Delay Analysis of Multihop Cognitive Radio Networks Using Network of - - PowerPoint PPT Presentation

delay analysis of multihop cognitive radio networks using
SMART_READER_LITE
LIVE PREVIEW

Delay Analysis of Multihop Cognitive Radio Networks Using Network of - - PowerPoint PPT Presentation

Delay Analysis of Multihop Cognitive Radio Networks Using Network of Virtual Priority Queues Dibakar Das Alhussein A. Abouzeid Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute Troy, NY 12180 Emails: dasd2@rpi.edu,


slide-1
SLIDE 1

Delay Analysis of Multihop Cognitive Radio Networks Using Network of Virtual Priority Queues

Dibakar Das Alhussein A. Abouzeid

Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute Troy, NY 12180 Emails: dasd2@rpi.edu, abouza@rpi.edu

April 7, 2014

slide-2
SLIDE 2

Introduction

A wireless ad-hoc network: multi-hop wireless, nodes use random-access MAC.

slide-3
SLIDE 3

Introduction

A wireless ad-hoc network: multi-hop wireless, nodes use random-access MAC. Consider two co-existing networks with n(p) + 1 and n(s) + 1 primary and secondary nodes respectively.

slide-4
SLIDE 4

Introduction

A wireless ad-hoc network: multi-hop wireless, nodes use random-access MAC. Consider two co-existing networks with n(p) + 1 and n(s) + 1 primary and secondary nodes respectively. Nodes use random access MAC with exponentially distributed back-off timers.

slide-5
SLIDE 5

Introduction

A wireless ad-hoc network: multi-hop wireless, nodes use random-access MAC. Consider two co-existing networks with n(p) + 1 and n(s) + 1 primary and secondary nodes respectively. Nodes use random access MAC with exponentially distributed back-off timers. Probabilistic routing scheme.

slide-6
SLIDE 6

Introduction

A wireless ad-hoc network: multi-hop wireless, nodes use random-access MAC. Consider two co-existing networks with n(p) + 1 and n(s) + 1 primary and secondary nodes respectively. Nodes use random access MAC with exponentially distributed back-off timers. Probabilistic routing scheme. Main results: obtained closed-form expressions for the average end-to-end queuing delay averaged over all network topologies and number of transmitted packets, and maximum achievable throughput of secondary nodes, as a function of primary network.

slide-7
SLIDE 7

Related Work

[Wang,Zhang, Infocom, 2010]: Delay analysis for single-hop network. [Chen, Liu, IEEE Trans. on Wireless Communications, 2011]: Delay performance of one secondary user in presence of other primary users. [Ren, Zhao, IEEE Journal on Selected Areas in Communications, 2011]: Characterize the minimum multi-hop delay and connectivity of the secondary network. [Tran, Duong, ISWPC, 2010], [Zhang, Li, ICC, 2009], [Do, Tran, ICOIN, 2012]: Use priority queues to model the behavior of secondary node. Prior work: Single-user, no contention, service time independent of

  • ther nodes.
slide-8
SLIDE 8

Network and Interference Model

Network consists of n(p) + 1 primary and n(s) + 1 secondary nodes that are distributed uniformly and independently over a unit torus.

slide-9
SLIDE 9

Network and Interference Model

Network consists of n(p) + 1 primary and n(s) + 1 secondary nodes that are distributed uniformly and independently over a unit torus. r(p) and r(s) denote the transmission radius of primary and secondary nodes respectively. Primary (or secondary) nodes are located within transmission radius of a primary (or secondary) node are its neighbors.

slide-10
SLIDE 10

Network and Interference Model

Network consists of n(p) + 1 primary and n(s) + 1 secondary nodes that are distributed uniformly and independently over a unit torus. r(p) and r(s) denote the transmission radius of primary and secondary nodes respectively. Primary (or secondary) nodes are located within transmission radius of a primary (or secondary) node are its neighbors. Node i can successfully transmit a packet to node j only if j is

  • utside the transmission radius of any other node k that is

simultaneously transmitting.

slide-11
SLIDE 11

Network and Interference Model(contd.)

Interfering neighbors to a secondary node: all primary nodes located within distance of r(p) + r(s), and all secondary nodes located within 2r(s) from it.

slide-12
SLIDE 12

Network and Interference Model(contd.)

Interfering neighbors to a secondary node: all primary nodes located within distance of r(p) + r(s), and all secondary nodes located within 2r(s) from it. Interfering neighbors to a primary node: all primary nodes located within distance of 2r(p) from it.

slide-13
SLIDE 13

Interference model

slide-14
SLIDE 14

MAC Model

Each node counts down an exponentially distributed random timer prior to a packet transmission. We denote the mean duration of the timer corresponding to each primary and secondary node as

1 ξ(p) and 1 ξ(s) respectively.

slide-15
SLIDE 15

MAC Model

Each node counts down an exponentially distributed random timer prior to a packet transmission. We denote the mean duration of the timer corresponding to each primary and secondary node as

1 ξ(p) and 1 ξ(s) respectively.

A primary (or secondary) node freezes its timer once it detects transmission from another primary (or secondary) interfering neighbor.

slide-16
SLIDE 16

MAC Model

Each node counts down an exponentially distributed random timer prior to a packet transmission. We denote the mean duration of the timer corresponding to each primary and secondary node as

1 ξ(p) and 1 ξ(s) respectively.

A primary (or secondary) node freezes its timer once it detects transmission from another primary (or secondary) interfering neighbor. A secondary node also freezes its timer and any ongoing transmission once it detects transmission from another primary interfering neighbor.

slide-17
SLIDE 17

MAC Model

Each node counts down an exponentially distributed random timer prior to a packet transmission. We denote the mean duration of the timer corresponding to each primary and secondary node as

1 ξ(p) and 1 ξ(s) respectively.

A primary (or secondary) node freezes its timer once it detects transmission from another primary (or secondary) interfering neighbor. A secondary node also freezes its timer and any ongoing transmission once it detects transmission from another primary interfering neighbor. This models the backoff scheme of IEEE 802.11 while ensuring mathematical tractability.

slide-18
SLIDE 18

Packet Generation and Routing Model

Primary (or secondary) packet generation process is Poisson with rate λ(p) (or λ(s)) packets per second . Each packet is of constant length L.

slide-19
SLIDE 19

Packet Generation and Routing Model

Primary (or secondary) packet generation process is Poisson with rate λ(p) (or λ(s)) packets per second . Each packet is of constant length L. Probabilistic Routing: on reception of packet, a primary (or secondary) node absorbs it with probability q(p) (or q(s)) or forward it to any neighbor, picked randomly, with probability 1 − q(p) (or 1 − q(s))

slide-20
SLIDE 20

Queuing Network Representation

Model the secondary network as two-class priority queuing network. Each station represents a secondary node. The first class (highest priority) of job arrivals at any station consists of packet transmissions from interfering neighbors

  • primary and secondary.

The second class (low priority) of job arrivals consists of packets forwarded from neighboring secondary nodes and ones generated at that node.

slide-21
SLIDE 21

Queuing Network Representation (contd.)

Class 1 jobs are served at rate

L W where W is the channel

bandwidth. Class 2 jobs from any station are forwarded with probability

1−q(s) number of neighbors as class 2 jobs to its neighbors and with

probability 1 as class 1 jobs to interfering secondary neighbors.

slide-22
SLIDE 22

Priority Queuing Network Representation of The Secondary Network

r

43 (21) (22)

r

43

, r

34 (21) (22)

r

34

r

31 (21)

r

12 (21) (22)

r

12 21 (21) (22)

r

21

, External Source External Sink 1 2 4 3 r , r

13 (21)

,

r(k,l)

ij

: routing probability of class-k job from station i as a class-l job to station j

slide-23
SLIDE 23

Priority Queuing Network Representation of The Secondary Network(contd.)

Filter

Stations corresponding to neighboring nodes of i Stations corresponding to interfering but not neighboring nodes of i Class-2 jobs served at rate E [ 1/ ] Class-1 jobs served at rate E [ 1/ ] q (n )

(s) (s)

λ

(s)

λ(1)

i

λ(2)

i

c(2)

i

c(1)

i

slide-24
SLIDE 24

Representation of The Secondary Network As A Network

  • f G/G/1 Queues

p (n )

21 (s)

p (n )

12 (s)

p (n )

13 (s)

p (n )

31 (s)

p (n )

45 (s)

p (n )

51 (s)

p (n )

54 (s)

External Source External Sink 4 3 1 2 5 p (n )

15 (s)

pij: routing probability from station i to neighbor j

slide-25
SLIDE 25

Representation of The Secondary Network As A Network

  • f G/G/1 Queues(contd.)

Filter

Stations corresponding to neighboring nodes of i Jobs served at rate E [ 1/ ] and forwarded to neighbors of i q (n )

(s) (s)

λ

(s)

λ(2)

i

c(2)

i

slide-26
SLIDE 26

Note About The Network Model

The network model is based on [Bisnik, Abouzeid, Ad Hoc Networks, 2009] extended here to the case of primary-secondary network. The previous work finds average end-to-end delay in an ad-hoc network using diffusion approximation for a network of G/G/1 queues. This work considers two co-existing and interacting networks where nodes from one network (i.e. primary) have higher priority in accessing the channel than the nodes from the second network (i.e. secondary). This coupling of the behavior of the queues in the two networks introduced new modeling challenges, which are analyzed by applying new approximation techniques that has not been used before in this context.

slide-27
SLIDE 27

Diffusion Approximation for Priority Queues

An approximation for completion and inter-departure time of jobs of any class at a station consisting of priority queues is provided in [Czachrski, Nycz, Pekergin, International Journal On Advances in Networks and Services, 2009]. Approximate pdf of completion time of a class-k job is given as fc(k)(t) = ∞ fb(k)(t)ψ(k)(t − T|T)1(t − T)dT where 1(t) is the unit step function and T denotes the service-time of a class-k job without interruptions.

slide-28
SLIDE 28

Diffusion Approximation for Priority Queues

An approximation for completion and inter-departure time of jobs of any class at a station consisting of priority queues is provided in [Czachrski, Nycz, Pekergin, International Journal On Advances in Networks and Services, 2009]. Approximate pdf of completion time of a class-k job is given as fc(k)(t) = ∞ fb(k)(t)ψ(k)(t − T|T)1(t − T)dT where 1(t) is the unit step function and T denotes the service-time of a class-k job without interruptions. Approximate pdf of inter-departure time of a class-k job is given as fd(k)(t) = ρ(k) 1 − R(k−1) fc(k)(t) + (1 − ρ(k) 1 − R(k−1) ) [(1 − R(k−1))fa(k)(t) ∗ fc(k)(t) + R(k−1)fa(k)(t) ∗ γ(k−1)(t) ∗ fc(k)(t)]

slide-29
SLIDE 29

Diffusion Approximation for Priority Queues – details

fb: pdf of service time of a class-k job in absence of interruptions. ψ(k): pdf of duration of all interruptions during the service of a class-k job. ρk: Utilization of queue corresponding to class-k jobs if there were no arrival of jobs of higher classes. R(k−1) = ρ(1) + ... + ρ(k−1)

slide-30
SLIDE 30

Diffusion Approximation for Network of G/G/ 1 Queues

Let ρi denote utilization of node i. Then the average number

  • f jobs at node i is given as

¯ Ki = ρi 1 − ˆ ρi where ˆ ρi = exp(−

2(1−ρi) C 2

Ai.ρi+C 2 Bi ); CAi and CBi denote the

co-efficient of variation of arrival-time and service-time of jobs at i respectively. We use the above equation to find average number of packets at a

  • station. The coefficient of variation parameters themselves are
  • btained using the approximation techniques mentioned in the

previous slide.

slide-31
SLIDE 31

Calculating Average End-to-end Delay

Following results can be obtained immediately from [Bisnik, Abouzeid, Ad Hoc Networks, 2009]: Exact expressions for mean and second moment of effective service-time of primary nodes in terms of primary network parameters. For any secondary node i , mean number of primary interfering neighbors to i, ¯ N(p)

i

= (n(p) + 1)Ar(p),r(s), where Ar(p),r(s) = π(r(p) + r(s))2. Mean number of secondary interfering neighbors to i, ¯ N(s)

i

= 4n(s)Ar(s) where Ar(s) = π(r(s))2. The probability of routing a class-2 job as class-2 job from secondary node i to secondary node v is, r(2,2)

iv

= 1−q(s)

n(s) .

Average number of hops traversed by a secondary packet before being absorbed is

1 q(s) .

slide-32
SLIDE 32

Calculating Average End-to-end Delay (contd.)

Obtain the mean and second moment of service-time (without interruption) of class-1 and class-2 jobs.

slide-33
SLIDE 33

Calculating Average End-to-end Delay (contd.)

Obtain the mean and second moment of service-time (without interruption) of class-1 and class-2 jobs. Use approximation techniques to find mean and second moment of inter-departure time and completion time of class-2 jobs at any secondary station.

slide-34
SLIDE 34

Calculating Average End-to-end Delay (contd.)

Obtain the mean and second moment of service-time (without interruption) of class-1 and class-2 jobs. Use approximation techniques to find mean and second moment of inter-departure time and completion time of class-2 jobs at any secondary station. Derive the co-efficient of variation of inter-departure times of class-1 and class-2 jobs and inter-arrival time of class-1 jobs and express those variables in terms of known network parameters.

slide-35
SLIDE 35

Calculating Average End-to-end Delay (contd.)

Obtain the mean and second moment of service-time (without interruption) of class-1 and class-2 jobs. Use approximation techniques to find mean and second moment of inter-departure time and completion time of class-2 jobs at any secondary station. Derive the co-efficient of variation of inter-departure times of class-1 and class-2 jobs and inter-arrival time of class-1 jobs and express those variables in terms of known network parameters. Use diffusion-approximation for a network of G/G/1 queues to find average number of jobs at any station.

slide-36
SLIDE 36

Calculating Average End-to-end Delay (contd.)

Obtain the mean and second moment of service-time (without interruption) of class-1 and class-2 jobs. Use approximation techniques to find mean and second moment of inter-departure time and completion time of class-2 jobs at any secondary station. Derive the co-efficient of variation of inter-departure times of class-1 and class-2 jobs and inter-arrival time of class-1 jobs and express those variables in terms of known network parameters. Use diffusion-approximation for a network of G/G/1 queues to find average number of jobs at any station. Use Littles Theorem to obtain average system delay at any secondary station.

slide-37
SLIDE 37

Calculating Average End-to-end Delay (contd.)

Obtain the mean and second moment of service-time (without interruption) of class-1 and class-2 jobs. Use approximation techniques to find mean and second moment of inter-departure time and completion time of class-2 jobs at any secondary station. Derive the co-efficient of variation of inter-departure times of class-1 and class-2 jobs and inter-arrival time of class-1 jobs and express those variables in terms of known network parameters. Use diffusion-approximation for a network of G/G/1 queues to find average number of jobs at any station. Use Littles Theorem to obtain average system delay at any secondary station. Multiply the above by average number of hops to find average end-to-end delay.

slide-38
SLIDE 38

Maximum Achievable Throughput

Use q(s) = r(s) =

  • log(n(s))

n(s)

and q(p) = r(p) =

  • log(n(p))

n(p)

to make the transmission radius and average number of hops traversed by a packet comparable to the corresponding parameters in the Gupta-Kumar model.

slide-39
SLIDE 39

Maximum Achievable Throughput

Use q(s) = r(s) =

  • log(n(s))

n(s)

and q(p) = r(p) =

  • log(n(p))

n(p)

to make the transmission radius and average number of hops traversed by a packet comparable to the corresponding parameters in the Gupta-Kumar model. The maximum achievable throughput of any secondary node is given as, λ(s)

max =

q(s){1 − (

n(p)Ar(p),r(s)λ(p) q(p)

) L

W } 1 ξ(s) + L W + 4n(s)Ar(s) L W

slide-40
SLIDE 40

Maximum Achievable Throughput

Use q(s) = r(s) =

  • log(n(s))

n(s)

and q(p) = r(p) =

  • log(n(p))

n(p)

to make the transmission radius and average number of hops traversed by a packet comparable to the corresponding parameters in the Gupta-Kumar model. The maximum achievable throughput of any secondary node is given as, λ(s)

max =

q(s){1 − (

n(p)Ar(p),r(s)λ(p) q(p)

) L

W } 1 ξ(s) + L W + 4n(s)Ar(s) L W

Then λ(s)

max = o( W

n(s)log(n(s))). In addition with fixed number

  • f primary nodes, λ(s)

max is asymptotically greater than a

constant fraction of maximum achievable throughput for the corresponding stand-alone network (i.e. secondary network in absence of primary nodes) and the constant term consists only

  • f parameters from the primary network.
slide-41
SLIDE 41

Results Validation

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Average number of secondary (=primary) packets generated per second Average end−to−end delay (s) Theory, n(s)=n(p)=100 Simulation, n(s)=n(p)=100 Theory, n(s)=n(p)=400 Simulation, n(s)=n(p)=400

Figure: Simulation with varying packet generation rates

slide-42
SLIDE 42

Results Validation(contd.)

100 150 200 250 300 350 400 0.2 0.4 0.6 0.8 1 Number of primary nodes(=number of secondary nodes) Average end−to−end delay (s) Theory,λ(s)=.5 Theory,λ(s)=0.8 Theory,λ(s)=1 Simulation,λ(s)=.5 Simulation,λ(s)=.8 Simulation,λ(s)=1

Figure: Simulation with varying number of nodes.

slide-43
SLIDE 43

Results Validation(contd.)

100 150 200 250 300 350 400 450 500 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 Number of secondary nodes( = Number of primary nodes) Average end−to−end delay (s) Theory, q(s)(n(s))=1.2(log(n(s))/n(s))0.5 Simulation, q(s)(n(s))=1.2(log(n(s))/n(s))0.5 Theory, q(s)(n(s))=1.4(log(n(s))/n(s))0.5 Simulation, q(s)(n(s))=1.4(log(n(s))/n(s))0.5

Figure: Simulations using shortest path routing.

slide-44
SLIDE 44

Conclusion & Future Work

Obtained closed-form expressions for the average end-to-end queuing delay averaged over all network topologies and number of transmitted packets, and maximum achievable throughput of secondary nodes, as a function of primary network. Extend the analysis to various other modes of co-existence e.g. cooperation and competition e.g. Secondary users carry and forward Primary traffic. Analysis for specific topologies or non-probabilistic routing e.g. a routing matrix.

slide-45
SLIDE 45

Bibliography

  • S. Wang, J. Zhang, and L. Tong, Delay analysis for cognitive

radio networks with random access: A fluid queue view, in INFOCOM, 2010Proceedings IEEE, 2010, pp. 19. R.R. Chen and X. Liu, Delay performance of threshold policies for dynamic spectrum access, IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp. 22832293, 2011.

  • W. Ren, Q. Zhao, and A. Swami, On the connectivity and

multihopdelay of ad hoc cognitive radio networks, CoRR, vol. abs/0912.4087, 2009.

  • H. Tran, T. Q. Duong, and H.-J. Zepernick, Average waiting

time of packets with different priorities in cognitive radio networks, in Wireless Pervasive Computing (ISWPC), 2010 5th IEEE International Symposium on, may 2010, pp. 122 127.

  • C. Zhang, X. Wang, and J. Li, Cooperative cognitive radio

with priority queuing analysis, in Communications, 2009. ICC

  • 09. IEEE International Conference on, June, pp. 15.
slide-46
SLIDE 46

Bibliography(contd.)

  • C. Do, N. Tran, and C. seonHong, Throughput maximization

for the secondary user over multi-channel cognitive radio networks, in Information Networking (ICOIN), 2012 International Conference on, Feb., pp. 6569.

  • N. Bisnikand A. A. Abouzeid, Queuing network models for

delay analysis of multihopwireless ad hoc networks, Ad Hoc Networks, vol. 7, no. 1, pp. 79 97, 2009.

  • T. Czachrski, T. Nycz, and F. Pekergin, Diffusion

approximation models for transient states and their application to priority queues, International Journal On Advances in Networks and Services, vol. 2, no. 2, pp. 205217, Dec. 2009.

  • G. Bolch, S. Greiner, H. d. Meer, and K. S. Trivedi,

QueueingNetworkand Markov Chains. Wiley-Interscience, 2005

slide-47
SLIDE 47

THANKS!

http://www.rpi.edu/˜abouza abouza@rpi.edu