Professional Documents
Culture Documents
Modeling and Performance Analysis of Multihop Packet Radio Networks
Modeling and Performance Analysis of Multihop Packet Radio Networks
FELLOW, IEEE
Invited Paper
I. INTRODUCTION
Packet Radio is a communications technologywhich applies packet switching to the domain of broadcast radio. It
is an attractive concept because it brings together the advantages of both broadcast communications and packet
switching. The broadcast radio medium is a readily available resource, easily accessible, and particularly suitable
for communication among mobile
users; packet switching
offers the fair and efficient sharing of communications
resources by manycontending users with unpredictableand
bursty demands. A packet radio networkis typically a collection of packet switchingnodes that communicate with
each other via broadcast radio. Each node consists of a
broadcast radio and a digital controller.The broadcast radio acts like the modem andline in wire-based
a
terrestrial
Manuscript received March I O , 1986; revised August 14, 1986.
This work was supportedby the Defense AdvancedResearch Projects Agency (DARPA) under Contract MDA-903-84-K-0249.
The author is with the Department of Electrical Engineering,
Computer Systems Laboratory, Stanford University, Stanford, C A
94305, USA.
NO.
1, JANUARY 1987
135
II.
BACKGROUND
To best understand the task of modeling the performance of amultihop packet-switching networkin general,
and to appreciatethe complexity underlying thatof packet
radio networksin particular, we begin by reviewing briefly
the work done on point-to-point packet switching networks, such as ARPANET, and then discuss those features
of packet radio networkswhich are responsible forthe difficulty in analyzing them.
A. Modeling Point-to-PointPacket Switching Networks
136
by A. L.
e j = l k = l yjyir;
and
A
ff/k
= *fjk/Y.
The matrix [ f f j k ] represents thetraffic pattern, and y, the network throughput. Let Ci denote the capacity of channel i
in bits per second and let X; denote the mean traffic rate
in packets per second that flows on channel i.Given [ y j k ]
and the routing scheme, the vector { A,}y=, is easily computed. Let I/p denote the mean packet length, and nj, the
i.For a Jacknumber of packetswaitingfor or usingchannel
sonian network, the vector (nl, . * * , nM)is a complete state
description; moreover, the state probability is given by Rn,)
P(n2) . . . P(nM),where P(nj) is the probability of finding nj
in an M/M/l queue with arrival rate Xi and service rate l/pCi.
From this resuIt,theexpected end-to-end packetdelayaveraged over all user traffic is easily derived as [36]
M
T =
,x[-].
y pcj 1- hj
1=1
Secondly, in a given locality (as determined by radio connectivity), the radio channelis a server which is contended
upon and shared by the many nodes in that locality. The
success of a transmission undertaken by a node depends
not only on the quality of radio
the link between the node
and its intended neighbor, but also on the particular topology ofthe network in the
locality, transmission activity
of other nodes, state of the receiving node, the signaling
method used, etc. Consequently, essential
to the
operation
of a radio networkis a policy accordingto whichnodes determine their rightto access the channel. The objective of
such a policy is to improve the likelihood of success of a
transmission to beundertaken, and thus maximize the
overall networkthroughput. Thus in packet radionetworks, the decision as to whether a node should transmit
or not may be a function of the state of the network in its
neighborhood (as dictated by the access protocol); and once
the transmission has been initiated, the outcome is dependent on the state of the neighboring nodes and their
evolution during thetransmission time in question. Thus
we are in presence of a network of queues in which a packsysets service time is dependent on thestate of the entire
tem and its evolution in time. This i s indeed a complex
queueing problem to which nosimple solution exists.
The conditions underwhich atransmitted
packet may be
correctly received and the channel access protocols used
(also called link activation protocols)are so essential to the
performance of packet radio networks and so central t o
every modeling effort reported upon, thatwe devote Section Ill to a clear description of these issues.
In thesequel, unless otherwise stated, we shall consider
a packet radio network to be consisting of N nodes distributed over some geographical area. Theconnectivity of
the networkis considered to be a known Boolean function
and specified by an N X N hearing matrix H = [h,,], where
h , = 1 if j can hear i,and 0 otherwise. Thus each nonzero
to a directed raentry h, in thehearing matrix corresponds
dio link in the network fromito
node
nodej , and viceversa.
We denote such a link by (i,j ) , and call node i i t s source
and node j its destination. Alternatively, a network can be
represented graphically by a directed graph in which vertices represent nodes in the network, and directed edges
represent one-way connectivity. A link is said to be active
whenever a transmission is taking place over that link; i.e.,
whenever the source node i s transmitting a message destined to thedestination node on that link.
Ill. PACKET RADIO NETWORK
OPERATION
137
A. Channel
Signaling
-
and Capture
Two types of channel signaling exist: narrow-band signaling and spread-spectrumsignaling. In narrow-band signaling, databits are modulated directlyon the carrier.
Thus
the overlap at some receiver of two packets with roughly
the same signal power typically results in theloss of both
packets. If the two overlapping
packets areof distinctly different signal power, thensome form of powercapturemay
come into effect, whereby the strongerpacket is received
correctly, and the weaker one is lost. (This, however, sometimes depends on timing as a weak signal may tie up the
synchronization circuit at the receiver.) Considering a networkwithafixedtopologyinwhichalllinksareofthesame
quality, (thus removing the possibility of power capture),
we then say that the network operates in a zero-capture
mode: the overlap of
two ormore packets at some receiver
results in the destruction of all. (Note that, on the other
to detect
hand, in narrow-band systems, it is easy for a node
activitydue to other nodes within radio connectivity simply
by sensing carrier.)
Spread-spectrum refers to signaling schemes which are
based on some form of coding
and whichuse a much wider
bandwidth than do narrow-band schemesforthe
same data
rate [63].One way of achieving spread-spectrum operation
consists of using directsequence pseudo-noise (PN) modulation. Another is frequency hopping (FH). Spread-spectrum techniques have been introduced to combat multipath effectsand jamming; but they also offerspecific
advantages in multiuser interference which center around
two properties: code-division and time-capture. Codedivision refers to the fact that transmissionswith orthogonal
codes may overlap in time with little or no
effect on each
other. Time-capture refers
to the ability ofan idle receiver
to successfully receive a packet with agiven code despite
the presence of other time-overlapping transmissions
with
the same code (or othercodes) [21], [28],
[49]. Packet radio
networks may take advantage of these two properties in
different ways as described in the following.
Since the transmission ofpackets is asynchronous, each
packet transmission mustbe preceded by the transmission
of a preamblewhich the receivers use to acquire bit synchronization. Often, the preamble
consists of aknown code
is used
with strongautocorrelationpropertieswhich
throughout the network, and which idle receivers constantly search for. Furthermore, this code is chosen to be
orthogonal to those used in encoding thepackets. In order
to be able to receive a packet, an idle receiver must first
process successfully the preamble. Failures are primarily
due to overlaps in time with another packets preamble;
they may also be due to the presence of other ongoing
transmissions, which act as background noise and thus
reduce the effective signal-to-noise
ratio. Errors due to overlapping preambles can be reduced by the use of receiverdirected codes. In this mode of operation,each receiver is
assigned a distinct preamble code waveform, and transmitters must use the waveformassigned to the receiver they
are trying tocommunicate with in thetransmission of the
preambles. The result is that a receiver will process the
preamble of only those packets that are specifically destined to it, all other transmissions by neighboring transmitters, includingtheir preambles, appearing as background noise. We shall refer to the two above-mentioned
138
preamble
code
assignment methods as space-homogeneous and receiver-directed, respectively. Havingsuccessfully processed the preamble of an incoming packet, the
receiver at a nodewill thus lockonto the
data portion of the
packet until its transmission is completed.
is locked onto byareceiver, it is important
Once a packet
that future overlapping packets do not interfere with the
completion of its successful reception. The conditions for
such a success are, here too, dependent on the ways the
PN waveform patterns are selected and used, in addition
to theset of active linksand their signal strengths. Several
cases can be identified. Consider first thecase in which a
fixed PN spread-spectrum pattern identical for
each bit
transmitted throughout the network is used. An overlap
ping packet would not interfere with
a packet lockedonto
earlier as long as its autocorrelation peaks do not coincide
with those of the earlier packet
(see Fig.1).This meansthat
DesiredSignal
Inteferlng Slgnal
Sum
time of the earlier packet. (The problem of packet acquisition incurred with arrival times too close to each other
would persist, since one would require the PN sequence
to start from thesame point, known to thereceivers. Note
that the startingpoint can be thesame for all receivers, or
different for each receiver.) Werefer to this scheme as the
bit-by-bit code changingscheme or bit-nonhomogeneous
code assignment. Assuming that backgroundnoise is negligible andall codes aretruly orthogonal, this mode ofo p
eration achieves perfect capture, whereby correct recep
tion is guaranteed oncethe packet is locked onto. Perfect
capture can also be achieved by assigning distinct orthogonal codes to nodes which the latter use to encode their
packets when transmitting.In this case, the preamble contains information on the spreading waveform used, thus
allowing the receiver to program
its matched filter accordingly. Note that, in this case, perfect capture does not necessitate bit-by-bit code changing as long as transmitters
are assignedorthogonal codes. We refer to this scheme as
the transmitter-directed codeassignment.
As true orthogonality ofcodes is not always guaranteed
on a bit-wise basis, and the background noise cannot always be negligible, some form of encoding (e.g., convolutional coding) is performed on the information
to be
transmitted prior tospread-spectrum coding,so that, with
the use of a decoder (e.g., sequential decoder), the correction of bit or symbol errors
can bedone at the receiving
end. Consequently, the correct reception
of apacket is considered to be achieved if the decoder does not make any
error in decoding the entirepacket. Perfect capture refers
then to the ideal case whereby, once locked on, a packet
is always successfully received.
'When different codes are assigned to nodes (e.g., receiverdirected, transmitterdirected, etc.), the termCode-Division Multiple
Access (CDMA) is generally employed. However, the termCDMA
in itself is not sufficient to describe completely the operation of
a network as it does not specify any particular channel access protocol. To be precise, one must indicate, in addition to the codeassignment scheme in use, a channel access protocol whichnodes
follow in transmitting their packets.
139
140
PROCEEDINGS OF
ticular variant of BTMA which makes most sense implementation-wise is receiving-destination BTMAand is referred to in thiscontext as locked-onto Destination BTMA
(LD-BTMAI [8]: the destination node of a link emits a busy
tone whenever the link is active and the destination node
is locked onto the packet (receiver-directed code assignment i s assumed in thiscase).
The performance of any of the access protocols cannot
be easily predicted in a multihop packet radio network, as
many conflicting effects actually take place; furthermore,
the performance of
an accessprotocol is highly dependent
on the topology of the network
and the imposed trafficrequirements. consider, for example, ALOHA and CSMA in
narrow-band systems. If the network is fully connected,
then CSMAwouldsignificantlyoutperformALOHA[35]. But
in a general multihop topology, the presence of hidden
nodes may have such a degrading effect that CSMA may
only be slightly better than
ALOHA. (See numerical results
below.) The situation becomes more complexwith BTMA.
In conservative BTMA,a transmission maybe blocked, while
in destination-based BTMA it may be allowedto take place
and may result in a successful transmission. On theother
hand, in destination-based BTMA (and CSMAfor that matter) it i s possible to allow a transmission to take place that
will be unsuccessful, and whosepresencemay block a
number of other potentially
successful transmissions,while
in conservative BTMA, the former transmission would be
inhibited bytheprotocol,allowingthe later potentiallysuccessful transmissions to then take place.6 It is not clear
whichof theeffectswouldpredominate in agiven situation,
and hence one must resort to analysis and simulation to
compare the different schemes.
IV. NETWORK
CAPACITY
As with point-to-pointpacket-switched networks, we define the network input traffic requirement by the matrix
r = [?,&I,where y i k , j # k, is the average number ofpackets
per unit timeoffered at n o d e j and ultimately destined for
k. (We let yii = 0, vi.) We let y again denote the totaluser
traffic, i.e.,
N
A
and define a,&= yikly: The matrix [alk] represents the traffic
pattern. We also deftne network capacity to be the maximum value y that the network can support, keeping the
matrix {aik] fixed. In this section, we focus on analytical
models appropriate for the determination of network capacity.
As with point-to-point networks, the analysis of packet
radio networks is simplified by assuming that the routing
algorithm is of thefixed type (i.e., all packets from a given
source to a given destination flow through thesame set of
nodes), all nodes haveinfinite buffers, and no link nor flow
control protocols are in effect. While under such assumptions the determination of network capacity for point-topoint networksbecomes a trivial task, for packet radio networksitremainscomplexduetothemanyoperationalcharacteristics that may be in effect, as discussed in the previous
section. Models differentfrom those used for point-to-point
networks are needed. Beforewe proceed with a discussion
6For more details on such a discussion and an example, see [77].
of themodels introduced andused for multihoppacket radio networks, weshall first devotethe following
subsection
to special cases of single-hop networks and
to a brief review
of relevant models used in theiranalysis; these models constitute a precursor to multihop network
modeling, andwill
thus assist the reader in the understanding of the latter.
A. Single-Hop Networks
Extensive analysisof single-hop networks operating under a variety of channel access methods have appeared in
the literature. Most analyses related to narrow-band systems with zero capture, although some did address the case
of spread-spectrum and time-capture. In [I],Abramson introduced and analyzed pure ALOHA. Slotted ALOHA was
then introduced byRoberts [51], [52] and later analyzed by
Abramson [2], [3] and Kleinrock and
Lam [32], [34].Kleinrock
and Tobagi introduced and analyzed CSMA [33], [35] and
BTMA[67]. Raychaudhuriand analyzed slotted ALOHA with
codedivision [50]; Cronemeyer andDavis
considered
spread-spectrum slotted ALOHA with capture due to time
of arrival [14]. Musser and Daigle derived the throughput
ofpureALOHAwithcodedivision[46].Finally,Pursleystudied the throughput frequency-hopped
of
spread-spectrum
communications [MI. While these represent the key references, additional publications on the subject have appeared in the literature. Basically,two models haveemerged
from this work: an infinite-population model and a finitepopulation model. We
discuss thesehere briefly inspecific
representative cases.
In theanalysis of single-hop networks, the environment
i s assumed to consist of a population of nodes communicating with a single station. For the ALOHA schemes, radio connectivity need not exist among the nodes themselves. For CSMA,it is first assumed that allnodes areradioconnected, and thus every terminal can sense the activity
due toany other terminal.This assumption is then relaxed
allowing hidden nodes to be present. Note that, if the system under consideration
is fullyconnected and of thezerocapture type,then all packets need not bedestined to a single node for theresults to apply.
I) An Infinite-Population Model for the Determinationo f
ChannelCapacity Under Various Channel AccessProtocols: In the infinite-population
model, the numberofusers
is assumed to be very large (infinite).Users collectivelygenerate packets at some aggregate rate,
sayy packets per second. Assuming fixed-size packetswith transmission timeT
seconds, and normalizing timeto T, the packet generation
rate becomesS = yTpackets perpacket transmissiontime.
The assumption of a large population allows us to consider
thateach nodewill beabletosuccessfullytransmit its packet
in a period of time small compared to the timeit takes it
to generate a new one. Thus no queueing of packets ever
takes place, andall outstanding packets (i.e., generatedbut
not yet successfully transmitted) belongto different nodes.
From the point of view of multiuser interference, this is
clearly the worst case. Due to packet collisions and blocking by the access protocol, the rate at which packets get
submitted to ortransmitted on the channel i s larger than
S, and is here denoted byC.In this model, it is furthermore
assumed that the mean rescheduling delay X incurred by
a packet that was blocked orunsuccessfully transmitted is
very large compared to thepacket transmission time (theoretically infinite).(Recall that this modelis aimed towards
141
G=
,E G;.
,=1
c = r,x
c;.
=l
We note that C = maxcc,);-,(S) such that Si = ais, vi, and
is achieved by
a
unique set of
transmission
rates
{G:}Y=l. Note that the set of equations (2) is valid only so
long as each node hasalways packetsto betransmitted, and
thus is valid at the boundary. We therefore deduce that the
approachisvalidforthedeterminationof networkcapacity.
3) The Hidden Terminal Problem in CSMA:As pointed
out in Section I l l , CSMA suffers performance degradation
in the presenceof hidden terminals.
This problem has been
studied for single-hop networks by Tobagi and Kleinrock
in [67]. Anenvironment consistingof a large number ofterminals communicatingwith asingle stationis considered.
Packets are of fixed size. All terminals are in line-of-sight
and within range of the station
but not with
respect to each
other. All assumptions introduced above for the infinite
population model are considered to hold true. From the
hearingmatrixdescribingconnectivityfortheenvironment, the population can then be partitioned into say N
groups, suchthat all nodes within a grouphear eachother
and hear the same subset of nodes in the rest of the population. Aswith the infinite populationmodel, it is assumed
that each group consists of a large number of nodes who
collectivelyform an independent Poisson sourcewith mean
ratesi packets per unit time. Heretoo, given atraffic pattern
where
s=
csi
i=l
cn
= C
i=l
C; = max
{s)
142
PROCEEDINGS OF THEIEEE,
B. Multihop Networks
Note that for C-BTMA, given the zero-propagation delay assumption, the assumption of perfect captureis a natural one,
even
in narrow-band systems.
143
PROCEEDINGS
144
we have
s- = Gl k = 1 , 2n;..,
(1 - Gk).
(5)
ht, = 1
x,
- Pr {X({i,j } )
Pi
idle}.
U(D)to be the set of nodes that are not blockedby any node
in the set D, given the access protocol. The balance equations then become:
r
,x
+ reD A , Q O
+ iC
X,Q(D cD
{i}).
(7)
- {i})
(11)
hi
- Pr {X2(;)idle}.
(12)
Pi
DnX({r.j))=6
Pr { i idle} =
+ GkSP(A - Wk)),
for k
E A.
(IO)
+ Cj'
thesuccessorfailureinthereceptionofapacketisnotsolely
dependent on thestate of the networkat the beginning of
reception, as eventsmay occur during its reception affecting its successful completion. for the perfect-capture
case,for example,receiving nodejmayabortthe reception,
giving priorityto i t s transmitter (see SectionI l l ) . In the zerocapture case, in addition to thepossibility of nodej aborting its reception, transmission by any neighbor of j causes
a collision. Let T ( ( i ,j ) ) denote theaverage period of time
that a transmission over ( i , j ) contributes to throughput,
given that X ( j ) i s idle at the beginningof transmission. The
general throughput equation for ALOHA is given by
suItsarepreserved.Inaddition,itwasshownthatthemodel
could accommodate different packet length distributions
for each link emanating from a node. In [5], this modelwas
also extended to include theeffects of acknowledgments.
b) PureALOHA and C-BTMA in networks with symmetric hearingmatrix: Tobagi and Brazio [75] showed that
the state description required for the analysis of ALOHA
and C-BTMA in symmetric topologies is, as above, the set
of nodesbusy transmitting.Independently, C.-N. Chen
treated C-BTMA the same way in [IO]. To write thebalance
equations for these systems,for each stateDESwe define
zerocapture
It,
145
I C M(D)
Q(D U { ; } ) p i ,
DES
(18)
D such that D U { i } E
S,andI(D)isthesetofallIinksj~Dsuchthatjisnotblocked
by D - {j}.
146
(20)
where Us(;)
is the collection of
states D E S that donot block
link i and do not contain an active link which causes link
i to be unsuccessful from its start, and T(D, i ) , D E U5(i),
is
the average time that a transmission
over link icontributes
to throughput given that thestate just prior to thestart of
the transmission is D. For CSMA and BTMA with perfect
capture, we haveT(D,i ) = l/pI.Equation (20) then takes on
a simple form; applied
to CSMA, it is similar to (9);the same
is true forC-BTMA. Under zero-capture, however,similarly
to what was encountered above in the analysis of pure
ALOHA, the average transmission time ofsuccessful
a
mesexists between
sage is not l/pi,due to the dependency that
the message length andits success. In order to derive T(D,
i ) , an auxiliary Markov chainis created as follows. Let a,(;)
be the collection of states in which i is active and no interfering link is active, let &,(;) be the collection of states
in which i is active and some interfering linkis also active,
and let 9 ( i )be the set of states obtained from a,(;)by deactivating linki. The start of atransmission over link iwhich
does not suffer a collision at its very start corresponds to
a transition ofX ( t ) from astate D E 'u,(i) into state D U { i }
E e&). Link i remains free of collisions as long as X ( t ) remains in a,(/]while i is active. The successful completion
of link i's transmission corresponds to a transition from
some state in a,(;)into a state in 9 ( i ) (without having ever
visited any state in @,(i)).The derivation of T(D, i ) is then
simply obtained by considering the auxiliary Markov chain
consisting of the states in a,(;),and two absorbing states
representing a,(i)and 9(i). This approach is used to derive
the capacity of any narrow-band systems operating under
pure ALOHA,CSMA,C-BTMA,andID-BTMA.
When a p
plied to pure ALOHA, it provides results similar
to (16) and
(17). It is also usedto model errors due
to noise and capture
effects other than zero and perfect
capture, as encountered
in spread-spectrum systems [8], [MI. Numerical examples
illustrating theuse of these analyses are
given belowin the
following subsection.
5) Models forSpread SpectrumSystems: The models ex-
PROCEEDINGS OF THEIEEE,
TOBACI:MULTIHOP
ilar to (20). This is the approach used in [8] to analyze disciplined ALOHA and D-BTMA.
For systems in which the
access protocol is such that the
decisiontotransmit isfunction onlyof
linkactivity,Brazio
and Tobagi[ilhave shown that a simplification in theanalysis manifests itself in the form of some degree of separation in therepresentation of transmitters activity
and receiversactivity,whichallowstheresuItsobtainedintheIinkactivity model to be useful. Consider a generic noden. Let
rJt) representthe linkwhich the
receiver at noden is locked
onto at time t; (r,(t) = (o if the receiver is not locked onto
any packet). Let,as before, X ( t ) denote theset of active links
at time t. Define
Y,(t)
4 (XW;r,,(t)).
of
that do not block
i, and
where u( i )is the collection states
where given D, p , ( D ; p) is the probability that the destination of linki, di, is not busy receiving,6 , ( D ;i ) is the probabilitythatthe preamble is processed correctly(i.e., d,locks
onto i), and Ti@) i s the average time that a transmission
over link i contributes to throughput. Pd,(D; p) is determined froma set of linear equations derivedfrom thebalance equations ofprocess YJt). T,(D)depends on theconditions under which the
packet will be successfullyreceived
after the preamble is successfully locked onto, and is derived in a way similar to thesame in (20).
Numerical Results: To illustrate the use of all the models
described so far, and compare the performance of some
access schemes, we consider here a ring of N nodes (N 1
3) [q,[8],[751,in whichall nodes behave identically, and all
links carry equal traffic. Figs. 2-5 show the linkcapacity as
a function of N. In Fig. 2, narrow-band systems with zerocapture are considered. (In this case, disciplined ALOHA
assumes that a receiving node, which actually cansynchronize on and receive a packet only if the
packet reaches
the receiver when the channel is idle, knows the length of
the packet being received.) Theeffect of noise is also taken
into account by consideringa constant bit errorrate Pb, for
packets that are not interfered with. (In Fig. 2, Pbe is 1.9 x
It is clear that BTMA offers a performance thatis superior t o all other schemes. Note thatCSMA performs well
when N = 3 and thus the networkis fully connected; for
N > 3, however, the performance of CSMA is heavily dePure ALOHA, CSMA, and C-BTMA are such protocols.
147
aslongasjisidle,6j(D,(i,j))=1.Furthermore,ifareceiver
locks onto a packet, then all future transmissions by neigh-
.ooo'
6
7
8
Number of nodes
Fig. 2. Link capacityof narrow-band systemswith a ring topology operating under various channel
access modes.
-1 . 2 5 0 -
.-
u
Y
Topcuwes
P&
= 19'10 Io
2 ,200
,000
2
Number of nodes
Fig. 4. Linkcapacityin spread-spectrum systemswitha ring
topology and bit-homogeneous code assignment.
\,!
I..-.+---..a____.-A
7
8
Number of nodes
1.9'10~0
Fig. 3. Effectof P
o,n
linkcapacity in narrow-band systems
with a ring toplogy.
148
$?-
ALOHA
.ooo
2
Number of nodes
Fig. 5. Comparison of narrow-band and spread-spectrum
;,
- Pr {i
and j idle).
Pij
a
pi = Pr {i is idle}
t
I
10.0
+ + +
+ CDMA/2
A C-BTMA
A CSMA-Perlect Capture
CDMM
0
0 CDMAIaJ
x Approxlmatlon
CDMW
CDMNJ
6 CDMNP
A CDMAll
40
A
00
0
A
I
20
40
Average Nodal Degree
60
0.0
0
20
40
60
uniform end-toend requirements, varying levels of connectivity, andup to60 nodes were considered.
The following results were obtained for CDMA. When
all nodes have
In capacity
analysis,
the heavy traffic assumption,
whereby at each scheduling point a nodeis guaranteed to
need to
have a packet readyfor transmission, removed the
include in thestate description any information regarding
thenumberofpacketsqueuedateachlink.Also,atcapacity
packet delay is infinite. For loads below capacity, queue
lengths are not infinite and must be included in the state
description. As a result, the state space grows dramatically
in size rendering analysis either complex, or limitedto smallsize networks. Another major problem
in thedelay analysis
of multihop packetradionetworks(and
any multihop
packet-switched network for that matter), is the need to
keep track ofpackets as they are relayed through the network. This too requires additionalstate information which
149
150
PROCEEDINGS
OF THEIEEE,
B. Multihop Networks
Studies of throughput-delay in multihop packet radio
networks have appearedfor slottedALOHA as well as some
unslotted schemes. All assume zerocapture.
Slotted
ALOHA is somewhat easier to analyze since questions regarding generation of new packets, transmissions, recep
tions, andinterference are all resolved in each slot. The state
of all nodes in a givenslot determines the activityand outcome in the next.For unslotted systems, there are no such
convenient times as slot boundaries, and various timings
(e.g., packet length, propagation times, etc.) must be accounted for. We begin by examining thosestudies which
provide exact analyses of specific instances, and then discuss approximate methods aimed at a more general a p
plicability.
7) Exact Analysis: The earliest work on the analysis of
throughput-delay performance in multihop packet radio
networks can be found in [70]-[73] where a specifictopology is considered, namely, a centralized two-hop system.
Terminals communicate with a central stationvia repeaters
with finitebuffers located around the station.
The first hop
isfromgroupsofterminalstotherepeatersontowhichthey
are homed;the second hop is from therepeaters to the central station. Only inbound traffic is considered, and both
slotted ALOHA and CSMA are studied. The analysis assumesadecoupling between
thetwo hops; thisdecoupling
is natural for slotted ALOHA; for CSMA it is based on the
observation that the distribution of time separating two
conflict-free transmissions from a group of terminals can
be approximated by an exponential one, an observation
which is validated by simulation. The effects on performance of the number repeaters,
of
the connectivity among
them,variations in thetransmission protocolstheyuse,and
the number of buffers they possess, have all been examined. Perhaps one of the most interesting results is that,
under the assumptions of zero-processing times
at the
nodes and instantaneous acknowledgments,packet radio
networks are channel bound rather than storage bound: a
slight improvement i s gained by increasing the buffer size
at the repeaters from 1to 2, but nosignificant improvement
is obtained beyond that.Fuduka and Tasaka [22] later analyzedthe same two-hopnetworksusingthe
EPA techniques, addressing similar issues.
Other studiesexist which employed exact analysisof specific instances, but with more
arbitrarytopologies [53], [65].
The models used lead to a large number ofstates and are
thus applicable to small networks. They are used to study
some specific protocol features in small networks.
Takagi and Kleinrock consider two arbitrary networks
with 8 and 12 nodes, operating under slottedALOHA [65].
A distinction is made between terminal nodes which are
sources and sinks of traffic but cannot serve as relays, and
repeaters which serve only as store-and-forward relays.
Otherwise, both types of nodes operateusingslotted
ALOHA under the same conditions. Each node has a finite
number of buffers, initially equal to 1. It is assumed that
there is afixed number of source-sink terminal
pairs which
have nonzero throughput requirements. A terminal
can be
151
152
SIMULATION MODELS
Mathematicalmodelsintroducesimplifyingassurnp
tions which limit their
usefulness in addressing certainaspects of packet radio network performance. Simulationmodels maybeused
to overcome these limitations.
Furthermore, in the absence of real networks operating under the various modes of interest, simulation models are
used to validate mathematicalmodels. Attempts have been
made to write simulation programs thatwould accurately
encompass a / / operational aspects of packet radio networks. Unfortunately, such effort has not been successful
due to the size and complexity of the resulting program.
As
a result, it seems more prudentto create simulation models
which incorporate the essential elements of packet radio
networks, and which can be used to study first-order effects. One such simulation model has been created and
successfully used by Silvester
to study spatial reusein multihop packet radio networks
[59], [39]. Another is by Tobagi
and Shur[771, [78].The latter incorporates a variety of channel access protocols, flow control protocols,andnode
buffer management strategies, and can accommodate arbitrary toplogies with nonzero propagation delays. It can
also be used to study other network aspects, such as the
handling of hop-by-hop acknowledgments and routing,
which have not yet been addressed in any form.
In [77l,[78], the focus has been on the performance of
channel-access protocols.Bothnetwork
capacity and
throughput-delay performance are evaluated, and the effects on performance of the nodal scheduling
rate, the
propagation delay among nodes, and the nodal buffersize
and management strategy are
studied. With regard to nodal
buffer management, structured bufferpool strategies have
been consideredto prevent deadlocksto which networks
with finitebuffers are prone. So far, numerical resultshave
with that obtained by analysis. Throughput-delay performance is shown in Fig. IO. The effect of buffer size on the
performance proved to be more complex. The nodes' optimum scheduling rate is found to vary with the nodes'
buffer size, increasing with increasing buffer size. Interesting resultshave been obtained showing
thatwhile some
schemes, such as ALOHA and CSMA, are indeed channelbound, others, such as C-BTMA, are storage bound. This
can be seen in Fig. 11 in which network capacity is plotted
as a function of buffersize. Future steps to be taken in this
simulation study will deal with more general (asymmetric)
topologies, and the optimization of network performance
with respect to system parameters.
ALOHA'
[ 1
CSMA - -
,
.o
IG'
'
'
'
"
"
'
1100.0
.o
10.0
Scheduling Rate G
'
'
I
'
""".
Fig. 8. Network capacity versus scheduling rate in a narrow-band &node ring network, underC-BTMA
the
protocol,
with a uniform traffic matrix and a = 0.01.
.O
packet transmission time, assumed constant, is 0.01). Define nodal capacity to be the sum of link capacities over
all links emanating from a node. The nodal capacity optimized over G for various schemes is plotted in Fig. 9 as a
function ofa. The ranking among the
schemes is consistent
1 .o,
C-BTMA
.9
.8.
.7
50~
451
RING
N=6 d=2
401
Slotted ALOHA
CSMA
ALOHA
10
100
Fig. 11. Network capacityversusnodes' buffer size for various access schemes.
. .o o w 1
,0010
.01m
.loo0
1.03oO
TOBACI:MULTIHOP
VII. CONCLUSION
153
works have been well studied. The models created and results obtained forsuch networks have helped considerably
the later effort of modeling and analysis of multihop network. Unfortunately, the modelsand techniques required
for multihop networks provedto be much more complex.
There are basically two approaches: i) create precise and
accurate models with the results that onlysmall networks
can be handled; properties of large networks have to be
inferred from those of
small ones; ii)provide approximate
analyses based on major simplifying system assumptions
so as to handle general cases, with the risk of producing
inaccurate results. Neither of the two is yet fully satisfactory. Several general observations can be made. Network
capacity appearsto have beenbetter covered than throughput-delay performance.In general, results obtainedin single-hop networks do not always apply to multihop networks (e.g., performance ofCSMA and i t s relation to other
schemes). Verification of the modeling techniques
and validation of the results obtained
have also been limited.Despite the considerable
progress madein the
last decade and
reported upon in thispaper, it is clear that the problemof
analyzing the performance of packet radio networks remains a challenging one, and the desire to reach a methodologyfor thedesign, control, and optimization of packet
radio networks remains unfulfilled.
154
155