slot. If the window contains at least two packets, instead, the CRI starts with a collision which is resolved within the duration of the CRI via the following rules.

The MSN transmits in slot 𝑑 if and only if π‘Ÿπ‘‘=1. A packet is successfully transmitted in 𝑑 if and only if π‘Ÿπ‘‘=1 and π‘₯𝑑=NC.

The counter values transition in time as follows: If π‘₯π‘‘βˆ’1=NC and π‘Ÿπ‘‘βˆ’1=𝑗;𝑗=2,3,…,𝐾, then π‘Ÿπ‘‘=π‘—βˆ’1. If π‘₯π‘‘βˆ’1=𝐢 and π‘Ÿπ‘‘βˆ’1=𝑗;𝑗=2,3,…,𝐾, then π‘Ÿπ‘‘=𝑗. If π‘₯π‘‘βˆ’1=𝐢 and π‘Ÿπ‘‘βˆ’1=1, then, π‘Ÿπ‘‘=   1;w.p.1/𝐾  2;w.p.1/𝐾  3;w.p.1/𝐾     …   𝐾;w.p.1/𝐾.

For any given 𝐾, the throughput of the algorithm is 0.43. This throughput is attained for different optimal window sizes Ξ”βˆ—, as 𝐾 varies. For 𝐾=2,Ξ”βˆ—=2.33. For 𝐾=3,Ξ”βˆ—=2.56.

From the above rules, it can be seen that a CRI that starts with a collision slot ends with 𝐾 consecutive noncollision slots, an event which cannot occur at any other instant during the CRI. Thus, the observation of 𝐾 consecutive noncollision slots signals the certain end of an CRI to all users in the system; it either signifies the end of an CRI that started with a collision or the end of a sequence of 𝐾 consecutive length-one CRIs. Therefore, a MSN packet that arrives in the system without any knowledge of the channel feedback history can synchronize with the system upon the observation of the first 𝐾-tuple of consecutive noncollision slots. This observation leads to the asynchronous by the MSNs generating of the size-Ξ” window placement on the arrival axis. Specifically, if a CRI ends with slot 𝑑, the window of the next CRI is selected with its right most edge πΎβˆ’1 slots to the left of slot 𝑑 and it contains those packets whose updates fall in the interval (π‘‘βˆ’πΎ+1βˆ’Ξ”,π‘‘βˆ’πΎ+1). The updates {π‘‘π‘˜} of a packet are generated as follows. Let 𝑑0 be the slot within which a packet is generated. Then define 𝑑0 to be equal to 𝑑0. Starting with slot 𝑑0, the corresponding regular MSN senses continuously the channel feedbacks. It does so passively, until it observes the first 𝐾-tuple of consecutive NC slots, ending with slot 𝑑1. If 𝑑0∈(𝑑1βˆ’πΎ+1βˆ’Ξ”,𝑑1βˆ’πΎ+1), the MSN participates in the CRI that starts with slot 𝑑1+1. Otherwise, it updates its arrival instant to 𝑑1=𝑑0+Ξ” and waits passively until the end of the latter CRI, ending with slot 𝑑2. If 𝑑1∈(𝑑2βˆ’πΎ+1βˆ’Ξ”,𝑑2βˆ’πΎ+1), the MSN packet participates in the CRI which starts with slot 𝑑2; otherwise, the MSN updates its arrival instant by Ξ” again and repeats the above process. In general, if {𝑑𝑛}𝑛β‰₯1 denotes the sequence of consecutive CRI endings since the first 𝐾-tuple of consecutive NC slots, the MSN packet participates in the kth CRI if π‘‘π‘˜βˆ’1∈(π‘‘π‘˜βˆ’πΎ+1βˆ’Ξ”,π‘‘π‘˜βˆ’πΎ+1) and π‘‘π‘›βˆ‰(𝑑𝑛+1βˆ’πΎ+1βˆ’Ξ”,π‘‘π‘›βˆ’πΎ+1) for all π‘›β‰€π‘˜βˆ’2. In the latter case, π‘‘π‘˜ denotes the beginning slot of the first after the packet’s arrival CRI whose examined interval the packet’s update falls into.

Each high-priority MSN observes both feedback sequences {π‘₯(1)}𝑑β‰₯𝑑1 and {π‘₯(2)}𝑑β‰₯𝑑1 and follows the evolution of both time sequences {𝑑𝑖(1)}𝑖β‰₯2 and {𝑑𝑖(2)}𝑖β‰₯2 and their corresponding sequences of updates. Given a high-priority packet, let π‘‘π‘˜(𝑗);𝑗=1,2 denote the beginning slot of the first after the packet’s arrival CRI in channel 𝑗 whose examined interval the channel 𝑗 update of the packet falls into. Then, if π‘‘π‘˜(1)<π‘‘π‘˜(2), the packet enters a CRI within the LSRAA of channel 1 in slot π‘‘π‘˜(𝑙)+𝑙 and is successfully transmitted during its process. Ifπ‘‘π‘˜(1)>π‘‘π‘˜(2), instead, then the MSN packet joins a CRI in channel 2, in slot π‘‘π‘˜(2)+1. If π‘‘π‘˜(1)=π‘‘π‘˜(2), then the MSN selects one of the local LSRAAs with probability 0.5. The evolution of the updates for each LSRAA and each high-priority MSN is exactly as those of the local MSNs. That is, the arrival sequences are always updated by Ξ” and the Ξ”-size window is equally divided between the two LSRAAs whenever π‘‘π‘˜(𝑙)=π‘‘π‘˜(2).

4.2. Expiration of MSNs during the Transmission Process

The MSNs that have a packet to transmit consume energy due to channel monitoring and due to retransmissions within the CRI which accommodates the transmission of the packet. If the energy consumed this way exceeds their limit, the MSNs expire and their generated packet is lost. We will assume that the energy consumed per single monitored channel slot is a constant, and so is the energy consumed per retransmission slot. Then, assuming the deployment of an M-channel system LSRAA, we form a linear expiration expression, as explained below. Let us first define the following:  β: the amount of per MSN energy consumed by the monitoring of a single channel slot;   η: the amount of per MSN energy consumed by a single packet (re)transmission; β€‰β€‰πœ1: the number of slots during which an MSN monitors both channels in the system;β€‰β€‰πœ2: the number of slots during which an MSN monitors a single channel in the system;  m: the number of retransmissions during the CRI;  ξ: the total energy stored in a single MSN for packet transmission.

Using the above notation, we assume that the MSN expires, with subsequent loss of its generated packet, if: π›½ξ€·π‘€πœ1+𝜏2ξ€Έ+πœ‚π‘š>πœ‰.(1)

As first stated in Section 2, the MSN expiration, as given by expression (1), causes packet rejections and subsequent reduction of cluster traffic rates, where, as the number M of monitored by the high-priority MSNs channels increases, the life span of these MSNs decreases. Other causes of MSN expiration may be environmental hazards or random electronic failures. Regardless of the causes, MSN expirations may result in traffic rate reductions that dictate architectural reconfigurations.

4.3. Algorithmic Analysis of the Two-Channel System

We index the two channels from 1 to 2. Then, for convenience in notation, we will refer to the regular MSNs in channel 1, the regular MSNs in channel 2 and the high-priority MSNs as subsystem 1, subsystem 2, and subsystem 3, respectively. In the algorithmic analysis, we will assume that the three subsystem traffics are mutually independent and that the user traffic in subsystem 𝑗,𝑗=1,2,3, is limit Poisson with intensity πœ†π‘—.

Consider either one of the local LSRAAs, whose operations are described in Section 4.1. Let us select the 3-cell algorithm among those in the class in [2]. In Appendix A, the algorithmic analysis of the 2-channel system is presented. This analysis includes stability, which provides the maintainable by the system traffic rates. In Table 2, we include the maximum rate πœ†βˆ—2; maintained by the system, for varying πœ†1 and πœ†3 values as well as the maximum maintained symmetric rate πœ†βˆ—(πœ†3)=πœ†βˆ—=πœ†βˆ—1=πœ†βˆ—2 for varying πœ†3 values. We also include the maximum rate πœ†βˆ—3; maintained by the system, when πœ†1=πœ†2=0. We note that due to the symmetries appearing in the system, for each fixed rate πœ†3 we only need to compute πœ†βˆ—2 for πœ†1 values in the interval [0,πœ†βˆ—(πœ†3)). In Figure 2, we plot the boundaries of the (πœ†1,πœ†2) acceptable regions of maintainable traffic, parameterized by various πœ†3 values. Those boundaries are clearly symmetric around the 45Β° straight line and determine the stability regions for the algorithmic system.

From Table 2 and Figure 2, we observe that whenever πœ†3 is strictly positive, the sum πœ†βˆ—1+πœ†βˆ—2+πœ†3 is strictly less than 0.86, that is, strictly less than twice the throughput of each local LSRAA. The reason for this is twofold: (a) when πœ†3>0, some percentage of the traffic generated by the high-priority MSNs is always assigned for transmission to an LSRAA already overloaded by local MSN traffic. This is true because the expected CRI length is upper bounded by the window size Ξ” if the algorithm operates in its stability region, and it is slightly larger than Ξ” if the system is temporarily overloaded. Thus, if the rate of the regular local MSN traffic is close to the algorithmic throughput, then the presence of high-priority MSNs results in overloading of the LSRAA. (b) The rate πœ†3 traffic sometimes uses the window size Ξ” that is optimal for the local LSRAAs, while sometimes it uses the window Ξ”/2, instead. This causes throughput reduction even in the absence of regular local MSN traffics. In fact, in the latter case the maximum such reduction results because a higher percentage of the overall system traffic uses then the suboptimal window size Ξ”/2.

We point out that the stability regions in Table 2 and Figure 2 represent the case where the traffic is maintained, meaning that no MSNs expire. We also point out that when traffic is maintained, the collision resolution process induced by the deployed LSRAAs changes the traffic statistics, that is, when the input traffic is limit Poisson, the output traffic is not Poisson then, while it simultaneously maintains the input rate and can be closely approximated by a Poisson process.

The 2-channel algorithmic system induces regenerative points within its stability region. Thus, the regenerative theory, as applied in [4, 5], is applicable here as well, for the computation of the expected delays in each of the three subsystems. The details of this approach can be found in [4]. In Figures 3 and 4, we plot expected delays for two symmetric systems, with the systems’ 1 and 2 rates being equal to 0.1 and 0.3, respectively. From these figures, we observe that the delays of the high-priority MSNs are very little affected by their traffic rate and remain low, while the same delays for the regular MSNs are significantly increasing as the rate of the high-priority traffic increases. From the latter figures, we decide that: (a) below the (πœ†1=πœ†2=0.1;πœ†3=0.1) rate region, the system is wasteful, and (b) above the (πœ†1=πœ†2=0.3;πœ†3=0.05) rate region, the delays of the regular MSNs are unsatisfactory. Rate region (πœ†1=πœ†2=0.1;πœ†3=0.2) reflects 0.15 rate per cluster and 33% of the total MSN population being high-priority MSNs. Rate region (πœ†1=πœ†2=0.3;πœ†3=0.05) reflects 0.325 rate per cluster and 7.6% of all MSNs being high-priority MSNs. Referring to the architectural reconfiguration algorithm in Section 3 and the notation there, we may initially subsequently select πœˆπ‘™=0.15 and πœˆπ‘’=0.325, between 0% and 10% of total traffic generated by high-priority MSNs.

As we will further discuss in Section 5, the selection of the πœˆπ‘™ and πœˆπ‘’ values should be finally tuned depending on the MSN expiration constants in (1).

4.4. The 𝑀-Channel System

In the M-channel system, with 𝑀>2, the algorithms operate as in Section 4.1, with the following simple modification: when a high-priority MSN with a packet to transmit observes simultaneous beginnings of N CRls and its updates are within the examined intervals of all of them, it selects each one of the N LSRAAs with probability 1/𝑁. The stability conditions for the M-channel case are along the same lines as in Theorem 4 in Appendix A. However, they induce interactions among the M LSRAAs, and the evolving recursions for their evaluation give rise to multidimensional couplings. It is possible to devise a simplified recursive methodology which will basically first decompose the M-channel system into lower-dimensionality subsystems, and then use these subsystems as units towards an overall system evaluation. Specifics on this methodology and throughput/delay results can be found in [4]. For 𝑀>2, the delays of the high-priority users decrease, while, via expression (1) in Section 4.2, their life span simultaneously decreases. The latter tradeoff may weigh favorably towards the 2-channel system selection, for a considerable range of values for the constants involved in expression (1).

5. The Data Rate Monitoring Protocol

As stated in Section 2, the architectural reconfiguration algorithm in Section 3 is facilitated by a high-level data rate monitoring protocol. In this section, we present the highlights of the algorithm that implements the latter protocol, as presented and fully analyzed in [12]. Isolating a single cluster in the system, we first denote by πœ† the data rate accessing the AFN of the cluster: this data rate encompasses MSN expirations, whose occurrence is explained in Section 4.2. We subsequently decide on the πœˆπ‘™ and πœˆπ‘’ rate values to be monitored, where 0.15 and 0.325 have been respectfully selected in Section 4.3. The objective is then to decide rate shifts from πœˆπ‘’ to πœˆπ‘™. Below, we will summarize the generalized algorithm from [12], which monitors shifts among a set {πœ†π‘–} of rates.

The proposed algorithm is sequential, with its operational values updated at discrete, equally spaced, time instants {𝑇𝑖}𝑖β‰₯0, where the time interval between consecutive 𝑇𝑖 is a fraction of the life expectancy of MSNs. We name the time interval between two consecutive 𝑇𝑖’s, frame. Let us denote by {𝑆𝑖}𝑖β‰₯0 the subsequence of the sequence {𝑇𝑖}𝑖β‰₯0 such that 𝑇0=𝑆0 is the beginning of time when the system starts operating, and 𝑆𝑖 is the ith after 𝑆0 time instant (corresponding to the beginning of some frame) at which the monitoring algorithm decides that a shift in the acting rate has just occurred. Let us assume that, given any fixed rate πœ†π‘˜, the cluster data arrival process is stationary, and let π‘“π‘˜(𝑛1,…,π‘›π‘ž) denote its q-dimensional distribution in frame lengths, that is, π‘“π‘˜(𝑛1,…,π‘›π‘ž) is the probability that, in a sequence of q consecutive frames, 𝑛1 data arrivals occur in the first frame, and so on, with π‘›π‘ž data arrivals finally occurring in the qth frame, given that the active rate is πœ†π‘˜ throughout. Let us assume that the distributions {π‘“π‘˜(𝑛1,…,π‘›π‘ž)} are well known for all π‘˜β€™s (or all πœ†π‘˜β€™s). Then, we propose the following sequential data rate monitoring algorithm, from [12], which traces consecutive data rate shifts.

5.1. The Algorithmic System

(1) The monitoring algorithmic system is designed at rates {πœ†π‘˜}1β‰€π‘˜β‰€π‘›. (2) Let at some 𝑆𝑖 the rate πœ†π‘˜ be decided as just starting, by the monitoring algorithmic system. Then, immediately (at 𝑆𝑖), a set of π‘›βˆ’1 parallel algorithms starts operating. The jth such algorithm is monitoring a possible shift from the rate πœ†π‘˜ to the rate πœ†π‘—, where πœ†π‘˜β‰ πœ†π‘—, sequentially, with adaptations occurring at beginnings of frames. The π‘›βˆ’1 parallel algorithms use a reflective threshold at zero and a common decision threshold, πœ‚π‘˜. Let π‘‰π‘˜π‘— (0) denote the operating value of the algorithm monitoring {πœ†π‘˜β†’πœ†π‘—} shift at 𝑆𝑖, when it starts operating; let π‘‰π‘˜π‘—(π‘Ÿ) denote its operating value at its rth adaptation step. Then, the operating values of the algorithm are sequentially updated as follows: π‘‰π‘˜π‘—(0)Δ𝑉=0,π‘˜π‘—ξƒ©(π‘Ÿ+1)=max0,π‘‰π‘˜π‘—π‘“(π‘Ÿ)+logπ‘—ξ€·π‘›π‘Ÿ+1βˆ£π‘›1,…,π‘›π‘Ÿξ€Έπ‘“π‘˜ξ€·π‘›π‘Ÿ+1βˆ£π‘›1,…,π‘›π‘Ÿξ€Έξƒͺ.(2)𝑆𝑖+1 is then the first time after 𝑆𝑖 that one of the above π‘›βˆ’1 algorithms first crosses the common decision threshold πœ‚π‘˜. If the latter algorithm is the one which monitors a πœ†π‘˜β†’πœ†πœŒ shift, it is decided that the latter shift occurred and a set of π‘›βˆ’1 parallel algorithms, each monitoring a shift from πœ†πœŒ to one of the remaining rates, is immediately initialized. The latter algorithmic system has operational characteristics as those stated above, utilizing a common decision threshold πœ‚πœŒ.

A summary of the performance characteristics of the algorithm, taken from [12], is included in Appendix B. The algorithm induces correct decisions as well as false alarms whose relative relationship is controlled by the value of the selected decision threshold.

When the data rate monitoring algorithm is deployed for both architectural reconfiguration purposes and dynamic routing adaptations, as in [12], then, multiple rates are monitored and multiple parallel algorithms are simultaneously operating, as stated above. When focusing solely on the architectural reconfiguration problem, the data rate monitoring per cluster is implemented by a single algorithm as in (2) that monitors πœˆπ‘’ to πœˆπ‘™ possible shifts.

5.2. The Algorithm for the Poisson Model

As explained in Section 2, the data generated by the MSNs in cluster 𝑖 may be modeled as cumulatively comprising a homogeneous limit Poisson process, with rate πœ†πΆπ‘– bits/time unit. As stated in Section 4.4, the traffic accessing the AFN of the cluster, while not Poisson then, it can be closely approximated by a Poisson process. The Poisson arrival process is memoryless: the conditioning in the log-ratio updating step of the algorithm is (2) then drops. If 𝑑 denotes the length of a frame in time units, the {πœ†π‘˜β†’πœ†π‘—} monitoring algorithm in (2) takes the following form: π‘‰π‘˜π‘—(0)Δ𝑉=0,π‘˜π‘—ξ‚΅(π‘Ÿ+1)=max0,π‘‰π‘˜π‘—ξ‚Έπœ†(π‘Ÿ)+π‘‘π‘˜βˆ’πœ†π‘—+π‘›π‘Ÿ+1ξ‚΅πœ†logπ‘—πœ†π‘˜,ξ‚Άξ‚Ήξ‚Ά(3) where π‘›π‘Ÿ+1 denotes the number of transmitted data within the (π‘Ÿ+1)th frame from the beginning of the {πœ†π‘˜β†’πœ†π‘—} monitoring algorithm.

Let us define the following: πœξ€·πœ†π‘˜,πœ†π‘—ξ€ΈΞ”=ξ€Ίπœ†π‘˜βˆ’πœ†π‘—ξ€»ξ‚Έξ‚΅πœ†logπ‘˜πœ†π‘—ξ‚Άξ‚Ήβˆ’1,(4) where min(πœ†π‘˜,πœ†π‘—)<𝜁(πœ†π‘˜,πœ†π‘—)<max(πœ†π‘˜,πœ†π‘—). We may select {πœ†π‘–} rates such that 𝜁(πœ†π‘˜,πœ†π‘—) are rational numbers for all π‘˜ and 𝑗, and we then define the integers π‘‘π‘˜π‘— and π‘ π‘˜π‘—,π‘‘π‘˜π‘—<π‘ π‘˜π‘—, as follows: πœξ€·πœ†π‘˜,πœ†π‘—ξ€Έ=π‘‘π‘˜π‘—π‘ π‘˜π‘—.(5)

The algorithmic thresholds can then all be selected as positive integers, and without lack in generality, the algorithmic adaptation in (3) can be transformed as follows: π‘‰π‘˜π‘—ξ€½(π‘Ÿ+1)=max0,π‘‰π‘˜π‘—(π‘Ÿ)+(βˆ’1)ime(π‘˜,𝑗)ξ€Ίπ‘ π‘˜π‘—π‘›π‘Ÿ+1βˆ’π‘‘π‘‘π‘˜π‘—,ξ€»ξ€Ύ(6) where ξ‚»ime(π‘˜,𝑗)=0;ifπœ†π‘—>πœ†π‘˜;1;ifπœ†π‘—<πœ†π‘˜.(7)

6. Overall System Issues

As induced by the architectural reconfiguration algorithm in Section 3, when a πœˆπ‘’β†’πœˆπ‘™ shift is detected by at least one of the cluster data rate monitoring high-level protocols, the overall system reconfigures itself, where all MSNs reselect the AFN(s) that they will be connected to for their transmissions. This reselection halts the transmission process, until reconfiguration of the clusters is completed, causing interruptions of those transmissions that are in progress at the time of the halting. The latter transmissions need to be restarted by the corresponding MSNs, resulting in additional delays and retransmissions that may exceed the limit imposed by the low energy MSN characteristic, (see Section 4.3). Thus, architectural reconfigurations may cause increased MSN expiration rates. The so caused MSN expiration rate increase may be reduced if, Step 2(a) of the architectural reconfiguration algorithm in Section 3 is modified so that no cluster reselection by the MSNs occurs then, that is, in the case where the πœˆπ‘’β†’πœˆπ‘™ rate shift in one or a few clusters does not change the number of clusters in the system, the MSNs remain, instead, with the AFN(s) they were associated with before data rate shifts were detected, and do not interrupt any transmissions in progress. In the latter case, however, the overall system is not balanced: MSNs that are located in relatively overloaded clusters will suffer higher delays in their future transmissions, since they are not allowed to reallocate, at the risk of exhausting their life span. In summary, maintaining Step 2 in the Architectural Reconfiguration Algorithm, as described in Section 3, versus modifying it to exclude MSN reallocations induces a tradeoff between MSN expirations due to transmission interruptions and MSN expirations due to delays in relatively overloaded clusters. Given a specific clustered sensor environment, this tradeoff needs to be numerically evaluated, before a final decision regarding MSN reallocations in Step 2 of the architectural reconfiguration algorithm is made.

The false alarms induced by the data rate monitoring algorithm in Section 5 may occasionally dictate erroneous cluster reconfigurations and subsequent backbone network reductions. In particular, the monitoring algorithm may erroneously lead to the Step 2(b) case of the architectural reconfiguration algorithm in Section 3, imposing elimination of some clusters, while the actual overall network data rate πœ†πΆ has not been sufficiently reduced to necessitate such reduction. Implementation of cluster elimination will then result in traffic overloading of some clusters, with subsequent increase of the MSN expiration rate in them. The latter expiration rate increase must be evaluated against such increase due to the excessive routing and the propagation delays in the nonreduced backbone network, for the subsequent adjustment of the data rate monitoring decision threshold, in harmony with the per cluster boundary rates (πœˆπ‘™,πœˆπ‘’).

Given a member of the LSRAA class in Section 4, given the upper bound πœˆπ‘’ of the maintained data rate per cluster, given the MSN-expiration formula in (1), a specific value of the MSN expiration rate is induced. When the latter value is subtracted from πœˆπ‘’, the result should be bounded from below by the data rate lower bound πœˆπ‘™. In addition, if it is desirable that the MSN expiration rate, solely due to (1), be upper bounded, then, an upper bound to the value of πœˆπ‘’ is induced. As a conclusion, the pair (πœˆπ‘™,πœˆπ‘’) of rate values are dependent on the MSN-expiration formula in (1).

7. Numerical Results

We first simulated a two-cluster network, where the high-priority MSNs may transmit via either one of the two cluster channels. We assumed limit Poisson traffics generated by both the regular and the high-priority MSN populations, and we considered high-priority traffics from 0% to 10% of the regular traffics. We used the expression in (1) to model MSN expiration, with various values of the 𝛽,πœ‚, and πœ‰ constants, while we adopted the LSRAA transmission protocol for two channels in Section 4. We simulated the two-cluster system and computed the resulting MSN expiration rates as well as the delay distributions of the successfully transmitted packets. In accordance with the results and the subsequent discussion in Section 4, we selected πœˆπ‘™=0.15 and πœˆπ‘’=0.325, with 0% to 10% high-priority MSNs. We plot some of our results in Figures 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, and 16. We observe that, as expected, for fixed constant values πœ‰,𝛽, and πœ‚, the expiration rates of all three subsystems converge to identical values, while the nonexpired nodes of subsystem 3 are presented with a substantial delay advantage. When the constants 𝛽 and πœ‚ increase, the rejection rates increase uniformly, at the benefit of substantial decrease in the delays of the nonexpired MSNs. We note that within our πœ‰,𝛽, and πœ‚ value selections, the only case where the effective transmission rate falls below the 0.15 per cluster value is that corresponding to πœ‰=100,𝛽=10, and πœ‚=50.

We simulated the two channel system for the total per cluster traffic rate being the as selected above πœˆπ‘’=0.325 and for the high-priority traffic being between 0% and 10% of the per cluster regular traffic. We monitored the input to the two AFNs traffics deploying the high-level protocol in Section 5 and implemented the architectural reconfiguration algorithm in Section 3. We selected frame length equal to 11 units and we chose the integers π‘‘π‘˜π‘— and π‘ π‘˜π‘— in (5) equal to 11 and 50, respectively. We selected the threshold value of the monitoring algorithm equal to 1000, via inspection of the power and false alarm curves induced by various threshold values. For the πœ‰,𝛽, and πœ‚ constant values used in Figures 5–16, we simulated the monitoring algorithm. In all cases, the monitoring algorithm detected the rate change correctly. In particular, it detected such a change only when it actually occurred, in the case of the πœ‰=100,𝛽=10, and πœ‚=50 constants selection. In the latter case, we computed the distribution of the decision delay for the πœˆπ‘’=0.325 to πœˆπ‘™=0.15 change, as induced by the monitoring algorithm. The result is exhibited in Figure 17. From the latter figure, we observe the effective response of the monitoring system.

8. Conclusions

We presented an algorithm for the architectural reconfiguration of clustered wireless sensor networks, where power consumption per sensor is modeled as a linear function of retransmission and channel monitoring periods imposed upon it. The algorithm is based on per cluster cumulative rate control, in contrast to other existing cluster formation schemes (LEACH-based) that ignore the composite rate factor; it is facilitated by a distributed and highly efficient rate monitoring algorithm. We evaluated the algorithm for a system deploying a powerful stable random access transmission protocol that accommodates high-priority data transmissions. The latter protocol is limited sensing and stable, reducing effectively the high-priority delays, while simultaneously accommodating low-priority delays satisfactorily. In contrast, the existing alternative proposals for transmission protocols (e.g., ZigBee, IEEE802.15.4) are unstable with rapidly decreasing throughput, while they also do not accommodate high-priority data. The overall system proposed in this paper is robust and highly effective, controlling expiration rates and transmission delays with high efficiency.

Appendices

A. Throughput Analysis of the Random Access Transmission Protocol

Consider either one of the local LSRAAs, whose operations are described in Section 4.1. Let us select the 3-cell algorithm among those in the class in [2]. Consider some CRI within the system of the LSRAA, which starts with transmissions from packet arrivals in an arrival interval of cumulative length 𝑒. We will call 𝑒, the β€œlength of the examined interval.” Let us then define the following:   𝐸{π‘™βˆ£π‘’}: given that the length of the examined interval is equal to 𝑒, the expected number of slots needed for its resolution, that is, for the successful transmission of all the arrivals in the examined interval.Let πΏπ‘˜ denote the expected length of a CRI given that it starts with a collision of multiplicity π‘˜. We can then write the following: 𝐸(π‘™βˆ£π‘’)=βˆžξ“π‘˜=0𝐸(π‘™βˆ£π‘’,π‘˜)π‘’βˆ’πœ†Ξ”(πœ†π‘’)π‘˜=π‘˜!βˆžξ“π‘˜=0πΏπ‘˜π‘’βˆ’πœ†π‘’(πœ†π‘’)π‘˜,π‘˜!(A.1) since 𝐸(π‘™βˆ£π‘’,π‘˜)=πΏπ‘˜(A.2) depends only on π‘˜. In [2], and focusing on the 3-cell algorithm, we have shown that:(1)πΏπ‘˜;π‘˜β‰₯0 can be computed recursively;(2)πΏπ‘˜ is quadratically upper bounded.As found in [2], in the presence of the limit Poisson user model, each local LSRAA has then a throughput of 0.43, attained for window size Ξ”βˆ—=2.5599. Thus, in view of the system considered in this paper, the Poisson intensities πœ†π‘—,𝑗=1,2,3 must satisfy the following necessary conditions, for overall system stability: πœ†1<0.43,πœ†2<0.43,πœ†1+πœ†2+πœ†3<2(0.43)=0.86.(A.3) The necessary conditions in (A.3) determine a {πœ†π‘—,𝑗=1,2,3} hyperplane, which generally contains the {πœ†π‘—,𝑗=1,2,3} region that determines the system throughput. Tight bounds on the {πœ†π‘—,𝑗=1,2,3} space, which provide the system throughput, will be attained via the system stability analysis below.

We consider the evolution of the algorithms in the two-channel system, and we assume that the system starts operating at time zero. Let us consider the sequence in time of the CRls induced by the two LSRAAs in the system. Let the sequence {𝑇𝑛}𝑛β‰₯0 be such that: (a) for each 𝑛,𝑇𝑛 corresponds to the starting point of a slot which is the beginning of some CRI. We note that at 𝑇𝑛, two CRIs may simultaneously begin; one for each of the two LSRAAs in the system. (b) 𝑇𝑛 is the first after π‘‡π‘›βˆ’π‘™ time instant which corresponds to the beginning of some CRI. (c) 𝑇0=2, and at 𝑇0 two CRIs begin; one for each of the two LSRAAs in the system.

Let {𝑇𝑛(𝑠)}𝑛β‰₯0 be the subsequence of sequence {𝑇𝑛}𝑛β‰₯0 which consists of those time instants when two CRIs begin simultaneously; one for each of the two LSRAAs in the system. Clearly, 𝑇0(𝑠)=𝑇0=2. Let 𝐷(𝑗)𝑛.𝑠+1,𝑗=1,2,3 denote the total length of the unresolved arrival intervals in subsystem 𝑗, at the time instant 𝑇𝑛(𝑠). 𝐷(𝑗)𝑛.𝑠 is then called β€œthe lag of subsystem 𝑗 at time 𝑇𝑛(𝑠).” From the algorithmic operations in the system, we conclude the following: (a) 𝐷(𝑗)𝑛.𝑠β‰₯1 and the values of 𝐷(𝑗)𝑛.𝑠 are denumerable for all 𝑛 and 𝑗. (b) 𝐷(𝑗)0.𝑠=1,𝑗=1,2,3. (c) At time 𝑇𝑛(𝑠), the LSRAA in cluster π‘˜,π‘˜=1,2, examines two arrival intervals: one from subsystem π‘˜ which has length min (𝐷(𝑗)𝑛.𝑠,Ξ”) and contains arrivals generated by a Poisson process with intensity πœ†π‘˜, and one from subsystem 3 which has length min (𝐷(3)𝑛.𝑠,Ξ”) and contains arrivals generated by a Poisson process with intensity 0.5πœ†3. (d) The triple (𝐷(𝑗)𝑛.𝑠+1,𝑗=1,2,3) describes the state of the system at time 𝑇𝑛(𝑠), and the sequence {𝑆𝑛}Δ𝑛β‰₯0=𝐷(𝑗)𝑛.𝑠+1,𝑗=1,2,3 is a three-dimensional irreducible and aperiodic Markov chain.

The stability of the system is represented by the ergodicity of the three-dimensional Markov chain {𝑆𝑛}𝑛β‰₯0, [20]. In addition, at time 𝑇𝑛(𝑠), the backlogs of each of the two LSRAAS and of the overall system are all represented by the three lags, 𝐷(𝑗)𝑛.𝑠,𝑗=1,2,3. Given 𝐷(𝑗)𝑛.𝑠=𝑑𝑛(𝑗),𝑗=1,2,3, the expected system backlog at time 𝑇𝑛(𝑠) is βˆ‘3𝑗=1πœ†π‘—π‘‘π‘›(𝑗), where 𝑉(𝑑𝑛)=𝑉({𝑑𝑛(𝑗)}1≀𝑗≀3)Ξ”=βˆ‘3𝑗=1πœ†π‘—π‘‘π‘›(𝑗) is a Lyapunov function of the three systems lags {𝑑𝑛(𝑗)}1≀𝑗≀3. Let 𝐢 denote the state space of the Markov chain {𝑆𝑛}𝑛β‰₯0, and let us then define the operator 𝐴𝑉(𝑑)=𝐴𝑉({𝑑𝑛(𝑗)}1≀𝑗≀3) called a generalized drift, as follows: 𝐴𝑉𝑑𝑑=𝐴𝑉(𝑗)ξ€Ύ1≀𝑗≀3Δ𝑉𝐷=𝐸(𝑗)𝑛+1,𝑠1≀𝑗≀3ξ‚Άξ‚΅ξ‚†π·βˆ’π‘‰(𝑗)𝑛,𝑠1≀𝑗≀3ξ‚Άβˆ£π·(𝑗)𝑛,𝑠=𝑑(𝑗)ξ‚Όξƒ―,𝑗=1,2,3=𝐸3𝑗=1πœ†π‘—π·(𝑗)𝑛+1,π‘ βˆ£π·(𝑗)𝑛,𝑠=𝑑(𝑗)ξƒ°βˆ’,𝑗=1,2,33𝑗=1πœ†π‘—π‘‘(𝑗);𝑑𝑑=(𝑗)ξ€Ύ1≀𝑗≀3∈𝐢.(A.4) Thus, the generalized drift in state 𝑑 is the expected change in backlog over one slot time, starting in state 𝑑, and it can be used to establish necessary and sufficient conditions for the ergodicity of the Markov Chain {𝑆𝑛}𝑛β‰₯0 [20]. To see that, let us define the following: 𝑝𝑑,𝑒Δ=𝑃𝑑𝑛+1=π‘’βˆ£π‘‘=𝑑,𝐹𝑑,𝑉(𝑧)Ξ”=(1βˆ’π‘§)βˆ’1βŽ‘βŽ’βŽ’βŽ£π‘§π‘‰(𝑑)βˆ’ξ“_π‘’βˆˆπΆπ‘π‘‘,𝑒𝑧𝑉(_𝑒)⎀βŽ₯βŽ₯⎦;[π‘§βˆˆ0,1),π‘‘βˆˆπΆ,(A.5) where 𝐹𝑑,𝑉(𝑧) is the generalized Kaplan function on the Lyapunov function 𝑉 [22]. From the results in [1], we can then express the following proposition.

Proposition 1. Assume that the following hold:(i)|||𝐴𝑉𝑑|||<∞,βˆ€π‘‘βˆˆπΆ;(A.6)(ii)there exist finite subset 𝐻2∈𝐢 and some nonnegative finite constant 𝐡 such that 𝐹𝑑,𝑉[(𝑧)β‰₯βˆ’π΅,βˆ€π‘§βˆˆ0,1),βˆ€π‘‘βˆˆπΆβˆ’π»2.(A.7)
Then,(A)if there exists a finite subset 𝐻1 of 𝐢, and some πœ€ξ…ž>0 such that 𝐴𝑉𝑑<πœ€β€²,βˆ€π‘‘βˆˆπΆβˆ’π»1,(A.8) then the Markov chain {𝑆𝑛}𝑛β‰₯0 is ergodic;(B)if 𝐻 is a proper subset of 𝐢 such that inf[]π‘‘βˆˆπΆβˆ’π»π‘‰ξ‚€π‘‘ξ‚>supπ‘‘βˆˆπ»π‘‰ξ‚€π‘‘ξ‚,𝐴𝑉𝑑>0,βˆ€π‘‘βˆˆπΆβˆ’π»,(A.9) then the Markov chain {𝑆𝑛}𝑛β‰₯0 is nonergodic.

Remark 2. Condition (A.7) is trivially satisfied for Markov chains, which are uniformly downward bounded with respect to the Lyapunov function 𝑉, that is, for Markov chains such that, 𝑃(𝑉(𝐷𝑛+1)<𝑉(𝑑𝑛)βˆ’π‘₯)=0, for all π‘₯>𝛼, for some positive and finite constant 𝛼 and for all 𝑑𝑛 in 𝐢. In the problem studied in this paper, when πœ†3=0, two decoupled systems arise. Each of those systems corresponds to a local LSRAA, whose lags at collision resolution points form a uniformly downward bounded Markov chain; the Lyapunov function 𝑉(𝑑) reduces then to 𝑑(𝑗), for the system in channel 𝑗,𝑗=1,2, and the constant 𝛼 equals then βŒŠΞ”βŒ‹=2.
We now express a lemma whose proof is as in Lemma 1 in [4].

Lemma 3. Consider the Markov Chain {𝑆𝑛}𝑛β‰₯0={𝐷(𝑗)𝑛.𝑠,𝑗=1,2,3}𝑛β‰₯0 and its Lyapunov function (π‘‘π‘›βˆ‘)=1≀𝑗≀3πœ†π‘—π‘‘π‘›(𝑗), and let 𝐢 be the state space of {𝑆𝑛}𝑛β‰₯0. Let 𝐴𝑉(𝑑) and 𝐹𝑑,𝑉(𝑧) be as in (A.4) and (A.5), respectively. Then, (i)|||𝐴𝑉𝑑|||<∞,βˆ€ξ€½πœ†π‘‘βˆˆπΆ,βˆ€π‘–ξ€Ύsuchthat3𝑗=1πœ†π‘–β‰€1;(A.10)(ii)there exist a positive finite constant 𝐡 and some finite subset 𝐻2 of 𝐢 such that 𝐹𝑑,𝑉[(𝑧)β‰₯βˆ’π΅,βˆ€π‘§βˆˆ0,1),βˆ€π‘‘βˆˆπΆβˆ’π»2,βˆ€ξ€½πœ†π‘—ξ€Ύsuchthat3𝑗=1πœ†π‘–β‰€1.(A.11)

Due to Lemma 3, and in view of the proposition, the search for the ergodicity versus the nonergodicity of the Markov chain {𝑆𝑛}𝑛β‰₯0 reduces to the identification of appropriate properties for the satisfaction of conditions (A) and (B) in the proposition, respectively.

Consider 𝑇𝑛(𝑠), and let the lags {𝐷(𝑗)𝑛,𝑠}1≀𝑗≀3 be sufficiently long, so that in the time interval [𝑇𝑛(𝑠),𝑇(𝑠)𝑛+1], each CRI from each of the two LSRAAs in the system, resolves an arrival interval of length Ξ”. Given system Poisson rates {πœ†π‘—}1≀𝑗≀3, and for πΈπœ†{π‘™βˆ£π‘’} as in (A.1), let us then define the following: 𝑖=1,2;𝑁𝑖({πœ†π‘—},Ξ”): given {πœ†π‘—}, the number of CRIs generated by the algorithm in channel 𝑖 in [𝑇𝑛(𝑠),𝑇(𝑠)𝑛+1], when each CRI resolves arrival intervals of length Ξ”, from both its low- and high-priority users. The first such CRI starts at 𝑇𝑛(𝑠), and the last such CRI ends at 𝑇(𝑠)𝑛+1. 𝐴𝑉(𝑑Δ,{πœ†π‘—}): The generalized drift in (2), for given Poisson rates {πœ†π‘—}, when, in [𝑇𝑛(𝑠),𝑇(𝑠)𝑛+1], each CRI generated by either algorithm in the system, resolves arrival intervals of length Ξ”. 𝑖=1,2;𝐴(𝑖)𝑉𝑑Δ,ξ€½πœ†π‘—ξ€Ύξ‚Ξ”=πΈπœ†π‘–+πœ†3/2+𝐸𝑁{π‘™βˆ£Ξ”}βˆ’Ξ”iπœ†ξ€·ξ€½j𝐸,Ξ”ξ€Έξ€Ύβˆ’1ξ€»ξ€Ίπœ†π‘–+πœ†3ξ€».{π‘™βˆ£Ξ”}βˆ’Ξ”(A.12)Then, via (3), we easily derive the following expression: 𝐴𝑉𝑑Δ,ξ€½πœ†π‘—ξ€Ύξ‚=ξ‚΅πœ†1+πœ†32𝐴(1)𝑉𝑑Δ,ξ€½πœ†π‘—ξ€Ύξ‚+ξ‚΅πœ†2+πœ†32𝐴(2)𝑉𝑑Δ,ξ€½πœ†π‘—ξ€Ύξ‚βˆ’πœ†3Ξ”2𝐸𝑁1πœ†ξ€·ξ€½π‘—ξ€Ύξ€½π‘,Ξ”ξ€Έξ€Ύ+𝐸2πœ†ξ€·ξ€½π‘—ξ€Ύξ€»,,Ξ”ξ€Έξ€Ύβˆ’2(A.13) where πΈπœ†π‘–+πœ†3/2𝐸𝑁{π‘™βˆ£Ξ”}+1πœ†ξ€·ξ€½π‘—ξ€ΎπΈ,Ξ”ξ€Έξ€Ύβˆ’1ξ€»ξ€Ίπœ†1+πœ†3ξ€»{π‘™βˆ£Ξ”}=πΈπœ†2+πœ†3/2𝐸𝑁{π‘™βˆ£Ξ”}+2πœ†ξ€·ξ€½π‘—ξ€Ύξ€»Γ—ξ€ΊπΈ,Ξ”ξ€Έξ€Ύβˆ’1πœ†2+πœ†3{ξ€».π‘™βˆ£Ξ”}(A.14) We note that 𝐴(𝑖)𝑉(𝑑Δ,{πœ†π‘—}) in (A.12) is a generalized drift for the algorithm in cluster 𝑖. We now state a theorem whose proof is as in Theorem 1 in [4].

Theorem 4. (i) Let there exist some πœ€>0 such that the two conditions below are satisfied: 𝐴(1)𝑉𝑑Δ,ξ€½πœ†π‘—ξ€Ύξ‚π΄<βˆ’πœ€,(2)𝑉𝑑Δ,ξ€½πœ†π‘—ξ€Ύξ‚<βˆ’πœ€.(A.15)
Then, the Markov chain {𝑆𝑛}𝑛β‰₯0 is ergodic at the Poisson rates {πœ†π‘—}1≀𝑗≀3.
(ii) Let at least one of the two generalized drifts, 𝐴(𝑖)𝑉(𝑑Δ,{πœ†π‘—}),𝑖=1,2, be nonnegative.
Then, the Markov chain {𝑆𝑛}𝑛β‰₯0 is nonergodic at the Poisson rates {πœ†π‘—}1≀𝑗≀3.
The conditions (A.15) in the theorem define lower bounds on the {πœ†π‘—} regions for which the Markov chain {𝑆𝑛}𝑛β‰₯0 is ergodic. Since the constant πœ€ in (A.15) can be arbitrarily small, and in combination with the statement in part (ii) of the theorem, we conclude that the ergodicity bounds determined by (A.15) are tight.
In [4], a methodology regarding the computation of the {πœ†π‘—} values, for which the Markov chain {𝑆𝑛}𝑛β‰₯0 is ergodic, is described, leading to the system stability regions.

B. Performance of the Data Rate Monitoring Protocol

In this appendix, we summarize the performance of the data rate monitoring high-level protocol.

B.1. Performance Characteristics of a Simple Algorithmic System

Let us consider the distinct rates πœ†1,…,πœ†π‘›, and the corresponding arbitrary dimensionality distributions 𝑓1,…,𝑓𝑛 of the arrivals, as defined in the beginning of this section. For given rates πœ†1,…,πœ†π‘›, let the latter distributions be well known, and consider then the algorithmic system of (π‘›βˆ’1) algorithms, each monitoring a change from the rate πœ†π‘˜ to one of the remaining rates. The {πœ†π‘˜β†’πœ†π‘—} algorithm utilizes the observed per frame number of arrivals and the distributions π‘“π‘˜ and 𝑓𝑗 in its updating log-ratio steps (see (2) in Section 5), while the parallel algorithms utilize a common threshold πœ‚π‘˜. We now state a lemma that is included in [12].

Lemma 5. Let the distributions 𝑓1,…,𝑓𝑛 satisfy πœ™-mixing conditions as and consider the system of the (π‘›βˆ’1) parallel algorithms {πœ†π‘˜πœ†πœŒ};πœŒβ‰ π‘˜, from the time instant when they start operating. Let the rate πœ†π‘– be acting throughout the total observation time interval, and let then π‘πœ†π‘–{πœ†π‘˜β†’πœ†π‘—} denote the stopping variable of the {πœ†π‘˜β†’πœ†π‘—} algorithm, given the decisive common threshold Ξ·k, that is, π‘π‘–π‘˜π‘— is the random variable denoting the number of frames needed for the {πœ†π‘˜β†’πœ†π‘—} algorithm to first cross the threshold πœ‚π‘˜, when arrivals are generated by the distribution/process 𝑓𝑖 throughout. Then, limπœ‚π‘˜β†’βˆžπΈξ‚»π‘πœ†π‘–ξ€½πœ†π‘˜β†’πœ†π‘—ξ€Ύξ‚Όβ‰ˆβŽ§βŽͺβŽͺ⎨βŽͺβŽͺβŽ©πœ‚π‘˜2𝑓;ifπΎπ‘–π‘“π‘˜ξ‚Άξ‚΅π‘“βˆ’πΎπ‘–π‘“π‘—ξ‚Άξ€·πœ‚<0;log𝑛𝐾𝑓𝑖/π‘“π‘˜ξ€Έξ€·π‘“βˆ’πΎπ‘–/𝑓𝑗𝑓;ifπΎπ‘–π‘“π‘˜ξ‚Άξ‚΅π‘“βˆ’πΎπ‘–π‘“π‘—ξ‚Ά>0,(B.1) where K(𝑓𝑝/𝑓𝑙) is the Kullback-Leibler number [1] of the distribution/process of 𝑓𝑝, with respect to the process 𝑓𝑙, subject to the existence of the latter number.

As a direct consequence of (4), when the rate πœ†π‘–(πœ†π‘–β‰ πœ†π‘˜) acts throughout, then, asymptotically (for πœ‚kβ†’βˆž), the {πœ†π‘˜β†’πœ†π‘–} algorithm stops first, in the expected stopping time sense. That is, πœ†π‘– acting throughout, and πœ†π‘–β‰ πœ†π‘˜: limπœ‚kβ†’βˆžπΈξ‚†π‘πœ†π‘–ξ€½πœ†π‘˜β†’πœ†π‘–ξ€Ύξ‚‡β‰ˆξ€·πœ‚logπ‘˜ξ€ΈπΎξ€·π‘“π‘–/π‘“π‘˜ξ€Έ<limπœ‚kβ†’βˆžπΈξ‚†π‘πœ†π‘–ξ€½πœ†kβ†’πœ†i;βˆ€πœ†jβ‰ πœ†i;πœ†jβ‰ πœ†k.(B.2)

If πœ†π‘˜ acts throughout, on the other hand, the expected stopping time of each {πœ†π‘˜β†’πœ†π‘—};π‘—β‰ π‘˜ algorithm is asymptotically (πœ‚π‘˜β†’βˆž) of the same order with that of the threshold value.

The implementation of the algorithm is clearly determined by its nonasymptotic performance: its performance for finite values of the threshold πœ‚π‘˜. Given a threshold value πœ‚π‘˜, the performance of the (πœ†π‘˜β†’πœ†π‘—) monitoring algorithm is basically characterized by two time curves: the power and false alarm curves, denoted, respectively, by π›½π‘˜π‘—(π‘Ÿ) and π›Όπ‘˜π‘—(π‘Ÿ), where π‘Ÿ denotes the time instant π‘‡π‘Ÿ, as in (B.1), and whereβ€‰π›½π‘˜π‘—(π‘Ÿ): the probability that the πœ†π‘˜β†’πœ†π‘— monitoring algorithm crosses threshold πœ‚π‘˜ before or at time π‘‡π‘Ÿ, given that the acting rate is πœ†π‘— throughout, named power curve;β€‰π›Όπ‘˜π‘—(π‘Ÿ): the probability that the πœ†π‘˜β†’πœ†π‘— monitoring algorithm crosses threshold πœ‚π‘˜ before or at time π‘‡π‘Ÿ, given that the acting rate is πœ†π‘˜ throughout, named false alarm curve.

B.2. Reinitialization Performance

Above, we summarized the performance of a simple single-shot system of parallel algorithms, that monitor a shift from a given rate πœ†π‘˜ to any one of the remaining π‘›βˆ’1 rates. Incorporating the common threshold πœ‚π‘˜ utilized by this system, we denote it {πœ†π‘˜β†’πœ†π‘—;forallπ‘—β‰ π‘˜,πœ‚π‘˜}. The algorithmic system in ([19, Section 5]) reinitializes each time it makes a decision. When the algorithm {πœ†π‘˜β†’πœ†π‘—;π‘—β‰ π‘˜,πœ‚π‘˜} decides in favor of a rate πœ†πœŒ, a new algorithm {πœ†πœŒβ†’πœ†π‘—;π‘—β‰ πœŒ,πœ‚πœŒ} immediately starts and this process continuous on. The latter reinitialization process gives rise to stability issues: descriptively, the rate of the actual rate changes cannot be faster than the rate of algorithmic decisions. Below, we define stability in precise mathematical terms.

Let πΆπœ€π‘–(πœ†π‘–);𝑖=0,1,…,(π‘›βˆ’1) denote disjoint rate regions, respectively, centered around the rates πœ†π‘–,𝑖=0,1,…,(π‘›βˆ’1). Let the traffic monitoring systems be designed at the latter central rates. Let πœ†ξ…žπ‘–;𝑖=0,1,…,(π‘›βˆ’1) denote the acting rates, where πœ†ξ…žπ‘–βˆˆπΆπœ€π‘–(πœ†π‘–) for all 𝑖. Let us assume that the arrival processes are all memoryless, and let the process which generates the actual rate shifts, from some πœ†ξ…žπ‘– to some πœ†ξ…žπ‘—, be homogeneous Markov. Let πœ†πΌ<πœ†π‘–+1 for all 𝑖. Let us then define the following: 𝐸{𝑙𝑖}: the expected length, in time units, during which the rate πœ†ξ…žπ‘– is continuously acting;β€‰πœ†ξ…ž: the vector [πœ†ξ…ž0,πœ†ξ…ž1,πœ†ξ…ž2,πœ†ξ…ž3,…,πœ†ξ…žπ‘›βˆ’1].

Consider the sequence {π‘†π‘š} of time instants when shifts in rates are declared by the algorithmic system. Let πœ†ξ…žπ‘–π‘š denote the acting data rate, and let πœ†π‘–π‘š denote the rate decided by the rate monitoring system at π‘†π‘š. Let Xπ‘š be the random variable denoting the data backlog at π‘†π‘š. Let π‘Šπ‘š be the random variable which denotes the distance from π‘†π‘š of the instant when πœ†ξ…žπ‘–π‘š started acting. Then, due to the memoryless and homogeneous Markov assumptions given above, {πœ†ξ…žπ‘–π‘š,πœ†π‘–π‘š,π‘Šπ‘š,π‘‹π‘š} forms a Markov chain. System stability corresponds, then, to ergodicity of the latter Markov chain [20], which by the way, is clearly uniformly downward bounded [20]. We now express a Lemma, stated in [12].

Lemma 6. Let the data arrival processes be memoryless, and let the processes that generate the actual rate shift be homogeneous Markov. Let the algorithmic thresholds {πœ‚π‘˜}0β‰€π‘˜β‰€π‘›βˆ’1 be such that πœ‚π‘˜β†’βˆž; for all π‘˜. Then, the following sufficient and necessary conditions for the algorithmic stability hold, where 𝐾(πœ†ξ…žπ‘–/πœ†π‘š) is the Kullback-Leibler number as in Lemma 1, where 𝐾maxξ€·πœ†π‘šξ€ΈΞ”=maxπΎπœ†β€²π‘–ξ‚΅πœ†ξ…žπ‘–πœ†π‘šξ‚Ά,ξ€·πœ†indξ…žπ‘š,πœ†π‘šξ€ΈΞ”=ξ‚»π‘šβˆ’1;forπœ†ξ…žπ‘š<πœ†π‘š;π‘š;forπœ†ξ…žπ‘šβ‰₯πœ†π‘š.(B.3)
Sufficient condition: π‘›βˆ’1ξ“π‘š=0⎧βŽͺ⎨βŽͺβŽ©ξ€·πœ‚logπ‘šξ€ΈπΎmaxξ€·πœ†π‘šξ€Έind(πœ†β€²π‘š,πœ†π‘š)ξ“π‘˜=0ξ€·πœ†ξ…žπ‘˜βˆ’πœ†π‘šξ€ΈπΈξ€½π‘™π‘˜ξ€Ύ+πœ‚π‘š2nβˆ’1ξ“π‘˜=[ind(πœ†β€²π‘š,πœ†π‘š)+1]ξ€·πœ†ξ…žπ‘˜βˆ’πœ†π‘šξ€ΈπΈξ€½π‘™π‘˜ξ€ΎβŽ«βŽͺ⎬βŽͺβŽ­β‰€0.(B.4)
Necessary condition: π‘›βˆ’1ξ“π‘š=0⎧βŽͺ⎨βŽͺβŽ©πœ‚π‘š2ind(πœ†β€²π‘š,πœ†π‘š)k=0ξ€·πœ†ξ…žπ‘˜βˆ’πœ†π‘šξ€ΈπΈξ€½π‘™π‘˜ξ€Ύ+ξ€·πœ‚logπ‘šξ€ΈπΎmaxξ€·πœ†π‘šξ€Έπ‘›βˆ’1ξ“π‘˜=[ind(πœ†β€²π‘š,πœ†π‘š)+1]ξ€·πœ†ξ…žπ‘˜βˆ’πœ†π‘šξ€ΈπΈξ€½π‘™π‘˜ξ€ΎβŽ«βŽͺ⎬βŽͺβŽ­β‰€0.(B.5)

The sufficient and necessary conditions for system stability in the above Lemma are asymptotic. In general, both asymptotic and nonasymptotic conditions relate rates of actual data rate changes to rates of convergence of the algorithmic monitoring system, for stability, where stability translates to maintaining the data traffics with finite delays (nonincreasing expected backlogs). All conditions basically require that acting high rates be bursty.