Kybernetika. Andrzej Dziech; Andrzej R. Pach Bounds on the throughput of an unslotted ALOHA channel in the case of a heterogeneous users' population

Similar documents
Multiaccess Communication

Markov Chain Model for ALOHA protocol

Information in Aloha Networks

Chapter 5. Elementary Performance Analysis

FCFS Tree Algorithms with Interference Cancellation and Single Signal Memory Requirements

Random Access Protocols ALOHA

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

16:330:543 Communication Networks I Midterm Exam November 7, 2005

P e = 0.1. P e = 0.01

Analysis of random-access MAC schemes

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Power Laws in ALOHA Systems

Performance Evaluation of Queuing Systems

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

LECTURE 3. Last time:

Modeling and Simulation NETW 707

An Evolutionary Game Perspective to ALOHA with power control

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Discrete Random Variables

Analysis of tree algorithm for collision resolution

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

Časopis pro pěstování matematiky

Channel Allocation Using Pricing in Satellite Networks

Wireless Internet Exercises

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

Performance of Dynamic-Frame-Aloha protocols: Closing the gap with tree protocols

Stability and Performance of Contention Resolution Protocols. Hesham M. Al-Ammal

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Delay and throughput analysis of tree algorithms for random access over noisy collision channels

Lecture on Sensor Networks

Computer Networks More general queuing systems

A discrete-time priority queue with train arrivals

Czechoslovak Mathematical Journal

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Archivum Mathematicum

Bit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel

Conference Paper. Stability and Delay of Network-Diversity Multiple Access with Backlog Retransmission Control. Ramiro Robles CISTER-TR

Load Balancing in Distributed Service System: A Survey

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009.

Acta Universitatis Carolinae. Mathematica et Physica

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Queueing Theory and Simulation. Introduction

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

CS115 Computer Simulation Project list

The Poisson Channel with Side Information

Lecture 6 I. CHANNEL CODING. X n (m) P Y X

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Chapter 2 Queueing Theory and Simulation

Kybernetika. Šarūnas Raudys Intrinsic dimensionality and small sample properties of classifiers

Information Theory Meets Game Theory on The Interference Channel

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute

Multiaccess Problem. How to let distributed users (efficiently) share a single broadcast channel? How to form a queue for distributed users?

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

EQUADIFF 1. Milan Práger; Emil Vitásek Stability of numerical processes. Terms of use:

Risk-Sensitive and Average Optimality in Markov Decision Processes

Časopis pro pěstování matematiky

Intro Refresher Reversibility Open networks Closed networks Multiclass networks Other networks. Queuing Networks. Florence Perronnin

Optimal power-delay trade-offs in fading channels: small delay asymptotics

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks

6 Solving Queueing Models

GI/M/1 and GI/M/m queuing systems

Introduction to Sequential Teams

TCP over Cognitive Radio Channels

Multimedia Communication Services Traffic Modeling and Streaming

Performance of Random Medium Access Control An asymptotic approach

Link Models for Circuit Switching

Linear Differential Transformations of the Second Order

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Dynamic resource sharing

Stability analysis of a cognitive multiple access channel with primary QoS constraints

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

Performance analysis of queueing systems with resequencing

Stability and Instability Conditions for Slotted Aloha with Exponential Backoff

Mathematica Slovaca. Ján Jakubík On the α-completeness of pseudo MV-algebras. Terms of use: Persistent URL:

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Czechoslovak Mathematical Journal

Part I Stochastic variables and Markov chains

Maximum Sum Rate of Slotted Aloha with Capture

The Timing Capacity of Single-Server Queues with Multiple Flows

Communications and Signal Processing Spring 2017 MSE Exam

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

SEVERAL results in classical queueing theory state that

On Common Information and the Encoding of Sources that are Not Successively Refinable

Reliable Data Transport: Sliding Windows

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Archivum Mathematicum

Cooperative Communication with Feedback via Stochastic Approximation

Commentationes Mathematicae Universitatis Carolinae

Robustness of Q-ary collision resolution algorithms in random access systems

On ARQ for Packet Erasure Channels with Bernoulli Arrivals

Giuseppe Bianchi, Ilenia Tinnirello

Lecture 5: Channel Capacity. Copyright G. Caire (Sample Lectures) 122

Transcription:

Kybernetika Andrzej Dziech; Andrzej R. Pach Bounds on the throughput of an unslotted ALOHA channel in the case of a heterogeneous users' population Kybernetika, Vol. 25 (1989), No. 6, 476--485 Persistent URL: http://dml.cz/dmlcz/124672 Terms of use: Institute of Information Theory and Automation AS CR, 1989 Institute of Mathematics of the Academy of Sciences of the Czech Republic provides access to digitized documents strictly for personal use. Each copy of any part of this document must contain these Terms of use. This paper has been digitized, optimized for electronic delivery and stamped with digital signature within the project DML-CZ: The Czech Digital Mathematics Library http://project.dml.cz

KYBERNETIKA- VOLUME 25 (1989), NUMBER 6 BOUNDS ON THE THROUGHPUT OF AN UNSLOTTED ALOHA CHANNEL IN THE CASE OF A HETEROGENEOUS USERS' POPULATION ANDRZEJ DZIECH, ANDRZEJ R. PACH In this paper we give a lower and an upper bound on the intensity of successful packet transmissions and the throughput of an unslotted ALOHA channel in the case of a heterogeneous users' population. These bounds have been derived under the only assumptions of stationarity and independence of traffic streams generated by the users. They are obtained by means of the results from the theory of random pulse streams [9] and depend only on the mean packet transmission times and the intensities of packet generation. 1. INTRODUCTION For the last ten years there has been a significant interest in performance evaluation of random access protocols (see [1] and references therein). Most of the studies in this area have been devoted to protocols with slotted time e.g. the slotted ALOHA. The main reason is that slotted protocols can be conveniently described by Markov chains. Unfortunately, the use of Markov chains to unslotted protocols is not straightforward (see e.g. [2]). In consequence, there are only few results on unslotted protocols in the literature. Most of these results has been obtained for the unslotted ALOHA channel. The first approach to that channel has been made under the assumption that the overall packet traffic on the multiaccess channel is Poissonian [3]. It has been recognized that this assumption is not particulary valid for small users' populations and heavy loads. Another approach has been presented in [4] where it has been assumed that the starting points of packet transmissions at each transmitter form a renewal process. Next, this approach has been generalized in [5], In all above mentioned papers it has been assumed that transmitted packets have the same constant length. In the case of variable length packets the throughput analysis is more laborious. The research in this case was begun in [6] and [7] under the assumption of exponentially distributed "think" time of each user. Another approach has been presented in [8] where it has been assumed that the packet transmissions form collectively a Poisson point process. 476

In this paper we are concerned with an unslotted-aloha-type channel and a heterogeneous population of users. We present bounds on the intensity of successful packet transmissions and throughput under the most relaxed assumptions one can find in the literature, namely of stationarity and independence of traffic streams generated by the users. Our analysis is based on the results from the general theory of random pulse streams [9]. 2. THE MODEL Let us assume that the considered system consists of M users which collectively share a broadcast channel for communication with the common receiver. Each user sends occasionally his information in the form of variable length packets. Then, the signal emitted by each user can be viewed as a sequence of alternating pulses and idle periods of different lengths. Let., x V1 if user m is active at time t. _ 10 otherwise Thus, (A m (t), te( oo. +co)}, m = 1, 2,..., M, are stochastic processes and let us assume that 1) all these processes are stationary, therefore P[A m (t) = 1] = E[A m (t)] = g m, m = 1, 2,..., M, 2) all these processes are mutually independent, therefore p [^m(0 = 1 and A(t) = 1] = 9m9n > » = h 2,..., M, m =# n. We shall denote the average packet transmission time and the average idle period of user m(m = 1, 2,..., M) by r m and a m, respectively. Thus, the intensity of packet generation at user m is X m = l/(a m + x m ) whereas g m = l m x m. Next, we assume that the only source of errors is overlapping of packets in the multiaccess channel. 3. BOUNDS ON THE INTENSITY OF SUCCESSFULLY TRANSMITTED PACKETS The stream of pulses generated by user m can be conveniently represented as PS(m) = (..., x^mt 11, 5MF, 4T 1} j +1 ) where ^Wis pulse i of user m that is the time interval from x { m l) to y m l) when user m remains active. Next, let us denote by PS(l) the set of all pulses generated by all users: PS(l) = (x^y^, m = = 1,2,...,M, i = 0, +1, +2,...). Now let us focus our attention on a family of pulse streams that can be derived from PS(1), PS(2),..., PS(M). Let t be a randomly chosen observation point on the 477

time axis. Then, one may define the pulse stream PS[min (k, M)], k = 1, 2,..., M, as follows t e PS[min (k, M)] if and only if t e at least k elements of PS(l) Note that any point t may belong to at most M elements of PS(l) or does not belong to PS(Z) at all. Figure 1 presents a sample of pulse streams PS(m) and PS[min (k, M)] for M = 3. In this paper we first of all focus ourselves on the pulse stream denoted by PS(+) which is formed from the conflict-free pulses that is non-overlapping in time (see Fig. 1). The intensity of PS( + ) will be denoted by X+. We shall relate it with the User #1 PS(1) User # 2 PS(2) User # 3 PS(3) PS[mm(l,3)] PS[min(2,3)] PŞ[min(3,3)] PS(.) PS(-) Fig. 1. The considered pulse streams for a three user population (M = 3). intensities X mm{]im) and, in turn, with X_ that is the intensities of PS[min (k, M)_ and PS(l), respectively. The intensity A min(fcm) has been derived in [9] under the assumptions mentioned in Section 2 in the following form (i) ^min(fc,m) (?) E i n«.n(i-9;) E 1 ^ - ^ M l) ( l M-l f- l i M-l ; "i l = kn= Ui=l j 4= = m l [_m=l T m j=í j^m 1 gj_ (") where k m is the intensity ofps(m), x m is the average length of pulses generated by user m, M is the number of users, g m = X m r m and (n) denotes that we have the nth combination of / indices m in the brackets. 478

In order to explain the notation used in (l), we present below (l) for k = 2 and M = 3. 4rin(2,3) = 0i02(l - g 3 ) I + ) + Vl?2 1-03/ + 0i0 3 (i - 0 2 ) ( + ) + Vjl T 3 1 - _l 2 / + 020 3 (1 ~ 0l) ( + ' ) +, 1 r1 2 1 T 3 + 010203 + + - 1 - gj It is to be observed that the intensity of conflict-free packets X+ must be less than A min( i jm) since P;S[min (1, M)] also comprises pulses formed from the overlapping ones. Thus, using (1) we get that ( 2 ) ^+ < ^min(l,m) = Ki [1 C 1 * 0j) = ^ m = 1 j" = 1 j'4=m M The right-hand side of the above expression denoted by X v is, in fact, the upper bound on intensity X +. Let us turn now to deriving for a lower bound, X L. We note that a pulse stream PS[min (l, M)] may be splitted into two streams, that is the stream of conflict-free pulses PS(+) of intensity X+ and the stream of pulses PS(-) of intensity X- which is formed from the interfering ones. Thus, we have that (3; X- = A min(1m) X+ M-l On the other hand, we are able to observe that (4) X- < ^min(2,m) since every pulse of PS( ) meets with at least one pulse of PS[min (2, M)]. Substituting (3) into (4), we get that (5) X + > A min(1>m) / min( 2,M) Using (1) we have that M ЛÍ-1 (6) ^>L0mIl(l-0;) m=l j=l j * m i ү = ч.t и J-i 1 - Qj_ j^m It is to be noted that the result A min(ljm) X mln, 2M) may be less than zero for the sufficiently large values of X x, X 2,..., X M. Therefore, in order to determine a lower bound, we take the maximum of X* and zero: (7) X L = max (0, X* L ) 479

From the above considerations we can finally conclude that the intensity X+ in a multiaccess channel has belong to the interval (X L, X v ), that is (8) X L < X+ < X v where X L and X v are given by (7) and (2), respectively. Let us consider the special case of a homogeneous population of users in the sense that X x = X 2 =... = X M = X and x x = x 2 =... = x M = x, then (l) reduces to the following (9) X m, n{km) = AI (Y) 9 1 ' 1 (1-9) M ~ l ~ l Q - Mg) where g = Xx. Using the above result we get the lower and the upper bound as follows (10) X L = max [0, MX(l - g) M ' 2 (l - Mg)] and (11) X V = MX(1 ~g) M ' 1 4. BOUNDS ON THE THROUGHPUT In many cases we are interested in the throughput of a multiaccess channel instead of the intensity X+. Classically, the throughput S is defined as the average number of successfully transmitted bits (i.e. without errors) per time unit. However, in the theory of multiaccess channels we are often faced with another definition that can be expressed as follows (12) S = X+x+ where x+ is the average length of pulses of the stream PS(+). This definition does not take into account the non-demaged bits in the overlapped packets. It is assumed that packets involved in collisions will be retransmitted after elapsing the proper timeout interval. In the following we focus ourselves on the throughput defined by (12). In order to find an upper bound on the throughput we define the pulse stream PS(1,M): t e PS(l, M) if and only if t e exactly one element of PS(l) Let Xn M) an d T (i,m) be the intensity and the average pulse length of PS(1, M). Then, g (l)m) = A (1)M) T (1>M) and it is given by the following formula [9]: M M-1 (13) 9(i,M) = I^mEK 1-9j) V > m m=l = 1 J í'=l = 1 where g m = ^m x m- 480

The quantity #(i,m) represents the probability that at a randomly chosen point on the time axis exactly one user is active. We observe that a pulse stream PS(l, M) comprises all successfully transmitted packets plus non-overlapped parts of packets involved in collisions. Thus, q (1M) is the unconditional channel throughput in terms of error-free bits transmitted. The above remark simply leads us to an upper bound on the throughput defined by (12): (14) S < g il>m) = S v where g ium) is given by (13). In the special case of a homogeneous system in the sense that g x = g 2 =... = g M = = g we get that (15) S < G 1 = s MJ r where G is the total traffic in the channel (G = Mg). The elementary differential calculus shows that the right-hand side of (15) is maximized at G 0 = 1 and then it is equal to (16) C - ( l - l The above result is in fact the channel capacity since the average number of successfully transmitted packets per time unit is always less than C. The same result has been obtained in the other way in [5] but under the assumption of constant length packets. It is worth to note that for very large M we have C» l/e as for the slotted ALOHA channel. Next, it is to be observed also that (14), (15), and (16) do not depend on the type of distribution of traffic generated by users but only on g m, m = 1,2,...,M. Unfortunately, it is impossible to derive a lower bound under such general assumptions using the pulse streams theory since we cannot boun dt+. The only exception is that all users generate identical fixed-length packets. Then T X = T 2 =... = T M = T and T + = T, and hence M- i r M-1 (17) S>Ă L т = S L = max 0, g m [ (l - 9j) where X L is given by (7). 7 = i j*m Let us consider the symmetric case, i.e. X X T = X 2 T one may simply find that i- Z (18) S L = max ;o,c( i- c) (i-ø- In the limit as M --> oo, we get that (19) s L = max [0, G(l - G)~ c ] j " 1 j + m 9j 9jJ) (n) = X x = G/M. Then, 481

One can prove that S L given by (18) has the maximum at (20) G _ 3M - 1 - J(5M 2-6M + 1) 1 2M equal to, v c -4M 2 + 5M - 1 + (2M - 1) V( 5M2-6M + 1) (21) S L, max _ 3M - 1 - V(5M 2-6M + 1) Finally, we conclude that the maximum throughput, S max, can be bounded as given below / <M-1 2M 2 (22) S L, max <S max < (! - - and in the limit case as M -> oo, we get that (23) ( N /5-2)e^- 3 )/ 2 <S niax <l/e At this moment we recall the well-known Abramson's [3] result on the maximum throughput in the case of infinite population of users and constant length packets that is equal to 1/(2 e) and, of course, satisfies (23). 5. NUMERICAL EXAMPLES In the following we shall present numerical examples in order to demonstrate the behaviour of the derived bounds. To begin with, we compare the bounds on the intensity of successfully transmitted packets given by (9) and (10) for a homogeneous population of users with the simulation results. This is displayed in Figs. 2a, b, and c for different number of users, namely 2, 5, and 100, respectively. The simulation results have been gathered for different types of idle periods/packet transmission times distributions, namely Erlang2/uniform, exponential/exponential, and exponential/constant ones. The parameters of packet transmission time distributions have been chosen in such a way that the average transmission time equals one (T 1) in all cases. We observe that all results obtained via simulation lie between the bounds. In the limit cases when G Mg = 0 or oo both bounds are equal to zero, thus for very light and heavy loads they are very close to real values of the throughput. Furthermore, one may note that for the load within the range [0, GJ, where G x maximizes the lower bound and is given by (20), in the case of T 1, the gap between the bounds is little. Therefore, we may approximate the intensity of successfully transmitted packets by X + «(X L + X^2 in the considered range. 482

b) ø.øø 0.20 0.40 0.60 0.80 1.00 TOTAL INTENSITY c) 1.20 1. 40 Fig. 2. The bounds on the intensity of successfully transmitted packets vs. simulation results for a homogeneous population of users, different number of users (M), and types of idle periods/packet transmission times distributions. We note that out of this range X + is considerably sensitive to the type of idle period and packet transmission time distributions. Let us turn now to the case of a heterogeneous population of users. Figures 3a, b,c,d and e show the bounds for five user population (M = 5) in the case of fixed traffic generated by three users [g 1 = g 2 = g 3 ) and variable traffic from two users (but g 4 = g 5 ). We may easy recognize that the behaviour of the bounds is very similar to that presented in Figure 2. The upper bound is valid for any type of idle period and packet transmission time distributions. The greater than zero part of the lower bound is valid only for identical and constant packet transmission times of all users. In the case when x = 1 we have that X L =. S L and X v = S v. When the total traffic offered to the channel is sufficiently large then the lower bound is equal to zero what can be observed in Figures 3d and e. 483

g( 1) = Э C 2) =g( 31=0.05 C 1)=g(2)=g(3)=Є. 15 1 - / // / / /' / / 3.40 0.60 g( 4)=g( 5) g< 1) =g( 2)=g( 3) =0.25 à) 0.40 Ø.бв g(4)=gc5) e) Fig 3. The bounds on the throughput for a heterogeneous population of users (M= = 5) in the case of fixed g = g 2 = 3 and variable g 4 = g 5.

6. CONCLUSIONS The lower and upper bounds on the intensity of successfully transmitted packets and throughput of an unslotted-aloha-type channel were given in the case of arbitrary packet lengths and "think" time distributions. According to the best authors' knowledge they are the first such presented in the open literature. These bounds were obtained under the only assumptions of stationarity and mutual independence of traffic streams generated by the users. The presented bounds are rather applicable to ALOHA systems (i.e. with feedback and retransmissions of erroneous packets) if users' buffers are emptied according to a random selection discipline or to the case of packets identical in length. It is to be mentioned that the assumed model of an ALOHA channel is appropriate to the system with an entry controlling discipline and non-empty users' buffers. It is worth to note that the presented upper bounds are identical with the throughput in the case of open multiaccess channel where these quantities are measured in terms of successfully transfered bits (even if they are contained in collided packets) per time unit. The derived bounds are very easy to obtain because they only depend on the average packet transmission times and intensities of packet streams transmitted by users. These parameters are in most cases easy to predict or estimate. REFERENCES (Received August 8, 1988.) [1] IEEE Trans. Inform. Theory IT-31 (1985), 2, 117 306 (Special Issue on Multiple Access Protocols). [2] A. B. Carleial and M. E. Hellman: Bistable behaviour of ALOHA type systems. IEEE Trans. Commun. COM-23 (1975), 4, 401-410. [3] N. Abramson: The throughput of packet broadcasting channels. IEEE Trans. Commun. COM-25 (1977), 1, 117-128. [4] D. Sant: Throughput of unslotted ALOHA channels with arbitrary packet interarrival time distributions. IEEE Trans. Commun. COM-28 (1980), 8, 1422-1425. [5] B. S. Tsybakov and V. L. Bakirov: Stability of unslotted ALOHA system. Problemy Peredachi Informatsii 20 (1984), 1, 82 94. In Russian. [6] M. J. Ferguson: A study of unslotted ALOHA with arbitrary message lengths. In: Proceedings of the 4th Data Commun. Symp., Quebeck, Canada 1975, 5. 20 5.25. [7] M. J. Ferguson: An approximate analysis of delay for fixed and variable length packets in an unslotted ALOHA channel. IEEE Trans. Commun. COM-25 (1977), 7, 644-654. [8] S. Bellini and F. Borgonovo: On the throughput of an ALOHA channel with variable length packets. IEEE Trans. Commun. COM-28 (1980), 11, 1932-1935. [9] A. Dziech: Principles of Random Streams of Pulses with Applications. Polish Scientific Publishers, Warsaw (to be published in Polish). Prof. Dr. Andrzej Dziech, Technical University of'kielce, Al. Tysiaclecia Panstwa Polskiego 7, 25-314 Kielce and University of Mining and Metallurgy, Department of Telecommunications, Al. Mickiewicza 30, 30-059 Krakow. Poland. Dr. Andrzej R. Pach, University of Mining and Metallurgy, Department of Telecommunications, Al. Mickiewicza 30, 30-059 Krakow. Poland. 485