Research Article  Open Access
Zhimin Wang, Qinglin Zhao, Fangxin Xu, Hongning Dai, Yujun Zhang, "Detection Performance of Packet Arrival under Downclocking for Mobile Edge Computing", Wireless Communications and Mobile Computing, vol. 2018, Article ID 9641712, 7 pages, 2018. https://doi.org/10.1155/2018/9641712
Detection Performance of Packet Arrival under Downclocking for Mobile Edge Computing
Abstract
Mobile edge computing (MEC) enables batterypowered mobile nodes to acquire information technology services at the network edge. These nodes desire to enjoy their service under power saving. The sampling rate invariant detection (SRID) is the first downclocking WiFi technique that can achieve this objective. With SRID, a node detects one packet arrival at a downclocked rate. Upon a successful detection, the node reverts to a fullclocked rate to receive the packet immediately. To ensure that a node acquires its service immediately, the detection performance (namely, the missdetection probability and the falsealarm probability) of SRID is of importance. This paper is the first one to theoretically study the crucial impact of SRID attributes (e.g., tolerance threshold, correlation threshold, and energy ratio threshold) on the packet detection performance. Extensive Monte Carlo experiments show that our theoretical model is very accurate. This study can help system developers set reasonable system parameters for WiFi downclocking.
1. Introduction
Mobile edge computing (MEC) [1] aims to provide computing resources and information technology services at the network edge. In MEC, various batterypowered mobile nodes (such as smartphone) will access these resources and services via MEC application servers such as LTE base station and wireless access point (AP). These batterypowered nodes desire to enjoy their service under power saving.
In this paper, we assume that a number of batterypowered nodes access an AP (acting as an MEC application server) via a WiFi network. These devices adopt a novel algorithm called sampling rate invariant detection (SRID) [2] for power saving. SRID is the first downclocking mechanism (adopted in WiFi). With SRID, a node detects one packet arrival at a downclocked rate. Upon a successful detection, the node reverts to a fullclocked rate to receive the packet immediately. For each detection, there are two types of typical errors: missdetection (i.e., the AP sends a packet but the node does not detect it) and falsealarm (i.e., the AP sends nothing but the node detects a packet mistakenly). To ensure that a node acquires its service immediately, the detection performance (namely, the missdetection probability and the falsealarm probability) of SRID is of importance. This paper is concerned with the detection performance. Our contributions are summarized as follows:(i)To the best of our knowledge, this paper is the first one to theoretically analyze the detection performance of WiFi downclocking. Our theoretical model characterizes the crucial impact of SRID attributes (e.g., tolerance threshold, correlation threshold, and energy ratio threshold) on the packet detection performance (i.e., the missdetection probability and the falsealarm probability).(ii)We run extensive Monte Carlo experiments to verify that our theoretical model is very accurate. We show that as the downclocked rate decreases, the falsealarm probability increases significantly, which will lead to a serious adverse impact on packet detection.
This study can help system developers set reasonable system parameters for WiFi downclocking.
So far, downclocking has received great attention [2–13]. Among the most relevant works, [2] is the first paper that brought downclocking to lowpower WiFi networks and proposed the SRID algorithm, which was considered as one of the most classical amendments on power saving of 802.11 protocols [12, 13]. In WiFi, the dominant source of energy consumption is the idle listening operation [7, 8], where a node needs to frequently detect unpredictably arriving packets or assess a clear channel with high power. Therefore, SRID reduced the power consumption by allowing a WiFi node to downclock its sample rate in idle listening mode. SASD [3] was proposed to reduce the power consumption in SRID further by allowing nondestination nodes in idle listening to enter a doze state. ASMAC [4] was proposed to avoid contention and reduce delay by asynchronously scheduling the wakeup time of neighboring nodes via a downclocking mechanism for wireless sensor networks. SloMo [5] was proposed to allow WiFi nodes to operate their radios at lower clock rates when receiving and transmitting at low bit rates. Sampleless [6] allowed energyconstrained devices to scale down their sampling rates regardless of channel conditions. The above works mainly focused on the hardware implementation of the downclocking mechanism or evaluated its performance via simulation. In contrast, this paper is the first one to model the impact of downclocking on the packet detection performance theoretically.
The rest of this paper is organized as follows. Section 2 gives an overview of SRID. Section 3 theoretically analyzes the detection performance of SRID. Section 4 presents Monte Carlo results that reveal the crucial impact of SRID attributes on the detection performance. Section 5 concludes this paper.
2. Overview of SRID
In the downclocking mechanism, one basic problem is how to detect unpredictably arriving packets at a downclocked rate, so that the node can revert to a fullclocked mode to receive the arriving packets.
The SRID that adopts the downclocking mechanism is designed for WiFi networks. With the help of Figure 1, we specify how SRID works. Assume a WiFi network consisting of one access point (AP) and a number of nodes. The AP is always in the active mode, while each node is in the downclocked mode by default. When the AP has a packet to transmit toward a node, the operations of the AP and the node are as follows.(i)The AP first transmits an additional preamble called preamble, and then a sequence of dummy bits, and finally a conventional 802.11 packet. Here, the preamble is used to notify the node of the arrival of an expected packet. The dummy bits are used to provide a guard interval that allows the node to revert to the fullclocked mode from the downclocked mode.(ii)The node continuously detects its preamble via selfcorrelation and then reverts to the fullclocked mode upon a successful detection.
In the next two subsections, we detail the construction and the detection of an preamble.
2.1. Construction of Preamble
In SRID, an preamble consists of duplicated versions of a complex gold sequence (CGS), the length of each CGS sequence being . Figure 1(a) shows an example of preamble, where . Thus the total length of preamble can be expressed aswhere represents the minimum length of the CGS (used for preamble). The integer represents the address of the node in SRID, which is assigned by the AP. is the minimum downclocking factor of radio hardware. For example, assume that the fullclocked frequency is 20 MHz. Then the minimum downclocked frequency is MHz.
2.2. Detection of Preamble
In SRID, a node continuously performs selfcorrelation to detect its preamble. Assume that a node operates with a downclocking factor of .
Let denote the sampling value of the node at the sampling point.
Let denote the selfcorrelation result of the node at the sampling point . To detect its preamble, at each sampling point , the node with address performs the selfcorrelation between the latest samples and the previous samples (offset by ). Therefore, can be calculated bywhere is the size of the selfcorrelation window (in sampling points) and is the number of sampling points of a CGS when the downclocking factor is . Note that and are shown in Figure 2.
Let denote the energy level at sampling point , which can be calculated by
We say that an preamble is successfully detected if the total number of successfully detected points, , is greater than ; namely, where is the tolerance threshold and is the total number of sampling points (from the 2nd CGS to the th CGS), as shown in Figure 2.
We say that a sampling point is detected successfully if the following two conditions are satisfied.
Condition 1. At sampling point , the correlation result normalized by is between and; namely,where is a predefined threshold.
Condition 2. At sampling point , the energy ratio (in dB) of and exceeds a threshold ; namely,where represents a moving average of energy level, with a window size equal to . The reason of introducing Condition 2 is to reduce the probability that Condition 1 is satisfied but no preambles are transmitted.
3. Detection Performance Analysis
In this section, focusing on the downlink traffic from the AP to nodes, we theoretically analyze the crucial impact of SRID attributes (namely, tolerance threshold , correlation threshold , and energy ratio threshold ) on the detection performance.
Due to the downclocked rate and the noise, each SRID detection result is associated with four mutually exclusive minievents: (a) successful detection: AP sends an preamble and the node detects it successfully, (b) missdetection: AP sends an preamble but the node does not detect it, (c) falsealarm: AP does not send an preamble but the node detects it mistakenly, and (d) Null: AP does not send an preamble and the node detects nothing. To study the detection performance, we only need to calculate the successful detection probability = Prob(successful detection) and the falsealarm probability = Prob(falsealarm), because Prob(missdetection) = 1 − Prob(successful detection) and Prob(Null) = 1 − Prob(falsealarm).
We note that each detection result is determined depending on whether the AP sends an preamble. Below, we introduce two competing hypotheses:where is referred to as the null hypothesis (i.e., AP does not send an preamble to a node) and as the alternative hypothesis (i.e., AP sends an preamble to a node). Under hypothesis , at the sampling point , the node receives the noise, and therefore its sample value is , where is the Gaussian white noise. Under hypothesis , at the sampling point , the node receives the preamble signal and the noise, and therefore its sampling value is , where represents the sampling value on the preamble and represents the channel coefficient.
3.1. Expression of
We now express . According to (4), we haveThe sampling process is a Bernoulli process, where a sampling point is marked success if Conditions 1 and 2 (specified in Section 2.2) are satisfied. Therefore, the number of successfully detected points in trials, , follows a binomial distribution. Thus is expressed by where is the probability of Condition 1 being satisfied under and is the probability of Condition 2 being satisfied under .
Expression of . According to (5), can be written as
In (10), represents the probability of deciding when is true. Let denote the normalized correlation result at sampling point under . Then can be expressed as . Thus is expressed by
Note that is complicated, because it is a function of random variables (i.e., and . In Section 3.3, we calculate via the Monte Carlo method [14].
Expression of . According to (6), can be written as
Under , and are expressed as follows.Note that , because AP transmits one preamble (which consists of sampling points only) for each packet, and thereby the node only receives the noise before the preamble. Similar to , we can calculate via the Monte Carlo method.
3.2. Expression of
We now express . Similar to , can be expressed as follows:where is the probability of Condition 1 being satisfied under and is the probability of Condition 2 being satisfied under .
3.3. Calculation of and via Monte Carlo Method
In the previous two subsections, we give expressions of and . However, they involve random variables and therefore are hard to solve. Below we adopt the Monte Carlo method [14] to calculate them. Algorithm 1 lists the computation process in terms of , which is given by (9). Similarly, we can calculate .

In Algorithm 1, we input the SRID parameters and output the value of . In the algorithm, we run Monte Carlo experiment for 100000 times. We now detail each experiment.(i)In lines to , we generate an preamble of samples points, which simulates the AP’s preamble transmission.(ii)In line , we invoke the Matlab function, , to simulate the additive white Gaussian noise (AWGN) channel and then the node’s received signal is the result that the AP’s preamble signal passes through the AWGN channel.(iii)In line , we obtain the downclocked sampling sequence under the downclocking factor of .(iv)In line , we calculate selfcorrelation result and the energy level .(v)In lines to , we calculate in this experiment.(vi)In lines to , we calculate in this experiment.
Finally, after we finish 100000 runs, we first calculate the average of , , and the average of , , and then calculate , as shown in line (14).
4. Model Verification
In this section, we present the Monte Carlo results to illustrate the crucial impact of SRID attributes and SNR on the detection performance (namely, the successful detection probability and the falsealarm probability ). The default parameter settings are set by [2] and are shown in Table 1. In Figures 3 and 4, each Monte Carlo result is on average over 100000 runs. In addition, we use “SRID()” to denote the SRID detection with the downclocking factor of . In all figures, the labels “ana” and “sim”, respectively, denote the theoretical and simulation results.

(a)
(b)
(a)
(b)
Figures 3(a) and 3(b), respectively, plot and as the SNR varies, when . From Figure 3, we have the following observations.(i)Given , increases and decreases gradually as the SNR increases.(ii)Given SNR, as decreases, decreases slightly while increases significantly. For example, for SNR = 5 dB, when decreases from to , grows from 0.0098 to 0.0301 significantly, while just drops from 0.9997 to 0.9754 slightly. This will lead to a serious adverse impact on packet detection.(iii)The detection performance is almost perfect (i.e., and ) when SNR = 10 dB, which is easy to achieve in real environments [15].
Figures 4(a) and 4(b), respectively, plot and as varies, when . From Figure 4, we have the following observations.(i)Given , as increases, always decreases, but first decreases to 0 and then remains unchanged. The reason is as follows: increasing will decrease the successful detection probability from (9) as well as the falsealarm probability from (14).(ii)Give , as decreases, decreases significantly, while decreases gradually.
Finally, from these figures, the close match between the theoretical and simulation curves manifests that our performance model is very accurate.
5. Conclusion
In mobile edge computing, various batterypowered mobile nodes desire to acquire information technology services at the network edge under power saving. WiFi downclocking is such a promising technique. In this paper, we investigate a novel WiFi downclocking technique called SRID and first theoretically study the impact of SRID attributes (namely, tolerance threshold, correlation threshold, and energy ratio threshold) on the detection performance of packet arrival. This study is helpful in designing better WiFi downclocking protocols.
Disclosure
Qinglin Zhao is the corresponding author.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work is supported by the Macao FDCTMOST Grant 001/2015/AMJ, Macao FDCT Grants 056/2017/A2 and 005/2016/A1, National Science Foundation of China (61672500), and Program of International S&T Cooperation (2016YFE0121500).
References
 https://en.wikipedia.org/wiki/Mobile_edge_computing.
 X. Zhang and K. G. Shin, “Emili: energyminimizing idle listening in wireless networks,” IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1441–1454, 2012. View at: Publisher Site  Google Scholar
 T. Xiong, J. Yao, J. Zhang, and W. Lou, “It Can Drain Out Your Energy: An EnergySaving Mechanism Against Packet Overhearing in High Traffic Wireless LANs,” IEEE Transactions on Mobile Computing, vol. 16, no. 7, pp. 1911–1925, 2017. View at: Publisher Site  Google Scholar
 B. Jang, J. B. Lim, and M. L. Sichitiu, “An asynchronous scheduled MAC protocol for wireless sensor networks,” Computer Networks, vol. 57, no. 1, pp. 85–98, 2013. View at: Publisher Site  Google Scholar
 Lu F., Voelker G. M., Snoeren A. C. SloMo: downclockingWiFi communication[C]// Usenix Conference on Networked Systems Design and Implementation. 2013:255268.
 W. Wang, Y. Chen, L. Wang, and Q. Zhang, “Sampleless WiFi: Bringing low power to WiFi communications,” IEEE/ACM Transactions on Networking, vol. 25, no. 3, pp. 1663–1672, 2017. View at: Publisher Site  Google Scholar
 Y. Agarwal, R. Chandra, A. Wolman, P. Bahl, K. Chin, and R. Gupta, “Wireless wakeups revisited: energy management for VoIP over WiFi smartphones,” in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (MobiSys '07), pp. 179–191, June 2007. View at: Publisher Site  Google Scholar
 G. Anastasi, M. Conti, E. Gregori, and A. Passarella, “802.11 powersaving mode for mobile computing in WiFi hotspots: limitations, enhancements and open issues,” Wireless Networks, vol. 14, no. 6, pp. 745–768, 2008. View at: Publisher Site  Google Scholar
 P. Serrano, A. De La Oliva, P. Patras, V. Mancuso, and A. Banchs, “Greening wireless communications: Status and future directions,” Computer Communications, vol. 35, no. 14, pp. 1651–1661, 2012. View at: Publisher Site  Google Scholar
 X. Zhang and K. G. Shin, “Gap Sense: lightweight coordination of heterogeneous wireless devices,” in Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM '13), pp. 3093–3101, April 2013. View at: Publisher Site  Google Scholar
 W. R. Dieter, S. Datta, and W. K. Kai, “Power reduction by varying sampling rate,” in Proceedings of the 2005 International Symposium on Low Power Electronics and Design, pp. 227–232, usa, August 2005. View at: Google Scholar
 Y. Cui, X. Ma, H. Wang, I. Stojmenovic, and J. Liu, “A survey of energy efficient wireless transmission and modeling in mobile cloud computing,” Mobile Networks and Applications, vol. 18, no. 1, pp. 148–155, 2013. View at: Publisher Site  Google Scholar
 H. A. Omar, K. Abboud, N. Cheng, K. R. Malekshan, A. T. Gamage, and W. Zhuang, “A Survey on High Efficiency Wireless Local Area Networks: Next Generation WiFi,” IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 2315–2344, 2016. View at: Publisher Site  Google Scholar
 https://en.wikipedia.org/wiki/Monte_Carlo_method.
 J. T. Bevan et al., “An Integrated 802.11a Baseband and MAC Processor,” in IEEE ISSCC Digest, 2002. View at: Google Scholar
Copyright
Copyright © 2018 Zhimin Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.