Enabling Technologies for 5G Mobile SystemsView this Special Issue
Research Article | Open Access
Jing Gao, Changchuan Yin, Xi Han, "End-to-End Delay Analysis in Cognitive Radio Ad Hoc Networks with Different Traffic Models", Mobile Information Systems, vol. 2015, Article ID 157659, 9 pages, 2015. https://doi.org/10.1155/2015/157659
End-to-End Delay Analysis in Cognitive Radio Ad Hoc Networks with Different Traffic Models
Delay and throughput are important metrics for network performance. We analyze the end-to-end delay of cognitive radio ad hoc networks for two traffic models: backlogged and geometric, respectively. By modelling the primary users as a Poisson point process and the secondary network deploying multihop transmissions, we derive the closed-form expression for the end-to-end delay in secondary networks. Furthermore, we optimize the end-to-end delay in terms of the hop number and the secondary transmission probability, respectively. The range of the optimal hop number and the equation satisfied by the optimal transmission probability are obtained for backlogged source models. The equation met by the optimal hop number is presented for geometric source models.
With the rapid development of real-time transmissions in wireless communication networks, delay analysis has gained more and more attention in the literature. Compared with single-hop transmission, the analysis of multihop delay is more challenging. Since many factors can impact the end-to-end delay in multihop networks, such as routing algorithm, network topology, traffic model, and data scheduling, and since it is unrealistic to analyze the end-to-end delay by taking all factors into consideration, we simplify the network topology as a “line network” by neglecting the routing algorithm to complete the analysis of end-to-end delay.
A “line network” consists of a source, many relays, and a destination with all relays being distributed along line from a source to its destination. So far, much research has been conducted on the performance of “line network.” In [1, 2], end-to-end propagation speed is determined without the delay constraints with a channel model combined path-loss, fading with noise. Accordingly, the tradeoff between single-hop transmission and multihop transmission subject to an end-to-end delay constraint is studied in . In , end-to-end packet delivery probability is derived based on the distances between neighboring nodes in a Poisson point process (PPP). In , “line network” is decomposed into many independent queues, and the end-to-end delay is determined by considering the combination of TDMA and ALOHA access protocol. All these works do not take the traffic style of the source node into consideration. With the increasing requirement for various types of traffic [6, 7] (such as document, video, and audio), it becomes important to characterize the network performance considering different types of traffic. In , the correlations between traffic statistics and channel qualities are investigated accompanied with their impact on the performance of multihop networks. In , the end-to-end delay is studied in Poisson network considering two traffic models: backlogged and geometric.
However, prior studies only focused on homogeneous networks without considering heterogeneous network model. A practical network usually consists of interdependent, interactive, and hierarchical network components which leads to a heterogeneous network structure. Different from , the purpose of this paper is to conduct a systematic study of the end-to-end delay in cognitive radio (CR) ad hoc networks which is one of heterogeneous network models. In this paper, we evaluate the end-to-end delay of CR ad hoc networks in which the secondary nodes are assumed to be placed to form a line network. We derive the closed-form expression for the end-to-end delay for backlogged and geometric arrival model of source traffic, respectively. Primary and secondary networks are supposed to be two PPPs which are independent of each other. Similar to that, in , waiting delay is considered by importing the node buffer accompanied with propagation delay. And the waiting delay of each node is modeled as a M/M/1 model with infinite buffer.
The paper is organized as follows. Section 2 defines the system model and symbol notations. Section 3 analyzes the end-to-end delay of CR ad hoc network. Section 4 derives the end-to-end delay of secondary network for two traffic models. Section 5 presents the numerical results and some discussions. Finally, conclusions are drawn in Section 6.
2. System Model
We consider a scenario where primary users and secondary users coexist in the same two-dimensional plane. Secondary users employ underlay spectrum sharing method to access the licensed channel, that is, transmit their packets while keeping the quality of service (QoS) of primary network. In the following, we will define the primary and secondary network models, respectively.
2.1. Primary Network Model
Assume that the locations of primary transmitters follow a PPP with density . Each primary receiver associates with one designated primary transmitter with distant away. According to the displacement theorem , the locations of the primary receivers formulate another PPP with density . All transmitters are assumed to send their packets with the same power . Signals undergo path-loss and small scale Rayleigh fading so that the power caught by a receiver is , where is the small scale fading coefficient having exponential distribution with mean of 1 and is the path-loss factor.
2.2. Secondary Network Model
Secondary network is composed of many multihop paths, each of which comprises a source user, relay users, and a destination user. The distance from a source user to its destination is . Figure 1 is the topology of a two-hop network. Supposing that all source users are distributed as a PPP with density , then all relay users formulate a PPP with density . All relay users are equidistantly distributed on the line from source user to the destination user; one hop distance is . Index as the source, the relay, and destination users. The power of all transmitters is assumed to be the same and is represented by . Time is divided into slots and all users are synchronized to one clock. We assume no space reuse on one path; that is, users along one path are not allowed to send packets in the same time slot. Therefore, the locations of secondary transmitters in each slot follow a PPP with density . Each user has an infinite buffer in which data is queued by FIFO (first-in-first-out) mode.
2.2.2. Traffic Model
In data networks, there are many types of traffic, such as video, audio, and files. Different traffic model has different impacts on the network performance. Similar to that in , we consider the end-to-end delay for two traffic models in this paper: backlogged and geometric:(i)Backlogged sources: source users always have data packets to send.(ii)Geometric sources: data packets arrive at the source user with probability each time slots.
2.2.3. MAC Protocol
A combination of TDMA and ALOHA protocol is adopted. Since time is divided into slots, source, relay, and destination users send their packets in turn at the beginning of each slot. The source and relay users will send their packets when they are permitted to transmit, with probabilities and , respectively. Packets are successfully received at the time slot if signal-to-interference ratio (SIR) caught by their receivers is greater than the threshold . Otherwise, the source and relay users will receive a negative feedback and the packets are still put first in the queue for retransmission.
Take a two-hop transmission with backlogged sources; for example, set when the source user of a path begins to send packets with probability . If the SIR at the relay user is greater than , an ACK will be sent to the source, which indicates that the packets are successfully received by the relay, and the packets will be discarded from the queue of the source. Otherwise, the packets are still at the head of the queue in the source. At the beginning of the next time slot, the relay users will transmit their packets with probability . Similarly, the destination will send an ACK to the relay if it successfully received the packets. And the relay discards the current packets from its queue according to the ACK. At the beginning of the next time slot, the sources transmit their packets in the queue again and so on. In this paper, we ignore the ambient thermal noise and consider the interference coming from both the secondary transmitters and the primary transmitters, which is different from .
2.3. SIR Based Successful Transmission
We consider the wireless channel which undergoes both large scale path-loss and small scale Rayleigh fading. Power gain of the channel in both networks is given bywhere is the link distance.(i)We consider a typical primary receiver on the origin; its transmitter can successfully send the packets to it if and only if where is the sum of interference coming from other concurrent transmitters.(ii)Considering a certain secondary user along an arbitrary path accessing the channel at time , its next hop user could successfully receive the packets from user if and only if where is the sum of interference of other transmitters at time .
3. Successful Transmission Probability
Successful transmission probability is the probability that a receiver could receive the packets successfully from its transmitter in a time slot.
3.1. Successful Transmission Probability of Standalone Primary Network
When the secondary network is absent, based on the SIR transmission criterion, the successful transmission probability of a typical primary transmitter is given bywhere is the sum of interference power of other primary transmitters. is the outage constraint of the primary network.
3.2. Successful Transmission Probability of the Secondary Network with Backlogged Sources
When the secondary network is presented, the successful transmission probability of both primary and secondary networks is closely related to the density of the secondary transmitters due to the interference they introduced. Supposing secondary user accesses the channel at , for backlogged traffic sources, the distribution of secondary transmitters in each time slot is characterized in Lemma 1 as follows.
Lemma 1. For backlogged sources and , secondary transmitters follow a PPP with density within any time slot .
Proof. Considering that secondary transmitters send their packets independently and have the same successful transmission probability , the queue of a relay user can reach a steady state if and only if ; that is, . Under the steady state circumstance, we discuss the distribution of secondary transmitters in the following two cases:(i)Time slots begin at or : in these time slots, secondary source users transmit their packets with probability . Since source users are conformed to a PPP with density in each time slot, therefore, the distribution of secondary transmitters is a PPP with density .(ii)Time slots begin at any other . In these slots, relay users are allowed to send their packets. Unlike source users, relay users will transmit with a certain probability which is the product of the probability of nonempty queue and the probability of accessing channel. According to M/M/1 queue model, the probability that the queue of a relay buffer is nonempty is . Therefore, the probability of relay users sending their packets is . Since there is no intraroute interference along each multihop route and the relay users send their packets in turn, as such secondary transmitters in these time slots follow a PPP with density .
In conclusion, whenever the source users or the relay users are permitted to send packets, the distribution of the secondary transmitters follows a PPP with density .
This completes the proof.
According to Lemma 1, the successful transmission probability of the primary network iswhere is the Laplace transformation of the probability density function (PDF) and Substituting into (8) and putting these results into (7), we have
Since the outage constraint of primary network is , must satisfy . Putting into the inequality, we solve the density range of secondary users for backlogged sources as
All in the following analysis must meet the limit in (10). Supposing that each user in a multihop path sends packets with probability independently, we derive the successful transmission probability for one single hop in the following lemma.
Lemma 2. Considering the given MAC protocol, the successful transmission probability for one single hop is given bywherewith ,
Proof. The successful transmission probability for one single hop along a multihop path for secondary network iswhere is a predetermined threshold. Since there is no intrainterference but there is interinterference in secondary network, we haveThis completes the proof.
3.3. Successful Transmission Probability of the Secondary Network for Geometric Sources
Lemma 3. Supposing the packets arrive at the source users every slots with probability , if , then the successful transmission probability of secondary network isand the probability of a secondary user to be a transmitter iswhere , and is Lambert function (Lambert function is the unique solution of the function ).
Proof. A queue can reach steady state if and only if . In this mode, the probability of a packet arriving at a relay user is . Thus, a secondary user could be transmissions at a probabilityAnd the successful probability of a single-hop transmission isCombined with the result in (15), we haveRewrite (20) as orSubstituting (22) into (20) and (18), respectively, we derive the results in (16) and (17).
In addition, has unique solution when . Combined with the condition of a queue reaching a steady state, we solve the following inequality and obtain the range of as given in Lemma 3:The proof is completed.
The density of the secondary users is further limited by the following lemma.
Lemma 4. Supposing that the packets arrive at the source users every slots with probability , the density of the secondary source users is bounded bywhere .
Proof. Being overlaid with secondary network for geometric sources, the successful transmission probability of the primary network is Let , ; substitute in (17) into (25); we haveTake logarithm at both sides of the inequality above; we haveSince , we have .
This completes the proof.
4. Delay Analysis of CR Ad Hoc Networks
In this section, we assume the types of data transmission for each hop along the multihop route are independent of each other and study the end-to-end delay of CR ad hoc networks in a way similar to that in .
4.1. The End-to-End Delay of Secondary Network for Backlogged Sources
Theorem 5. In the case of backlogged sources, the end-to-end delay of an -hop path in the secondary network is given by
Proof. The end-to-end delay is the sum of delays at source user and relays on a path. According to the TDMA and ALOHA combined MAC protocol, the propagation time from the source user to its relay is easyly obtained as follows:For relay users, the waiting time is also needed to be calculated. Since all users are assumed to transmit their packets independently, we only need to calculate the waiting time for one single relay and then produce it with to obtain the total waiting time along the multihop route.
Referring to the propagation time for source user, we have the propagation time for a relay asTake the first relay user, for example; the nonempty probability of its queue is . The probability of the relay user to be in state isBased on Little’s theorem , the queue length for steady state isSince the average length of a queue equalling the data arrival rate produces the mean waiting time , the mean waiting time in a queue isAnd the end-to-end delay isSubstituting , , and into (34), we obtain the result in (28).
This completes the proof.
4.2. The End-to-End Delay of Secondary Network for Geometric Sources
For a S-D multihop path, the probability of a packet arriving at each user (including source user and relay user) is . The probability of successful transmission is . For simple calculation, we derive the upper bound of the end-to-end delay, which starts being calculated from the data packets arriving at the tail of the queue of a source user. And the end-to-end delay is the sum of propagating time and waiting time of users:According to Theorem 5, the propagating and the waiting time for each user could be obtained as follows:respectively. Therefore, the upper bound of the end-to-end delay isSumming the delay of the source user, we have the end-to-end delay as
4.3. Optimization of the End-to-End Delay
In the following, we will optimize the end-to-end delay for backlogged and geometric sources in terms of and .
Theorem 6. For backlogged source traffic model, the end-to-end delay has an upper bound , and
Proof. For and , it is obvious that . While , is the tight upper bound of the end-to-end delay , which completes the proof.
Compared with concludes the waiting time in the queue of the source user which has nothing to do with the hop number . Therefore, it is reasonable for us to optimize instead of in terms of hop number .
Proposition 7. For backlogged sources, the optimal hop number to minimize the upper bound of the end-to-end delay isThe optimal transmission probability meets the equation in the following:
Proof. Take the derivative of with respect to ; we obtainwhere . Since is the prerequisite for a queue entering steady state; that is, , Therefore, the sign of (43) is determined by , andIn the following, we discuss the sign of in two cases:(1)While , if , then , and ; if , then , and ; if , , then . The optimal hop number is(2)While , let , , and we obtain Since , .
Let , we derive the optimal transmission probability for the source user as shown in the proposition.
The proof is completed.
Proposition 8. If the packets arrive at the source user in a probability each N time slot, we optimize instead of in the following:And the optimal hop number to minimize the end-to-end delay should meet the expression as follows:where , , , , and .
The proof is similar to that of Proposition 7 and therefore is omitted.
5. Numerical Results and Discussion
In this section, we present some numerical results based on the above theoretical analysis. Unless otherwise specified, the network parameters are set as follows: , , , , , , , and . Putting these parameters into (5), (9), and (24) and letting , we obtain , , and .
In Figure 2, we illustrate in (28) versus density of primary users for backlogged source model. As shown in the figure, we see that increases linearly with . The reason is that, on the one hand, the increasing leads to more interference from the primary users and, on the other hand, this also decreases the maximum allowable density of the secondary users which decreases the intrainterference. Since the effect of increasing of interinterference is larger than that of the reducing of the intrainterference, the probability of successful transmission for the secondary network becomes smaller which increases the end-to-end delay. Therefore, the density of the primary users plays a significant role in the delay performance of the secondary network.
In Figure 3, we show the end-to-end delay versus the density of the secondary source users for geometric sources with varied . Given , , we derive . It is shown that the end-to-end delay increases monotonically with increasing in range . This explains that increased density of primary users will increase the interinterference and thus increase the end-to-end delay of the secondary network.
In Figure 4, we show the end-to-end delay for backlogged sources versus the optimal hop number when . It is shown that the optimal hop number when and when . It is worth noting that higher transmission power of source user causes more intrainterference. In this case, we can reduce the hop distance to obtain maximized successful transmission probability and then the minimized end-to-end delay. Similarly, the higher the density of the primary transmitters, the larger the optimal hop number.
In Figure 5, we draw the end-to-end delay with backlogged sources versus transmission probability of the source users. Since the necessary condition for node queue entering steady state is . It is shown that there is an optimal in the range of to minimize the end-to-end delay. When , putting the parameters into (42), we solve the optimal transmission probability of the source users as which agrees with the numerical results shown in the figure.
In Figure 6, we present the end-to-end delay for geometric sources versus hop number . It is seen that there is an optimal hop number to minimize the end-to-end delay no matter how the access probability of the relay users vary with . In addition, the larger the , the lower the delay. This is because when the access probability becomes larger, the waiting delay of each relay becomes smaller which leads to lower delay.
We studied the end-to-end delay in CR ad hoc networks for two traffic sources models: backlogged and geometric. First, we modelled the primary users as PPP and the secondary users opportunistically access the channel with a combination of TDMA with ALOHA protocol. Secondly, we derived the successful transmission probability for both the primary and the secondary networks, respectively. Thirdly, we obtained the closed-form expression for the end-to-end delay with the above two traffic models, respectively. Finally, by optimizing the end-to-end delay, we obtained the range of the optimal hop number for backlogged sources and we also present an equation with which the optimal hop number should satisfy geometric sources. The numerical results showed that due to the outage constraints of the primary network, an optimal hop number and transmission probability for source user could be derived to minimize the end-to-end delay for backlogged sources and an optimal hop number can be got to minimize the end-to-end delay for geometric sources.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This work was supported in part by the National Research Foundation for the Doctoral Program of Higher Education of China under Grant 20120005110007 and the NSFC under Grants 61271257 and 61379159.
- Ö. Oyman and S. Sandhu, “A shannon-theoretic perspective on fading multihop networks,” in Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS '06), pp. 525–530, Princeton, NJ, USA, March 2006.
- M. Sikora, J. N. Laneman, M. Haenggi, D. J. Costello Jr., and T. E. Fuja, “Bandwidth- and power-efficient routing in linear wireless networks,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2624–2633, 2006.
- D. Rajan, “Power efficient delay allocation in multihop wireless networks,” IEEE Transactions on Vehicular Technology, vol. 56, no. 4, pp. 1813–1825, 2007.
- M. Haenggi, “On routing in random rayleigh fading networks,” IEEE Transactions on Wireless Communications, vol. 4, no. 4, pp. 1553–1562, 2005.
- M. Xie and M. Haenggi, “Towards an end-to-end delay analysis of wireless multihop networks,” Ad Hoc Networks, vol. 7, no. 5, pp. 849–861, 2009.
- D. E. Wrege, E. W. Knightly, H. Zhang, and J. Liebeherr, “Deterministic delay bounds for VBR video in packet-switching networks: fundamental limits and practical trade-offs,” IEEE/ACM Transactions on Networking, vol. 4, no. 3, pp. 352–362, 1996.
- E. W. Knightly and H. Zhang, “D-BIND: an accurate traffic model for providing QoS guarantees to VBR traffic,” IEEE/ACM Transactions on Networking, vol. 5, no. 2, pp. 219–231, 1997.
- M. Xie and M. Haenggi, “A study of the correlations between channel and traffic statistics in multihop networks,” IEEE Transactions on Vehicular Technology, vol. 56, no. 6 I, pp. 3550–3562, 2007.
- K. Stamatiou and M. Haenggi, “Delay characterization of multihop transmission in a poisson field of interference,” IEEE/ACM Transactions on Networking, vol. 22, no. 6, pp. 1794–1807, 2014.
- D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry and Its Applications, John Wiley & Sons, 2nd edition, 1996.
- F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, “An aloha protocol for multi-hop mobile wireless networks,” IEEE Transactions on Information Theory, vol. 52, no. 2, pp. 421–436, 2006.
- S. M. Ross, Stochastic Processes, John Wiley & Sons, New York, NY, USA, 2nd edition, 1996.
Copyright © 2015 Jing Gao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.