Abstract

Wireless mesh networking is an effective approach to reach high performance in the last mile of broadband Internet access. The mesh structure is the basic step toward providing cost-effective, dynamic, and high-bandwidth wireless connection. In this paper, WiMAX-like wireless mesh network is considered, emphasizing the grid arrangement which is the general topology described in the literature. To evaluate the performance of the conventional and proposed scheduling algorithms, each link is modeled using an M/D/1 queue and a virtual node concept is introduced to describe comparable performance metrics for the system. Performance measures of the system in addition to the simulation results are assessed in terms of the network length and the arrival rates.

1. Introduction

Wireless mesh network (WMN) is a cost-effective multihop network, usually comprising some subscriber stations (SS) and one base station (BS). The multihop feature of WMN can increase its range of accessibility, in addition to reliability due to dynamic self-organizing and self-configuring features. Each SS can communicate with other SSs in its transmission range and the BS that connects the mesh network to the backbone. While some SSs only relay traffic flows of other SSs, some others carry their underlying subnetwork traffic flows as well.

IEEE 802.16d has a potential to replace its tenacious rivals [1]. Its optional mesh mode transmits and routes various traffic streams among SSs directly in a distributed manner. Moreover, in its centralized mode, traffic stream routes to the network backbone through the BS. Since most of the traffic streams are between SSs and wired backbone network, the centralized mode is the most important [24] and we evaluate the system in this mode.

In this paper, we consider an IEEE 802.16-like WMN and analyze the performance of a grid topology, which is generally used in WMNs. We introduce a queuing model to evaluate the average delay and also investigate some other issues influencing the delay constraint such as scheduling algorithm and position of the BS.

The paper is organized as follows. In Section 2, a brief survey of the previous research in this area is presented. In Section 3, the topologies used for introducing the model are described. Section 4 elaborates the IEEE 802.16d mesh mode with respect to its central scheduling procedure. The analytical model is presented in the Section 5. In Section 6, the VN solution is proposed and verified with two simple examples. Impact of the scheduling algorithm is also considered in this section. Performance evaluation of the proposed model and simulation results are discussed in Sections 7 and 8, respectively. Finally, the paper is concluded in Section 9.

A comprehensive survey of WMNs has been presented in [5]. Performance analysis of WMN has been considered in a few recent papers. Reference [4] analyzes a WMN by combining M/M/C/∞, M/M/N(s)/K(s), and M/M/1/∞ queuing models. The network throughput, average packet delay, and packet loss are evaluated using the model. Performance modeling and analysis of integrated WLANs and mesh networks are considered in [2]. The analytical model utilizes the Poisson arrival and service rates at each mobile station. The average queuing delay in multichannel multi-interface WMNs is minimized in [6] based on an M/M/C/∞ queue.

None of these models are suitable for IEEE 802.16 mesh network in which the frame duration is fixed. So, the main contribution of the paper is finding a suitable queuing model that can be considered in WiMAX-based WMN.

Time division multiple access (TDMA) scheduling in central mesh mode of IEEE 802.16 has been considered in [7]. The authors of [8] have represented a survey on scheduling in WiMAX mesh mode. Since the basic scheduling algorithm of IEEE 802.16 has two drawbacks (stated below), some works have been carried out, challenging the basic algorithm. In [9], the Bellman-Ford scheduling algorithm shows worthy results on the return path delay, which is also bandwidth optimal. An interference-aware research framework introduced in [10] uses a blocking metric to improve spectral utilization. Scheduling problem in WiMAX mesh network is formulated and solved in [11] as a binary linear programming problem. The authors of [12] introduce the uniform slot allocation and uplink and downlink slot allocation algorithms to achieve higher spatial reuse and network throughput both in uplink and downlink paths.

3. Assumed Topologies

We consider a general form of mesh networks (Figure 1), gird topology, which consists of some SSs and one BS. The length of the network (𝑌) is assumed to be the square root of the number of nodes (𝑌2=𝑁).

Each one of the nodes has a potential to be the BS; however, two more interesting geographical points will be elaborated in this paper. First, assuming the length of the grid to be an odd number, the BS is considered to be placed at the center of the grid (Figure 2). The main advantage of this topology is its minimized hop count to other nodes. In the second topology (Figure 3), the BS is placed at one of the four corners of the grid. This topology is suitable for special situations such as earthquake-stricken or flood-prone areas, where the BS is placed at the margin of the area and SSs are distributed inside the area. However, with this topology the average hop count to the BS is maximized. We call the former topology BS centered (BSCe) and the later one BS cornered (BSCo).

4. IEEE 802.16d Mesh Mode

Each SS is interconnected with other SSs in its transmission area. This structure forms a graph including some nodes (𝑉) and some links (𝐸). Each time an SS joins the network, it should experience an entry process. This process includes coarse synchronization establishment with the network. From all the potential sponsor nodes that the new node may connect to, it selects a sponsor node having the best signal quality metrics. After joining the network, the new node requests its data rate (service rate) from the BS through other SSs in the path to the BS. The BS collects all bandwidth requests from all SSs and assigns link bandwidths in a fixed frame length. The frame length is fixed at 𝑇𝑓; since each time its length is changed, the network should be set up again and this imposes some extra overheads to the network. As each node transmits in both uplink and downlink directions, node scheduling is replaced with link scheduling. Since this paper considers only uplink traffic analysis, node and link scheduling are equivalent and interchangeable throughout the paper.

If total duration of bandwidth assignment procedure exceeds the frame length, link durations are fairly scaled down to be fit in the frame length. Scaling down the link durations means that some of the traffic needs to be queued for transmission in the next frames.

A routing algorithm multicasts the end-to-end bandwidth granted to each mesh node by forming a spanning tree in the network. As stated in [13], this spanning tree can be constructed after a new node joins the network. We form one spanning tree for each of the two scenarios shown in Figures 4 and 5. Each tree has some leaf nodes and some middle nodes. Leaf nodes only generate traffic flows; however, middle nodes not only relay packets generated by leaf nodes but also may transmit their own traffic streams.

In the basic IEEE 802.16d scheduling algorithm, the transmission order of each link (in this paper, node) in the frame is computed during the breadth-first traversal of the routing algorithm. The link transmission times are sequential based on their ranking obtained from the previous stage. Once a transmission ends, the next transmission is started so there is no overlapping or gap between the two consecutive transmissions. This means that the IEEE 802.16 scheduling algorithm does not benefit the spatial reuse mechanism that allows simultaneous transmissions of nonconflicting links.

Link durations are expressed in terms of minislots so that each minislot consists of some OFDM symbols. The maximum number of data minislots in a frame is limited to 256 [7]. Each OFDM symbol carries a number of bits (𝑏), which is dependent to the modulation. Therefore, the number of bits transmitted in an OFDM symbol belongs to the {96,192,288,384,576,768,864}, where 96 is the number of bits carried in a symbol with the BPSK-1/2 modulation and 864 is the number of bits carried in a symbol with 64QAM-3/4 [7]. The total bandwidth occupied by the carriers is considered to be fixed at 20 MHz, so the duration of OFDM symbol will be 𝑇𝑠=12.5𝜇𝑠. Assuming that each minislot consists of 𝑜 OFDM symbols and each transmission has an overhead of 𝜈 OFDM symbols, then, for the requested bandwidth of 𝑟𝑗 by node 𝑗, in terms of bits per second, the number of requested minislots is given by

𝑑𝑗=𝑟𝑗𝑇𝑓/𝑏𝑗+𝜈𝑜.(4.1)

Since 𝑑𝑗 may be scaled down due to inadequate space in the frame, the number of granted minislots will be

𝑑𝑗=𝑟𝑗𝑇𝑓/𝑏𝑗+𝜈𝑜×(1𝜙),(4.2)

where 0𝜙<1 is the scaling factor. As spatial reuse may be used in the scheduling algorithm, 𝑗𝑑𝑗 is greater or equal to 256; however, in this paper spatial reuse is neglected for simplicity; so, 𝑗𝑑𝑗=256. Moreover, we exclude the overhead 𝜈 from analysis (𝜈=0). We assume that 𝜙=0; so 𝑑𝑗=𝑑𝑗.

Granted link durations are fixed unless the bandwidth request of one or more nodes changes. Under such circumstances, the requested bandwidth propagates through the network and the BS recalculates the bandwidth granted to all the nodes again. This condition imposes some extra overheads to the system, which should be avoided [9]. We assume that the link durations or node service rates have been fixed for a long time.

5. Analysis

5.1. Mean Hop Count

Let be a random variable denoting node hop counts to the BS. Probability distribution of node hop counts to the BS can be obtained by means of its probability generation function (PGF):

𝐺(𝑧)=𝑖𝑝𝑖𝑧𝑖,(5.1)

where 𝑖=𝑖 is the 𝑖th hop count and 𝑝𝑖 denotes the probability of number of nodes in the 𝑖th hop count. The mean hop count to the BS is defined as𝐻=𝐺|𝑧=1.(5.2) The expected number of hops to the BS in the BSCe scenario (𝐻BSCe) is computed as follows:

𝐻BSCe=4𝑌21𝑌/2𝑖=1𝑖2+𝑖=𝑌1,𝑗=1𝑖=𝑌/2,𝑗=𝑌/2=4𝑖×𝑗𝑌2𝑌13𝑌+𝑌243𝑌.12(5.3)

With some simple algebra, 𝐻BSCe can be simplified as𝐻BSCe=𝑌2.(5.4) By using (5.2) to calculate the expected number of hops to the BS in the BSCo scenario (𝐻BSCo), we have

𝐻BSCo=1𝑌21𝑖=𝑌1,𝑗=𝑌𝑖=1,𝑗=2𝑖×𝑗+𝑖=2(𝑌1),𝑗=1𝑖=𝑌,𝑗=𝑌1=1𝑖×𝑗𝑌2𝑌13𝑌3+2𝑌33𝑌2+𝑌3.(5.5)

Again, 𝐻BSCo can be simplified as𝐻BSCo=𝑌2.𝑌+1(5.6)

Observation 1. The ratio of the expected number of hops to the BS in the BSCo scenario to the expected number of hops to the BS in the BSCe scenario, for large number of nodes in the system, is 2.

Proof. From (5.4) and (5.6), it is clearly observed that lim𝑌𝐻BSCo𝐻BSCe=lim𝑌2𝑌𝑌+1=2.(5.7)

5.2. Mean Service Rate

We assume that the service rate of each node follows a constant distribution with parameter 𝑆. This assumption is equivalent to what is stated in the IEEE 802.16d central mesh mode described in previous sections.

The service process of the outgoing link of a node can be found by adding up its own service rate and the incoming service rates of that node:

𝑆𝑗𝑖=𝑆+𝑘𝑆𝑘𝑖+1,𝑘INLNK(𝑗),(5.8)

where 𝑆𝑗𝑖 indicates the service rate of the 𝑗th link located at the 𝑖th hop count. INLNK indicates the set of all incoming links to node 𝑗.

The mean service rate of links is obtained by the following relation:

𝑆=𝑖𝑗𝑆𝑗𝑖.𝑁1(5.9)

This parameter, for the BSCe and the BSCo topologies, is obtained by the following relations, respectively:𝑆BSCe(𝑌)=4𝑆𝑌𝑌/2𝑖=1𝑖𝑌2=𝑌12𝑆,𝑆BSCo(𝑌)=𝑆𝑌+𝑆𝑌2𝑖=1(𝑌𝑖1)(2𝑖+1)+(1/6)𝑆(𝑌(𝑌1)(4𝑌+1)6)𝑌2=𝑌12𝑆.𝑌+1(5.10)

Observation 2. It can be seen from (5.4), (5.6), and (5.10) that: 𝑆=𝐻𝑆.(5.11)

5.3. Mean Arrival Rate

The arrival rate of each node is assumed to follow a Poisson distribution with parameter 𝜆. With the spanning trees of Figures 4 and 5, a queuing network is constructed. The arrival rate of the last hop link (farthest link related to the BS) is 𝜆. Since each link carries not only its own traffic flows but also its subtree traffic flows, the links closer to the BS get more arrival and service rates. Based on the Burke theorem, this arrival rate passes through the next link (because of stability conditions), and, next link, with respect to its own node, has a Poisson arrival rate of 2𝜆. The following relation is obtained for a general topology:

𝜆𝑗𝑖=𝜆+𝑘𝜆𝑘𝑖+1,𝑘INLNK(𝑗),(5.12)

where 𝜆𝑗𝑖 indicates the arrival rate of the 𝑗th link located at the 𝑖th hop count. The mean arrival rate of the links is obtained by the following relation:

𝜆=𝑖𝑗𝜆𝑗𝑖.𝑁1(5.13)

The mean arrival rate for the BSCe and the BSCo topologies is obtained as follows, respectively:𝜆BSCe𝑌(𝑌)=2𝜆,𝜆BSCo𝑌(𝑌)=2𝑌+1𝜆.(5.14)

Observation 3. It can be seen from (5.4), (5.6), and (5.14) that 𝜆=𝐻𝜆.(5.15)

5.4. Queuing Model

From the previous sections, it is concluded that the queuing model for the system follows an M/D/1 model for each link. The arrival process follows the Poisson model with parameter 𝜆𝑖 and the service model is assumed to be constant and equal to 𝑆𝑖 for the link 𝑖, respectively. The queuing metrics for this model are summarized as follows [14]:𝑤𝑞𝑖=12𝑆𝑖𝜌𝑖1𝜌𝑖,𝑤𝑖=12𝑆𝑖2𝜌𝑖1𝜌𝑖,𝐿𝑞𝑖=𝜌2𝑖21𝜌𝑖,(5.16) where 𝑤𝑞𝑖 is the queuing delay of the link 𝑖, 𝑤𝑖 is the sojourn time of the link 𝑖, and 𝐿𝑞𝑖 represents the queue length of the link 𝑖 with 𝜌𝑖=𝜆𝑖/𝑆𝑖<1.

6. Virtual Node Concept

In this section, we take advantages of a virtual node (VN) to describe the overall properties of the mesh network, including

(i) the average hop counts to the BS,

(ii) their arrival and service rates.

This VN could be a candidate node replacing all the nodes other than the BS and is located at 𝐻 hop count from the BS (Figure 6). The arrival and service rates of its connected link are 𝜆 and 𝑆, respectively, both defined by Observation 2 and Observation 3. The stability condition for this model is

𝜌=𝜆𝑆<1.(6.1)

The aggregate service rate of all links should be smaller than the maximum service rate of a frame of length 256 minislots. The service rate of a frame can be obtained by

FRMSR=256×𝑜×𝑏𝑇𝑓.(6.2)

Since there are 𝑌21 links in a frame, it can be concluded that

𝑆𝑌21FRMSR.(6.3)

With some algebra, the following relations can be derived to obtain 𝑆 for the BSCe and the BSCo topologies, respectively:

𝑆BSCe2×256×𝑜×𝑏𝑌𝑌2𝑇1𝑓,𝑆BSCo256×𝑜×𝑏𝑌2(𝑌1)𝑇𝑓.(6.4)

Assuming the total bandwidth usage of the frame, the less than or equal sign is turned to equal sign. So𝑆BSCe=2×256×𝑜×𝑏𝑌𝑌2𝑇1𝑓,(6.5)𝑆BSCo=256×𝑜×𝑏𝑌2(𝑌1)𝑇𝑓.(6.6)

Since, for the stability conditions, 𝜆 should be less than 𝑆, we have𝜆BSCe<2×256×𝑜×𝑏𝑌𝑌2𝑇1𝑓,(6.7)𝜆BSCo<256×𝑜×𝑏𝑌2(𝑌1)𝑇𝑓.(6.8) Each node should be granted at least one minislot per frame; hence:𝑆×𝑇𝑓𝑏×𝑜1.(6.9) From (6.6), (6.7), and (6.9) it can be concluded that1<𝑌BSCe<9,1<𝑌BSCo<7.(6.10)

The average end-to-end waiting time, delivering traffic streams of all the nodes to the BS, is obtained by

𝑤𝑒2𝑒=𝐻𝑤,(6.11)

which is turned to𝑤𝑒2𝑒=12𝑠2𝜌1𝜌.(6.12) Calculating 𝑤𝑒2𝑒, based on the VN data units, turns (6.12) to𝑤𝑒2𝑒=12𝑠2𝜌1𝜌𝑜×𝑏×256𝐻𝑌2.1(6.13) In which 𝑆 is obtained by (6.5), or (6.6) and 𝐻 is calculated by (5.4) or (5.6), respectively. It is worth noting that in this case 𝜌=𝜌.

6.1. Examples

In this section, two simple examples are used to validate and illustrate the above mentioned VN model.

6.1.1. Simple Linear Topology

Figure 7 shows the linear topology used for our experience. Each node is fed with the Poisson arrival rate with parameter 𝜆. The arrival and service rates of each link are illustrated on that link. Each link is assumed to have an infinite buffer size.

Mean end-to-end delay in this topology is calculated as follows:𝑤𝑒2𝑒=𝑤1+𝑤2+𝑤1+𝑤3+𝑤2+𝑤13=𝑤1+23𝑤2+13𝑤3.(6.14)

The subscript 𝑖 in 𝑤𝑖 indicates the 𝑖th SS. Since 𝜌=𝜆/𝜇,𝑤3=12𝑆2𝜌1𝜌,𝑤2=14𝑆2𝜌1𝜌,𝑤1=16𝑆2𝜌.1𝜌(6.15)

The actual mean end-to-end delay in this topology is obtained by𝑤Ac𝑒2𝑒=12𝑆2𝜌.1𝜌(6.16)

From the VN solution described in this section, we have𝐻=2,𝜆=2𝜆,𝑆=2𝑆.(6.17)

Then, 𝑤𝑒2𝑒 in the VN model is calculated as𝑤VN𝑒2𝑒=12𝑆2𝜌,1𝜌(6.18)

which is equal to 𝑤Ac𝑒2𝑒.

6.1.2. Simple Tree Topology

In simple tree topology of Figure 8, the waiting times in the system are obtained by the following relations:𝑤1=16𝑆2𝜌1𝜌,𝑤2=𝑤3=12𝑆2𝜌,1𝜌(6.19)

which results in𝑤Ac𝑒2𝑒=𝑤1+𝑤2+𝑤33=12𝑆2𝜌.1𝜌(6.20)

From the VN model, we have5𝐻=3,5𝜆=3𝜆,5𝑆=3𝑆.(6.21)Then, 𝑤𝑒2𝑒 in the VN model is calculated as𝑤VN𝑒2𝑒=531×2×(5/3)𝑆2𝜌,1𝜌(6.22)

which is equal to 𝑤Ac𝑒2𝑒.

6.2. Impact of Scheduling Algorithm (Scheduling Delay)

Observation 4. The maximum number of required frames, in which the BS can process all the nodes, is the height of the spanning tree.

Proof. In a spanning tree the node with maximum number of hops to the root (one of the leaf nodes as an example) has the worst condition to reach the root. This situation gets worse if the transmission order of links is conversely from root to that leaf. In the worst condition, the scheduling algorithm does not exploit the spatial reuse mechanism. So each link of the path to the root, on which the leaf node is scheduled, should be scheduled in a separate frame.

The analytical model described in the previous section is based on the fact that the transmission order of the links is recursively from leaf nodes to the BS. For example in Figure 8, links 2 and 3 start the transmission; then, transmission of link 1 will be commenced.

Each link should be scheduled in a frame such that all the links take some amount of bandwidth in each frame. The transmission order of each link in the frame has a direct influence on delay consideration. For example, suppose that the transmission order of links in the linear topology of Figure 7 follows 𝑒3𝑒2𝑒1. Since each link should be scheduled in each frame, all the links deliver their traffic in one frame (Scheduling Algorithm 1 (SA1)). This situation is the best in terms of the total delay for delivering the traffic streams to the BS and has been analyzed in the previous sections. On the other hand, suppose the transmission order follows 𝑒1𝑒2𝑒3 (Scheduling Algorithm 2 (SA2)) meaning that 𝑒1 delivers its data to the BS in the first frame, 𝑒2 delivers its data in the second frame, and 𝑒3 delivers its data in the third frame. Therefore, the average delay in terms of the number of frames is 2. This situation, on the other hand, is the worst in delivering traffic streams to the BS. All the other situations lie between these two scenarios.

We estimate scheduling delay in terms of the frame length 𝑇𝑓 in the VN solution. As stated in the previous sections, 𝐻 can be obtained by (5.4) or (5.6). This number of hops (in this case, links) can be scheduled in maximum 𝐻 frames, based on Observation 4. In the best case (by using SA1) all of them can be scheduled in one frame; on the other hand, in the worst case (by using SA2) all of them can be scheduled in 𝐻 frame. It is worthy to note that we defined this metric comparing various scenarios; however, the accurate analysis of delay in this case is out of the scope of this paper and in left for another work in this area.

PGF of , a random variable denoting the number of required frames to deliver all the packets of nodes to the BS, is defined as

𝐺(𝑧)=𝑓𝑖𝑝𝑓𝑖𝑧𝑓𝑖,(6.23)

where 𝑓𝑖=𝑖>1 denotes the number of required frames and 𝑝𝑓𝑖 is the probability of 𝑓𝑖 frames required to deliver all the packets to the BS. So, the mean number of required frames is defined as𝐹=𝐺|𝑧=1.(6.24)

Equation (6.13), with respect to (6.5) and (6.6) and with some simple algebra, can be rewritten as follows:𝑤SA1𝑒2𝑒=𝑇𝑓22𝜌SA11𝜌SA1.(6.25)

Separating queuing and service delay results in𝑤SA1𝑒2𝑒=𝑇𝑓2𝜌SA11𝜌SA1+𝑇𝑓.(6.26)

The first term in the right-hand side of (6.26) is queuing delay and the second term is serving delay of each unit of data in the VN solution. This equation implies that end-to-end delay in both topologies of Figures 4 and 5 is equal; since their arrival and service rates are different based on (6.5) and (6.6); however, this is only true in the case of SA1 deployment. Providing such a relation in the case of SA2 deployment is out of the scope of this paper; however, it is possible to estimate this metric as well.

The serving delay in (6.26) can be expressed as scheduling delay. With respect to the VN solution and Observation 4, it can be concluded that, in the case of SA2, the scheduling delay is turned to 𝐻𝑇𝑓. So𝑤SA2𝑒2𝑒=𝐻𝑇𝑓2𝜌SA21𝜌SA2+𝐻𝑇𝑓.(6.27)

Finding 𝜌SA2 is out of the scope of this paper; however, we can put a maximum bound on 𝜆SA2 for the stability condition as well.

Since 𝜌SA2 must be less than 1 and the serving delay is equal to 𝐻𝑇𝑓, we have

𝜆SA2<𝑜×𝑏×256𝐻2𝑇𝑓𝑌2.1(6.28)

7. Performance Evaluation

The system described in the previous sections has two essential delay constraints: queuing delay (𝐷𝑄) and scheduling delay (𝐷𝑆). The mean end-to-end delay of the system is given by

𝐷𝑒2𝑒=𝐷𝑠𝑒2𝑒+𝐷𝑄𝑒2𝑒.(7.1)

To evaluate the performance of the system, the two scheduling algorithms, SA1 and SA2, which are the best and the worst cases, respectively, have been deployed to the analysis. 𝑝𝑓𝑖 is computed in these two cases by the following relations:𝑝𝑓𝑖(SA1)=𝑝1𝑖=1,0𝑖1,𝑓𝑖(SA2)=1𝑖=𝐻,0𝑖𝐻.(7.2)

7.1. Delay Analysis

Deploying SA1 and SA2 scheduling algorithms results in the following relations obtaining the end-to-end delay:𝐷𝑒2𝑒(SA1)=𝑇𝑓+𝑇𝑓2𝜌SA11𝜌SA1,𝐷𝑒2𝑒(SA2)=𝐻𝑇𝑓+𝐻𝑇𝑓2𝜌SA21𝜌SA2.(7.3)

Observation 5. Assuming the same work load in the cases SA1 and SA2, it can be concluded that 𝐷𝑒2𝑒(SA2)=𝐻𝐷𝑒2𝑒(SA1).(7.4)

We set the parameters 𝑜, 𝑏, and 𝑇𝑓 to 3, {96,864}, and 10 ms, respectively. At first, we compare queuing and scheduling delay constraints. Figure 9 shows this comparison for the case of SA1. It can be seen that for 𝜌 less than 2/3 the scheduling delay is dominant. When the amount of work load passes 2/3, the queuing delay will be the main factor and for work loads close to 1 the scheduling delay can be neglected.

Figure 10 compares the scheduling and queuing delay constraints for the case SA2 while the BSCe topology is exploited. In this case the queuing delay is dominant for 𝜌𝑠 greater than 2/3, too.

Figures 11 and 12 illustrate the end-to-end delay for the case SA2 with possible 𝑌𝑠.

Next, we compare end-to-end delay of the two topologies, the BSCe and the BSCo, in the cases of SA1 and SA2. Figure 13 compares end-to-end delay for the four scenarios.

The main results derived from Figure 13 are summarized as follows.(i)In the case of SA2, delay of the BSCe topology for 𝜌=0.9 is greater than that of the BSCo topology for 𝜌=0.8.(ii)In the case of SA2, delay of the BSCe topology for 𝜌=0.95 is greater than that of the BSCo topology for 𝜌=0.9.(iii)In the case of SA2, delay of the BSCo topology and that of the BSCe topology for 𝜌=0.95, and 𝜌=0.95, respectively, are such that they are not suitable for real-time applications (maximum delay bound for real-time applications is about 150 ms).(iv)The BSCe topology with SA2 deployment and 𝜌=0.9 is suitable for real-time applications; however, the BSCo topology with SA2 deployment and 𝜌=0.9 is suitable for real-time applications for the network lengths of less than 4.(v)Delay bound for the two topologies and 𝜌=0.95 is greater than that for the BSCe topology with SA2 scheduling algorithm and 𝜌=0.8.

7.2. Throughput Evaluation

Since each individual node is granted 256/((𝑌21)𝐻) minislots, the throughput of the system is calculated according to the following relation, in the case of SA1, by means of the VN concept: 𝜃SA1=256×𝑜×𝑏×𝜌SA1𝐻𝑇𝑓.(7.5) In the case of SA2 deployment, the system throughput is computed as follows:

𝜃SA2=𝑆SA2𝜌SA2𝑌2.1(7.6)

As previously stated, 𝑆SA2 is equal to 𝑆SA1/𝐻; so:𝜃SA2=256×𝑜×𝑏×𝜌SA2𝐻2𝑇𝑓.(7.7)

Observation 6. Assuming the same work load in the two cases SA1 and SA2, it can be concluded that 𝜃SA1=𝐻𝜃SA2.(7.8)

Figure 14 illustrates the throughput comparison of the four scenarios regarding three values of 𝜌𝑠 for each scenario. The main results derived from the figure are summarized as follows. (i)As it can be indicated from Figure 13, the delay bounds for the two topologies in the case of SA1 are equivalent; however, the throughput of the BSCo topology is less than that of the BSCe topology in the case of SA2. This degradation is because of lower data rates of the BSCo topology.(ii)The throughput of the SA2 scheduling algorithm is greater than the throughput of the SA1 scheduling algorithm for small network lengths; however, this measure is lower as the length of the network grows. Since the network length for the BSCe topology could not be set to 2, this situation occurs.

As the throughput is dependent on the modulation used, Figure 15 shows this dependency for 𝑏={96,864} for the BSCe topology in the case of SA1. It can be indicated from the figure that the maximum throughput reaches 39.8131 when 𝑏=864 and 𝑌=3; this measure is 1.8959 when 𝑏=96 and 𝑌=7.

8. Simulation Results

We have developed a simulation scenario in the NS-2 simulation environment. It is assumed that all links exploit the BPSK-1/2 modulation (𝑏=96) and each minislot contains 3 OFDM symbols. So, minislot size has been fixed at 96×3 bits. The buffer size of each node has been set so large such that no packet loss is occurred. Transmission and interference ranges of each node are equal with respect to the modulation used.

For each network length we ran the simulation about 50 times and set the average as the simulation result. We took two scenarios for the simulation. The work load of the system in these two scenarios has been set to 0.9. In the first scenario, the BSCe topology along with SA1 scheduling algorithm with 𝑏=96 has been considered. In the second scenario, the BSCo topology along with SA2 scheduling algorithm with 𝑏=96 has been considered. In both cases, the analytical model has been illustrated along with the simulation result to verify the analytical model.

Figure 16 illustrates end-to-end delay calculated through simulations for various lengths of the network. As it can be indicated from the figure, the simulation and analytical results follow the same curve in the two cases; however, for the case of simulation because of some extra overheads, the end-to-end delay is more than that of analytical results. As network length grows up, the overhead gets bigger and the simulation results get a little far from the analytical approach. As a result, it can be seen that the analytical model can predict the system delay as well.

Figure 17 shows the throughput calculated through simulations for various lengths of the network. As it can be seen in this figure, the throughput degradation is completely evident in the case of simulation results. A simple indication is that, as each minislot carries some overhead, the aggregated minislots flown in the network are smaller than those of the analytical model. Again, the analytical results follow the same curves as simulation results and it can be concluded that the analytical approach predicts the throughput of the system as well.

9. Conclusions

The main contribution of this paper was devoted to introducing a model for estimating the performance measures of WiMAX-like WMNs. Exploiting the benefits of the virtual node solution and introducing two types of scheduling algorithms, delay and throughput metrics of the two topologies were obtained. The analytical study shows that the throughput of the system is highly dependent on the position of the BS and the length of the network. Although the analytical approach was restricted by some simplifying assumptions, its verification with simulation results confirms that this approach estimates the system parameters well.